CN102799542A - Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof - Google Patents
Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof Download PDFInfo
- Publication number
- CN102799542A CN102799542A CN201210240635XA CN201210240635A CN102799542A CN 102799542 A CN102799542 A CN 102799542A CN 201210240635X A CN201210240635X A CN 201210240635XA CN 201210240635 A CN201210240635 A CN 201210240635A CN 102799542 A CN102799542 A CN 102799542A
- Authority
- CN
- China
- Prior art keywords
- overlayer
- data
- configuration information
- disk
- layer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a disk protection system of a tree-form multilayer cover layer of a sector increment and an implementing method thereof. The disk protection system and the implementing method comprise a disk filter drive, a configuration information module, a current layer and a history cover layer, wherein the disk filter drive is used for implementing reading-writing redirections to writing filter data of a protected partition through the current layer and the history cover layer, the configuration information module is used for storing a configuration information structure which consists of multiple levels structures; the multiple levels of structures include a disk protection system configuration information sector, multiple cover layer information of each partition, position information of each cover layer of the partition and a layer information sector in turn; the address of the next level of structure is stored in the front level of structure, and the tree-form hierarchical structure of multiple layers of cover layers can be analyzed only through the disk protection system configuration information sector. According to the disk protection system and the implementing method, multiple layers of covering layers are effectively organized through a configuration information structure so as to support multiple functions of the cover layers, each cover layer is of a tree-form organization structure, and the privacy and the safety of the data in each cover layer can be protected.
Description
[technical field]
The present invention relates to tree-like multilayer tectal disk protect system and its implementation of a kind of sector increment.
[background technology]
In the network environment of current complicacy; Various viruses and wooden horse are ubiquitous, and people are to being that the protection of operating significant data in system and the operating system is more and more paid attention to, and the software of protection operating system is also more and more; But along with the application client environment becomes increasingly complex; Data volume is increasing, and common protection software can't satisfy the demands at all, and people hope to protect software can support the tectal function of multilayer; Safety that like this can protection system can be managed oneself data again efficiently and easily.The EWF hard disk protection of Microsoft can be supported the tectal function of multilayer; Make the client can state before be arrived in the reduction of data of oneself; But the EWF hard disk protection only provides simple linear overlayer function; Can not satisfy the more complicated system applies of client, and in use can have following problem:
1, the EWF hard disk protection reverts to the state of system after the former state, and the data of current state will be lost, if the client hopes and gets back to current state and just can't realize; Part client possibly hope the significant data of oneself can be hidden in disk; The present invention can realize data hidden through data being deposited in current invalid overlayer, when the client needs, returns to the layer at data place; Can obtain data, and the EWF hard disk protection also can't be satisfied this demand;
2, EWF is when generating hard disk protection; In disk, must have one freely disk space set up overlayer; If when disk has free space, can't not generate hard disk protection, the part client possibly construct the condition that a new system could satisfy the generation protection again like this; And EWF is when generating memory protect, and after physical memory was used up, system's meeting blue screen made the use scene of EWF be restricted.
3, the EWF hard disk protection only provides the version on the Windows XP Embedded operating system, is not provided at the version that moves on Windows XP and the Windows7 operating system, big limitations most users' use.
[summary of the invention]
One of technical matters that the present invention will solve is to provide the tectal disk protect of the tree-like multilayer system of a kind of sector increment.
The present invention solves the problems of the technologies described above one through following technical scheme:
The tectal disk protect of the tree-like multilayer system of sector increment comprises disk filtration drive, configuration information module, current layer and historical overlayer, and said historical overlayer is tree structure;
Said disk filtration drive is located under the file system layer of operating system, and is positioned under the volume of operating system, possesses the filtering function of writing of disk sector level, realizes the read-write of being write filtering data by the protection subregion is redirected through current layer and historical overlayer; Said by the protection subregion set by the user;
Said configuration information module stores one configuration information structure; Said configuration information structure is made up of multilevel hierarchy; Comprise many overlayers information of disk protect system configuration information sector, each subregion, each the overlayer positional information and the layer information sectors of subregion successively, wherein, the address of storage next stage structure in the previous stage structure; As long as through said configuration information structure, can analyze the tectal tree-like hierarchical structure of multilayer;
Said current layer is used for storage operating system and starts the data of revising on the subregion of quilt protection afterwards, and the data in the current layer are interim, if do not submit the operation of current layer to, the data that operating system is restarted the back current layer can be cleared;
Said historical overlayer comprises the multilayer overlayer; Said multilayer overlayer is divided into current effective overlayer and current invalid overlayer; Said current effective overlayer is meant according to said configuration information structure and carries out recurrence, with current layer the overlayer of relation of interdependence arranged; Said current invalid overlayer is meant the overlayer that does not have dependence with current layer; When the user submits current layer to, then the data in the current layer are saved as a new overlayer as a data incremental layer, and this new overlayer is current effective overlayer; When the user submitted a certain current effective overlayer in the historical overlayer to, all the current effective tectal data after then the data in the data in the current layer, the current effective overlayer that is chosen and current effective overlayer are formulated were merged into a new current effective overlayer; Said new current effective tectal map information is updated to the configuration information structure in the said configuration information module;
When the user selects a certain overlayer to carry out operating system reduction; When system restart; Said disk filtration drive reads the configuration information structure in the configuration information module; The disk filtration drive reads out the tectal data that the user selects from overlayer, be organized into the system data that can move, the restoring operation system.
