CN101495973A - N^N data management, access, storage, transmission, exchange and retrieval system (data concentration management) - Google Patents

N^N data management, access, storage, transmission, exchange and retrieval system (data concentration management) Download PDF

Info

Publication number
CN101495973A
CN101495973A CNA2006800549027A CN200680054902A CN101495973A CN 101495973 A CN101495973 A CN 101495973A CN A2006800549027 A CNA2006800549027 A CN A2006800549027A CN 200680054902 A CN200680054902 A CN 200680054902A CN 101495973 A CN101495973 A CN 101495973A
Authority
CN
China
Prior art keywords
data
server
user
database
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006800549027A
Other languages
Chinese (zh)
Inventor
郭培基
Original Assignee
FAST DRAGON INTERNATIONAL HOLDINGS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FAST DRAGON INTERNATIONAL HOLDINGS Ltd filed Critical FAST DRAGON INTERNATIONAL HOLDINGS Ltd
Publication of CN101495973A publication Critical patent/CN101495973A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

Breaking the data into N chunks, each chunk could be stored at a different location as a file or in a database without geographical limits. The system is a combination of component stand along operation. Each component can run on different machine at different locations. There is no geographical limitation. Allow hardware sharing, reuse, and optimal performance. The system allows user to store and manage large volumes of data via a web services XML component based environment. The application is flexible and easy to fit into customers' current server and network environment. It works with all types of customers' existing network platform. Easy deployment saves time and internal network and application conflicts. Data Master can be applied to all industries. The system can work with any type of data. There is no limitation on what type of data. It is a true lossless storage application.

Description

N^N data management, visit, storage, transmission, exchange and searching system (data centralization management)
Background technology
No matter small-sized exchanges data, management and backup are major issue or that large unit faced all the time.Can exchange in real time, management and Backup Data can allow enterprise efficiently and safely run, thereby and because can to make rapid and precise decision-making more competitive.Yet at present, company is big more, and intra-company and the outside problem that exists are big more.Utilize traditional backup of DISK to Image driver and whole magnetic disk image copying to come Backup Data.This can all take hardware resource on the server and client side.The data that retrieval is stored may spend a couple of days or several weeks.Can not shared data between the user.Data can not get management.The user can't determine what to back up, and can not directly visit.This mode inefficiency and expending time in.No matter be small-sized or large-scale company, they all have identical concern and problem.In addition, big data set can make its more difficult transmission, storage, management and retrieval.Data also will continue to increase.We know situation in the future and understand current problem, have designed a kind of new scheme and technology for this reason, can work or own independent operating with any existing system.Invent N^NData Master (data centralization management) system and realized this purpose.Data Master is implemented on the real Enterprise SOA (SOA).
Data Master make much share with mass data, task automation that transmission, storage, management and retrieval are relevant and obtain simplification.Data can be radiographic image, business data, digital voice data, digital of digital video data and a lot of multidata more, are not limited to these forms.This system can utilize all types of datamations.This system realizes this point in the following way:
Thin client, it resides on terminal user's PC, kneetop computer or the mobile device;
User's group: middleware server and database;
Group of server: terminal server and database;
Automatic serving device data backup filing system;
Automatic serving device and database are removed;
The automatic data management (ADM) system;
Automated Data Retrieval System;
UserView (user side) system management;
ServerView (server end) system management.
Many covers or multilayer middleware server can be arranged, but have only a locking terminal server and a database.Terminal server and database are the destinations of all data.The management system based on web by UserView by name and ServerView realizes system management.UserView is a critical piece, and by much constituting than widgets and sharing some assemblies that other critical pieces use, it is managed and configure user group server and database component.ServerView is similar to UserView; But, its management and configuration is group of server server and database.
Usage
DataMaster can be used for from small-sized to medium-sized all enterprises to global large enterprises.It is easy to convergent-divergent and management; The most important thing is that it can utilize the datamation of all kinds.This system is a plug and play system, need not to worry current network system architecture and current safety and network system are made an amendment, and enterprise can easily dispose this system.
The another kind of data storage that is used for meeting includes, but are not limited to notes, the talk of record, meeting video, follow-up report, the E-mail communication of everyone record.By Data Master, only click just can be managed several times, share, transmits and retrieve all these.The meeting of holding in Hong Kong can be stored in Britain at an easy rate, and is retrieved by U.S. somewhere.Can also put teeth in the multilayer access rights.
By the DVD of the Internet and next online transaction of big data transfer components that music is sold directly to households or lease also can be used Data Master.These are different with traditional online shopping; The DVD and the postal delivery of encapsulation need direct marketing and lease.The DVD file is very big, can't pass through Internet transmission.Utilize the N^N Data Master system that strengthens, can pass through Internet transmission DVD.The online DVD leasing company of Netflix type can cut down huge rate usefulness, has eliminated the damage that may cause DVD.Can use the data detection of hereinafter mentioning to send to duplicate disabling component and implement these rules with data.Whole processes at direct marketing DVD on the Internet can implemented on the Internet.To cross over the Internet by DataMaster and send data.This has eliminated mailing, DVD, manufacturing cost, printing material etc.In addition, to duplicate the disabling component version slightly different with data because data detection sends, and therefore only data can be fired once or once also not allow on DVD.Same situation is applicable to that also music is sold directly to households and lease.
Large-scale global financial institution has thousands of branch officeses all over the world.In order to safeguard efficiently and fully soon and shared data that in worldwide their existing systems are out-of-date.DataMaster can efficiently safeguard and shared data in the world in real time.The subclass of Data Master can be installed in each local branch offices, and it is made of thin client and middleware server and database.Can another layer middleware server and database be installed regional level (for example each state, as California and Arizona).Can dispose another layer middleware server and database in major region level (for example West Coast) more.Each layer middleware server all serving as the exchanges data point.Can this mode be continued, up to the N-1 layer always.Last one deck is the N layer, just terminal server and database.This layer is made of all data.
Except exchanges data, also back up efficiently and managing mass data.Data Master prevents the peculiar methods of loss of data in addition.Many grade backups drop to floor level with the chance of loss of data.Can also realize the N+1 layer by increasing extra backup layer to the terminal server layer.Can also realize N+2, N+3.....N+N layer subclass as N^N Data Master system.Therefore the N+1/n layer is represented whole data are assigned in N the chunk (chunk), and allows Backup Data on N server and database.Need not to be subjected to geographic restrictions via N^N Data Master system and can realize all these.A accident if branch offices meets accident, the middleware layer of direct neighbor can restore the data of losing.For example, the N-4 layer can restore the data on the N-3 layer, and N+i or N+1/N or 1 to N-1 layer can restore the data on the N layer.
This system allows the user via environment storage and managing mass data based on web Services XML assembly.This application is very flexible, and is fit to any server and network environment easily.It can utilize all types of network platform work.Dispose and saved the time easily and eliminated internal network and application conflicts.
This system is made of numerous different assemblies.Each assembly can independent operating or is worked together to form critical piece.The critical piece of picture UserView, Serverview, middleware server assembly and terminal server assembly is shared some identical system components.Basic module is called as system component, and they will increase, to generate new critical piece.
The example how system works
With the financial institution is example; The statistician group at rear is implementing the financial modeling project based on the data of this California branch office of mechanism.
In the past, the statistician must will wait for that data center sends data to them.All data at first must be gathered from branch office by data center.When the statistician can use data, data may have some months outmoded.If you are statisticians of the sector, you will can hear " still waiting pending data " the words always.If DataMaster is arranged, this situation has not just been had again.
If DataMaster has been installed, so in branch office, every employee just uses Data Master to back up and the transmission data to data center from his/her this diji.The statistician can by the sky, monthly or the self-defining time period retrieve the copying data of whole California branch office.Can retrieve and use real time data immediately via DataMaster.
DataMaster can:
1. utilize up-to-date and accurate data to improve the accuracy of financial modeling.
2. reduce statistician's stand-by period; Make the throughput rate maximization of group.Statistics expert group can make quick response to the demand of mechanism.
3. this mechanism can tackle market rapidly and accurately make a policy.
4. statistician there and sender eliminate the cost of magnetic tape station or hardware there again.
5. save in data center's one side data acquisition to together and place the time used on tape, CD or the DVD.
6. save the time of retrieval of statistician's one side or loading data.
7. if transportation data is saved trucking costs.
8. know in the electronics mode and retrieve and store data, rather than transport by carrier.
Technical progress and advantage
1. safe and reliable
2. flexible and scalable
3. true-time operation
4. to data volume/form without limits
5. guarantee the quality of data and integrality
6. be easy to use and manage
7. minimizing hardware costs
Safety and reliable
1. data can be divided into the N piece, stride a plurality of servers and/or database storing then.Invade this system and will only can retrieve one or some blocks of data, do not have constructive method, the piece number is limited, data can not be put together.
2. can on all levels, encrypt during the data transmission.During data transmission, can utilize different encryption keys that above-mentioned every blocks of data is encrypted.
Above above piecemeal and storage means, essential will the encryption every blocks of data by different way, the hacker just can't retrieve any significant data like this.
3.Data Master prevents the peculiar methods of loss of data in addition.Many grade backups drop to floor level with the chance of loss of data.Can be on a plurality of servers Backup Data.Can also realize the N+1 layer by increasing extra backup layer to the terminal server layer.Can also realize N+2, N+3.....N+N layer subclass as N^N Data Master system.Therefore the N+1/n layer is represented whole data are assigned in N the chunk, and allows Backup Data on N server and database.Need not to be subjected to geographic restrictions via N^N Data Master system and can realize all these.A accident if branch offices meets accident, the middleware layer of direct neighbor can be recovered the data of losing again.For example, the N-4 layer can recover the data on the N-3 layer, and N+1 or N+1/N or 1 to N-1 layer can recover the data on the N layer.
4. carry out reliable transmission through the Internet.Data Master has thin client and uses SOAP and Web service communicates and data access and transmission.It uses direct http/https two-way communication and real-time processing data transmission.
5. this system can be used for all types of safety approachs, for example SSL and VPN.Any existing internal data safety approach can be used with Data Master.
6. unwanted database will be eliminated based on predefined condition by this system; This condition only can be changed by the power user.Only can eliminate data by user with privilege.
7. the MSMQ technology based on transaction also implemented is with the data integrity of guaranteeing banking and the transaction security of other types.
Flexible and scalable
This system allows the user via environment storage and managing mass data based on web Services XML assembly.This application is very flexible, and is fit to client's current server and network environment easily.It can utilize the work of client's existing network platform.Dispose and saved the time easily and reduced internal network and application conflicts.
This system is made of numerous different assemblies.Each assembly can independent operating or is worked together to form critical piece.The critical piece of picture UserView, Serverview, middleware server assembly and terminal server assembly is shared some identical system components.Basic module is called as system component, and they are bases of critical piece.This is applied as real SOA.
1.Data the assembly among the Master is to utilize such as the state-of-the-art technology of Web Services, SOAP and XML to develop.We make the dirigibility of this system reach highest level based on framework, design and the realization of N^N layered component.
2. this system allows big data storage.Can come convergent-divergent storage space easily by increasing extra disk space, hardware even magnetic tape station storage system.
3. assembly is arranged along operation.Each assembly may operate on the different machine at different locations.There is not the restriction of geographical aspect.Allow the sharing of hardware, repeated use and optimum performance.
4. scalable and flexible.N^N layered component Web business structure allows user's panntographic system easily.The deployment of user's group is disposed the same simple with user's group and group of server.In addition, can carry out multilayer based on the scale of unit and dispose, and can reduce based on the demand of unit or the deployment of expansion multilayer.Referring to N^N layering deployment diagram.
5. locomotive function has been enabled by this system.Allow mobile device to be connected to server, share and Backup Data by http/https the thin client on subscriber set.
6. this system can be used for all types of safety approachs, for example SSL and VPN.
Any existing internal data safety approach can be used with Data Master.
True-time operation
Large-scale global financial institution has thousands of branch officeses all over the world.In order to safeguard efficiently and fully soon and shared data that in worldwide their existing systems are out-of-date.Data Master can efficiently safeguard and shared data in the world in real time.The subclass of Data Master can be installed in each local branch offices, and it is made of thin client and middleware server and database.Can another layer middleware server and database be installed regional level (for example each state, as California and Arizona).Can dispose another layer middleware server and database in major region level (for example West Coast) more.Each layer middleware server all serving as the exchanges data point.Can this mode be continued, up to the N-1 layer always.Last one deck is the N layer, just terminal server and database.This layer is made of all data.
To data volume/form without limits
1.Data Master can be used for all industries.
2. this system can utilize the datamation of any kind.To the data of what type without limits.
3.Data Master allows the transmission large data sets.Can easily large data sets be transferred to server and retrieve by simple drag-and-drop operation by client site.Current, measure big data and be difficult to transmission or send, so company uses ftp or data are placed on tape, DVD or the CD, then it is sent by post far or branch offices.The take over party must want loading data, this very consuming time and inefficiency.Utilize Data Master, can transmit in real time, storage, management and retrieval large data sets.It is more safe and reliable than current ftp.Reduced at branch offices reads or management data is required big cost hardware or magnetic tape station.In addition, delivery overnight or other postal delivery running costs have also been reduced.
Guarantee the quality of data and integrality
1.Data Master accepts all types of data.It is a kind of true lossless storage application.
2. guarantee the integrality and the backup of data.Database is a real-time update, can backrush, and during file transfer, there is different schemes to come the block data visit or upgrade, and keeps transmission to keep data integrity.
3. also implemented data integrity and the transaction security type of MSMQ technology to guarantee banking based on transaction.
4. nomenclature scheme has solved real-time conflict of the same name.
5. implement Priority Queues to keep data integrity and to judge that those data have highest priority until lowest priority.
Be easy to use and manage
1. share.Allow by the Internet shared data, the different user in perhaps can being organized by same user is the retrieval network filing data easily, can be by the different user real-time retrieval to many parts of copies.
2. dispose easily.Data Master is applicable to current existing network and security architecture.It is the external annex of current environment, does not need current network is done any change.Can thin client easily be installed by web.
3. manageable.Can be by based on the ServerView of web and UserView server admin instrument and remote service and scheduling tool management server easily.
4. locomotive function has been enabled by this system.Allow mobile device to be connected to server, share and Backup Data by http/https the thin client on subscriber set.
5. use easily.If you need storage, transmission and retrieve data, only need to carry out single operation, for example click and drag and drop.
6. find data easily, terminal client can check and search metadata that thin client resides on terminal user's the machine, for example on PC, kneetop computer and the mobile device by thin client.The user can use them that the limited understanding utilization of data is clicked search and retrieve data.
7. management automatically.When data entered system, system can or extract in the metadata arrangement information associated with the data rather than True Data collection.This system uses and compiling of metadata manages True Data then.In case data are dragged and dropped in the thin client, and the meta-data extraction assembly will extract the metadata of True Data and carry out data management and retrieval with it.User or keeper do not need to come by hand management data.
8. automatic data backup.In case the user is dragged and dropped into Backup Data in the thin client, user's work has just been finished.To automatically data be backuped to down one deck user based on predetermined set by system and organize server and database or group of server server and database, this setting is provided with by the keeper.
9. automatic serving device and database are removed.System will be according to the predefined stale data of eliminating on the different layers storer that is provided with, and this setting is provided with by the keeper.
10. Automated Data Retrieval System.The single click will make system find data and retrieve data by copying data is beamed back this diji.Not needing the people loads tape, searches True Data and then it is beamed back the user.
Reduce hardware costs
1. utilize Data Master, backup and storage is True Data but not the backup of DISK to Image driver during the backup of the company data of routine.Do like this and will eliminate the demand of server one end Internet resources and big storage space.
2. can use server or of equal value and conventional machine based on low-cost PC.This has reduced hardware costs.
3. hardware is reused.Can reuse indivedual or a plurality of Data Master assemblies that old hardware device moves diverse location.For example, to may operate in RAM be that 512MB, hardware space are on the Pentium II or equivalent device of 6G to the journal file assembly.Can also be used for DB Backup by the machine that some are old.Reuse hardware and can reduce the hardware spending of enterprise.
Other assemblies
Data Master has other inventions that much are associated with this system.
Cache module, it has used some existing system assemblies.Design is to allow shared data between one group of contiguous colleague.Co-workers group often will be used the similar data collection, is identical data sometimes.With no matter when need data all from next-door neighbour's middleware server different with the database retrieval data be, can be from having the adjacent machines retrieve data of copying data.This will significantly reduce network traffics and server bottleneck.For realizing this purpose, need place the pocket server of high-speed cache in the position of thin client.
Segmentation module makes system data can be divided into N fritter, and when bandwidth constraints is arranged data transmission is arrived client or server.The recipient can be reassembled into data its original form.
Encrypting module is used in the password protection district among the Data Master at present, also can work and it is expanded to another level with segmentation.It can be encrypted the data of transmitting in our exclusive mode.It can also rearrange each section by different order, and allows they to be re-assemblied at recipient's one end based on the demoder and the order of definition.
The background synchronization module can be carried out synchronously utilizing traditional backup scenario backed up data, and the current data of needs backups or hard disk drive and previous DISK to Image driver backed up data are carried out synchronously.Carry out simultaneously with backup synchronously, rather than at first backup is synchronous then.Necessary data that this module does not only have on the transmission server or the data of upgrading version.This module can be saved taking of huge disk space on the server and bandwidth.
The backstage add-on module is the expansion of background synchronization module.It carries out the data that are used for traditional backup scenario and DataMaster standby system synchronously.If do not back up some data in Data Master, this system will search these data and determine what this does so.The backstage add-on module will all be created the link of leading to the data physical location in the N^N storage system on user's machine and conventional store disk.If these data are judged as Data Master Backup Data, will send email need to determine whether Backup Data to the person in charge.
Data detection sends assembly and will be structured on the current system component.The time period that its data that allow to retrieve are survived on retrieval person's hard disk drive and set.In case surpass this time period, data can autocide.
Data are duplicated disabling component also will use a lot of current system components.It does not allow to carry out data and duplicates.The combination that this technology is based on encryption, digital ID and public/private key scheme realizes.In order to open data, demoder, suitable key and correct digital ID will be needed.Different machines or different environment will have different demoders, key and digital ID.It can keep the integrality of data, eliminates data and duplicates and revise.
Data detection can be sent and duplicate disabling component with data and be widely used for a lot of industries, especially credit inquiry institute and large-scale financing corporation.Per minute is all in the transmission of carrying out large data sets.Complete tape, DVD or CD are issued by the mode of payment overnight.Some be for project based on the basis of debt-credit, yet under most of situation, after debt-credit expiration, data will keep unknown period at this place.Under many circumstances, transmission be misdata, need on tape, DVD or CD, regenerate new data set and subsequently it is delivered to this place.Expense is very high.On the contrary, if by Data Master storage or management data, can utilize simple several times this task of accurately cost efficiency is arranged finishing of clicking so.In addition, remote site can be saved thousands of dollars that spend on the expensive tape that is used to read data on the tape and the magnetic tape station.Sometimes can change hands some big data sets in order to gain.Utilize data detection to send and duplicate disabling component, with data management with control to best practice with data.
Automated back-up, data transmission and removing.Automaticdata transmission is based on that being provided with of defining among the UserVi ew carry out.In case finish transmission, will descend Backup Data on one deck middleware server and database or group of server server and the database.In case backed up data safely, will on sender's server and database, remove automatically.If arrived the term of validity of data, will clear data, otherwise data may continue to be deposited on server and the database.Finish after the everything feelings, will show and confirm report.
Can change the data dictionary assembly a little, DataMaster is applied to all industries.It can be used for the data of any kind and be suitable for the deployment of any kind.
Version
In order to be easy to adopt, same application has six different editions.It is identical that central principle keeps, but regulate demand, budget and environment to adapt to different clients by different way.
1) not at the scene, allow the server farm of client by being connected to us via storing and manage the radiography image based on the security context of web.At small-to-medium business or there is not internal technology expert's company that this is regulated.
2) scene allows the client to buy whole Data Master, in the operation of client's place.The client will trust all data securities.This provides comfortable environment more for the height confidential data.We will adjust demand and the current environment of Data Master to adapt to the client.We also will provide support and customize for produced on-site.
3) mix the place, allow the client to use our place to come management data, but True Data is stored on their central server.System only comprises the information of metadata or relevant these data by certain mode, and True Data still is positioned at client's place.The client will trust all data securities.This provides comfortable environment more for the height confidential data.We will provide data base administration and other versions with same user interface.On client's place, store data by the XML mapping framework.
4) OEM allows technology company to utilize available Data Master assembly or interface to carry out the OEM of product.Core component will remain unchanged, but user interface meeting change, with product or the system that is applicable to the OEM affiliate.
5) accessing wirelessly can allow the client through wireless device management data or related data.Allow the keeper to manage bill, report, emails and other utility routines via wireless device.
6) single copy uses for the individual.Visit by virtual drive.A one-step process.Access rights do not need extra login process, because will be judged based on the windows the user name and password by system.Can be via Windows Directory UI management data.
Dispose
Total system can run on the server and client on the machine, also can be deployed to N user on the N platform machine by variety of way and organize database, a N user and organize on server, a N group of server database, a N group of server server and N the client.
Pocket configuration is to move 5 layers on two machines with N client in all places, 2 servers and 2 database servers.
No matter company or organize current physical location where and branch offices where, their current network architecture, hardware resource and technical specialist and technician's position is how, can easily dispose Data Master.Yet we need know above all factors, so that dispose and install correct assembly in correct place.In case we have known the fact, we just can determine go which platform machine where those operations and assembly to be installed.We can according to layer, according to assembly or according to assembly and the layer combination it is set.We can allow server and database server only handle login process, allow central Journaling File System handle journal file, and utilize a plurality of layers that it is carried out convergent-divergent; Perhaps we can be on its oneself layer every layer of operation.Every kind of situation all is unique but similar.
The Technical Architecture general introduction
The pocket version that has shown Data Master on following one page.The basic framework synoptic chart shows this system and how comprises what critical piece in communication and every layer between all component.It has schematically illustrated high-level framework what has looked like.(referring to the basic framework general survey of Fig. 1.)
There is shown Data Master integral body in the N^N deployment.(dispose referring to Fig. 2 N^N.)
Also Data Master can be divided into user's group and group of server, to provide clearer and more definite illustration.(referring to Fig. 3, single N layering user organizes definition to please refer to user's group.) and the server picture group show (referring to Fig. 4, single N hierarchical service device group definition).
N layering user organizes high-grade design and (organizes definition referring to the single N layering of Fig. 3 user.)
This system self comprises following critical piece:
The ClientView interface; User's group, middleware storer, semipermanent memory; The user organizes server (middleware server); Data access layer; Database server; ClientView is to the Https/http communication of middleware server; Middleware server is to the Https/http communication of middleware server; User's group system assembly; The ClientView inquiry proxy; UserView web administration system; The data transmission reporting interface; The system optimization module; User's group scheduling automated back-up and data transmission; The user organizes automatic removing; Daily record and activation record database; The log interface layer
The high-grade design of N hierarchical service device group (defines referring to the single N hierarchical service of Fig. 4 device group.)
This system self comprises following critical piece:
Group of server server (terminal server); The group of server database server; The group of server server is to N+1 ..., the Https/http communication of N+N or 1/N group of server server; Middleware server is to the Https/http communication of terminal server; The group of server system component; The group of server inquiry proxy; The group of server data access layer; ServerView web administration system; The system optimization module; Group of server scheduling automated back-up and data transmission; Group of server is removed automatically; Automatically Email notifies; Daily record and activation record database; The log interface layer; Terminal server storer, permanent memory; Optional magnetic tape station automated back-up scheme N layering user group is enabled
For each following critical piece, enable them by the practical object in the source code.These objects have also been listed below.
The ClientView interface:
Keeper's login, user's login, the assembly of checking with User Status, assembly is checked in tabulation with admin state, search component with User Status, search component with admin state, view data with docking window is checked assembly, view data with dynamic array view is checked assembly, view data with tree-like view is checked assembly, view data with admin state is checked assembly, view data with User Status is checked assembly, view data with increase is checked assembly, have the updated images data and check assembly, view data with deletion is checked assembly, allowing for every kind of pattern uses different color schemes to filter every kind of pattern with button, the password encryption scheme, the password decrypt scheme, the view that refreshes with User Status, the view that refreshes with admin state, the filing image that request is selected, selected own, cancellation is selected owns, the deletion selected item, add screen, drag and drop, menu is checked and is refreshed, menu is checked thumbnail, size, menu is checked requested image, menu is checked selected digital image, menu image upgrades, the menu image deletion, menu image adds, menu label is checked, menu label adds, menu access is nullified.
User's group, middleware storer, semipermanent memory:
Tbl management, tbl dictionary, tbl view data, tbl image, tbl daily record, tbl user
The user organizes server (middleware server):
File upload service, Web service test suite,
The centralized server web service that client one side has IIS is provided with data access layer:
Cdata object, DataAccessWs, Web service MDAC database server:
The middleware database script
ClientView communicates by letter to the Https/http of middleware server:
Web service XML SOAP assembly, Web service file transmitting assembly
Middleware server is communicated by letter to the Https/http of middleware server:
Web service XML SOAP assembly, Web service downloaded assembly
User's group system assembly:
Library component, Cencrypt object, Cdecrypt object
The ClientView inquiry proxy:
Cadministration object, access layer object, Cdictionary object, CimageData object, Cimages object, ClistView object, ClistViewSet object, Cusers object, Cvalidation object, ClientView object, ImageDataLayer object, ImageDataUI object
UserView web administration system:
Admin_Archive module, Admin_Management module, filing module, deletion filing module, deletion administration module, UserView primary module, login module, cancellation module, administration module
The system optimization module:
XRY2DIB object, classification ordering, bitmap object, SearchUI object
User's group scheduling automated back-up and data transmission:
File transfer object, CfileTransfer object, FileTransferSetup
The user organizes automatic removing: remove object automatically
Data transmission report interface: the report user interface after the automatic data backup
Daily record and activation record database: tblLog
Log interface layer: Clog
N hierarchical service device group is enabled
For each following critical piece, enable them by the realistic objective in the source code.These objects have also been listed below.Therefore some assemblies may be had a large amount of assemblies of sharing by user's assembly crossover between group.Some assemblies are for can not be slightly different on the same group.
Group of server server (terminal server):
File upload service, file download service, Web service test suite, has the Web service setting of IIS
Group of server database server: terminal database script
The group of server server is to N+1 ..., the Https/http communication of N+N or 1/N group of server server:
Web service XML SOAP assembly, file upload service, Web service file transmitting assembly
Web service file download component, Web service downloaded assembly
Middleware server is communicated by letter to the Https/http of terminal server:
Web service XML SOAP assembly, file upload service, Web service file transmitting assembly
Web service file download component, Web service downloaded assembly
The group of server system component:
Library component, Cencrypt object, Cdecrypt object
The group of server data access layer
Cdata object, DataAccessWs, Web service MDAC
ServerView web administration system
Admin filing module, Admin record keeping module, Admin administration module, filing module, record keeping module, deletion filing module, deletion administration module, ServerView primary module, login module, cancellation module, administration module
The group of server inquiry proxy:
Cadministrat ion object, Carchive object, Cusers object, Cmanagement object
System optimization module: cut apart, automaticdata removes
Group of server scheduling automated back-up and data transmission:
File transfer object, CfileTransfer object, FileTransferSetup
Group of server is removed automatically: remove object automatically
Automatically Email notifies: Web service Email assembly
Daily record and activation record database: tblLog
Log interface layer: Clog
Terminal server storer, permanent storage, tblManagement, tblArchive, tblUsers
Optional magnetic tape station automated back-up scheme:
Enable assembly and allow magnetic tape station and this system's plug and play
Data Master systematic technical indicator
Data backup and storage via ClientView
According in the white paper in the step of below the operation steps of user perspective, listing, obtain new data via ClientView.
During the process of adding new data or data set, extract metadata.For every kind of new data generates data-base recording.
User the next-door neighbour organizes storing data information on the server.True Data is stored on the independent machine or the user organizes on the server.Preferably, be stored in and organize database server and user with the user and organize server independently on the machine.This is the consideration for safety and performance.
Database server keeps all metadata and the data that are associated with True Data.
Middleware server handles system management, data access layer, with the communicating by letter and safety problem of other servers or database server.
True Data will be stored on the independent machine, and it can be on the client place, at our server farm place, in New York or Little Rock even in India.
In UserView web administration system, after default (can dispose) term of validity, stamp timestamp to data-base recording and go forward side by side row labels for filing by the user.Listed detailed step in white paper, these are the operation stepss from user Group administrators angle.
Organize in the database server in case data are added to next-door neighbour's user, data just are under " activity " pattern now, and this state is represented by the green highlighted background of last this line data of ClientView.
ClientView is the thin client on desktop computer, mobile device or the laptop computer that is in the terminal user.Data retrieval at project partly designs, and allows the user to search for by any field of using in the data dictionary, to find data list (or data set) and to select data to check.If on the group of server server, data are filed, will give information to the user as mentioned above so, this object will ask to obtain data from the group of server server.
Search, the keeper can search for database with regard to metadata, and for example, whether data filing, site number, data number etc.The user can utilize the data that are associated with True Data based on current data available search data available.All search can be adopted and/or concern.In case finish search, all return results will be display update the left side of ClientView window.
Can expand this interface, to have the ability of searching for fully to any field.
Automaticdata transmission and backup
Automaticdata transmission is based on that being provided with of defining in the administrative section of UserView carry out.Date of filling and timing definition will when transmit data.
The user organizes that server will be got in touch down one deck user group or the group of server server transmits with log-on data.
In case finish transmission, will descend Backup Data on one deck middleware server and database or group of server server and the database.
When the transmission data, ClientView will change into red " transmission " state to the color background of data line.
In case transmitted data fully, ClientView will change into the data line color background " filing " state of black.
Finish after the transmission, sender and recipient's database is all upgraded, to reflect the variation of data message.
During each the processing, all can generate log record.
Confirm screen, it contains a column information relevant with being transmitted data.Each bar in this tabulation is all represented the data transmission of whether succeeding, if success then represent failure cause.
Automatically remove
In case backed up data safely, will on sender's server and database, remove automatically.If arrived the term of validity of data, will clear data, otherwise data may continue to be deposited on server and the database.
As long as meet the date and time of setting, dispatcher software will move.This circulation will return repetition himself, remove the non-administrator by in the UserView system management, redefining filing data and the time changes routine.
The failure period of data is meant should be from the date that middleware server clears data.It also is based on following formula calculating:
The failure period=" first data transmission being organized the date and time of server and database to the user "+" grace period ".
When first data transmission being obtained first to the moment that the user organizes server and database.
Via UserView be set by the user Group administrators grace period.
During each the processing, all can generate log record.
Confirm screen, it contains data list, and which data and whether success and failure cause are removed in expression.
Fault processing
If the user attempts the retrieve data via ClientView in the positive transmission data, so can be at show tags below the state part, inform these data of user just in transmit stage, the suggestion user is not that " in the transmission " and field background are no longer tried again in red in pattern.
Communication
The default communication port-for-port 80 of user's group and group of server.But, the keeper can be provided with the communication port within user's group and the group of server.They need not to be identical port, as long as sender and recipient have accurate setting on port numbers.
User's group and server group communication are all undertaken by web business, soap and XML.
The requestor sends request.Send request via the Internet by http and https.The web serviced component that is positioned at the reception server on the web server will only be handled request when needed.
Http and https are bidirectional communication protocol; Reception server allows the requestor know what has been lost.Event schema and callback feature permission system set up two-way communication.
Data access layer
At every turn when database request is obtained data,, open database once more after the authentication of requestor's log-on data storehouse and authentication meet the requirement of database server.
The inquiry proxy object will obtain data by the Query Database request.
Data retrieval
When the user wished to retrieve a application program, the user at first must select one or more project on ClientView, clicked " the selected project of request " button then, to obtain the copy of these data from user's group or group of server request.
Send request command to server, server will be located these data and copy download is arrived the requestor there.
If the data of not finding will send email message to the keeper, allow it search data by hand, also can send email message to the requestor, allow the requestor go and find out what's going on.This can occur in usually since hard drive space limited with data when database or server are transferred to position such as tape or CD.
Each processing all can be recorded in the log sheet.
Exchanges data
If group or the user within user's group do not wish to check or visit data, the user Group administrators must allow this group or user accesses data by UserView for user's group is provided with user ID and password.If user or group are current via ClientView calling party group, then must on strong ClientView, patch be installed.
Can be by the UserView administrative section the enforcement access privileges is set.Referring to white paper, from user Group administrators's operation steps part.
Keep accounts
ServerView has accounting feature, allows the group of server system to keep accounts for user's group system.
Accounting system is chosen wantonly, with such as not at the scene with mix the live version no-float, details are referring to white paper version part.
System is from management and log sheet retrieval charging information.Can keep accounts based on group of server keeper's requirement.
Daily record
Log store can be installed in it within any position or user group or the group of server in the log sheet of tblLog by name.They can also all share a center daily record.
Clog is the layer of handling all inquiries and the authentication of database.It is also communicated by letter with web service data access layer.
Database design
The user organizes database
Relevant database comprises following leading schedule:
The dictionary form has the principle of DICOM data dictionary.
The mark of 8 unitss will be represented field name and size etc.This label information is stored in the form and uses when searching in database.
This form is used for determining should be with other form data presented types, its length and field name in report.
SiteNo is and the relation of management table SiteNo field, represents that this data markers should be explained in the mode of this record description SiteNo field data.
Field Type Length
Mark Numeral-unique primary key (not automatic numbering)
SiteNo Relation
RefName Text 50
Display Name Text 50
Data type Numeral
Data length Numeral
Usage flag Logic
User's table storage and user-dependent all data.It is used to make user ID and password to come into force so that login.
Recording mechanism is a primary key.
The password field of encrypting is preserved the encryption version of user password.
Action field shows whether the user is movable.
It is domestic consumer, custodian, only contact person or keeper that rank field is followed the tracks of the user.
Field Type Length
RecordNo Automatic numbering-unique primary key
SiteNo Relation with management table SiteNo field
Employee-number Text 50
Employee-name Text 50
Login name Text 25
Encrypted ones Text 50
Movable Logic
Grade Only contact person domestic consumer handles the keeper
Email Text
100
Image table storage True Data.
Pathname storing path information.
In case successfully image is transferred to group of server, just filing field mark for true.
User field comprises the user who creates these data.
Field Type Length
ImageNo Automatic numbering (unique primary key)
SiteNo Relation with management table SiteNo field
Acquisition time Time on date
Pattern Search
The path Text 255
Expiration Date Time on date
File Logic
Date of filling Time on date
The user Numeral
The data that the ImageData table storage is relevant with True Data.It is the form relevant with True Data.Data itself are write as with the received text form.Data dictionary provides explains that reading of data how and this item field show the means of length.
Field Type Length
RecNo Automatic numbering
SiteNo Relation
ImageNo Relation
Marker number Relation
Data Text 255
The user Relation
Management table is preserved data filing and is retrieved and used be connected and identify necessary data.The user name of website should be unique for all clients and website.
The encrypted ones field is the encrypted fields that sends by the Internet.
If the UseEncryption mark is set to very, then the SSL data encryption must to be used.
Whether UseCompression label table registration is according to compressing.
Filing day field determines which day of a week be this system should begin to send data.
Time of filing is the time that begins to handle, and should be expressed as 24 hours military time.
Grace period is that the fate-acquiescence of preserving data in next-door neighbour's middleware server should be 7 days.
Field Type Length
SiteNo Unique primary key
Site name Text 50
Encrypted ones Text 50
The site contact Text 50
The site affiliation phone Text 16
The IP address Text (but being the tcp/ip address format) 11
Port Numeral
AETitle Text 50
The archive file folder Text 255
The retrieving files folder Text 255
Server ip Text (but being the tcp/ip address format) 11
Service-Port Numeral
User encryption Logic
Use compression Logic
Filing day Numeral
Time of filing Time
Grace period Numeral (fate of retention data before the deletion)
The daily record charting is to the activity of data and the data that are associated with True Data.All processing of this charting.The daily record form can independently be installed, and perhaps group can share one, or even all groups can share one.
Field Type Length
LogNo Unique primary key
SiteNo Relation with management table SiteNo field
Login time Time on date
ImageNo Relation-image form ImageNo field
ImageDataNo Relation-view data form RecNo field (, also can be sky) if it is only specific to image
Action Numeral
The user Numeral
The group of server database
The group of server database can comprise user's form, is used for the purpose of verification and authentication.Each group of server will have user's form, and perhaps according to client's environment, they all share one.
Management table is preserved the data of relevant user's group or indivedual record keeping and contact details.
Field Type Length
ClientNo Automatic numbering-unique main field
Client name Text 50
Main address Text 100
Main address 2 Text 50
The city Text 50
The state Text 50
Postcode Text 15
Country Text 50
Administrative contact person Text 50
AdminPhone Text 16
When and where filing form tracking data is placed in the group of server database.
Purge date is the date of permanent elimination data.If this field is empty, eliminate data so never.
The physical location field is used to be kept at the description that where can find data.
Notes are the memo fields that are used to write down about any notes of this record.
The type of data type field data of description, for example bmp and wav.
File type data of description filing medium thereon.
The filename of file data file by name does not comprise the path.
File name is call number or filing media name.
Field Type Length
ArchiveNo Automatic numbering (unique primary key)
ImageNo Relation-image form mageNo field
Date of filling Time on date
File name Text 100
Filename Text 255
File type Text 50
Data type Text 20
Purge date Date
Remove Logic (being defaulted as vacation)
Physical location Text 255
Notes Memo field

Claims (7)

1. date storage method comprises:
Data are divided into N chunk, every can not be subjected to geographic restrictions as file storage at diverse location or be stored in the database; This system is the combination that assembly is arranged along operation; Each assembly may operate on the different machine at different locations; There is not the restriction of geographical aspect; Allow the sharing of hardware, repeated use and optimum performance; This system allows the user via environment storage and managing mass data based on web Services XML assembly; This application is very flexible, and is fit to client's current server and network environment easily; It can utilize various types of customers'existing network platform work; Dispose and saved the time easily and reduced internal network and application conflicts; Data Master can be used for all industries; This system can utilize the datamation of any kind; To the data of what type without limits; It is a kind of true lossless storage application.
2. data security method comprises:
Can on all levels, encrypt during the data transmission; During data transmission, can utilize different encryption keys that above-mentioned every blocks of data is encrypted; Invade this system and will only can retrieve one or some blocks of data, do not have the data block of constructive method and some, data can not be put together; Above above piecemeal and storage means, essential will the deciphering every blocks of data by different way, the hacker just can't retrieve any significant data like this.
3. data back up method comprises:
Data Master prevents the peculiar methods of loss of data in addition; Guarantee the integrality and the backup of data; Database is a real-time update, can backrush, and during file transfer, there is different schemes to come the block data visit or upgrade, and keeps transmission to keep data integrity; Also implemented data integrity and the transaction security type of MSMQ technology to guarantee banking based on transaction; Many grade backups drop to floor level with the chance of loss of data; Can be on a plurality of servers Backup Data; Can also realize the N+1 layer by increasing extra backup layer to the terminal server layer; Can also realize N+2, N+3.....N+N layer subclass as N^N Data Master system; Therefore the N+1/n layer is represented whole data are assigned in N the chunk, and allows Backup Data on N server and database; Need not to be subjected to geographic restrictions via N^N Data Master system and can realize all these; A accident if branch offices meets accident, the middleware layer of direct neighbor can restore the data of losing; For example, the N-4 layer can restore the data on the N-3 layer, and N+1 or N+1/N or 1 to N-1 layer can restore the data on the N layer.
4. N^N system architecture comprises:
Scalability and dirigibility; N^N layered component Web business structure allows user's panntographic system easily; The deployment of user's group is disposed the same simple with user's group and group of server; In addition, can carry out multilayer based on the scale of company and dispose, and can reduce based on the demand of company or the deployment of expansion multilayer; N^N referring to Fig. 2 disposes.
5. automatic management method comprises:
When data entered system, system can or extract in the metadata arrangement information associated with the data rather than True Data collection; This system uses and compiling of metadata manages True Data then; In case data are dragged and dropped in the thin client, and the meta-data extraction assembly will extract the metadata of True Data and carry out data management and retrieval with it; User or keeper do not need to come by hand management data; Automatic data backup allows system automatically data to be backuped to down one deck user based on predetermined set and organizes server and database or group of server server and database, and this setting is provided with by the keeper; Automatic serving device and database are removed; System will be according to the predefined stale data of eliminating on the different layers storer that is provided with, and this setting is provided with by the keeper; Automated Data Retrieval System; The single click will make system find data and retrieve data by copying data being beamed back the subscriber's local machine.
6. background synchronization method comprises:
System can carry out synchronously utilizing traditional backup scenario backed up data, and the current data of needs backups or hard disk drive and previous DISK to Image driver backed up data are carried out synchronously; Carry out simultaneously with backup synchronously, rather than at first backup is synchronous then; Necessary data that this module does not only have on the transmission server or the data of upgrading version; This module can be saved taking of huge disk space on the server and bandwidth; The backstage add-on module is the expansion of background synchronization module; It carries out synchronously the data that are used for traditional backup scenario and Data Master standby system; If do not back up some data in Data Master, this system will search these data and determine what this does so; The backstage add-on module is created the link of data physical location on the machine that leads to the user and the conventional store disk in the N^N storage system; If these data are judged as Data Master Backup Data, will send email need to determine whether Backup Data to the person in charge.
7. a data detection sends with data and duplicates disabling component, comprising:
Data are duplicated disabling component and are not allowed duplicating of data; The combination that this technology is based on encryption, digital ID and public/private key scheme realizes; In order to open data, demoder, suitable key and correct digital ID will be needed; Different machines or different environment will have different demoders, key and digital ID; It can keep the integrality of data, eliminates data and duplicates and revise; Complete tape, DVD or CD are issued by the mode of payment overnight; Some be for project based on the basis of debt-credit, yet under most of situation, after debt-credit expiration, data will keep unknown period at this place; Under many circumstances, transmission be misdata, need on tape, DVD or CD, regenerate new data set and subsequently it is delivered to this place; Expense is very high; On the contrary, if by DataMaster storage or management data, can utilize simple several times this task of accurately cost efficiency is arranged finishing of clicking so; Utilize data detection to send and duplicate disabling component, with data management with control to best practice with data.
CNA2006800549027A 2006-06-09 2006-06-09 N^N data management, access, storage, transmission, exchange and retrieval system (data concentration management) Pending CN101495973A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2006/001275 WO2007143882A1 (en) 2006-06-09 2006-06-09 N^n data management, access, storage, transfer, exchange and retrieval system (data master)

Publications (1)

Publication Number Publication Date
CN101495973A true CN101495973A (en) 2009-07-29

Family

ID=38831389

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006800549027A Pending CN101495973A (en) 2006-06-09 2006-06-09 N^N data management, access, storage, transmission, exchange and retrieval system (data concentration management)

Country Status (2)

Country Link
CN (1) CN101495973A (en)
WO (1) WO2007143882A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107430668A (en) * 2015-01-03 2017-12-01 迈克菲股份有限公司 Backed up for personal device and the safe distribution of cloud data
CN110727638A (en) * 2012-11-12 2020-01-24 伊诺卡姆公司 Data system and data method in electronic system and machine readable medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7861281B2 (en) * 2005-12-30 2010-12-28 Reflexis Systems, Inc. System and method for facilitating the transfer of information relating to quality of an organization
US9268807B2 (en) * 2013-07-17 2016-02-23 Sybase, Inc. In-memory bitmap for column store operations

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7277941B2 (en) * 1998-03-11 2007-10-02 Commvault Systems, Inc. System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device
JP4317296B2 (en) * 1999-09-17 2009-08-19 株式会社ターボデータラボラトリー Parallel computer architecture and information processing unit using this architecture
CN100525288C (en) * 2000-10-26 2009-08-05 普里斯梅迪亚网络有限公司 Method and apparatus for large payload distribution in network
CN1299207C (en) * 2005-01-21 2007-02-07 清华大学 Large scale resource memory managing method based on network under SAN environment
CN1304961C (en) * 2005-03-11 2007-03-14 清华大学 Memory virtualized management method based on metadata server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727638A (en) * 2012-11-12 2020-01-24 伊诺卡姆公司 Data system and data method in electronic system and machine readable medium
CN110727638B (en) * 2012-11-12 2023-09-15 伊诺卡姆公司 Data system and data scheduling method in electronic system and machine readable medium
CN107430668A (en) * 2015-01-03 2017-12-01 迈克菲股份有限公司 Backed up for personal device and the safe distribution of cloud data
CN107430668B (en) * 2015-01-03 2020-10-27 迈克菲有限公司 Secure distributed backup for personal devices and cloud data

Also Published As

Publication number Publication date
WO2007143882A1 (en) 2007-12-21

Similar Documents

Publication Publication Date Title
US9524306B2 (en) Global information management system and method
CN104813276B (en) Recover database from standby system streaming
US20070100834A1 (en) System and method for managing data in a distributed computer system
US8818957B2 (en) Employing user-context in connection with backup or restore of data
US20110225123A1 (en) Multi-dimensional surrogates for data management
US20050160088A1 (en) System and method for metadata-based distribution of content
WO2007002412A2 (en) Systems and methods for retrieving data
CN104603740A (en) Archival data identification
CN104520822A (en) Data storage application programming interface
CN102193899A (en) System for managing data across a plurality of environments and method thereof
CN101601027A (en) The synchronization framework of the application program that is used for connecting once in a while
WO2012058385A2 (en) Integrated customer communications computer system and process for implementing same
US20140379661A1 (en) Multi source unified search
US7657585B2 (en) Automated process for identifying and delivering domain specific unstructured content for advanced business analysis
CN110569670A (en) Encryption and design method of enterprise annuity based on block chain
CN109255587A (en) A kind of cooperative processing method and device of operational data
CN101495973A (en) N^N data management, access, storage, transmission, exchange and retrieval system (data concentration management)
US20110137866A1 (en) Method for generating backup script
WO2020112993A1 (en) Systems and methods for data usage monitoring in multi-tenancy enabled hadoop clusters
CN113259411B (en) Article tracking method based on RFID and mixed block chain-edge architecture
EP1205855A2 (en) Data managing method, data managing system, data managing apparatus, data handling apparatus, computer program, and recording medium
CN114169887A (en) Reconciliation system based on distributed data nodes
KR20020070274A (en) Systems and Methods of Message Queuing
CA3169976A1 (en) System, method, and device for uploading data from premises to remote computing environments
Jessen An Overview of ESI Storage & Retrieval

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: GUO CHUN

Free format text: FORMER OWNER: XUNLONG INTERNATIONAL GROUP CO., LTD.

Effective date: 20100601

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 000000 FLOOR 3, TOWER 3, TAIGU PLAZA, NO.1, EAST OF QUEENSWAY, HONGKONG, CHINA TO: GEOGIA, USA

TA01 Transfer of patent application right

Effective date of registration: 20100601

Address after: Georgia

Applicant after: Guo Chun

Address before: 3 floor 3, Pacific Plaza, 1 Queen's Road East, 000000, Hongkong, China

Applicant before: Fast Dragon International Holdings Limited

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090729