CN107291387A - A kind of disk cut-in method of double control disk array - Google Patents

A kind of disk cut-in method of double control disk array Download PDF

Info

Publication number
CN107291387A
CN107291387A CN201710449661.6A CN201710449661A CN107291387A CN 107291387 A CN107291387 A CN 107291387A CN 201710449661 A CN201710449661 A CN 201710449661A CN 107291387 A CN107291387 A CN 107291387A
Authority
CN
China
Prior art keywords
disk
controller
information
master controller
preparation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710449661.6A
Other languages
Chinese (zh)
Other versions
CN107291387B (en
Inventor
王施人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Computer Technology and Applications
Original Assignee
Beijing Institute of Computer Technology and Applications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Computer Technology and Applications filed Critical Beijing Institute of Computer Technology and Applications
Priority to CN201710449661.6A priority Critical patent/CN107291387B/en
Publication of CN107291387A publication Critical patent/CN107291387A/en
Application granted granted Critical
Publication of CN107291387B publication Critical patent/CN107291387B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0629Configuration or reconfiguration of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0689Disk arrays, e.g. RAID, JBOD

Abstract

The present invention relates to a kind of disk cut-in method of double control disk array, belong to computer information storage technology field.The present invention controls the insertion of disk with isolating from operating system layer, it ensure that access state stores the uniformity of the upstate of application with upper strata, improve the security of double control disk array, it is to avoid available management of the disk to upper layer application, reduce the complexity of system and the accuracy of data;Also the uniformity of access information and access state is kept using the active and standby role of dual control disk two controllers of disk array;Also pass through two controller access informations of background monitoring management program periodic maintenance and the realtime uniform of access state.

Description

A kind of disk cut-in method of double control disk array
Technical field
The present invention relates to computer information storage technology field, and in particular to a kind of disk access side of double control disk array Method.
Background technology
With the growth and the popularization of information system of information explosion formula, people are to the demand more and more higher of storage device, greatly Cause can be divided into three phases:First stage, memory capacity, storage performance demand stage, this stage, during mainly due to information The rapid growth of generation burst of informational capacity, makes how to expand memory space, how to improve memory rate as research emphasis, Then Large Copacity, high performance special purpose memory devices-disk array are rapidly developed and wide popularization and application;Second stage, Highly reliable demand stage, with advances in technology, the capacity and performance of disk array are all rendered very remarkably, in order to protect The uninterrupted operation of card business, improving storage equipment reliability turns into main direction of studying, and double control disk array etc. passes through redundancy The storage device that means improve equipment dependability is gradually popularized;Phase III, security requirement stage, as data statistics is dug The enhancing of analysis ability is dug, data are inseparable with wealth, and each manufacturer need to protect its data to occupy in competition Favourable position, how to improve the security of storage device becomes urgent problem to be solved.At present, the development of storage device is being just In the phase III:The security requirement stage.Improving storage equipment security has many means, including certification, encryption, disk connect Enter the various ways such as management.Although disk access-in management is not the means of most common raising storage equipment security, it By the mandate access to disk and the unauthorized quarantine measures of disk, it can effectively prevent illegal disk access disk array right User data is stolen by other any special measures such as copy, duplications afterwards, becomes most direct raising Information Security means.
The content of the invention
(1) technical problem to be solved
The technical problem to be solved in the present invention is:How a kind of double control disk array disk cut-in method is designed, effectively Carry out disk access-in management and ensure the uniformity of upper layer application storage resource, improve the security of double control disk array.
(2) technical scheme
In order to solve the above-mentioned technical problem, the invention provides a kind of disk cut-in method of double control disk array, including Following steps:
In start process, the operating system nucleus of the active and standby controller of double control disk array scans all magnetic respectively Disc apparatus, including authorized disk unit 7 and unauthorized disk 8, the udev that the operating system of active and standby controller is carried is according to The rule file of definition, implements start pretreatment to each disk unit:The information of current disk unit is obtained first, including: Disk Serial Number, disk internal interface information, disk slot number and disk block device number, and information is inserted into disk authorization message Table and disk internal interface information table, when there is the corresponding relevant information of the Disk Serial Number in disk authorization message table, retain Originally information, does not perform insertion, otherwise, to give tacit consent to the disk unit as unauthorized setting insertion record, and in disk Portion's interface message table, no matter whether it has the corresponding relevant information of the Disk Serial Number, is required for insertion, and record new Internal interface information, disk block device number and disk slot number;
After start, the scanning of the operating system nucleus of the active and standby controller of double control disk array is all to have accessed disk, including Disk 7 and unauthorized disk 8 have been authorized, equipment Serial Number has been read, it is compared with disk authorization message table, mandate letter is checked Breath, if authorize, then do not handle, otherwise, its internal interface information is inquired about by disk internal interface information table, call and be System order, removes the disk from operating system layer and is isolated, and delete the device node;
When local master controller 1 or preparation controller 2 receive user instruction, user instruction is performed locally first, Its internal interface information, calling system order are obtained by disk internal interface information table, if disk authorized order is then held Row disk incoming order, otherwise performs disk isolation order, and updates disk authorization message table, then sends an instruction to opposite end Preparation controller 2 or master controller 1, opposite end preparation controller 2 or master controller 1 also perform identical operation, and by result Local master controller 1 or preparation controller 2 is fed back to, opposite end preparation controller 2 or master controller 1 run succeeded then local Master controller 1 or preparation controller 2 are returned success message, and otherwise local master controller 1 or preparation controller 2 perform rollback behaviour Make and return to failed message.
Preferably, in whole access procedure, master controller 1, the running background of preparation controller 2 monitoring maintenance program, cycle Property by the synchronizing information of the information of preparation controller 2 and master controller 1.
Preferably, the synchronous process of described information is:
The disk authorization message table of master controller 1 is read, by the table information format and is sent to preparation controller end 2;
Preparation controller 2 read come autonomous controller 1 disk authorization message table, analyze disk authorization message table and with it is local Disk authorization message table is contrasted;
When the discovery disk of preparation controller 2 is not accessed and the disk of master controller 1 has been accessed, what 2 pairs of preparation controller was not accessed Inconsistent disk performs disk access operation one by one, and changes local disk authorization message table;
When the disk of preparation controller 2 has been accessed and the disk of master controller 1 is not accessed, what 2 pairs of preparation controller had been accessed differs The disk of cause performs disk and removes operation, and changes local disk authorization message table;
Disk access operation is performed if preparation controller 2 or disk is removed if operating successfully and returned success message;Otherwise, remember The disk of operation failure is recorded, corresponding disc information is sent to master controller 1, master controller 1 will be according to the disc information to upper Layer user gives a warning, and points out its manual intervention to operate.
Preferably, in the double control disk array, heartbeat link 3 and data are passed through between master controller 1 and preparation controller 2 Link 4 is connected respectively.
Preferably, the master controller 1 by shared data link 5 with having authorized disk 7 and unauthorized disk 8 to be connected, The preparation controller 2 is also by shared data link 5 with having authorized disk 7 and unauthorized disk 8 to be connected.
(3) beneficial effect
The present invention controls the insertion of disk with isolating from operating system layer, it is ensured that access state stores application with upper strata The uniformity of upstate, improves the security of double control disk array, it is to avoid available management of the disk to upper layer application, subtracts The complexity of system and the accuracy of data are lacked;Also keep connecing using the active and standby role of two controllers of dual control disk disk array Enter information and the uniformity of access state;Also by two controller access informations of background monitoring management program periodic maintenance with connecing Enter the realtime uniform of state.
Brief description of the drawings
Fig. 1 is the disk cut-in method hardware architecture diagram of double control disk array of the present invention.
Wherein,
The preparation controller of 1 master controller 2
The data link of 3 heartbeat link 4
The shared memory cell of 5 shared data link 6
7 have authorized the unauthorized disk of disk 8
Embodiment
To make the purpose of the present invention, content and advantage clearer, with reference to the accompanying drawings and examples, to the present invention's Embodiment is described in further detail.
Hardware platform needed for the disk cut-in method of the double control disk array of the present invention is double control disk array, the dual control magnetic Disk array is made up of two controllers and a shared memory cell, as shown in figure 1, the double control disk array includes main control Device 1, preparation controller 2, heartbeat link 3, data link 4, shared data link 5, shared memory cell 6.Wherein share storage single Member 6 has authorized disk 7, some unauthorized disks 8 including some.
The present invention ensures the safety that system hardware is used by the method for software, only allows to have awarded by disk access-in management The access system of disk 7 is weighed, and the unauthorized disk 8 for having inserted double control disk array is isolated in operating system layer, so that Ensure that master controller 1 and the operating system of preparation controller 2 and upper strata storage application can only all access to use and authorized disk 7.Base In the characteristic of double control disk array, the present invention takes synchronisation measures with Isolation Management operation to disk access, keeps main control All disks access of device 1 and preparation controller 2 is consistent in real time with isolation, so as to ensure bottom storage resource to upper strata That applies is consistent.
The disk cut-in method of the present invention is accessed by disk and completed with isolating control, disc information management with synchronous interaction, And data interaction is realized by disk authorization message table, disk internal interface table.
Disk accesses access and the Isolation Management that disk is realized with isolating control process.When double control disk array start, newly Disk access double control disk array or during user instruction arrival, the insertion event that sends of operating system is captured first and is notified, so After read and update disk authorization message table, disk internal interface information table, decide whether to access or isolate according to authorization message The disk becomes available or disabled disk.
Disc information is managed and synchronizing process:, need to be when double control disk array performs access or isolation disk each time Two controllers perform operation simultaneously, in addition, during system operation, periodically two controller disk authorization messages of synchronization The content of table, disk internal interface information table, and keep two ends disk access consistent with isolation.
The hot plug supervisor of the invention that make use of operating system to carry udev equipment managers on disk access-in management System, when controller operating system nucleus scanning device, udev intercepts the uevent events from kernel, for adding or deleting Except the equipment under/dev for it creates device node, and trigger the execution of hot plug program.Invention defines the two of udev Rule file, the operation that the insertion of self-defined disk unit should be performed with extraction respectively.Disc information management synchronization on by The division of two active and standby roles of controller of double control disk array, background monitoring maintenance mechanism, it is ensured that two controller data accesses It is synchronous with isolation information.
In order to safeguard disk authorization message and disk internal interface information, invention creates disk authorization message table and magnetic Disk internal interface information table.Sequence number, the access information of disk, the disk access that disk authorization message table is used for recording disc are said Whether the information such as bright, the mandate of disk determined by user, and the table is whether disk finally accesses foundation with isolating.Inside disk Interface message table is used for sequence number, disk block device number, disk internal interface information, disk slot number of recording disc etc., should Table will provide key message when will be plugged for disk.All operations of the present invention inside disk authorization message table and disk all by connecing Mouthful information table realizes information exchange, and specific access procedure is as follows:
In start process, controller operating system nucleus can scan all disk units and (including authorize disk unit 7 With unauthorized disk 8), udev is according to defined rule file, it will implement start pretreatment to each disk unit.This hair Bright preprocessing process obtains the information of current disk unit first, including:Disk Serial Number, disk internal interface information, magnetic Disk slot number, disk block device number etc., and information is inserted into disk authorization message table and disk interface information table.When disk mandate When having the corresponding relevant information of the Disk Serial Number in information table, retain original information, do not perform insertion, otherwise, to give tacit consent to this Disk unit is unauthorized setting insertion record, and for disk interface information table, no matter whether it has the disk The corresponding relevant information of sequence number, is required for insertion (existing information is then replaced), records new internal interface information, disk The information such as block device number, disk slot number.
After start, scanning system is all to have accessed disk (including having authorized disk 7 and unauthorized disk 8), reads it and sets Standby sequence number, it is compared with disk authorization message table, its authorization message is checked, if authorize, do not handle, otherwise, lead to Cross disk internal interface information table and inquire about its internal interface information, calling system order removes the disk from operating system layer and entered Row isolation, and delete the device node.Now system is ready, and master controller 1 and preparation controller 2 can only be checked and used and authorize Disk 7, all unauthorized disks 8 have all been isolated, and can not be accessed.
When the user instruction of master controller 1 (or preparation controller 2) is reached, user instruction is performed locally first, is led to Cross disk internal interface information table and obtain its internal interface information, calling system order, if disk authorized order is then performed Disk incoming order, otherwise performs disk isolation order, and updates disk authorization message table, then sends an instruction to opposite end Preparation controller 2 (or master controller 1), opposite end preparation controller 2 (or master controller 1) also performs identical operation, and will knot Fruit feeds back to local master controller 1 (or preparation controller 2), and opposite end preparation controller 2 (or master controller 1) runs succeeded then Local master controller 1 (or preparation controller 2) is returned success message, otherwise local master controller 1 (or preparation controller 2) Perform rolling back action and return to failed message.
In system operation, in order to ensure that disk is accessed between the master controller 1 of double control disk array and preparation controller 2 It is consistent with isolation information, it is necessary to distribute the role of two controllers, based on master controller 1, preparation controller 2 is standby, active and standby angle The determination of color can be determined according to the active and standby role of double control disk array itself.The disc information management of the present invention and synchronization policy For:It is defined by the access of the disk of master controller 1 with isolation information, expands former double control background monitoring maintenance program, in this program Middle increase disk access and the operation of isolation information periodic synchronization, program is by periodically by the information of preparation controller 2 and master control The synchronizing information of device 1 processed, synchronizing process is:
The disk authorization message table of master controller 1 is read, by the table information format and is sent to preparation controller end 2;
Preparation controller 2 read come autonomous controller 1 disk authorization message table, analyze disk authorization message table and with it is local Disk authorization message table is contrasted;
When the discovery disk of preparation controller 2 is not accessed and the disk of master controller 1 has been accessed, what 2 pairs of preparation controller was not accessed Inconsistent disk performs disk access operation one by one, and changes local disk authorization message table;
When the disk of preparation controller 2 has been accessed and the disk of master controller 1 is not accessed, what 2 pairs of preparation controller had been accessed differs The disk of cause performs disk and removes operation, and changes local disk authorization message table;
Disk access operation is performed if preparation controller 2 or disk is removed if operating successfully and returned success message;Otherwise, remember The disk of operation failure is recorded, corresponding disc information is sent to master controller 1, master controller 1 will be according to the disc information to upper Layer user gives a warning, and points out its manual intervention to operate.
As can be seen that the present invention utilizes udev equipment hot swap administrative mechanisms so that disk is accessed when disk is inserted It is managed;By setting up with safeguarding that disk authorization message table completes the message tube of disk access-in management with disk internal interface table Reason and the interactive maintenance of upper-layer user;The access of double control disk array mandate disk and unauthorized disk are controlled from operating system layer Isolation, prevent using unauthorized disk intercept and capture user data, the safety of storage system can be effectively ensured, it is ensured that access state The uniformity of the upstate of application is stored with upper strata, it is to avoid available management of the disk to upper layer application, reduce system The accuracy of complexity and data;Access information is kept with connecing in the active and standby role using two controllers of dual control disk disk array Enter the uniformity of state;Pass through the real-time of two controller access informations of background monitoring management program periodic maintenance and access state Unanimously.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, without departing from the technical principles of the invention, some improvement and deformation can also be made, these improve and deformed Also it should be regarded as protection scope of the present invention.

Claims (5)

1. the disk cut-in method of a kind of double control disk array, it is characterised in that comprise the following steps:
In start process, the operating system nucleus of the active and standby controller of double control disk array scans all disks and set respectively Standby, including authorized disk unit (7) and unauthorized disk (8), the udev that the operating system of active and standby controller is carried is according to The rule file of definition, implements start pretreatment to each disk unit:The information of current disk unit is obtained first, including: Disk Serial Number, disk internal interface information, disk slot number and disk block device number, and information is inserted into disk authorization message Table and disk internal interface information table, when there is the corresponding relevant information of the Disk Serial Number in disk authorization message table, retain Originally information, does not perform insertion, otherwise, to give tacit consent to the disk unit as unauthorized setting insertion record, and in disk Portion's interface message table, no matter whether it has the corresponding relevant information of the Disk Serial Number, is required for insertion, and record new Internal interface information, disk block device number and disk slot number;
After start, the operating system nucleus scanning of the active and standby controller of double control disk array is all to have accessed disk, including has awarded Disk (7) and unauthorized disk (8) are weighed, equipment Serial Number is read, it is compared with disk authorization message table, mandate letter is checked Breath, if authorize, then do not handle, otherwise, its internal interface information is inquired about by disk internal interface information table, call and be System order, removes the disk from operating system layer and is isolated, and delete the device node;
When local master controller (1) or preparation controller (2) receive user instruction, user instruction is performed locally first, Its internal interface information, calling system order are obtained by disk internal interface information table, if disk authorized order is then held Row disk incoming order, otherwise performs disk isolation order, and updates disk authorization message table, then sends an instruction to opposite end Preparation controller (2) or master controller (1), opposite end preparation controller (2) or master controller (1) also perform identical operation, And result is fed back to local master controller (1) or preparation controller (2), opposite end preparation controller (2) or master controller (1) Run succeeded, local master controller (1) or preparation controller (2) is returned success message, otherwise local master controller (1) Or preparation controller (2) performs rolling back action and returns to failed message.
2. the method as described in claim 1, it is characterised in that in whole access procedure, master controller (1), preparation controller (2) running background monitoring maintenance program, periodically by the information of preparation controller (2) and the synchronizing information of master controller (1).
3. method as claimed in claim 2, it is characterised in that the synchronous process of described information is:
The disk authorization message table of master controller (1) is read, by the table information format and is sent to preparation controller end (2);
Preparation controller (2) read come autonomous controller (1) disk authorization message table, analyze disk authorization message table and with it is local Disk authorization message table is contrasted;
When discovery preparation controller (2) disk is not accessed and master controller (1) disk has been accessed, preparation controller (2) is not to accessing Inconsistent disk perform disk access operation one by one, and change local disk authorization message table;
When preparation controller (2) disk has been accessed and master controller (1) disk is not accessed, preparation controller (2) is to having accessed not Consistent disk performs disk and removes operation, and changes local disk authorization message table;
Disk access operation is performed if preparation controller (2) or disk is removed if operating successfully and returned success message;Otherwise, record The disk of operation failure, corresponding disc information is sent to master controller (1), master controller (1) will be according to the disc information pair Upper-layer user gives a warning, and points out its manual intervention to operate.
4. the method as described in claim 1, it is characterised in that in the double control disk array, master controller (1) and standby control Connected respectively by heartbeat link (3) and data link (4) between device (2).
5. the method as any one of Claims 1-4, it is characterised in that the master controller (1) passes through shared data Link (5) is with having authorized disk (7) and unauthorized disk (8) to be connected, and the preparation controller (2) is also by shared data link (5) with having authorized disk (7) and unauthorized disk (8) to be connected.
CN201710449661.6A 2017-06-14 2017-06-14 A kind of disk cut-in method of double control disk array Active CN107291387B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710449661.6A CN107291387B (en) 2017-06-14 2017-06-14 A kind of disk cut-in method of double control disk array

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710449661.6A CN107291387B (en) 2017-06-14 2017-06-14 A kind of disk cut-in method of double control disk array

Publications (2)

Publication Number Publication Date
CN107291387A true CN107291387A (en) 2017-10-24
CN107291387B CN107291387B (en) 2019-10-11

Family

ID=60096535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710449661.6A Active CN107291387B (en) 2017-06-14 2017-06-14 A kind of disk cut-in method of double control disk array

Country Status (1)

Country Link
CN (1) CN107291387B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109445701A (en) * 2018-10-26 2019-03-08 北京计算机技术及应用研究所 A kind of double control disk array simplifies configuration and synchronization method automatically
CN109446169A (en) * 2018-10-22 2019-03-08 北京计算机技术及应用研究所 A kind of double control disk array shared-file system
CN110275680A (en) * 2019-06-24 2019-09-24 浙江大华技术股份有限公司 A kind of dual control dual-active storage system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1932745A (en) * 2005-09-15 2007-03-21 英业达股份有限公司 Magnetic disc array setting system and method
CN101593083A (en) * 2008-05-26 2009-12-02 联想(北京)有限公司 Device, computing machine and method that computer profile is protected and recovered
WO2014112090A1 (en) * 2013-01-17 2014-07-24 株式会社日立製作所 Disk array system and cable information setting method
US20140245016A1 (en) * 2011-08-26 2014-08-28 Vmware, Inc. Management system and methods for object storage system
CN105260143A (en) * 2015-11-09 2016-01-20 深圳市迪菲特科技股份有限公司 Disk data transmission method and device in dual control disk array

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1932745A (en) * 2005-09-15 2007-03-21 英业达股份有限公司 Magnetic disc array setting system and method
CN100377061C (en) * 2005-09-15 2008-03-26 英业达股份有限公司 Magnetic disc array setting system and method
CN101593083A (en) * 2008-05-26 2009-12-02 联想(北京)有限公司 Device, computing machine and method that computer profile is protected and recovered
US20140245016A1 (en) * 2011-08-26 2014-08-28 Vmware, Inc. Management system and methods for object storage system
WO2014112090A1 (en) * 2013-01-17 2014-07-24 株式会社日立製作所 Disk array system and cable information setting method
CN105260143A (en) * 2015-11-09 2016-01-20 深圳市迪菲特科技股份有限公司 Disk data transmission method and device in dual control disk array

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446169A (en) * 2018-10-22 2019-03-08 北京计算机技术及应用研究所 A kind of double control disk array shared-file system
CN109446169B (en) * 2018-10-22 2022-02-15 北京计算机技术及应用研究所 Double-control disk array shared file system
CN109445701A (en) * 2018-10-26 2019-03-08 北京计算机技术及应用研究所 A kind of double control disk array simplifies configuration and synchronization method automatically
CN109445701B (en) * 2018-10-26 2021-02-23 北京计算机技术及应用研究所 Automatic simplifying configuration synchronization method for double-control disk array
CN110275680A (en) * 2019-06-24 2019-09-24 浙江大华技术股份有限公司 A kind of dual control dual-active storage system

Also Published As

Publication number Publication date
CN107291387B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
US8539562B2 (en) Automated management of system credentials
CN105912428B (en) Realize that source data is converted into the system and method for virtual machine image in real time
US20210103873A1 (en) Blockchain-based sleeve grouting quality tracing method and system, and collection terminal
CN105027498B (en) A kind of method and its system and device by remotely separating and assembling data file realization secure storage
CN104008330B (en) Based on file is centrally stored and anti-data-leakage system of isolation technology and its method
CN108038384B (en) High-safety cluster shared storage virtualization method
CN109906448A (en) Promote the operation on pluggable database using individual logical time stamp service
CN110688261A (en) Heterogeneous electronic file cloud disaster recovery system based on block chain
CN107633168B (en) Automated password management
CN107291387B (en) A kind of disk cut-in method of double control disk array
CN104182184A (en) Distributed block storing and cloning method
CN102693399B (en) System and method for on-line separation and recovery of electronic documents
CN107301544A (en) A kind of safe Wallet System of block chain
CN105516117A (en) Cloud computing based power data security storage method
CN110807064A (en) Data recovery device in RAC distributed database cluster system
CN109977170A (en) The synchronous method and system of network data inside and outside a kind of government affairs
CN105912698A (en) Deletion method and system of data file in disk
US11743262B2 (en) Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
CN111866038A (en) Distributed storage dynamic defense system and method based on heterogeneous multiple copies
CN106559213A (en) Device management method, equipment and system
CN107277152A (en) A kind of public cloud data safety backup system
CN108459929A (en) A kind of data back up method based on cloud computing
CN110300289A (en) Video security management system and method
CN109033444A (en) The method and device across organizational boundary's data sharing is realized based on object storage technology
CN112633764A (en) Intelligent customer service system and customer service method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant