CN107291387A - A kind of disk cut-in method of double control disk array - Google Patents
A kind of disk cut-in method of double control disk array Download PDFInfo
- Publication number
- CN107291387A CN107291387A CN201710449661.6A CN201710449661A CN107291387A CN 107291387 A CN107291387 A CN 107291387A CN 201710449661 A CN201710449661 A CN 201710449661A CN 107291387 A CN107291387 A CN 107291387A
- Authority
- CN
- China
- Prior art keywords
- disk
- controller
- information
- master controller
- preparation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0683—Plurality of storage devices
- G06F3/0689—Disk arrays, e.g. RAID, JBOD
Abstract
The present invention relates to a kind of disk cut-in method of double control disk array, belong to computer information storage technology field.The present invention controls the insertion of disk with isolating from operating system layer, it ensure that access state stores the uniformity of the upstate of application with upper strata, improve the security of double control disk array, it is to avoid available management of the disk to upper layer application, reduce the complexity of system and the accuracy of data;Also the uniformity of access information and access state is kept using the active and standby role of dual control disk two controllers of disk array;Also pass through two controller access informations of background monitoring management program periodic maintenance and the realtime uniform of access state.
Description
Technical field
The present invention relates to computer information storage technology field, and in particular to a kind of disk access side of double control disk array
Method.
Background technology
With the growth and the popularization of information system of information explosion formula, people are to the demand more and more higher of storage device, greatly
Cause can be divided into three phases:First stage, memory capacity, storage performance demand stage, this stage, during mainly due to information
The rapid growth of generation burst of informational capacity, makes how to expand memory space, how to improve memory rate as research emphasis,
Then Large Copacity, high performance special purpose memory devices-disk array are rapidly developed and wide popularization and application;Second stage,
Highly reliable demand stage, with advances in technology, the capacity and performance of disk array are all rendered very remarkably, in order to protect
The uninterrupted operation of card business, improving storage equipment reliability turns into main direction of studying, and double control disk array etc. passes through redundancy
The storage device that means improve equipment dependability is gradually popularized;Phase III, security requirement stage, as data statistics is dug
The enhancing of analysis ability is dug, data are inseparable with wealth, and each manufacturer need to protect its data to occupy in competition
Favourable position, how to improve the security of storage device becomes urgent problem to be solved.At present, the development of storage device is being just
In the phase III:The security requirement stage.Improving storage equipment security has many means, including certification, encryption, disk connect
Enter the various ways such as management.Although disk access-in management is not the means of most common raising storage equipment security, it
By the mandate access to disk and the unauthorized quarantine measures of disk, it can effectively prevent illegal disk access disk array right
User data is stolen by other any special measures such as copy, duplications afterwards, becomes most direct raising Information Security means.
The content of the invention
(1) technical problem to be solved
The technical problem to be solved in the present invention is:How a kind of double control disk array disk cut-in method is designed, effectively
Carry out disk access-in management and ensure the uniformity of upper layer application storage resource, improve the security of double control disk array.
(2) technical scheme
In order to solve the above-mentioned technical problem, the invention provides a kind of disk cut-in method of double control disk array, including
Following steps:
In start process, the operating system nucleus of the active and standby controller of double control disk array scans all magnetic respectively
Disc apparatus, including authorized disk unit 7 and unauthorized disk 8, the udev that the operating system of active and standby controller is carried is according to
The rule file of definition, implements start pretreatment to each disk unit:The information of current disk unit is obtained first, including:
Disk Serial Number, disk internal interface information, disk slot number and disk block device number, and information is inserted into disk authorization message
Table and disk internal interface information table, when there is the corresponding relevant information of the Disk Serial Number in disk authorization message table, retain
Originally information, does not perform insertion, otherwise, to give tacit consent to the disk unit as unauthorized setting insertion record, and in disk
Portion's interface message table, no matter whether it has the corresponding relevant information of the Disk Serial Number, is required for insertion, and record new
Internal interface information, disk block device number and disk slot number;
After start, the scanning of the operating system nucleus of the active and standby controller of double control disk array is all to have accessed disk, including
Disk 7 and unauthorized disk 8 have been authorized, equipment Serial Number has been read, it is compared with disk authorization message table, mandate letter is checked
Breath, if authorize, then do not handle, otherwise, its internal interface information is inquired about by disk internal interface information table, call and be
System order, removes the disk from operating system layer and is isolated, and delete the device node;
When local master controller 1 or preparation controller 2 receive user instruction, user instruction is performed locally first,
Its internal interface information, calling system order are obtained by disk internal interface information table, if disk authorized order is then held
Row disk incoming order, otherwise performs disk isolation order, and updates disk authorization message table, then sends an instruction to opposite end
Preparation controller 2 or master controller 1, opposite end preparation controller 2 or master controller 1 also perform identical operation, and by result
Local master controller 1 or preparation controller 2 is fed back to, opposite end preparation controller 2 or master controller 1 run succeeded then local
Master controller 1 or preparation controller 2 are returned success message, and otherwise local master controller 1 or preparation controller 2 perform rollback behaviour
Make and return to failed message.
Preferably, in whole access procedure, master controller 1, the running background of preparation controller 2 monitoring maintenance program, cycle
Property by the synchronizing information of the information of preparation controller 2 and master controller 1.
Preferably, the synchronous process of described information is:
The disk authorization message table of master controller 1 is read, by the table information format and is sent to preparation controller end 2;
Preparation controller 2 read come autonomous controller 1 disk authorization message table, analyze disk authorization message table and with it is local
Disk authorization message table is contrasted;
When the discovery disk of preparation controller 2 is not accessed and the disk of master controller 1 has been accessed, what 2 pairs of preparation controller was not accessed
Inconsistent disk performs disk access operation one by one, and changes local disk authorization message table;
When the disk of preparation controller 2 has been accessed and the disk of master controller 1 is not accessed, what 2 pairs of preparation controller had been accessed differs
The disk of cause performs disk and removes operation, and changes local disk authorization message table;
Disk access operation is performed if preparation controller 2 or disk is removed if operating successfully and returned success message;Otherwise, remember
The disk of operation failure is recorded, corresponding disc information is sent to master controller 1, master controller 1 will be according to the disc information to upper
Layer user gives a warning, and points out its manual intervention to operate.
Preferably, in the double control disk array, heartbeat link 3 and data are passed through between master controller 1 and preparation controller 2
Link 4 is connected respectively.
Preferably, the master controller 1 by shared data link 5 with having authorized disk 7 and unauthorized disk 8 to be connected,
The preparation controller 2 is also by shared data link 5 with having authorized disk 7 and unauthorized disk 8 to be connected.
(3) beneficial effect
The present invention controls the insertion of disk with isolating from operating system layer, it is ensured that access state stores application with upper strata
The uniformity of upstate, improves the security of double control disk array, it is to avoid available management of the disk to upper layer application, subtracts
The complexity of system and the accuracy of data are lacked;Also keep connecing using the active and standby role of two controllers of dual control disk disk array
Enter information and the uniformity of access state;Also by two controller access informations of background monitoring management program periodic maintenance with connecing
Enter the realtime uniform of state.
Brief description of the drawings
Fig. 1 is the disk cut-in method hardware architecture diagram of double control disk array of the present invention.
Wherein,
The preparation controller of 1 master controller 2
The data link of 3 heartbeat link 4
The shared memory cell of 5 shared data link 6
7 have authorized the unauthorized disk of disk 8
Embodiment
To make the purpose of the present invention, content and advantage clearer, with reference to the accompanying drawings and examples, to the present invention's
Embodiment is described in further detail.
Hardware platform needed for the disk cut-in method of the double control disk array of the present invention is double control disk array, the dual control magnetic
Disk array is made up of two controllers and a shared memory cell, as shown in figure 1, the double control disk array includes main control
Device 1, preparation controller 2, heartbeat link 3, data link 4, shared data link 5, shared memory cell 6.Wherein share storage single
Member 6 has authorized disk 7, some unauthorized disks 8 including some.
The present invention ensures the safety that system hardware is used by the method for software, only allows to have awarded by disk access-in management
The access system of disk 7 is weighed, and the unauthorized disk 8 for having inserted double control disk array is isolated in operating system layer, so that
Ensure that master controller 1 and the operating system of preparation controller 2 and upper strata storage application can only all access to use and authorized disk 7.Base
In the characteristic of double control disk array, the present invention takes synchronisation measures with Isolation Management operation to disk access, keeps main control
All disks access of device 1 and preparation controller 2 is consistent in real time with isolation, so as to ensure bottom storage resource to upper strata
That applies is consistent.
The disk cut-in method of the present invention is accessed by disk and completed with isolating control, disc information management with synchronous interaction,
And data interaction is realized by disk authorization message table, disk internal interface table.
Disk accesses access and the Isolation Management that disk is realized with isolating control process.When double control disk array start, newly
Disk access double control disk array or during user instruction arrival, the insertion event that sends of operating system is captured first and is notified, so
After read and update disk authorization message table, disk internal interface information table, decide whether to access or isolate according to authorization message
The disk becomes available or disabled disk.
Disc information is managed and synchronizing process:, need to be when double control disk array performs access or isolation disk each time
Two controllers perform operation simultaneously, in addition, during system operation, periodically two controller disk authorization messages of synchronization
The content of table, disk internal interface information table, and keep two ends disk access consistent with isolation.
The hot plug supervisor of the invention that make use of operating system to carry udev equipment managers on disk access-in management
System, when controller operating system nucleus scanning device, udev intercepts the uevent events from kernel, for adding or deleting
Except the equipment under/dev for it creates device node, and trigger the execution of hot plug program.Invention defines the two of udev
Rule file, the operation that the insertion of self-defined disk unit should be performed with extraction respectively.Disc information management synchronization on by
The division of two active and standby roles of controller of double control disk array, background monitoring maintenance mechanism, it is ensured that two controller data accesses
It is synchronous with isolation information.
In order to safeguard disk authorization message and disk internal interface information, invention creates disk authorization message table and magnetic
Disk internal interface information table.Sequence number, the access information of disk, the disk access that disk authorization message table is used for recording disc are said
Whether the information such as bright, the mandate of disk determined by user, and the table is whether disk finally accesses foundation with isolating.Inside disk
Interface message table is used for sequence number, disk block device number, disk internal interface information, disk slot number of recording disc etc., should
Table will provide key message when will be plugged for disk.All operations of the present invention inside disk authorization message table and disk all by connecing
Mouthful information table realizes information exchange, and specific access procedure is as follows:
In start process, controller operating system nucleus can scan all disk units and (including authorize disk unit 7
With unauthorized disk 8), udev is according to defined rule file, it will implement start pretreatment to each disk unit.This hair
Bright preprocessing process obtains the information of current disk unit first, including:Disk Serial Number, disk internal interface information, magnetic
Disk slot number, disk block device number etc., and information is inserted into disk authorization message table and disk interface information table.When disk mandate
When having the corresponding relevant information of the Disk Serial Number in information table, retain original information, do not perform insertion, otherwise, to give tacit consent to this
Disk unit is unauthorized setting insertion record, and for disk interface information table, no matter whether it has the disk
The corresponding relevant information of sequence number, is required for insertion (existing information is then replaced), records new internal interface information, disk
The information such as block device number, disk slot number.
After start, scanning system is all to have accessed disk (including having authorized disk 7 and unauthorized disk 8), reads it and sets
Standby sequence number, it is compared with disk authorization message table, its authorization message is checked, if authorize, do not handle, otherwise, lead to
Cross disk internal interface information table and inquire about its internal interface information, calling system order removes the disk from operating system layer and entered
Row isolation, and delete the device node.Now system is ready, and master controller 1 and preparation controller 2 can only be checked and used and authorize
Disk 7, all unauthorized disks 8 have all been isolated, and can not be accessed.
When the user instruction of master controller 1 (or preparation controller 2) is reached, user instruction is performed locally first, is led to
Cross disk internal interface information table and obtain its internal interface information, calling system order, if disk authorized order is then performed
Disk incoming order, otherwise performs disk isolation order, and updates disk authorization message table, then sends an instruction to opposite end
Preparation controller 2 (or master controller 1), opposite end preparation controller 2 (or master controller 1) also performs identical operation, and will knot
Fruit feeds back to local master controller 1 (or preparation controller 2), and opposite end preparation controller 2 (or master controller 1) runs succeeded then
Local master controller 1 (or preparation controller 2) is returned success message, otherwise local master controller 1 (or preparation controller 2)
Perform rolling back action and return to failed message.
In system operation, in order to ensure that disk is accessed between the master controller 1 of double control disk array and preparation controller 2
It is consistent with isolation information, it is necessary to distribute the role of two controllers, based on master controller 1, preparation controller 2 is standby, active and standby angle
The determination of color can be determined according to the active and standby role of double control disk array itself.The disc information management of the present invention and synchronization policy
For:It is defined by the access of the disk of master controller 1 with isolation information, expands former double control background monitoring maintenance program, in this program
Middle increase disk access and the operation of isolation information periodic synchronization, program is by periodically by the information of preparation controller 2 and master control
The synchronizing information of device 1 processed, synchronizing process is:
The disk authorization message table of master controller 1 is read, by the table information format and is sent to preparation controller end 2;
Preparation controller 2 read come autonomous controller 1 disk authorization message table, analyze disk authorization message table and with it is local
Disk authorization message table is contrasted;
When the discovery disk of preparation controller 2 is not accessed and the disk of master controller 1 has been accessed, what 2 pairs of preparation controller was not accessed
Inconsistent disk performs disk access operation one by one, and changes local disk authorization message table;
When the disk of preparation controller 2 has been accessed and the disk of master controller 1 is not accessed, what 2 pairs of preparation controller had been accessed differs
The disk of cause performs disk and removes operation, and changes local disk authorization message table;
Disk access operation is performed if preparation controller 2 or disk is removed if operating successfully and returned success message;Otherwise, remember
The disk of operation failure is recorded, corresponding disc information is sent to master controller 1, master controller 1 will be according to the disc information to upper
Layer user gives a warning, and points out its manual intervention to operate.
As can be seen that the present invention utilizes udev equipment hot swap administrative mechanisms so that disk is accessed when disk is inserted
It is managed;By setting up with safeguarding that disk authorization message table completes the message tube of disk access-in management with disk internal interface table
Reason and the interactive maintenance of upper-layer user;The access of double control disk array mandate disk and unauthorized disk are controlled from operating system layer
Isolation, prevent using unauthorized disk intercept and capture user data, the safety of storage system can be effectively ensured, it is ensured that access state
The uniformity of the upstate of application is stored with upper strata, it is to avoid available management of the disk to upper layer application, reduce system
The accuracy of complexity and data;Access information is kept with connecing in the active and standby role using two controllers of dual control disk disk array
Enter the uniformity of state;Pass through the real-time of two controller access informations of background monitoring management program periodic maintenance and access state
Unanimously.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, without departing from the technical principles of the invention, some improvement and deformation can also be made, these improve and deformed
Also it should be regarded as protection scope of the present invention.
Claims (5)
1. the disk cut-in method of a kind of double control disk array, it is characterised in that comprise the following steps:
In start process, the operating system nucleus of the active and standby controller of double control disk array scans all disks and set respectively
Standby, including authorized disk unit (7) and unauthorized disk (8), the udev that the operating system of active and standby controller is carried is according to
The rule file of definition, implements start pretreatment to each disk unit:The information of current disk unit is obtained first, including:
Disk Serial Number, disk internal interface information, disk slot number and disk block device number, and information is inserted into disk authorization message
Table and disk internal interface information table, when there is the corresponding relevant information of the Disk Serial Number in disk authorization message table, retain
Originally information, does not perform insertion, otherwise, to give tacit consent to the disk unit as unauthorized setting insertion record, and in disk
Portion's interface message table, no matter whether it has the corresponding relevant information of the Disk Serial Number, is required for insertion, and record new
Internal interface information, disk block device number and disk slot number;
After start, the operating system nucleus scanning of the active and standby controller of double control disk array is all to have accessed disk, including has awarded
Disk (7) and unauthorized disk (8) are weighed, equipment Serial Number is read, it is compared with disk authorization message table, mandate letter is checked
Breath, if authorize, then do not handle, otherwise, its internal interface information is inquired about by disk internal interface information table, call and be
System order, removes the disk from operating system layer and is isolated, and delete the device node;
When local master controller (1) or preparation controller (2) receive user instruction, user instruction is performed locally first,
Its internal interface information, calling system order are obtained by disk internal interface information table, if disk authorized order is then held
Row disk incoming order, otherwise performs disk isolation order, and updates disk authorization message table, then sends an instruction to opposite end
Preparation controller (2) or master controller (1), opposite end preparation controller (2) or master controller (1) also perform identical operation,
And result is fed back to local master controller (1) or preparation controller (2), opposite end preparation controller (2) or master controller (1)
Run succeeded, local master controller (1) or preparation controller (2) is returned success message, otherwise local master controller (1)
Or preparation controller (2) performs rolling back action and returns to failed message.
2. the method as described in claim 1, it is characterised in that in whole access procedure, master controller (1), preparation controller
(2) running background monitoring maintenance program, periodically by the information of preparation controller (2) and the synchronizing information of master controller (1).
3. method as claimed in claim 2, it is characterised in that the synchronous process of described information is:
The disk authorization message table of master controller (1) is read, by the table information format and is sent to preparation controller end (2);
Preparation controller (2) read come autonomous controller (1) disk authorization message table, analyze disk authorization message table and with it is local
Disk authorization message table is contrasted;
When discovery preparation controller (2) disk is not accessed and master controller (1) disk has been accessed, preparation controller (2) is not to accessing
Inconsistent disk perform disk access operation one by one, and change local disk authorization message table;
When preparation controller (2) disk has been accessed and master controller (1) disk is not accessed, preparation controller (2) is to having accessed not
Consistent disk performs disk and removes operation, and changes local disk authorization message table;
Disk access operation is performed if preparation controller (2) or disk is removed if operating successfully and returned success message;Otherwise, record
The disk of operation failure, corresponding disc information is sent to master controller (1), master controller (1) will be according to the disc information pair
Upper-layer user gives a warning, and points out its manual intervention to operate.
4. the method as described in claim 1, it is characterised in that in the double control disk array, master controller (1) and standby control
Connected respectively by heartbeat link (3) and data link (4) between device (2).
5. the method as any one of Claims 1-4, it is characterised in that the master controller (1) passes through shared data
Link (5) is with having authorized disk (7) and unauthorized disk (8) to be connected, and the preparation controller (2) is also by shared data link
(5) with having authorized disk (7) and unauthorized disk (8) to be connected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710449661.6A CN107291387B (en) | 2017-06-14 | 2017-06-14 | A kind of disk cut-in method of double control disk array |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710449661.6A CN107291387B (en) | 2017-06-14 | 2017-06-14 | A kind of disk cut-in method of double control disk array |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107291387A true CN107291387A (en) | 2017-10-24 |
CN107291387B CN107291387B (en) | 2019-10-11 |
Family
ID=60096535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710449661.6A Active CN107291387B (en) | 2017-06-14 | 2017-06-14 | A kind of disk cut-in method of double control disk array |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107291387B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109445701A (en) * | 2018-10-26 | 2019-03-08 | 北京计算机技术及应用研究所 | A kind of double control disk array simplifies configuration and synchronization method automatically |
CN109446169A (en) * | 2018-10-22 | 2019-03-08 | 北京计算机技术及应用研究所 | A kind of double control disk array shared-file system |
CN110275680A (en) * | 2019-06-24 | 2019-09-24 | 浙江大华技术股份有限公司 | A kind of dual control dual-active storage system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932745A (en) * | 2005-09-15 | 2007-03-21 | 英业达股份有限公司 | Magnetic disc array setting system and method |
CN101593083A (en) * | 2008-05-26 | 2009-12-02 | 联想(北京)有限公司 | Device, computing machine and method that computer profile is protected and recovered |
WO2014112090A1 (en) * | 2013-01-17 | 2014-07-24 | 株式会社日立製作所 | Disk array system and cable information setting method |
US20140245016A1 (en) * | 2011-08-26 | 2014-08-28 | Vmware, Inc. | Management system and methods for object storage system |
CN105260143A (en) * | 2015-11-09 | 2016-01-20 | 深圳市迪菲特科技股份有限公司 | Disk data transmission method and device in dual control disk array |
-
2017
- 2017-06-14 CN CN201710449661.6A patent/CN107291387B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932745A (en) * | 2005-09-15 | 2007-03-21 | 英业达股份有限公司 | Magnetic disc array setting system and method |
CN100377061C (en) * | 2005-09-15 | 2008-03-26 | 英业达股份有限公司 | Magnetic disc array setting system and method |
CN101593083A (en) * | 2008-05-26 | 2009-12-02 | 联想(北京)有限公司 | Device, computing machine and method that computer profile is protected and recovered |
US20140245016A1 (en) * | 2011-08-26 | 2014-08-28 | Vmware, Inc. | Management system and methods for object storage system |
WO2014112090A1 (en) * | 2013-01-17 | 2014-07-24 | 株式会社日立製作所 | Disk array system and cable information setting method |
CN105260143A (en) * | 2015-11-09 | 2016-01-20 | 深圳市迪菲特科技股份有限公司 | Disk data transmission method and device in dual control disk array |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109446169A (en) * | 2018-10-22 | 2019-03-08 | 北京计算机技术及应用研究所 | A kind of double control disk array shared-file system |
CN109446169B (en) * | 2018-10-22 | 2022-02-15 | 北京计算机技术及应用研究所 | Double-control disk array shared file system |
CN109445701A (en) * | 2018-10-26 | 2019-03-08 | 北京计算机技术及应用研究所 | A kind of double control disk array simplifies configuration and synchronization method automatically |
CN109445701B (en) * | 2018-10-26 | 2021-02-23 | 北京计算机技术及应用研究所 | Automatic simplifying configuration synchronization method for double-control disk array |
CN110275680A (en) * | 2019-06-24 | 2019-09-24 | 浙江大华技术股份有限公司 | A kind of dual control dual-active storage system |
Also Published As
Publication number | Publication date |
---|---|
CN107291387B (en) | 2019-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8539562B2 (en) | Automated management of system credentials | |
CN105912428B (en) | Realize that source data is converted into the system and method for virtual machine image in real time | |
US20210103873A1 (en) | Blockchain-based sleeve grouting quality tracing method and system, and collection terminal | |
CN105027498B (en) | A kind of method and its system and device by remotely separating and assembling data file realization secure storage | |
CN104008330B (en) | Based on file is centrally stored and anti-data-leakage system of isolation technology and its method | |
CN108038384B (en) | High-safety cluster shared storage virtualization method | |
CN109906448A (en) | Promote the operation on pluggable database using individual logical time stamp service | |
CN110688261A (en) | Heterogeneous electronic file cloud disaster recovery system based on block chain | |
CN107633168B (en) | Automated password management | |
CN107291387B (en) | A kind of disk cut-in method of double control disk array | |
CN104182184A (en) | Distributed block storing and cloning method | |
CN102693399B (en) | System and method for on-line separation and recovery of electronic documents | |
CN107301544A (en) | A kind of safe Wallet System of block chain | |
CN105516117A (en) | Cloud computing based power data security storage method | |
CN110807064A (en) | Data recovery device in RAC distributed database cluster system | |
CN109977170A (en) | The synchronous method and system of network data inside and outside a kind of government affairs | |
CN105912698A (en) | Deletion method and system of data file in disk | |
US11743262B2 (en) | Controlling access to secure information resources using rotational datasets and dynamically configurable data containers | |
CN111866038A (en) | Distributed storage dynamic defense system and method based on heterogeneous multiple copies | |
CN106559213A (en) | Device management method, equipment and system | |
CN107277152A (en) | A kind of public cloud data safety backup system | |
CN108459929A (en) | A kind of data back up method based on cloud computing | |
CN110300289A (en) | Video security management system and method | |
CN109033444A (en) | The method and device across organizational boundary's data sharing is realized based on object storage technology | |
CN112633764A (en) | Intelligent customer service system and customer service method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |