CN104714864A - Intelligent computer data backup method - Google Patents

Intelligent computer data backup method Download PDF

Info

Publication number
CN104714864A
CN104714864A CN201510123310.7A CN201510123310A CN104714864A CN 104714864 A CN104714864 A CN 104714864A CN 201510123310 A CN201510123310 A CN 201510123310A CN 104714864 A CN104714864 A CN 104714864A
Authority
CN
China
Prior art keywords
file
backup
list
rule
delta
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510123310.7A
Other languages
Chinese (zh)
Inventor
胡晓勤
黄传波
谢俊峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Yun Qi Science And Technology Ltd
Original Assignee
Chengdu Yun Qi Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Yun Qi Science And Technology Ltd filed Critical Chengdu Yun Qi Science And Technology Ltd
Priority to CN201510123310.7A priority Critical patent/CN104714864A/en
Publication of CN104714864A publication Critical patent/CN104714864A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides an intelligent computer data backup method. By means of the method, data belonging to user data are determined, and backup is conducted on the user data. In the full backup process, a user operating system is scanned, and the name, version, installation path, application program name, application program version, application program installation path and other features are obtained; after the features are compared with cloud backup files, backup does not need to be conducted on the common files in the backup process; the full path names of the user backup files are compared with the abstract value, if matching is successful, backup does not need to be conducted on this type of user target files as well, and thus the backup speed is increased; after one-time full backup is finished, target files which change are determined when a user uses a computer, when a backup command is received, backup is directly conducted on the changed target files, the changed files do not need to be determined through scanning, and backup software performance can be improved greatly; meanwhile, the user does not need to set the backup path again, and the defects of missing of files and loss of data are overcome.

Description

A kind of computer data intelligent backup method
Technical field
The present invention relates to information security field, particularly relate to a kind of computer data intelligent backup method.
Background technology
Along with the generally use of computer technology, create a large amount of data, these data are mainly kept on various storage medium with the form of volume, file, database, and these data store in a large number with document form, use and transmit.Due to computing machine self fragility feature, data are often subject to full spectrum of threats, as virus, maloperation, stolen, mechanical disorder, disaster etc., make data be very easy to deleted, damage and lose.Tackling these threatens best bet to be carry out data backup.
For file backup, common way is: install a backup agent program on the user computer, adopt timed backup or strategy of backing up in realtime, regularly or in real time user file data (hereinafter referred to as file destination) are backuped to local storage medium or high in the clouds.In backup procedure, backup agent requires that user provides configuration information, as file path, file type, creation-time, modification time etc.But a lot of naive user does not also know file destination path, does not understand file type yet, say nothing of creation-time, modification time.Therefore, important file destination is often caused not back up.
Common backup policy can be divided into backup, incremental backup and differential backup completely.Backup is that all backup objects are all copied one time completely.Incremental backup copies the data changed between twice backup.Differential backup is the data copying this backup and change between backup completely.For incremental backup and differential backup, when adopting timed backup strategy, all need the change between contrast twice backup, determine that the general way of data variation is that scanning needs file destination and determines which file there occurs change at present.
In scanning process, first step is the metadata obtaining file destination, as complete trails filename, file size, modification time, last access time etc., judges whether file destination there occurs change with this; If first step can confirm that file destination there occurs change, then back up this file destination, if can not confirm, the digest value usually calculating file destination confirms whether file destination changes, if there occurs change, then backs up this file destination.Take up room in larger situation, as reached TB level, or in the more situation of file destination number for file destination, as reached 1,000,000 grades, then backup agent is by file destinations all for scanning, scans consuming time longer, cause subscriber computer performance degradation, even can not normally use.And in fact, in a backup cycle, within the time, the file destination that user just really uses, the file destination of actual generation data variation is fewer, needs to scan and determines whether that the file destination that data variation occurs is in the great majority.Backup agent takes a large amount of read-write resources and the time judges whether a file destination there occurs change, causes a large amount of waste, seriously drags slow computing power.
Summary of the invention
In order to solve the problem, the present invention proposes a kind of computer data intelligent backup method, helps user to determine which data belongs to user data, and backs up user data.In complete backup procedure, scanning operating system of user, obtain OS name, version, installation path, the features such as application name, version, installation path, and high in the clouds backup file contrast after, this type of known file can not be backed up during backup, on the other hand, the user's comspec of backup file and digest value is compared, after coupling, also need not back up this type of ownership goal file, thus improve backup rate.After completing once backup completely, use in computer procedures user and determine which file destination there occurs change, after receiving backup instruction, directly back up the file destination changed, and obstructed overscanning is determined to change to can greatly improve backup software performance by file.Meanwhile, user does not need to need Offered target file path more yet, overcomes the defect of file destination omission, loss of data risk.
The present invention relates to a kind of computer data intelligent backup method, comprising:
Step 1, complete backup module suspense file change detects, scanning custom system, obtain custom system feature and be sent to high in the clouds, generate non-backup file list and back up completely to high in the clouds, custom system feature at least comprises title, version, the installation path of application program of OS name, version, installation path and all installations;
Step 2, activates file change and detects, and complete backup module sends to file change detection module and activates message, and file change module changes running status into from halted state;
Step 3, file change detects and sends, file change detection module obtains system file change events, and obtains the file full path name relevant with this file change events, time, process name and type and form a file change events message, and sends to increment determination module;
Step 4, rule is loaded into step, and increment determination module is loaded into rule from rule base, at least comprises user class rule and system class rule;
Step 5, delta file determination step, increment determination module wait-receiving mode file change event, judge whether file change event is repeated events, rule in matching rule base, if do not mate all user class rule or mate any system class rule, then the file full path name of file change event is written to delta file list, otherwise abandons this file change events message;
Step 6, reads in delta file listings step, and incremental backup module reads in the comspec of all delta files;
Step 7, incremental backup finds out the standby volume of increasing at delta file place, travels through the standby volume of each increasing, to each increasing standby volume generating snapshot, carry snapshot, and delta file, delta file comspec, delta file digest value are sent to high in the clouds, delete snapshot, finally empty delta file list;
Step 8, rule base step of updating, rule base update module sends host characteristics to high in the clouds, and high in the clouds, according to host characteristics, returns rule base;
Step 9, rule base write step, the rule after renewal is written in rule base by Policy Updates module.
Generate non-backup file list in described step 1 and back up completely to high in the clouds and be further:
Step 21, high in the clouds is according to custom system feature, compare with the operating system file backed up in advance, application file, when after coupling, in conjunction with local system installation path, the comspec generating matching files is written in backup file list (but not needing file digest values), the subscriber data file list backed up in the past and digest value is write in backup file list simultaneously, backup file list is sent to complete backup module;
Step 22, all volumes of system of enumerating, generate the list of complete standby volume;
Step 23, judges whether the list of complete standby volume is empty, if be empty, goes to step 28, if be not empty, goes to step 24;
Step 24, selects one in the list of complete standby volume complete standby volume, to this complete standby volume generating snapshot;
Step 25, generate non-backup file listings step, the snapshot that carry step 24 generates, each file in traversal snapshot, file, generate comspec, by comspec and backup file list contrast, for the comspec matched in backup file list, if this comspec does not contain digest value, then think that the match is successful, this file backs up, otherwise, if containing digest value, then calculate the digest value of this file in local system, and it is more equal with the digest value of corresponding record in backup file list, if equal, then think that this file backs up, otherwise add this file complete trails to non-backup file list, for the comspec do not mated in backup file list, add this file complete trails to non-backup file list,
Step 26, sends non-backup file list, non-backup file, digest value to high in the clouds, empty non-backup file list;
Step 27, the snapshot that delete step 24 generates, removes this complete standby volume, goes to step 23 from the list of complete standby volume;
Step 28, sends full backup end to high in the clouds;
Step 29, sends to file change detection module and activates message, and file change detects and becomes running status from halted state.
User class rule and system class rule in described step 4, is characterized in that:
User class rule at least comprises: consumer process exclusionary rules, consumer process directory name exclusionary rules, file name exclusionary rules; System class rule at least comprises: system process comprises rule;
Consumer process exclusionary rules matching condition: process title;
Consumer process directory name exclusionary rules matching condition: consumer process name and the comspec of catalogue;
File name exclusionary rules matching condition: the comspec of file;
System process comprises rule match conditions: process title.
Described step 5 is further:
Step 41, wait-receiving mode file change event message, comprises document creation, file is write, file moves, go to step 42 after receiving file change event message;
Step 42, searches in delta file list, if certain file full path name is identical with the file full path name of current file change events message, then thinks that this file change events is repeated events, goes to step 41, otherwise go to step 43;
Step 43, compares process title and whether belongs to system user, if so, is then system process, goes to step 44, if not, go to step 45;
Step 44, compares process title and whether mates certain system process and comprise rule, if coupling, then thinks that this file change events belongs to backup scope, goes to step 46, otherwise go to step 41;
Step 45, is written to delta file list, goes to step 41 by file full path name;
Whether step 46, compare process title and mate with certain consumer process exclusionary rules, if coupling, then think that this file change is not within the scope of backup, goes to step 41, otherwise goes to step 47;
Step 47, compares change file directory name and whether process title mates certain consumer process directory name exclusionary rules, if coupling, then thinks that this file change is not within the scope of backup, goes to step 41, otherwise goes to step 48;
Step 48, compares change file full path name and whether mates certain user file name exclusionary rules, if coupling, then think that this file change is not within the scope of backup, goes to step 41, otherwise goes to step 45.
Described step 7 is further:
Step 51, travels through each delta file comspec, obtains the file label of delta file place volume, if not this file label in the list of increment volume, then write increases the list of standby volume, otherwise does not write;
Step 52, judges that whether increase the list of standby volume is empty, as empty, then go to step 56, otherwise goes to step 53;
Step 53, selects one to increase standby volume, generates the snapshot of the standby volume of this increasing in the list of increasing standby volume;
Step 54, the list of traversal delta file, finds the delta file comspec belonging to this increment volume, and the snapshot of the standby volume of this increasing reads this delta file, sends delta file, delta file comspec, delta file digest value to high in the clouds;
Step D55, deletes this increasing for volume shadow copy, removes file label, go to step 53 from the list of increasing standby volume;
Step 56, empties delta file list.
Described step 8 is further:
Step 61, rule base update module scanning operating system of user, obtains custom system feature, obtains present system time;
Step 62, sends custom system characteristic sum present system time to high in the clouds;
Step 63, responds if do not receive high in the clouds, then goes to step 67, otherwise go to step 64;
Step 64, the rule base version returned in high in the clouds and current version compare, and as changed, go to step 65, otherwise go to step 66;
Step 65, downloads new rule base from high in the clouds;
Step 66, latency period P step, goes to step 61;
Step 67, latency period Q step, goes to step 61.
Beneficial effect of the present invention is that user does not need configuration target file path, and ownership goal file is not omitted, and reduces the burden that user uses standby system; Without the need to backing up operating system file, the application file in preset high in the clouds, without the need to backing up the data backed up, improve complete backup rate; Obtaining file change without the need to scanning file destination during incremental backup, using process classification Sum fanction to filter, obtaining the user's delta file that there is backup and be worth, directly back up delta file, saved system I/O, greatly accelerated backup rate.
Accompanying drawing explanation
Fig. 1 is each module rack composition.
Fig. 2 is data intelligence backup process flow diagram.
Fig. 3 is for back up process flow diagram completely.
Fig. 4 is file increment change decision flowchart.
Fig. 5 is that incremental backup flow process is as figure.
Fig. 6 is that rule base upgrades process flow diagram.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further detail.
The each module rack composition of the present invention as shown in Figure 1.
File change detection module A, for detecting file change event, file change detection module is the filtration drive or the microfiltration driving that are arranged on operating system file system drive layer, be usually located in operating system nucleus, after file change event being detected, as document creation, file write, file moves, file change event is packaged as file change event message and sends to increment determination module.Each file change event forms a file change events message, and file change event message is by comprising following field:
File full path name: file store path and filename that file change event occurs, such as: C: testA testB.txt;
Time: the system time that file change occurs, be accurate to millisecond;
Type: for document creation, file write, file movement wherein a kind of;
Process name: the process name causing file change.
Complete backup module B, for executing full backup, detecting the All Files be present in operating system, obtaining local system feature, compare with the existing operating system file in high in the clouds, application file and user backup file, non-backup file is backuped to high in the clouds.
Delta file list C, for storing the record being defined as delta file through increment determination module, each delta file record, each record comprises following field:
File full path name: the file store path of file destination and filename, such as: C: testA testB.txt.
Incremental backup module D, for backing up delta file.When performing incremental backup, from delta file list C, reading delta file information, delta file is transferred to high in the clouds and completes backup.
Increment determination module E, for judging the data variation whether the file change event of sending from file change detection module occurs as user file, if so, write delta file list C, if not, then abandons.
Rule base F, for the decision rule needed for storage file change determination module E.Rule at least comprises two large classes, first kind rule is user class rule, Equations of The Second Kind rule is system class rule, three little rule-likes are at least comprised again in first kind rule, be respectively consumer process exclusionary rules FR101, consumer process directory name exclusionary rules FR102, file name exclusionary rules FR103, each little rule-like can comprise one or more; In Equations of The Second Kind rule, at least comprise a little rule-like, for system process comprises regular FR201, each little rule-like can comprise one or more.
Consumer process exclusionary rules FR101 can be described as:
Process title: such as: video player.
Consumer process exclusionary rules FR101 effect: get rid of the consumer process that can not produce user data, as video player, audio player, this type of consumer process may from network download data and file system buffer memory, but this type of video, voice data are not the data that user produces, not there is backup be worth, got rid of.
Consumer process directory name exclusionary rules FR102 can be described as:
Consumer process name: process software of such as handling official business;
The comspec of catalogue: such as: C: testA.
Consumer process directory name exclusionary rules FR102 effect: get rid of the temporary file that some software produces, this type of software can produce temporary file in formulation catalogue, but this class file produces in user's use procedure, it not the file of the actual editor of user, not there is backup be worth, as the cache file of browser in upper network process.
File name exclusionary rules FR103 can be described as:
The comspec of file: such as: C: pagefile.sys.
The effect of file name exclusionary rules FR103: removal system or application cache or swap file.
System process comprises regular FR201 and can be described as:
Process title: such as: mysqld-nt.exe, it is the system service process of MySql database.
System process comprises the effect of regular FR201: the file change that the system process comprising the change of generation user data causes.
Rule base update module G, for reading rule from high in the clouds, and update rule storehouse.
High in the clouds H, for storing user ID file, backup file list, digest value, rule base etc., high in the clouds is one or one group of server composition, is positioned over Local or Remote and provides backup services.
Data intelligence backup process flow diagram of the present invention as shown in Figure 2.
Step T201, complete backup-step, complete backup module suspense file change detects, scanning custom system, obtain custom system feature, upload user system features is to high in the clouds, high in the clouds returns backup file list, complete backup module enumerates all volumes, generate the list of complete standby volume, to each volume generating snapshot in the list of complete standby volume, carry snapshot, All Files folder in traversal snapshot, file, and contrast with backup file list, generate non-backup file list, complete backup module is according to non-backup file list, non-backup file list is sent to high in the clouds, non-backup file, digest value, non-backup file list is emptied after being transmitted, delete snapshot, full backup end is sent to high in the clouds.
Step T202, activates file change detecting step, and complete backup module sends to file change detection module and activates message, and file change module changes running status into from halted state.
Step T203, file change detects and forwarding step, file change detection module obtains system file change events, and obtains the file full path name relevant with this file change events, time, process name and type and form a file change events message, and sends to increment determination module.
Step T204, rule is loaded into step, and increment determination module is loaded into rule from rule base, at least comprises user class rule and system class rule.
Step T205, delta file determination step, first increment determination module judges whether file change event is repeated events, then the rule in matching rule base, if coupling, be then written to delta file list by delta file comspec, otherwise abandon this file change events message.
Step T206, reads in delta file listings step, and incremental backup module reads in all delta file comspecs from delta file list.
Step T207, incremental backup step, incremental backup module reads All Files comspec from delta file list, find out the standby volume of increasing at delta file place, travel through the standby volume of each increasing, to each increasing standby volume generating snapshot, carry snapshot, and delta file, delta file comspec, delta file digest value are sent to high in the clouds, delete snapshot, finally empty delta file list.
Step T208, rule base step of updating, rule base update module sends host characteristics to high in the clouds, as OS name, version, installation path, and application name, version, installation path and present system time, if high in the clouds does not respond, then latency period Q sends again, and high in the clouds, according to host characteristics, returns rule base, rule base update module downloads latency period P behind new regulation storehouse, then executing rule storehouse step of updating.
Step T209, rule base write step, the rule after renewal is written in rule base by Policy Updates module.
The flow process of backup completely of the present invention as shown in Figure 3.
Step B301, suspense file change detects, obtain custom system feature and be sent to high in the clouds step, complete backup module sends the message suspended and detect to file change detection module, scanning custom system, obtain title, version, the installation path of application program of OS name, version, installation path and all installations, and above-mentioned information is dealt into high in the clouds.
Step B302, obtain user's backup file listings step, high in the clouds is according to custom system feature, comprise OS name, version, application name, version, compare with the operating system file backed up in advance, application file, when after coupling, in conjunction with local system installation path, the comspec generating matching files is written to (but not needing file digest values) in backup file list, the subscriber data file list backed up in the past and digest value are write in backup file list simultaneously, backup file list is sent to complete backup module.Backup file list is made up of backup file record, and each backup file record comprises two parts, and a part is comspec, and another part is digest value.
Step B303, generate complete standby volume listings step, all volumes of system of enumerating, generate the list of complete standby volume.
Step B304, judges whether in the list of complete standby volume be sky step, if be empty, goes to step B309, if be not empty, go to step B305.
Step B305, selects complete standby volume and generating snapshot step, selects one in the list of complete standby volume complete standby volume, to this complete standby volume generating snapshot.
Step B306, generate non-backup file listings step, the snapshot that carry step B305 generates, each file in traversal snapshot, file, generate comspec, by comspec and backup file list contrast, for the comspec matched in backup file list, if this comspec does not contain digest value, then think that the match is successful, this file backs up, otherwise, if containing digest value, then calculate the digest value of this file in local system, and it is more equal with the digest value of corresponding record in backup file list, if equal, then think that this file backs up, otherwise add this file complete trails to non-backup file list, for the comspec do not mated in backup file list, this file complete trails is added the backup file list that puts in place.
Step B307, send non-backup file list, non-backup file, digest value step to high in the clouds, first send non-backup file list to high in the clouds, complete backup module is again according to non-backup file list, send non-backup file and digest value to high in the clouds item by item, finally empty non-backup file list.
Step B308, deletes snapshot, removes this complete standby volume step from the list of complete standby volume, and after these complete standby volume associated documents have backed up, the snapshot that complete backup module delete step B305 generates, then removes this volume, go to step B304 from the list of complete standby volume.
Step B309, sends full backup end to high in the clouds, once after complete Backup end, complete backup module sends full backup end to high in the clouds.
Step B310, sends to file change detection module and activates message, and complete backup module sends to file change detection module and activates message, and file change detects and becomes running status from halted state.
File increment change determination flow of the present invention as shown in Figure 3.
Step e 401, wait-receiving mode file change event message step, increment determination module waits for the file change event message sent from file change detection module, when receiving file change event message, comprise document creation, file is write, file moves, and goes to step E402.
Step e 402, whether comparison document change events is repetition eventing step, increment determination module parses file full path name from current file change events message, the list of traversal delta file, when the file full path name of certain record is equal with the file full path name of current file change events message, then think that this file change events is repeated events, go to step E401, otherwise go to step E403.
Step e 403, compares the step whether process belongs to system process, increment determination module according to process name, calling system interface, whether the determinating processes owner belongs to system user, and if so, then this process is system process, go to step E404, if not, go to step E405.
Step e 404, compare process name whether mate certain system process comprise rule step, if coupling, then think that this file change events belongs to backup scope, go to step E406, otherwise go to step E401.
Step e 405, is written to the step of delta file list, change file full path name is written to delta file list, goes to step E401 by change file full path name.
Step e 406, compare process name whether with the step of certain consumer process exclusionary rules coupling, if coupling, then think that this file change is not within the scope of backup, goes to step E401, otherwise goes to step E407.
Step e 407, compares change file directory name and whether process name mates the step of certain consumer process directory name exclusionary rules simultaneously, if coupling, then thinks that this file change is not within the scope of backup, goes to step E401, otherwise goes to step E408.
Step e 408, compares the step whether change file full path name mates certain user file name exclusionary rules, if coupling, then thinks that this file change is not within the scope of backup, goes to step E401, otherwise goes to step E405.
Incremental backup flow process of the present invention as shown in Figure 5.
Step D501, obtains increasing the step of standby volume list, travels through every bar delta file record, obtains the file label storing delta file, if not this file label in the list of increment volume, then write increases the list of standby volume, otherwise does not write.
Step D502, whether be sky step, judge that whether increase the list of standby volume is empty, as empty, then turn D506, otherwise turns D503 if increasing in the list of standby volume.
Step D503, selects one to increase standby volume and generating snapshot step, selects one to increase standby volume, generate the snapshot of the standby volume of this increasing in the list of increasing standby volume.
Step D504, send delta file, delta file comspec, delta file digest value to high in the clouds step, the list of incremental backup module walks delta file, find the delta file comspec belonging to this increment volume, the snapshot of the standby volume of this increasing reads this delta file, sends delta file, delta file comspec, delta file digest value to high in the clouds.
Step D505, deletes this increasing for volume shadow copy, removes file label step, go to step D503 from the list of increasing standby volume.
Step D506, empties delta file listings step.
More new technological process is as shown in Figure 6 for rule base of the present invention.
Step G601, obtains custom system characteristic sum present system time step, and rule base update module scanning operating system of user, obtain OS name, version, installation path, application name, version, installation path are as custom system feature.
Step G602, sends custom system characteristic sum present system time step to high in the clouds.
Whether step G603, receive high in the clouds and respond step, responds, then go to step G607, otherwise go to step G604 if do not receive high in the clouds.
Step G604, judgment rule storehouse changes step, and the rule base version returned in high in the clouds and current version compare, and as changed, go to step G605, otherwise go to step G606.
Step G605, download rule base, update rule storehouse step, Policy Updates library module downloads new rule base from high in the clouds, update rule storehouse.
Step G606, latency period P step, goes to step G601.
Step G607, latency period Q step, goes to step G601.
Those skilled in the art, under the condition not departing from the spirit and scope of the present invention that claims is determined, can also carry out various amendment to above content.Therefore scope of the present invention is not limited in above explanation, but determined by the scope of claims.

Claims (6)

1. a computer data intelligent backup method, is characterized in that, comprising:
Step 1, complete backup module suspense file change detects, scanning custom system, obtain custom system feature and be sent to high in the clouds, generate non-backup file list and back up completely to high in the clouds, custom system feature at least comprises title, version, the installation path of application program of OS name, version, installation path and all installations;
Step 2, activates file change and detects, and complete backup module sends to file change detection module and activates message, and file change module changes running status into from halted state;
Step 3, file change detects and sends, file change detection module obtains system file change events, and obtains the file full path name relevant with this file change events, time, process name and type and form a file change events message, and sends to increment determination module;
Step 4, rule is loaded into step, and increment determination module is loaded into rule from rule base, at least comprises user class rule and system class rule;
Step 5, delta file determination step, increment determination module wait-receiving mode file change event, judge whether file change event is repeated events, rule in matching rule base, if do not mate all user class rule or mate any system class rule, then the file full path name of file change event is written to delta file list, otherwise abandons this file change events message;
Step 6, reads in delta file listings step, and incremental backup module reads in the comspec of all delta files;
Step 7, incremental backup finds out the standby volume of increasing at delta file place, travels through the standby volume of each increasing, to each increasing standby volume generating snapshot, carry snapshot, and delta file, delta file comspec, delta file digest value are sent to high in the clouds, delete snapshot, finally empty delta file list;
Step 8, rule base step of updating, rule base update module sends host characteristics to high in the clouds, and high in the clouds, according to host characteristics, returns rule base;
Step 9, rule base write step, the rule after renewal is written in rule base by Policy Updates module.
2. the computer data intelligent backup method as described in claim 1, is characterized in that, generates non-backup file list and back up completely to high in the clouds to be further in described step 1:
Step 21, high in the clouds is according to custom system feature, compare with the operating system file backed up in advance, application file, when after coupling, in conjunction with local system installation path, the comspec generating matching files is written in backup file list (but not needing file digest values), the subscriber data file list backed up in the past and digest value is write in backup file list simultaneously, backup file list is sent to complete backup module;
Step 22, all volumes of system of enumerating, generate the list of complete standby volume;
Step 23, judges whether the list of complete standby volume is empty, if be empty, goes to step 28, if be not empty, goes to step 24;
Step 24, selects one in the list of complete standby volume complete standby volume, to this complete standby volume generating snapshot;
Step 25, generate non-backup file listings step, the snapshot that carry step 24 generates, each file in traversal snapshot, file, generate comspec, by comspec and backup file list contrast, for the comspec matched in backup file list, if this comspec does not contain digest value, then think that the match is successful, this file backs up, otherwise, if containing digest value, then calculate the digest value of this file in local system, and it is more equal with the digest value of corresponding record in backup file list, if equal, then think that this file backs up, otherwise add this file complete trails to non-backup file list, for the comspec do not mated in backup file list, add this file complete trails to non-backup file list,
Step 26, sends non-backup file list, non-backup file, digest value to high in the clouds, empty non-backup file list;
Step 27, the snapshot that delete step 24 generates, removes this complete standby volume, goes to step 23 from the list of complete standby volume;
Step 28, sends full backup end to high in the clouds;
Step 29, sends to file change detection module and activates message, and file change detects and becomes running status from halted state.
3. the computer data intelligent backup method as described in claim 1, is characterized in that, user class rule and system class rule in described step 4, is characterized in that:
User class rule at least comprises: consumer process exclusionary rules, consumer process directory name exclusionary rules, file name exclusionary rules; System class rule at least comprises: system process comprises rule;
Consumer process exclusionary rules matching condition: process title;
Consumer process directory name exclusionary rules matching condition: consumer process name and the comspec of catalogue;
File name exclusionary rules matching condition: the comspec of file;
System process comprises rule match conditions: process title.
4. the computer data intelligent backup method as described in claim 1, is characterized in that, described step 5 is further:
Step 41, wait-receiving mode file change event message, comprises document creation, file is write, file moves, go to step 42 after receiving file change event message;
Step 42, searches in delta file list, if certain file full path name is identical with the file full path name of current file change events message, then thinks that this file change events is repeated events, goes to step 41, otherwise go to step 43;
Step 43, compares process title and whether belongs to system user, if so, is then system process, goes to step 44, if not, go to step 45;
Step 44, compares process title and whether mates certain system process and comprise rule, if coupling, then thinks that this file change events belongs to backup scope, goes to step 46, otherwise go to step 41;
Step 45, is written to delta file list, goes to step 41 by file full path name;
Whether step 46, compare process title and mate with certain consumer process exclusionary rules, if coupling, then think that this file change is not within the scope of backup, goes to step 41, otherwise goes to step 47;
Step 47, compares change file directory name and whether process title mates certain consumer process directory name exclusionary rules, if coupling, then thinks that this file change is not within the scope of backup, goes to step 41, otherwise goes to step 48;
Step 48, compares change file full path name and whether mates certain user file name exclusionary rules, if coupling, then think that this file change is not within the scope of backup, goes to step 41, otherwise goes to step 45.
5. the computer data intelligent backup method as described in claim 1, is characterized in that, described step 7 is further:
Step 51, travels through each delta file comspec, obtains the file label of delta file place volume, if not this file label in the list of increment volume, then write increases the list of standby volume, otherwise does not write;
Step 52, judges that whether increase the list of standby volume is empty, as empty, then go to step 56, otherwise goes to step 53;
Step 53, selects one to increase standby volume, generates the snapshot of the standby volume of this increasing in the list of increasing standby volume;
Step 54, the list of traversal delta file, finds the delta file comspec belonging to this increment volume, and the snapshot of the standby volume of this increasing reads this delta file, sends delta file, delta file comspec, delta file digest value to high in the clouds;
Step D55, deletes this increasing for volume shadow copy, removes file label, go to step 53 from the list of increasing standby volume;
Step 56, empties delta file list.
6. the computer data intelligent backup method as described in claim 1, is characterized in that, described step 8 is further:
Step 61, rule base update module scanning operating system of user, obtains custom system feature, obtains present system time;
Step 62, sends custom system characteristic sum present system time to high in the clouds;
Step 63, responds if do not receive high in the clouds, then goes to step 67, otherwise go to step 64;
Step 64, the rule base version returned in high in the clouds and current version compare, and as changed, go to step 65, otherwise go to step 66;
Step 65, downloads new rule base from high in the clouds;
Step 66, latency period P step, goes to step 61;
Step 67, latency period Q step, goes to step 61.
CN201510123310.7A 2015-03-20 2015-03-20 Intelligent computer data backup method Pending CN104714864A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510123310.7A CN104714864A (en) 2015-03-20 2015-03-20 Intelligent computer data backup method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510123310.7A CN104714864A (en) 2015-03-20 2015-03-20 Intelligent computer data backup method

Publications (1)

Publication Number Publication Date
CN104714864A true CN104714864A (en) 2015-06-17

Family

ID=53414226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510123310.7A Pending CN104714864A (en) 2015-03-20 2015-03-20 Intelligent computer data backup method

Country Status (1)

Country Link
CN (1) CN104714864A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105373452A (en) * 2015-12-11 2016-03-02 上海爱数信息技术股份有限公司 Data backup method
CN106598785A (en) * 2016-12-16 2017-04-26 广东美晨通讯有限公司 File system backup and restoration method and device
CN109522160A (en) * 2018-11-29 2019-03-26 上海英方软件股份有限公司 Compare backup method and system by saving the file information abstract progress file directory
WO2020037985A1 (en) * 2018-08-23 2020-02-27 华为技术有限公司 Method and apparatus for calculating backup file size
CN111159109A (en) * 2019-11-26 2020-05-15 陶壮壮 Method and system for detecting file occupied by disk space
CN112181756A (en) * 2019-07-04 2021-01-05 上海泰宇信息技术股份有限公司 Data monitoring and security method
CN115061856A (en) * 2022-08-16 2022-09-16 四川大学 Block-based persistent volume backup method, system, storage medium and recovery method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
US20100058010A1 (en) * 2008-09-04 2010-03-04 Oliver Augenstein Incremental backup using snapshot delta views
CN102521075A (en) * 2011-12-01 2012-06-27 浪潮电子信息产业股份有限公司 Fast and reliable file incremental backup method
CN103389925A (en) * 2012-05-09 2013-11-13 南京壹进制信息技术有限公司 Real-time backup method based on process name identification
CN103412801A (en) * 2013-08-09 2013-11-27 厦门天锐科技有限公司 Method for file backup based on process identification file
CN103995757A (en) * 2014-05-12 2014-08-20 浪潮电子信息产业股份有限公司 Rapid file backup method based on changed file monitoring

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100058010A1 (en) * 2008-09-04 2010-03-04 Oliver Augenstein Incremental backup using snapshot delta views
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102521075A (en) * 2011-12-01 2012-06-27 浪潮电子信息产业股份有限公司 Fast and reliable file incremental backup method
CN103389925A (en) * 2012-05-09 2013-11-13 南京壹进制信息技术有限公司 Real-time backup method based on process name identification
CN103412801A (en) * 2013-08-09 2013-11-27 厦门天锐科技有限公司 Method for file backup based on process identification file
CN103995757A (en) * 2014-05-12 2014-08-20 浪潮电子信息产业股份有限公司 Rapid file backup method based on changed file monitoring

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105373452A (en) * 2015-12-11 2016-03-02 上海爱数信息技术股份有限公司 Data backup method
CN105373452B (en) * 2015-12-11 2019-02-01 上海爱数信息技术股份有限公司 A kind of data back up method
CN106598785A (en) * 2016-12-16 2017-04-26 广东美晨通讯有限公司 File system backup and restoration method and device
WO2020037985A1 (en) * 2018-08-23 2020-02-27 华为技术有限公司 Method and apparatus for calculating backup file size
CN109522160A (en) * 2018-11-29 2019-03-26 上海英方软件股份有限公司 Compare backup method and system by saving the file information abstract progress file directory
CN109522160B (en) * 2018-11-29 2020-05-05 上海英方软件股份有限公司 Method and system for comparing and backing up file directory by saving file information abstract
CN112181756A (en) * 2019-07-04 2021-01-05 上海泰宇信息技术股份有限公司 Data monitoring and security method
CN111159109A (en) * 2019-11-26 2020-05-15 陶壮壮 Method and system for detecting file occupied by disk space
CN115061856A (en) * 2022-08-16 2022-09-16 四川大学 Block-based persistent volume backup method, system, storage medium and recovery method thereof

Similar Documents

Publication Publication Date Title
CN104714864A (en) Intelligent computer data backup method
US10198451B2 (en) Systems and methods for using metadata to enhance data identification operations
CN102880663B (en) The optimization of the file of part deduplication
CN101809566B (en) Efficient file hash identifier computation
US8112464B2 (en) On-demand access to container file directories
US8478729B2 (en) System and method for controlling the storage of redundant electronic files to increase storage reliability and space efficiency
KR101626186B1 (en) Differential file and system restores from peers and the cloud
US9141289B2 (en) Intelligent data storage utilizing one or more records
US8321482B2 (en) Selectively modifying files of a container file
US20090228669A1 (en) Storage Device Optimization Using File Characteristics
CN103460197A (en) Computer system, file management method and metadata server
CN104462389B (en) Distributed file system implementation method based on classification storage
CN104408111A (en) Method and device for deleting duplicate data
CN103037004A (en) Implement method and device of cloud storage system operation
US7640588B2 (en) Data processing system and method
EP2291748A2 (en) Maintenance of exo-file system metadata on removable storage device
US11550913B2 (en) System and method for performing an antivirus scan using file level deduplication
CN113448946B (en) Data migration method and device and electronic equipment
CN102142010A (en) Method and equipment for inputting data to multimedia service database on embedded equipment
US10228961B2 (en) Live storage domain decommissioning in a virtual environment
EP2973008A1 (en) Grouping files for optimized file operations
CN109325005A (en) A kind of data processing method and electronic equipment
CN101872406A (en) Computer file tracking method
US8370589B1 (en) System and method for re-use of writeable PPIs
US7974953B1 (en) System and method for deletion of writeable PPIS

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150617

WD01 Invention patent application deemed withdrawn after publication