Further, said historical overlayer and configuration information module all are arranged on independent overlayer space or all are arranged on independent overlayer space; Said independent overlayer space be with in the disk freely unallocated space be organized into an available zone and be used for storing the data in the overlayer; Said independent overlayer space is that the free space that is not used in the disk of dividing subregion is organized the data that are used for storing overlayer; Said current layer is arranged in independent historical overlayer space or independent overlayer space or the internal memory, and in the time of in being arranged at internal memory, the speed that reads and writes data is faster.
Further, the storage cell in said independent overlayer space is a segment data, with logically being organized into a continuous logical segment between sector null scattered in the disk, is used to store the overlayer data; An overlayer is made up of at least one logical segment.
Further, the storage cell in said independent overlayer space is a segment data; Each overlayer takies at least one section, and the data between each overlayer are separate, and the layer data of next stage depends on the layer data of upper level.
Further; In the said configuration information structure, said layer information sectors comprises overlayer sector mark, layer message structure, redirection map message structure and memory address thereof, is redirected message bit pattern structure and memory address, non-redirected message bit pattern structure and memory address and free space message bit pattern structure and memory address thereof.
Further, the user can all write redirected position in disk before through all data of submitting to data manipulation will be kept in the historical overlayer, the valid data in the system are written in the disk, and invalid data will be deleted; After having carried out the submission data manipulation, all historical overlayers all can be deleted, and operating system gets into original state again; If the user did not submit the operation of data to before closing the disk protect system, all data in the then historical overlayer will lose efficacy.
Two of the technical matters that the present invention will solve is to provide the implementation method of the tectal disk protect of the tree-like multilayer system of a kind of sector increment.
The present invention solves the problems of the technologies described above two through following technical scheme:
The tectal disk protect of the tree-like multilayer system implementation method of sector increment comprises the steps:
Step 10, set up the overlayer space and be provided with and need protected subregion;
Step 20, to write by the protection subregion filtering data read and write redirected, with being revised data storage to a current layer on the protection subregion behind the os starting; If the user carries out the submission current layer, then get into step 30, if the user does not carry out the submission current layer, then the data in the current layer empty after operating system is closed;
Step 30, the data in the current layer are saved as an overlayer as a data incremental layer,, and this tectal map information is kept in the configuration information structure, and said overlayer and configuration information structure all are kept in the said overlayer space; Said configuration information module stores configuration information structure; Said configuration information structure is made up of multilevel hierarchy; Comprise many overlayers information of disk protect system configuration information sector, each subregion, each the overlayer positional information and the layer information sectors of subregion successively, wherein, the address of storage next stage structure in the previous stage structure; As long as through said configuration information structure, can analyze the tectal tree-like hierarchical structure of multilayer;
Submit the current layer operation to when repeatedly carrying out, then in the overlayer space, preserved a plurality of overlayers, and in said configuration information structure, preserved the dependence between each overlayer; Said a plurality of overlayers of in the overlayer space, preserving are formed historical overlayer, and promptly said historical overlayer comprises the multilayer overlayer; Said multilayer overlayer is divided into current effective overlayer and current invalid overlayer, and said current effective overlayer is meant according to said configuration information structure and carries out recurrence, with current layer the overlayer of relation of interdependence is arranged; Said current invalid overlayer is meant the overlayer that does not have dependence with current layer; According to said configuration information structure, be tree-like hierarchical structure between each overlayer; When the user selects to submit a certain overlayer in the historical overlayer to, execution in step 40; When the user selects a certain overlayer to carry out operating system reduction, execution in step 50;
Step 40, user select to submit to a certain overlayer in the historical overlayer, and all the current effective tectal data after then the data in the data in the current layer, the current effective overlayer that is chosen and current effective overlayer are formulated are merged into a new current effective overlayer; Said new current effective tectal map information is updated to the configuration information structure in the said configuration information module;
When step 50, user select a certain overlayer to carry out operating system reduction; When system restart, read the configuration information structure in the configuration information module, the tectal data that the user is selected read out from overlayer; Be organized into the system data that can move, the restoring operation system.
Further, said historical overlayer and configuration information module all are arranged on independent overlayer space or all are arranged on independent overlayer space; Said independent overlayer space be with in the disk freely unallocated space be organized into an available zone and be used for storing the data in the overlayer; Said independent overlayer space is that the free space that is not used in the disk of dividing subregion is organized the data that are used for storing overlayer; Said current layer is arranged in independent historical overlayer space or independent overlayer space or the internal memory, and in the time of in being arranged at internal memory, the speed that reads and writes data is faster.
Further, the storage cell in said independent overlayer space is a segment data, with logically being organized into a continuous logical segment between sector null scattered in the disk, is used to store the overlayer data; An overlayer is made up of at least one logical segment.
Further, the storage cell in said independent overlayer space is a segment data; Each overlayer takies at least one section, and the data between each overlayer are separate, and the layer data of next stage depends on the layer data of upper level.
Further; In the said configuration information structure, said layer information sectors comprises overlayer sector mark, layer message structure, redirection map message structure and memory address thereof, is redirected message bit pattern structure and memory address, non-redirected message bit pattern structure and memory address and free space message bit pattern structure and memory address thereof.
Further; After said step 50, also comprise step 60: the user all writes redirected position in disk before through all data of submitting to data manipulation will be kept in the historical overlayer; Valid data in the system are written in the disk, and invalid data will be deleted; After having carried out the submission data manipulation, all historical overlayers all can be deleted, and operating system gets into original state again; If the user did not submit the operation of data to before closing the disk protect system, all data in the then historical overlayer will lose efficacy.
The present invention has following advantage:
1, realizes the read-write of being write filtering data by the protection subregion is redirected through the disk filtration drive;
2, effectively organize the multilayer overlayer through the configuration information structure, thereby support tectal multilayer function, each overlayer is between tree-like institutional framework and each overlayer and interdepends; Data in the overlayer are the sector data of increment, and can switch overlayer between the overlayer data arbitrarily; And each tectal concrete data has only through restoring operation and just can see, thereby can protect the privacy and the security of data in each overlayer;
3, pass through to adopt the data organization mode in independent overlayer space, thereby the tectal data of multilayer do not need extra disk partition;
4, through submitting a certain overlayer to, a plurality of overlayers are merged, and the merged former overlayer of deletion, through submitting data to, all data in the historical overlayer are submitted in the physical disk, to reduce taking the overlayer space.
[description of drawings]
Combine embodiment that the present invention is further described with reference to the accompanying drawings.
Fig. 1 is the reading and writing data synoptic diagram of disk filtration drive of the present invention.
Fig. 2 is the synoptic diagram of configuration information structure of the present invention.
Fig. 3 is the synoptic diagram of layer information sectors of the present invention.
Fig. 4 is the historical tectal synoptic diagram of the present invention.
Fig. 5 is the data storage organization structure in independent overlayer of the present invention space.
Fig. 6 is the data storage organization structure in independence overlayer of the present invention space.
[embodiment]
Technical scheme one:
The tectal disk protect of the tree-like multilayer system of sector increment comprises disk filtration drive, configuration information module, current layer and historical overlayer, and said historical overlayer is tree structure;
See also disk filtration drive shown in Figure 1; Said disk filtration drive is located under the file system layer of operating system; And be positioned under the volume of operating system; The filtering function of writing that possesses the disk sector level is realized the read-write of being write filtering data by the protection subregion is redirected through current layer and historical overlayer; Said by the protection subregion set by the user;
See also shown in Figure 2; The configuration information structure of said configuration information module stores, said configuration information structure is made up of multilevel hierarchy, comprises many overlayers information of disk protect system configuration information sector, each subregion, each the overlayer positional information and the layer information sectors composition of subregion successively; Wherein, The address of storage next stage structure in the previous stage structure is as long as through disk protect system configuration information sector, can analyze the tectal tree-like hierarchical structure of multilayer; See also shown in Figure 3; In the said configuration information structure, said layer information sectors comprises overlayer sector mark, layer message structure, redirection map message structure and memory address thereof, is redirected message bit pattern structure and memory address, non-redirected message bit pattern structure and memory address and free space message bit pattern structure and memory address thereof.
Said sector mark: this sector of mark is a layer information sectors;
Said layer message structure: comprise layer size and father's layer that this layer relied on;
Said redirection map message structure: the relation of record redirection map information record original address and present sector position, can find data where to be placed in according to it.Information such as the layer under said redirection map message structure comprises, section size, total size, the address of its first sector of record, memory location or section;
Said redirected message bit pattern structure: be redirected which sector of bitmap record and be redirected, information such as the layer under said redirected message bit pattern structure comprises, section size, total size, the address of its memory address first sector of record or section;
Said non-redirected message bit pattern structure: which sector non-redirected message bit pattern record need not be redirected.Information such as the layer under said non-redirected message bit pattern structure comprises, section size, total size, the address of its memory address first sector of record or section
Said idle bitmap message structure: which sector idle message bit pattern record also is not used, information such as the layer under said idle bitmap message structure comprises, section size, total size, the address of its memory address first sector of record or section.
See also Fig. 4, said current layer is used for storage operating system and starts the data of revising on the subregion of quilt protection afterwards, and the data in the current layer are interim, if do not submit the operation of current layer to, the data that operating system is restarted the back current layer can be cleared;
Said historical overlayer comprises the multilayer overlayer; Said multilayer overlayer is divided into current effective overlayer and current invalid overlayer; Said current effective overlayer is meant according to said configuration information structure and carries out recurrence, with current layer the overlayer of relation of interdependence arranged; Said current invalid overlayer is meant the overlayer that does not have dependence with current layer; When the user submits current layer to, then the data in the current layer are saved as a new overlayer as a data incremental layer, and this new overlayer is current effective overlayer; When the user submitted a certain current effective overlayer in the historical overlayer to, all the current effective tectal data after then the data in the data in the current layer, the current effective overlayer that is chosen and current effective overlayer are formulated were merged into a new current effective overlayer; Said new current effective tectal map information is updated to the configuration information structure in the said configuration information module; See also Fig. 4, historical overlayer illustrated: among the figure 1,2,3,4,5,6 be meant establishment overlayer, the data that the user writes are being stored in the inside; After the user creates 1,2,3,4 four overlayer; Again recovering state is arrived overlayer 2, created 5,6 two-layer overlayers afterwards again, therefore; Overlayer 6 depends on that overlayer 5, overlayer 5 depend on overlayer 2, overlayer 2 depends on overlayer 1; And overlayer 4 depends on overlayer 3, and overlayer 3 depends on overlayer 2, and overlayer 2 depends on overlayer 1.This moment, current layer was based on overlayer 6 enterprising line data modifications; Therefore; With current layer the overlayer of relation of interdependence being arranged is respectively overlayer 6, overlayer 5, overlayer 1, overlayer 2; So overlayer 6,5,2,1 is current effective overlayer, and overlayer 3, overlayer 4 and current layer do not have dependence, are current invalid overlayer.If the user selects to submit to overlayer 5, become a new current effective overlayer 7 (not shown) after then the data in the data in the current layer, overlayer 6, the overlayer 5 merge.Initiation layer is that the data of initiation layer are user installation protection system data before among the figure, the perhaps last data data afterwards of submitting to.For example, the user can be kept at significant data in overlayer 3 or the overlayer 4, is reduced to overlayer 2 then, thereby the overlayer of preserving significant data is hidden, and has protected the privacy and the security of data in the overlayer.
When the user selects a certain overlayer to carry out operating system reduction; When system restart; Said disk filtration drive reads the configuration information structure in the configuration information module; The disk filtration drive reads out the tectal data that the user selects from overlayer, be organized into the system data that can move, the restoring operation system.
Said historical overlayer and configuration information module all are arranged on independent overlayer space or all are arranged on independent overlayer space; Said independent overlayer space be with in the disk freely unallocated space be organized into an available zone and be used for storing the data in the overlayer; Said independent overlayer space is that the free space that is not used in the disk of dividing subregion is organized the data that are used for storing overlayer, does not so just need the additional configuration disk partition; Said current layer is arranged in independent historical overlayer space or independent overlayer space or the internal memory, and in the time of in being arranged at internal memory, the speed that reads and writes data is faster.
See also the data storage organization structure in independent overlayer space shown in Figure 5; The storage cell in said independent overlayer space is a segment data; With logically being organized into a continuous logical segment between sector null scattered in the disk, be used to store the overlayer data; An overlayer is made up of at least one logical segment.
See also the data storage organization structure in independent overlayer space shown in Figure 6; The upper left side is 00 field among the figure, increases progressively successively from left to right, and the first row rightmost is 14 fields; Since the second row Far Left is 15 fields; Increase progressively successively from left to right, by that analogy, the second row rightmost is 29 fields.The storage cell in said independent overlayer space is a segment data; Each overlayer takies at least one section, and the data between each overlayer are separate, and the layer data of next stage depends on the layer data of upper level.When system initialization, we resolve current effective tectal information, can obtain the The initial segment of current effective covering; Like Fig. 6, current effective tectal The initial segment that we obtain is 00 section, and we are according to resolving the segment mark data that obtain in the independent overlayer space; The data that can find 00 section storage are 05, represent that promptly 00 section next section of pointing to is 05 section, and then we go to check 05 section position; Can find that the data of storing are 08, promptly next section is 08 section.Section after in like manner can waiting until is 13 sections, 16 sections, and 16 sections data are FE, representes that this section does not also use.Therefore can obtain the section that current effective overlayer comprises is 00 section, 05 section, 08 section, 13 sections, 16 sections, can in these several sections, read current effective tectal data.
The user can all write redirected position in disk before through all data of submitting to data manipulation will be kept in the historical overlayer, the valid data in the system are written in the disk, and invalid data will be deleted; After having carried out the submission data manipulation, all historical overlayers all can be deleted, and operating system gets into original state again; If the user did not submit the operation of data to before closing the disk protect system, all data in the then historical overlayer will lose efficacy.
Technical scheme two:
The tectal disk protect of the tree-like multilayer system implementation method of sector increment, concrete steps are following:
Step 10, set up the overlayer space and be provided with and need protected subregion;
Step 20, to write by the protection subregion filtering data read and write redirected, with being revised data storage to a current layer on the protection subregion behind the os starting; If the user carries out the submission current layer, then get into step 30, if the user does not carry out the submission current layer, then the data in the current layer empty after operating system is closed;
Step 30, the data in the current layer are saved as an overlayer as a data incremental layer,, and this tectal map information is kept in the configuration information structure, and said overlayer and configuration information structure all are kept in the said overlayer space; See also the synoptic diagram of configuration information structure shown in Figure 2 and layer information sectors shown in Figure 3; Said configuration information structure is made up of multilevel hierarchy; Comprise many overlayers information of disk protect system configuration information sector, each subregion, each the overlayer positional information and the layer information sectors of subregion successively, wherein, the address of storage next stage structure in the previous stage structure; As long as, can analyze the tectal tree-like hierarchical structure of multilayer through the configuration information structure; In the said configuration information structure, said layer information sectors comprises overlayer sector mark, layer message structure, redirection map message structure and memory address thereof, is redirected message bit pattern structure and memory address, non-redirected message bit pattern structure and memory address and free space message bit pattern structure and memory address thereof;
Submit the current layer operation to when repeatedly carrying out, then in the overlayer space, preserved a plurality of overlayers, and in said configuration information structure, preserved the dependence between each overlayer; Said a plurality of overlayers of in the overlayer space, preserving are formed historical overlayer, and promptly said historical overlayer comprises the multilayer overlayer; Said multilayer overlayer is divided into current effective overlayer and current invalid overlayer, and said current effective overlayer is meant according to said configuration information structure and carries out recurrence, with current layer the overlayer of relation of interdependence is arranged; Said current invalid overlayer is meant the overlayer that does not have dependence with current layer; According to said configuration information structure, be tree-like hierarchical structure between each overlayer; When the user selects to submit a certain overlayer in the historical overlayer to, execution in step 40; When the user selects a certain overlayer to carry out operating system reduction, execution in step 50;
Step 40, user select to submit to a certain overlayer in the historical overlayer, and all the current effective tectal data after then the data in the data in the current layer, the current effective overlayer that is chosen and current effective overlayer are formulated are merged into a new current effective overlayer; Said new current effective tectal map information is updated to the configuration information structure in the said configuration information module;
When step 50, user select a certain overlayer to carry out operating system reduction; When system restart, read the configuration information structure in the configuration information module, the tectal data that the user is selected read out from overlayer; Be organized into the system data that can move, the restoring operation system;
Step 60:, the valid data in the system are written in the disk, and invalid data will be deleted when the user all writes redirected position in disk before through all data of submitting to data manipulation will be kept in the historical overlayer; After having carried out the submission data manipulation, all historical overlayers all can be deleted, and operating system gets into original state again; If the user did not submit the operation of data to before closing the disk protect system, all data in the then historical overlayer will lose efficacy.
See also Fig. 4, historical overlayer illustrated: among the figure 1,2,3,4,5,6 be meant establishment overlayer, the data that the user writes are being stored in the inside; After the user creates 1,2,3,4 four overlayer; Again recovering state is arrived overlayer 2, created 5,6 two-layer overlayers afterwards again, therefore; Overlayer 6 depends on that overlayer 5, overlayer 5 depend on overlayer 2, overlayer 2 depends on overlayer 1; And overlayer 4 depends on overlayer 3, and overlayer 3 depends on overlayer 2, and overlayer 2 depends on overlayer 1.This moment, current layer was based on overlayer 6 enterprising line data modifications; Therefore; With current layer the overlayer of relation of interdependence being arranged is respectively overlayer 6, overlayer 5, overlayer 1, overlayer 2; So overlayer 6,5,2,1 is current effective overlayer, and overlayer 3, overlayer 4 and current layer do not have dependence, are current invalid overlayer.If the user selects to submit to overlayer 5, become a new current effective overlayer 7 (not shown) after then the data in the data in the current layer, overlayer 6, the overlayer 5 merge.Initiation layer is that the data of initiation layer are user installation protection system data before among the figure, the perhaps last data data afterwards of submitting to.For example, the user can be kept at significant data in overlayer 3 or the overlayer 4, is reduced to overlayer 2 then, thereby the overlayer of preserving significant data is hidden, and has protected the privacy and the security of data in the overlayer.
Said historical overlayer and configuration information module all are arranged on independent overlayer space or all are arranged on independent overlayer space; Said independent overlayer space be with in the disk freely unallocated space be organized into an available zone and be used for storing the data in the overlayer; Said independent overlayer space is that the free space that is not used in the disk of dividing subregion is organized the data that are used for storing overlayer; Said current layer is arranged in independent historical overlayer space or independent overlayer space or the internal memory, and in the time of in being arranged at internal memory, the speed that reads and writes data is faster.
See also the data storage organization structure in independent overlayer space shown in Figure 5; The storage cell in said independent overlayer space is a segment data; With logically being organized into a continuous logical segment between sector null scattered in the disk, be used to store the overlayer data; An overlayer is made up of at least one logical segment.
See also the data storage organization structure in independent overlayer space shown in Figure 6, the storage cell in said independent overlayer space is a segment data; Each overlayer takies at least one section, and the data between each overlayer are separate, and the layer data of next stage depends on the layer data of upper level.When system initialization, we resolve current effective tectal information, can obtain the The initial segment of current effective covering; Like Fig. 6, current effective tectal The initial segment that we obtain is 00 section, and we are according to resolving the segment mark data that obtain in the independent overlayer space; The data that can find 00 section storage are 05, represent that promptly 00 section next section of pointing to is 05 section, and then we go to check 05 section position; Can find that the data of storing are 08, promptly next section is 08 section.Section after in like manner can waiting until is 13 sections, 16 sections, and 16 sections data are FE, representes that this section does not also use.Therefore can obtain the section that current effective overlayer comprises is 00 section, 05 section, 08 section, 13 sections, 16 sections, can in these several sections, read current effective tectal data.
Though more than described embodiment of the present invention; But the technician who is familiar with the present technique field is to be understood that; We described concrete embodiment is illustrative; Rather than being used for qualification to scope of the present invention, those of ordinary skill in the art are in the modification and the variation of the equivalence of doing according to spirit of the present invention, all should be encompassed in the scope that claim of the present invention protects.
Claims (12)
1. the tectal disk protect of the tree-like multilayer system of sector increment, it is characterized in that: comprise disk filtration drive, configuration information module, current layer and historical overlayer, said historical overlayer is tree structure;
Said disk filtration drive is located under the file system layer of operating system, and is positioned under the volume of operating system, possesses the filtering function of writing of disk sector level, realizes the read-write of being write filtering data by the protection subregion is redirected through current layer and historical overlayer; Said by the protection subregion set by the user;
Said configuration information module stores one configuration information structure; Said configuration information structure is made up of multilevel hierarchy; Comprise many overlayers information of disk protect system configuration information sector, each subregion, each the overlayer positional information and the layer information sectors of subregion successively, wherein, the address of storage next stage structure in the previous stage structure; As long as through said configuration information structure, can analyze the tectal tree-like hierarchical structure of multilayer;
Said current layer is used for storage operating system and starts the data of revising on the subregion of quilt protection afterwards, and the data in the current layer are interim, if do not submit the operation of current layer to, the data that operating system is restarted the back current layer can be cleared;
Said historical overlayer comprises the multilayer overlayer; Said multilayer overlayer is divided into current effective overlayer and current invalid overlayer; Said current effective overlayer is meant according to said configuration information structure and carries out recurrence, with current layer the overlayer of relation of interdependence arranged; Said current invalid overlayer is meant the overlayer that does not have dependence with current layer; When the user submits current layer to, then the data in the current layer are saved as a new overlayer as a data incremental layer, and this new overlayer is current effective overlayer; When the user submitted a certain current effective overlayer in the historical overlayer to, all the current effective tectal data after then the data in the data in the current layer, the current effective overlayer that is chosen and current effective overlayer are formulated were merged into a new current effective overlayer; Said new current effective tectal map information is updated to the configuration information structure in the said configuration information module;
When the user selects a certain overlayer to carry out operating system reduction; When system restart; Said disk filtration drive reads the configuration information structure in the configuration information module; The disk filtration drive reads out the tectal data that the user selects from overlayer, be organized into the system data that can move, the restoring operation system.
2. the tectal disk protect of the tree-like multilayer system of sector according to claim 1 increment is characterized in that: said historical overlayer and configuration information module all are arranged on independent overlayer space or all are arranged on independent overlayer space; Said independent overlayer space be with in the disk freely unallocated space be organized into an available zone and be used for storing the data in the overlayer; Said independent overlayer space is that the free space that is not used in the disk of dividing subregion is organized the data that are used for storing overlayer; Said current layer is arranged in independent historical overlayer space or independent overlayer space or the internal memory, and in the time of in being arranged at internal memory, the speed that reads and writes data is faster.
3. the tectal disk protect of the tree-like multilayer system of sector according to claim 2 increment; It is characterized in that: the storage cell in said independent overlayer space is a segment data; With logically being organized into a continuous logical segment between sector null scattered in the disk, be used to store the overlayer data; An overlayer is made up of at least one logical segment.
4. the tectal disk protect of the tree-like multilayer system of sector according to claim 2 increment is characterized in that: the storage cell in said independent overlayer space is a segment data; Each overlayer takies at least one section, and the data between each overlayer are separate, and the layer data of next stage depends on the layer data of upper level.
5. the tectal disk protect of the tree-like multilayer system of sector according to claim 1 increment; It is characterized in that: in the said configuration information structure, said layer information sectors comprises overlayer sector mark, layer message structure, redirection map message structure and memory address thereof, is redirected message bit pattern structure and memory address, non-redirected message bit pattern structure and memory address and free space message bit pattern structure and memory address thereof.
6. the tectal disk protect of the tree-like multilayer system of sector according to claim 1 increment; It is characterized in that: the user can all write redirected position in disk before through all data of submitting to data manipulation will be kept in the historical overlayer; Valid data in the system are written in the disk, and invalid data will be deleted; After having carried out the submission data manipulation, all historical overlayers all can be deleted, and operating system gets into original state again; If the user did not submit the operation of data to before closing the disk protect system, all data in the then historical overlayer will lose efficacy.
7. the tectal disk protect of the tree-like multilayer system implementation method of sector increment is characterized in that: comprise the steps:
Step 10, set up the overlayer space and be provided with and need protected subregion;
Step 20, to write by the protection subregion filtering data read and write redirected, with being revised data storage to a current layer on the protection subregion behind the os starting; If the user carries out the submission current layer, then get into step 30, if the user does not carry out the submission current layer, then the data in the current layer empty after operating system is closed;
Step 30, the data in the current layer are saved as an overlayer as a data incremental layer,, and this tectal map information is kept in the configuration information structure, and said overlayer and configuration information structure all are kept in the said overlayer space; Said configuration information module stores configuration information structure; Said configuration information structure is made up of multilevel hierarchy; Comprise many overlayers information of disk protect system configuration information sector, each subregion, each the overlayer positional information and the layer information sectors of subregion successively, wherein, the address of storage next stage structure in the previous stage structure; As long as through said configuration information structure, can analyze the tectal tree-like hierarchical structure of multilayer;
Submit the current layer operation to when repeatedly carrying out, then in the overlayer space, preserved a plurality of overlayers, and in said configuration information structure, preserved the dependence between each overlayer; Said a plurality of overlayers of in the overlayer space, preserving are formed historical overlayer, and promptly said historical overlayer comprises the multilayer overlayer; Said multilayer overlayer is divided into current effective overlayer and current invalid overlayer, and said current effective overlayer is meant according to said configuration information structure and carries out recurrence, with current layer the overlayer of relation of interdependence is arranged; Said current invalid overlayer is meant the overlayer that does not have dependence with current layer; According to said configuration information structure, be tree-like hierarchical structure between each overlayer; When the user selects to submit a certain overlayer in the historical overlayer to, execution in step 40; When the user selects a certain overlayer to carry out operating system reduction, execution in step 50;
Step 40, user select to submit to a certain overlayer in the historical overlayer, and all the current effective tectal data after then the data in the data in the current layer, the current effective overlayer that is chosen and current effective overlayer are formulated are merged into a new current effective overlayer; Said new current effective tectal map information is updated to the configuration information structure in the said configuration information module;
When step 50, user select a certain overlayer to carry out operating system reduction; When system restart, read the configuration information structure in the configuration information module, the tectal data that the user is selected read out from overlayer; Be organized into the system data that can move, the restoring operation system.
8. the tectal disk protect of the tree-like multilayer system implementation method of sector according to claim 7 increment, it is characterized in that: said historical overlayer and configuration information module all are arranged on independent overlayer space or all are arranged on independent overlayer space; Said independent overlayer space be with in the disk freely unallocated space be organized into an available zone and be used for storing the data in the overlayer; Said independent overlayer space is that the free space that is not used in the disk of dividing subregion is organized the data that are used for storing overlayer; Said current layer is arranged in independent historical overlayer space or independent overlayer space or the internal memory, and in the time of in being arranged at internal memory, the speed that reads and writes data is faster.
9. the tectal disk protect of the tree-like multilayer system implementation method of sector according to claim 7 increment; It is characterized in that: the storage cell in said independent overlayer space is a segment data; With logically being organized into a continuous logical segment between sector null scattered in the disk, be used to store the overlayer data; An overlayer is made up of at least one logical segment.
10. the tectal disk protect of the tree-like multilayer system implementation method of sector according to claim 7 increment, it is characterized in that: the storage cell in said independent overlayer space is a segment data; Each overlayer takies at least one section, and the data between each overlayer are separate, and the layer data of next stage depends on the layer data of upper level.
11. the tectal disk protect of the tree-like multilayer system implementation method of sector according to claim 7 increment; It is characterized in that: in the said configuration information structure, said layer information sectors comprises overlayer sector mark, layer message structure, redirection map message structure and memory address thereof, is redirected message bit pattern structure and memory address, non-redirected message bit pattern structure and memory address and free space message bit pattern structure and memory address thereof.
12. the tectal disk protect of the tree-like multilayer system of sector according to claim 7 increment; It is characterized in that: after said step 50, also comprise step 60: the user all writes redirected position in disk before through all data of submitting to data manipulation will be kept in the historical overlayer; Valid data in the system are written in the disk, and invalid data will be deleted; After having carried out the submission data manipulation, all historical overlayers all can be deleted, and operating system gets into original state again; If the user did not submit the operation of data to before closing the disk protect system, all data in the then historical overlayer will lose efficacy.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210240635.XA CN102799542B (en) | 2012-07-12 | 2012-07-12 | Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210240635.XA CN102799542B (en) | 2012-07-12 | 2012-07-12 | Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102799542A true CN102799542A (en) | 2012-11-28 |
CN102799542B CN102799542B (en) | 2014-12-10 |
Family
ID=47198655
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210240635.XA Active CN102799542B (en) | 2012-07-12 | 2012-07-12 | Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102799542B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593146A (en) * | 2013-10-21 | 2014-02-19 | 福建升腾资讯有限公司 | Overlay layer space switching method based on disk filtration and overlay layer building method |
WO2015131801A1 (en) * | 2014-03-04 | 2015-09-11 | 北京中天安泰信息技术有限公司 | Data blackhole processing method |
CN106407129A (en) * | 2015-08-03 | 2017-02-15 | 四川效率源信息安全技术有限责任公司 | Data extraction method for embedded security protection device |
CN109408278A (en) * | 2017-08-15 | 2019-03-01 | 李剑春 | Data processing method and device |
WO2019182796A1 (en) * | 2018-03-20 | 2019-09-26 | Microsoft Technology Licensing, Llc | Configurable recovery states |
WO2019182797A1 (en) * | 2018-03-20 | 2019-09-26 | Microsoft Technology Licensing, Llc | Free space pass-through |
CN111158955A (en) * | 2019-12-30 | 2020-05-15 | 航天壹进制(南京)数据科技有限公司 | High-availability system based on volume replication and multi-server data synchronization method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149693A (en) * | 2007-11-02 | 2008-03-26 | 西安三茗科技有限责任公司 | Computer hard disk data continuous time point storage and recovery method |
US20100275057A1 (en) * | 2009-04-28 | 2010-10-28 | International Business Machines Corporation | Data Storage Device In-Situ Self Test, Repair, and Recovery |
CN102289624A (en) * | 2011-05-16 | 2011-12-21 | 福建升腾资讯有限公司 | Disk protection system based on write filtering technology |
US20120072398A1 (en) * | 2008-07-10 | 2012-03-22 | Cms Products, Inc. | Method and Apparatus for Creating a Self Booting Operating System Image Backup on an External USB Hard Disk Drive That is Capable of Performing a Complete Restore to an Internal System Disk |
CN102460415A (en) * | 2009-05-13 | 2012-05-16 | 惠普开发有限公司 | System for virtual disks version control |
-
2012
- 2012-07-12 CN CN201210240635.XA patent/CN102799542B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101149693A (en) * | 2007-11-02 | 2008-03-26 | 西安三茗科技有限责任公司 | Computer hard disk data continuous time point storage and recovery method |
US20120072398A1 (en) * | 2008-07-10 | 2012-03-22 | Cms Products, Inc. | Method and Apparatus for Creating a Self Booting Operating System Image Backup on an External USB Hard Disk Drive That is Capable of Performing a Complete Restore to an Internal System Disk |
US20100275057A1 (en) * | 2009-04-28 | 2010-10-28 | International Business Machines Corporation | Data Storage Device In-Situ Self Test, Repair, and Recovery |
CN102460415A (en) * | 2009-05-13 | 2012-05-16 | 惠普开发有限公司 | System for virtual disks version control |
CN102289624A (en) * | 2011-05-16 | 2011-12-21 | 福建升腾资讯有限公司 | Disk protection system based on write filtering technology |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593146B (en) * | 2013-10-21 | 2016-04-20 | 福建升腾资讯有限公司 | Based on overlayer space changing method and the tectal construction method of disk filter |
CN103593146A (en) * | 2013-10-21 | 2014-02-19 | 福建升腾资讯有限公司 | Overlay layer space switching method based on disk filtration and overlay layer building method |
WO2015131801A1 (en) * | 2014-03-04 | 2015-09-11 | 北京中天安泰信息技术有限公司 | Data blackhole processing method |
CN103927493B (en) * | 2014-03-04 | 2016-08-31 | 中天安泰(北京)信息技术有限公司 | Data black hole processing method |
CN106407129B (en) * | 2015-08-03 | 2019-12-06 | 四川效率源信息安全技术股份有限公司 | data extraction method of embedded security equipment |
CN106407129A (en) * | 2015-08-03 | 2017-02-15 | 四川效率源信息安全技术有限责任公司 | Data extraction method for embedded security protection device |
CN109408278A (en) * | 2017-08-15 | 2019-03-01 | 李剑春 | Data processing method and device |
CN109408278B (en) * | 2017-08-15 | 2021-06-15 | 李剑春 | Data processing method and device |
WO2019182796A1 (en) * | 2018-03-20 | 2019-09-26 | Microsoft Technology Licensing, Llc | Configurable recovery states |
US10564894B2 (en) | 2018-03-20 | 2020-02-18 | Microsoft Technology Licensing, Llc | Free space pass-through |
US10592354B2 (en) | 2018-03-20 | 2020-03-17 | Microsoft Technology Licensing, Llc | Configurable recovery states |
WO2019182797A1 (en) * | 2018-03-20 | 2019-09-26 | Microsoft Technology Licensing, Llc | Free space pass-through |
CN111158955A (en) * | 2019-12-30 | 2020-05-15 | 航天壹进制(南京)数据科技有限公司 | High-availability system based on volume replication and multi-server data synchronization method |
CN111158955B (en) * | 2019-12-30 | 2023-08-25 | 南京壹进制信息科技有限公司 | High-availability system based on volume replication and multi-server data synchronization method |
Also Published As
Publication number | Publication date |
---|---|
CN102799542B (en) | 2014-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102799542B (en) | Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof | |
CN106407040B (en) | A kind of duplicating remote data method and system | |
CN100419664C (en) | Incremental backup operations in storage networks | |
CN104395904A (en) | Efficient data object storage and retrieval | |
CN100416508C (en) | Copy operations in storage networks | |
KR100920716B1 (en) | Ruggedized block device driver | |
CN1983266B (en) | File system storing transaction records in flash-like media | |
CN100524235C (en) | Recovery operations in storage networks | |
CN105103114B (en) | Multiple layers of data storage, file and volume system are provided | |
CN110383251B (en) | Storage system, computer-readable recording medium, and method for controlling system | |
CN106716334A (en) | Efficient data movement within file system volumes | |
JP2006209636A (en) | Method for maintaining snapshot | |
CN101120305A (en) | New point-in-time copy operation | |
CN102012852A (en) | Method for implementing incremental snapshots-on-write | |
CN101566931A (en) | Virtual disk drive system and method | |
WO1999010893A2 (en) | Object reconstruction on object oriented data storage device | |
EP2972749A1 (en) | Data storage volume having tiers of different storage traits | |
CN1682193A (en) | Storage services and systems | |
CN109690494A (en) | Layering in system memory device is fault-tolerant | |
CN104272242A (en) | Creating encrypted storage volumes | |
KR20210068699A (en) | Storage device, storage system and method of operating storage device | |
CN101566928B (en) | Virtual disk drive system and method | |
CN109684271A (en) | Snapshot data management method, device, electronic equipment and machine readable storage medium | |
WO2015001620A1 (en) | Storage system, memory control method and computer system | |
CN113836116A (en) | Data migration method and device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |