CN102567472B - Built-in database based high-efficient data deleting and restoring method - Google Patents

Built-in database based high-efficient data deleting and restoring method Download PDF

Info

Publication number
CN102567472B
CN102567472B CN201110415320.XA CN201110415320A CN102567472B CN 102567472 B CN102567472 B CN 102567472B CN 201110415320 A CN201110415320 A CN 201110415320A CN 102567472 B CN102567472 B CN 102567472B
Authority
CN
China
Prior art keywords
packet
data
deleted
storage unit
backup
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110415320.XA
Other languages
Chinese (zh)
Other versions
CN102567472A (en
Inventor
战炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiuyin Technology (Nanjing) Co.,Ltd.
Original Assignee
CAPE LABS (BEIJING) TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CAPE LABS (BEIJING) TECHNOLOGY CO LTD filed Critical CAPE LABS (BEIJING) TECHNOLOGY CO LTD
Priority to CN201110415320.XA priority Critical patent/CN102567472B/en
Publication of CN102567472A publication Critical patent/CN102567472A/en
Application granted granted Critical
Publication of CN102567472B publication Critical patent/CN102567472B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a built-in database based high-efficient data deleting and restoring method, which sequentially includes a packet generating step, a packet storing step, a packet damage detecting and converting step, a packet deletion detecting step, a packet relevance comparing step and a packet dynamic monitoring and restoring step. Accordingly, the technical problem that data which are accidentally deleted and lost possibly cannot be restored or are poor in restoring effect in the prior art is solved, the function of instantly thoroughly restoring deleted data caused by misoperation of users is realized and can be kept for a long time by remote support of a server, and risk in data loss of operation of a built-in operation system for users is effectively reduced and convenience is provided for the users.

Description

Efficient data based on embedded database is deleted and restoration methods
Technical field
The invention belongs to microcomputer data processing field, particularly a kind of efficient data based on embedded database is deleted and restoration methods.
Background technology
Along with scientific and technical development, people delete the data of computing machine and recover to require and improve constantly, and wherein, extendfile allocation table is that Microsoft is in a kind of file system that can replace Fat16, Fat32 of issue in 2006.
Hard disk typically comprises the user data area of some, is synchronizing information before them, and described synchronizing information comprises preamble (preamble) and data sync pattern (data sync pattern).Preamble is used to make phase place and Frequency Synchronization at asynchronous during read, and data sync pattern is used to limit the starting point of a series of user data.In operation, circuit search data sync pattern, and process the data sampling in a series of orders receptions of the position acquisition relevant to this data sync pattern.Sometimes, data sync pattern is lost, and causes retry (retry), wherein with one or more of searching methods, carrys out identification data synchronous code-type.These searching methods are usually that cost is higher with regard to circuit and time.In addition, in some cases, described searching method can not identification data sync mark, causes data degradation.
Therefore,, at least for above-mentioned reason, there is in the art the demand to the more advanced system and method from storage medium recovery data.
ExFat file system and Fat16, Fat32 file system are similar on storage organization, and wherein DBR is dos boot record; $ Bitmap is exFat file system for the system file of the situation that takies of storing bunch; FAT table is file memory location record in disk; $ UpCase file is the system file of capital and small letter character conversion.In DBR, preserve the very important information of subregion, file system is carried out some parameters of reading and writing of files and from DBR, is obtained exactly, carries out after format manipulation, and DBR and backup DBR just can be destroyed, cause the file in disk to give for change.
The existing method that data after exFat partition format are recovered, general employing repaired the DBR of DBR and backup, realizes data and recovers.But the technical difficulty that this method realizes is large.If the DBR of DBR and backup is not modified, just must by loaded down with trivial details calculating, realize data and recover.Not only cost is high, and inefficiency.
Along with the development of network technology, Video Supervision Technique, due to advantages such as its authenticity, reliability and popularity, is widely used and development rapidly in all trades and professions such as security protection, traffic, finance, education; And along with the construction of safe city, Video Supervision Technique also becomes current hot technology.
In Video Supervision Technique, video data is except can be for real-time monitoring, can also first store, for follow-up playback, the audio, video data of simulation is after the numerical coding compression of scrambler is processed, can be sent on network for displaying live view, and can be simultaneously by identical audio, video data by the network storage in memory device.
Concrete, in Video Supervision Technique, scrambler is for after being converted to digital signal by analog audio-video signal and using real-time audio and video compression algorithm to process, corresponding audio, video data is transferred in network, and general external IP (the Internet Protocol that standard is provided of this scrambler, internetworking protocol) interface or SCSI (Small Computer System Interface, small computer system interface) interface, and memory device also has the interface identical with scrambler.
In audio, video data transmitting procedure, scrambler can pass through at dedicated network, ADSL (Asymmetric Digital Subscriber Line, ADSL (Asymmetric Digital Subscriber Line)) or on satellite link audio, video data is passed through to UDP (User Datagram Protocol, User Datagram Protocol)/TCP (Transmission Control Protocol, transmission control protocol) agreement or iSCSI (Internet SmallComputer System Interface, Internet small computer system interface), NFS (network file system(NFS), Network File System) agreement is written to audio, video data in memory device.
Audio, video data is being written to memory device,, in the process of audio, video data transmission, is having the possibility of losing audio, video data.For example, audio, video data is sent to memory device from producing to, can be due to the emergency case of scrambler code stream; Go-between transmission (for example, packet loss, time delay, out of order, shake etc.) in bad order; And degradation reason causes the audio, video data of needs storage to be lost under the storage data burst of memory device, array, disk performance, thereby affect the integrality of audio, video data in memory device.
In encoder-side, need to carry out audio, video data collection, audio, video data generation, obtain the operations such as a frame audio, video data, scrambler is written to memory device by audio, video data by network afterwards, and at memory device end, need to receive audio, video data, and audio, video data is written to the operations such as disk.
When adopting said method to store audio, video data into memory device, because can causing audio, video data, loses many reasons, and the audio, video data in memory device goes out after active, and the audio, video data of losing cannot recover.
And in order to recover the audio, video data of losing, in prior art, (for example can on scrambler, connect a memory device, disk, SD card etc.), scrambler in audio, video data transmitting procedure is being written to audio, video data in the process of memory device by network, can write a identical audio, video data in local memory device (being above-mentioned disk, SD card etc.).When network storage equipment generation audio, video data is lost, can in the memory device of scrambler this locality, find the audio, video data of loss, so that the audio, video data of losing in the network storage equipment is recovered.
In encoder-side, need to carry out audio, video data collection, audio, video data generation, obtain a frame audio, video data, scrambler is written to memory device by audio, video data by network afterwards, and this audio, video data is write to local memory device; And at memory device end, need to receive audio, video data, and audio, video data is written to the operations such as disk.
But, for example, when scrambler originally connects a memory device (, disk, SD card etc.) on the ground, need extra large capacity storage resource; And the consideration based on cost, extra capacity of memory device can be less than the capacity that memory device distributes to scrambler, i.e. and local memory device video recording (being corresponding audio, video data) can be less than the video time on the network storage equipment T.T.; After finding that on the network storage equipment video recording does not exist, that understands large probability cannot find corresponding video recording in the storage of this locality.
In embedded system, as in communication transmission equipment capacious, in board software operational process, often need to the data in embedded system, manage by data management module, data management module generally adopts the file list structure of embedded database or similar database to manage to the data in embedded system, good in order to guarantee the data stability of embedded system, and can exist lastingly, these tables of data need be kept on physical storage medium.High speed development along with embedded technology; user is more and more higher to the demand of data stability; but board software in operational process when running into the reasons such as power down or program exception reset; may cause the abnormal of data or lose; therefore need to back up data; to when data exception or loss, carry out data recovery.
In prior art, recovery to data in embedded system, whether some is consistent by the difference section divided data content of the check code that relatively current database produces and memory block check code, inconsistently carry out data recovery, the method that this data are recovered, can only prevent loss of data, and the data that corresponding factor data file and data file structure itself are damaged cannot be recovered.In this existing Data Recapture Unit, two check code storage spaces are also set simultaneously, have increased the physical store resource burden of embedded system.
On computer operating system and related software, have at present and take the anti-delete function of data and the independent data recovery function in each application program inside that " recycle bin " be representative, as " cancelling " function in microsoft office office suite.Thisly take that data that " recycle bin " be representative are anti-deletes the data protection effect that file-level is provided with Restoration Mechanism; but cannot instead with the data of each application program inside delete and recover associated and be used in conjunction with, cause final user must remember the own data of the operation note of each application program being given for change to maloperation.This mode is very not directly perceived for the user of first learning computer operating system and application program, and is very easy to allow consumer get lost in the process of finding maloperation data.
Simultaneously, along with user uses the increase of computer time, operation note and data in recycle bin are also restricted, such as after using long period of time, it is full that computer system can promote user's recycle bin, must empty accordingly operation and can continue to use.In the process emptying inevitably can lost part or whole maloperation records, further reduced the possibility that user gives maloperation data for change.Under user's scene that multimedia file is widely used at present, user will often use the file of the big data quantities such as picture, video, even can surpass over time the storage medium capacity of system itself.The content in recycle bin is will be inevitably deleted or empty in this case, and the scene that this capacity overflows must cause the loss of user misoperation record.
In addition, because the user operation records of preserving in application program not adopts the mode that disk is read and write in real time, therefore the data rewind of all user's service datas and " cancelling " operation is all kept in the internal memory of computing machine temporarily, once computing machine bolt down procedure, restart, shutdown or power-off, whole user's operation information and related data all will be lost.Even if user can find corresponding application program after maloperation, also often because interval bolt down procedure, restart, the operation such as shutdown or power-off and cause giving for change corresponding data, thereby brought the risk of loss of data for user.
In embedded OS field, comprise and be not limited to the equipment such as mobile phone, personal digital assistant (PDA), Set Top Box, panel computer and Industry Control.There is no similarly to possess user data database data, system data database data and user file data completely instead deletes and the product of restore funcitons and relevant user's operating process simultaneously.
Summary of the invention
Object of the present invention provides a kind of efficient data based on embedded database to delete and restoration methods, by packet, produce step successively, packet storing step, packet destructive test switch process, packet is deleted detecting step, packet is associated steps and packet dynamic surveillance recovering step relatively, having solved the various customer data that may cause of the prior art surprisingly deletes loss and cannot recover or technical matters that recovery effects is poor, realized the ability that user misoperation data are deleted instant recovery more thoroughly, and can be by the remote support with server, the data recovery capability of possessing for a long time user, thereby effectively reduce user in the risk of embedded OS operating aspect obliterated data, for user provides convenience.
For achieving the above object, the present invention is achieved by the following technical solutions:
A kind of efficient data based on embedded database of the present invention is deleted and restoration methods, it is characterized in that, described method in turn includes the following steps:
Step 1, packet produce: embedded database is created to unified access interface function, interface proxy module, interface service module, and wherein interface proxy module is provided for the interface accessing controll block of record interface and application program identification information; Start embedded device, scan successively the mark of described data in embedded database piece; Determine claimed storage area; By described, determine that the data block in claimed storage area is divided into a plurality of data groups again, add feature sequence number to form a plurality of packets in each data group, described feature sequence number comprises the data type of packet, affiliated frame and/or field;
Step 2, packet storage: the packet in step 1 is stored in to storage unit A, the packet backup information in step 1 is stored in to storage unit B;
Step 3, the conversion of packet destructive test: configuration receives and carries out several and for the detection components of destroying packet and non-destruction packet, the storage unit A in above-mentioned steps two detected, and wherein between detection period, identifies concrete destruction packet and changes described concrete destruction packet so that described concrete destruction packet is converted to non-destruction packet;
Step 4, packet are deleted and are detected: the packet in the step 3 that detection receives after the conversion of packet destructive test, according to the feature sequence number in the packet after packet destructive test conversion in the step 3 receiving, determine the packet that deletion occurs; Wherein, described feature sequence number comprises the data type of packet, affiliated frame and/or field; In data storage, identify initial deleted data item again, receive described initial deleted data item, according to from described initial deleted data item, transaction journal sign that derive from or that rely on relies on data item, identify transaction journal and show by the data item dependence that does not have deleted office to rewrite or that derive from, and in data storage, completely cut off described initial deleted data item and show by the data item derivation that does not have deleted office to rewrite or that rely on from described transaction journal;
Step 5, packet is more associated: by comparing unit A, receive the data that comprise the moment that will return to and recover after instruction, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares, the packet of the data type of coupling is sent to first by processing unit A and process notice, by processing unit A, received after the first processing notice again, the packet of coupling corresponding in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated A of mark, and send relatively A notice to comparing unit B, by comparing unit B, receive after comparison A notice, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares again, the packet of unmatched data type is sent to second by processing unit B and process notice, by processing unit B, received after the first processing notice again, unmatched packet in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated B of mark, by associative cell A, receive after associated notice again, the associated A of described mark is created in to a hidden partition in storage unit B with the associated B of described mark, wherein, the value of statistical indicant of this subregion is changed with predetermined characteristic value, and this subregion is converted to the hidden partition that routine operation system application can not be accessed,
Step 6, packet dynamic surveillance are recovered: by dynamic surveillance computing machine, the hidden partition in step 5 is monitored, when monitoring deleted file, by the corresponding list item that is stored in back-up file directories table and the file allocation table of reading in storage unit B with packet backup information in step 2, contrast mutually, the relevant entries of reduction current file allocation table, by virtual partition, read backup file allocation table and the File Directory Table in hidden partition, cover current file allocation table and File Directory Table.
As an optimal way, the packet in above-mentioned steps one is by sequentially sampling and obtain on axle in sweep time data.
As an optimal way, what the packet in above-mentioned steps one was stored is lteral data, video data or voice data.
Advantage of the present invention and effect can not only overcome the deficiencies in the prior art, and by the operation successively of above-mentioned steps, even if can realize user, carried out one or more data modification operation on equipment, the scene of operation includes but not limited to newly-increased or revises or delete and all can effectively realize more thoroughly recovering of its data.Meanwhile, system, when user carries out aforesaid operations, automatically at running background managing process, is entered user's Operation Log, associated data and file backup after a unified data protection engine, is encrypted with safeguard protection and operates.In addition, if the time of user misoperation, system journal, data file long or maloperation were excessive, the detailed content of this operation note will be kept at by network on the webserver limiting without storage, and can carry out far call for user, reaches the object of searching, locating and recovering data.
In the tide of mobile Internet and Internet of Things fast development, embedded OS is being played the part of more and more important effect, and it is professional, stability and mobility are that enterprise and personal user bring great convenience and application scenarios fully.For example the smart mobile phone of the annual consumption of Chinese market is just up to ten thousand of 3000-5000.In this simultaneously, because it relies on gentlyer to system hardware, allow a large amount of user data and operation leave traditional desktop type or server-type computer system, formed new use habit and the mode of any time, any place, any scene.And then brought embedded OS itself to multitask, concurrent running program and the direction evolution that produces a large number of users data stream.
Use the equipment of embedded OS in mobile context, to use often, as mobile phone or industrial control equipment, the feature of user's operation is multithreading and multitask, tends to use equipment in the situation that energy disperses, and the possibility of maloperation is than using PC greatly to improve.The present invention can help user effectively to protect most important data, afterwards making up after maloperation particularly, thus reduce the threshold that user uses embedded OS, and use the satisfaction of embedded OS equipment.
Embodiment
Below in conjunction with embodiment, further set forth the present invention.
Embodiment 1:
Efficient data based on embedded database is deleted and a restoration methods, it is characterized in that, described method in turn includes the following steps:
Step 1, packet produce: embedded database is created to unified access interface function, interface proxy module, interface service module, and wherein interface proxy module is provided for the interface accessing controll block of record interface and application program identification information; Start embedded device, scan successively the mark of described data in embedded database piece, wherein, packet is by sequentially sampling and obtain on axle in sweep time data; Determine claimed storage area; By described, determine that the data block in claimed storage area is divided into a plurality of data groups again, add feature sequence number to form a plurality of packets in each data group, described feature sequence number comprises the data type of packet, affiliated frame and/or field;
Step 2, packet storage: the packet in step 1 is stored in to storage unit A, the packet backup information in step 1 is stored in to storage unit B;
Step 3, the conversion of packet destructive test: configuration receives and carries out several and for the detection components of destroying packet and non-destruction packet, the storage unit A in above-mentioned steps two detected, and wherein between detection period, identifies concrete destruction packet and changes described concrete destruction packet so that described concrete destruction packet is converted to non-destruction packet;
Step 4, packet are deleted and are detected: the packet in the step 3 that detection receives after the conversion of packet destructive test, according to the feature sequence number in the packet after packet destructive test conversion in the step 3 receiving, determine the packet that deletion occurs; Wherein, described feature sequence number comprises the data type of packet, affiliated frame and/or field; In data storage, identify initial deleted data item again, receive described initial deleted data item, according to from described initial deleted data item, transaction journal sign that derive from or that rely on relies on data item, identify transaction journal and show by the data item dependence that does not have deleted office to rewrite or that derive from, and in data storage, completely cut off described initial deleted data item and show by the data item derivation that does not have deleted office to rewrite or that rely on from described transaction journal;
Step 5, packet is more associated: by comparing unit A, receive the data that comprise the moment that will return to and recover after instruction, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares, the packet of the data type of coupling is sent to first by processing unit A and process notice, by processing unit A, received after the first processing notice again, the packet of coupling corresponding in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated A of mark, and send relatively A notice to comparing unit B, by comparing unit B, receive after comparison A notice, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares again, the packet of unmatched data type is sent to second by processing unit B and process notice, by processing unit B, received after the first processing notice again, unmatched packet in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated B of mark, by associative cell A, receive after associated notice again, the associated A of described mark is created in to a hidden partition in storage unit B with the associated B of described mark, wherein, the value of statistical indicant of this subregion is changed with predetermined characteristic value, and this subregion is converted to the hidden partition that routine operation system application can not be accessed,
Step 6, packet dynamic surveillance are recovered: by dynamic surveillance computing machine, the hidden partition in step 5 is monitored, when monitoring deleted file, by the corresponding list item that is stored in back-up file directories table and the file allocation table of reading in storage unit B with packet backup information in step 2, contrast mutually, the relevant entries of reduction current file allocation table, by virtual partition, read backup file allocation table and the File Directory Table in hidden partition, cover current file allocation table and File Directory Table.
Embodiment 2:
Efficient data based on embedded database is deleted and a restoration methods, it is characterized in that, described method in turn includes the following steps:
Step 1, packet produce: embedded database is created to unified access interface function, interface proxy module, interface service module, and wherein interface proxy module is provided for the interface accessing controll block of record interface and application program identification information; Start embedded device, scan successively the mark of described data in embedded database piece; Determine claimed storage area; By described, determine that the data block in claimed storage area is divided into a plurality of data groups again, in each data group, add feature sequence number to form a plurality of packets, described feature sequence number comprises the data type of packet, affiliated frame and/or field, and what described packet was stored is lteral data, video data or voice data;
Step 2, packet storage: the packet in step 1 is stored in to storage unit A, the packet backup information in step 1 is stored in to storage unit B;
Step 3, the conversion of packet destructive test: configuration receives and carries out several and for the detection components of destroying packet and non-destruction packet, the storage unit A in above-mentioned steps two detected, and wherein between detection period, identifies concrete destruction packet and changes described concrete destruction packet so that described concrete destruction packet is converted to non-destruction packet;
Step 4, packet are deleted and are detected: the packet in the step 3 that detection receives after the conversion of packet destructive test, according to the feature sequence number in the packet after packet destructive test conversion in the step 3 receiving, determine the packet that deletion occurs; Wherein, described feature sequence number comprises the data type of packet, affiliated frame and/or field; In data storage, identify initial deleted data item again, receive described initial deleted data item, according to from described initial deleted data item, transaction journal sign that derive from or that rely on relies on data item, identify transaction journal and show by the data item dependence that does not have deleted office to rewrite or that derive from, and in data storage, completely cut off described initial deleted data item and show by the data item derivation that does not have deleted office to rewrite or that rely on from described transaction journal;
Step 5, packet is more associated: by comparing unit A, receive the data that comprise the moment that will return to and recover after instruction, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares, the packet of the data type of coupling is sent to first by processing unit A and process notice, by processing unit A, received after the first processing notice again, the packet of coupling corresponding in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated A of mark, and send relatively A notice to comparing unit B, by comparing unit B, receive after comparison A notice, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares again, the packet of unmatched data type is sent to second by processing unit B and process notice, by processing unit B, received after the first processing notice again, unmatched packet in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated B of mark, by associative cell A, receive after associated notice again, the associated A of described mark is created in to a hidden partition in storage unit B with the associated B of described mark, wherein, the value of statistical indicant of this subregion is changed with predetermined characteristic value, and this subregion is converted to the hidden partition that routine operation system application can not be accessed,
Step 6, packet dynamic surveillance are recovered: by dynamic surveillance computing machine, the hidden partition in step 5 is monitored, when monitoring deleted file, by the corresponding list item that is stored in back-up file directories table and the file allocation table of reading in storage unit B with packet backup information in step 2, contrast mutually, the relevant entries of reduction current file allocation table, by virtual partition, read backup file allocation table and the File Directory Table in hidden partition, cover current file allocation table and File Directory Table.
The present invention is not limited to above-mentioned specific embodiment, is not deviating under spirit of the present invention and real situation thereof, and those of ordinary skill in the art can make according to the present invention various corresponding changes and distortion.Within these corresponding changes and distortion all should belong to the protection domain of claims of the present invention.

Claims (3)

1. the efficient data based on embedded database is deleted and a restoration methods, it is characterized in that, described method in turn includes the following steps:
Step 1, packet produce: embedded database is created to unified access interface function, interface proxy module, interface service module, and wherein interface proxy module is provided for the interface accessing controll block of record interface and application program identification information; Start embedded device, scan successively the mark of described data in embedded database piece; Determine claimed storage area; By described, determine that the data block in claimed storage area is divided into a plurality of data groups again, add feature sequence number to form a plurality of packets in each data group, described feature sequence number comprises the data type of packet, affiliated frame and/or field;
Step 2, packet storage: the packet in step 1 is stored in to storage unit A, the packet backup information in step 1 is stored in to storage unit B;
Step 3, the conversion of packet destructive test: configuration receives and carries out several and for the detection components of destroying packet and non-destruction packet, the storage unit A in above-mentioned steps two detected, and wherein between detection period, identifies concrete destruction packet and changes described concrete destruction packet so that described concrete destruction packet is converted to non-destruction packet;
Step 4, packet are deleted and are detected: the packet in the step 3 that detection receives after the conversion of packet destructive test, according to the feature sequence number in the packet after packet destructive test conversion in the step 3 receiving, determine the packet that deletion occurs; Wherein, described feature sequence number comprises the data type of packet, affiliated frame and/or field; In data storage, identify initial deleted data item again, receive described initial deleted data item, according to from described initial deleted data item, transaction journal sign that derive from or that rely on relies on data item, identify transaction journal and show by the data item dependence that does not have deleted office to rewrite or that derive from, and in data storage, completely cut off described initial deleted data item and show by the data item derivation that does not have deleted office to rewrite or that rely on from described transaction journal;
Step 5, packet is more associated: by comparing unit A, receive the data that comprise the moment that will return to and recover after instruction, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares, the packet of the data type of coupling is sent to first by processing unit A and process notice, by processing unit A, received after the first processing notice again, the packet of coupling corresponding in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated A of mark, and send comparing unit A notice to comparing unit B, by comparing unit B, receive after comparing unit A notice, data type in packet backup information in storage unit B Backup Data in the data type of the packet that will recover and above-mentioned steps two compares again, the packet of unmatched data type is sent to second by processing unit B and process notice, by processing unit B, received after the first processing notice again, unmatched packet in the packet backup information in the storage unit B Backup Data in above-mentioned steps two is carried out to the associated B of mark, by associative cell A, receive after associated notice again, the associated A of described mark is created in to a hidden partition in storage unit B with the associated B of described mark, wherein, the value of statistical indicant of this subregion is changed with predetermined characteristic value, and this subregion is converted to the hidden partition that routine operation system application can not be accessed,
Step 6, packet dynamic surveillance are recovered: by dynamic surveillance computing machine, the hidden partition in step 5 is monitored, when monitoring deleted file, by the corresponding list item that is stored in back-up file directories table and the file allocation table of reading in storage unit B with packet backup information in step 2, contrast mutually, the relevant entries of reduction current file allocation table, by virtual partition, read backup file allocation table and the File Directory Table in hidden partition, cover current file allocation table and File Directory Table.
2. the efficient data based on embedded database according to claim 1 is deleted and restoration methods, it is characterized in that, the packet in above-mentioned steps one is by sequentially sampling and obtain on axle in sweep time data.
3. the efficient data based on embedded database according to claim 1 is deleted and restoration methods, it is characterized in that, what the packet in above-mentioned steps one was stored is lteral data, video data or voice data.
CN201110415320.XA 2011-12-14 2011-12-14 Built-in database based high-efficient data deleting and restoring method Active CN102567472B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110415320.XA CN102567472B (en) 2011-12-14 2011-12-14 Built-in database based high-efficient data deleting and restoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110415320.XA CN102567472B (en) 2011-12-14 2011-12-14 Built-in database based high-efficient data deleting and restoring method

Publications (2)

Publication Number Publication Date
CN102567472A CN102567472A (en) 2012-07-11
CN102567472B true CN102567472B (en) 2014-04-02

Family

ID=46412882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110415320.XA Active CN102567472B (en) 2011-12-14 2011-12-14 Built-in database based high-efficient data deleting and restoring method

Country Status (1)

Country Link
CN (1) CN102567472B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103986898B (en) * 2014-06-03 2017-02-01 四川效率源信息安全技术股份有限公司 Method for extracting remnant videos and deleted videos in DVR hard disk
CN106843746B (en) * 2015-12-04 2020-04-10 四川效率源信息安全技术股份有限公司 Data analysis and extraction method based on embedded security equipment
CN109117314B (en) * 2015-12-18 2021-04-16 福建随行软件有限公司 Anti-misoperation data rapid recovery method and system
CN110874377A (en) * 2018-08-08 2020-03-10 青岛海信移动通信技术股份有限公司 Data processing method and system
CN110474800B (en) * 2019-08-09 2022-01-11 北京直真科技股份有限公司 Method for maintaining stability of resource data of transmission comprehensive network management system
CN110784482B (en) * 2019-11-04 2022-03-25 浙江国利信安科技有限公司 Message storage method and device of industrial audit system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1275023A (en) * 1999-05-15 2000-11-29 三星电子株式会社 Deleting and recovering method of stream object and recording medium for storing its additional information
CN1886741A (en) * 2003-11-27 2006-12-27 皇家飞利浦电子股份有限公司 Storage system for retaining identification data to allow retrieval of media content
CN1904887A (en) * 2006-07-28 2007-01-31 珠海金山软件股份有限公司 Method for searching deleted document from assigned catalogue in FAT volume
CN101364192A (en) * 2007-08-09 2009-02-11 英华达(上海)电子有限公司 Recovery method and system after data being cancelled by mistake and electronic appliance

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1275023A (en) * 1999-05-15 2000-11-29 三星电子株式会社 Deleting and recovering method of stream object and recording medium for storing its additional information
CN1886741A (en) * 2003-11-27 2006-12-27 皇家飞利浦电子股份有限公司 Storage system for retaining identification data to allow retrieval of media content
CN1904887A (en) * 2006-07-28 2007-01-31 珠海金山软件股份有限公司 Method for searching deleted document from assigned catalogue in FAT volume
CN101364192A (en) * 2007-08-09 2009-02-11 英华达(上海)电子有限公司 Recovery method and system after data being cancelled by mistake and electronic appliance

Also Published As

Publication number Publication date
CN102567472A (en) 2012-07-11

Similar Documents

Publication Publication Date Title
CN102567472B (en) Built-in database based high-efficient data deleting and restoring method
US10019184B2 (en) Amortized snapshots
US9703640B2 (en) Method and system of performing incremental SQL server database backups
CN102012851B (en) Continuous data protection method and server
CN102955720B (en) A kind of method improving ext file system stability
US8868858B2 (en) Method and apparatus of continuous data backup and access using virtual machines
US9043280B1 (en) System and method to repair file system metadata
US20070208918A1 (en) Method and apparatus for providing virtual machine backup
CN103226965B (en) Based on the audio/video data access method of time bitmap
US20070294310A1 (en) Method and apparatus for storing and recovering fixed content
WO2009132211A1 (en) Systems and methods for reliably managing files in a computer system
CN112052121B (en) Hard disk data recovery method and system
WO2019223377A1 (en) File processing method, apparatus and device, and storage medium
CN113886143B (en) Virtual machine continuous data protection method and device and data recovery method and device
KR101674176B1 (en) Method and apparatus for fsync system call processing using ordered mode journaling with file unit
US9311189B2 (en) Method and device for inputting data in multimedia service database on embedded device
CN114461456A (en) CDP backup method, system, storage medium and recovery method based on continuous writing
CN112380067A (en) Metadata-based big data backup system and method under Hadoop environment
CN104156669A (en) Computer information evidence obtaining system
CN104965835A (en) Method and apparatus for reading and writing files of a distributed file system
CN116483284B (en) Method, device, medium and electronic equipment for reading and writing virtual hard disk
CN104794025A (en) Method for quick verification on storage device
CN111475334A (en) TiDB database maintenance method and device, computer equipment and storage medium
CN110659162A (en) Data recovery method, device and system of TPSFS file system and storage medium
US12045134B2 (en) Copy data management system and method for modern application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230821

Address after: Room 801, Building B, Tengfei Building, No. 88 Jiangmiao Road, Nanjing Area, China (Jiangsu) Pilot Free Trade Zone, Nanjing City, Jiangsu Province, 210000

Patentee after: Jiuyin Technology (Nanjing) Co.,Ltd.

Address before: 5332, 5th Floor, Shenchang Building, No. 51 Zhichun Road, Haidian District, Beijing, 100190

Patentee before: CAPE LABS (BEIJING) TECHNOLOGY Co.,Ltd.