CN108154045B - A method of creation authentic data library - Google Patents
A method of creation authentic data library Download PDFInfo
- Publication number
- CN108154045B CN108154045B CN201611111431.0A CN201611111431A CN108154045B CN 108154045 B CN108154045 B CN 108154045B CN 201611111431 A CN201611111431 A CN 201611111431A CN 108154045 B CN108154045 B CN 108154045B
- Authority
- CN
- China
- Prior art keywords
- server
- group
- database
- reliability
- reliable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2094—Redundant storage or storage space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/80—Database-specific techniques
Abstract
Description
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611111431.0A CN108154045B (en) | 2016-12-02 | 2016-12-02 | A method of creation authentic data library |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611111431.0A CN108154045B (en) | 2016-12-02 | 2016-12-02 | A method of creation authentic data library |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108154045A CN108154045A (en) | 2018-06-12 |
CN108154045B true CN108154045B (en) | 2019-11-26 |
Family
ID=62467780
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611111431.0A Active CN108154045B (en) | 2016-12-02 | 2016-12-02 | A method of creation authentic data library |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108154045B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101706795A (en) * | 2009-11-30 | 2010-05-12 | 上海世范软件技术有限公司 | Method for synchronizing data of database in active/standby server |
CN101876924A (en) * | 2009-04-30 | 2010-11-03 | 升东网络科技发展(上海)有限公司 | Database fault automatic detection and transfer method |
CN104317803A (en) * | 2014-09-23 | 2015-01-28 | 厦门美柚信息科技有限公司 | Data access structure and method of database cluster |
-
2016
- 2016-12-02 CN CN201611111431.0A patent/CN108154045B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101876924A (en) * | 2009-04-30 | 2010-11-03 | 升东网络科技发展(上海)有限公司 | Database fault automatic detection and transfer method |
CN101706795A (en) * | 2009-11-30 | 2010-05-12 | 上海世范软件技术有限公司 | Method for synchronizing data of database in active/standby server |
CN104317803A (en) * | 2014-09-23 | 2015-01-28 | 厦门美柚信息科技有限公司 | Data access structure and method of database cluster |
Also Published As
Publication number | Publication date |
---|---|
CN108154045A (en) | 2018-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Ensure data security in cloud storage | |
CN105120003B (en) | A kind of method for realizing data backup under cloud environment | |
CN104008152B (en) | Support the framework method of the distributed file system of mass data access | |
CN105282171B (en) | A kind of safe and reliable distributed cloud storage method | |
Alhazmi et al. | Evaluating disaster recovery plans using the cloud | |
CN102088491B (en) | Distributed storage oriented cloud storage security architecture and data access method thereof | |
US8528101B1 (en) | Integrated physical security control system for computing resources | |
KR102225196B1 (en) | Consensus of shared blockchain data storage based on error correction codes | |
Tamimi et al. | Disaster recovery techniques in cloud computing | |
Suguna et al. | Overview of data backup and disaster recovery in cloud | |
CN114363352B (en) | Cross-chain interaction method of Internet of things system based on block chain | |
Yaseen et al. | Mitigating insider threat in cloud relational databases | |
CN110839023B (en) | Electric power marketing multi-channel customer service system | |
Vande Putte et al. | Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers? | |
CN102055797A (en) | Method, device and system for accessing cloud storage data | |
Pottier et al. | TrustyDrive, a multi-cloud storage service that protects your privacy | |
CN103092533B (en) | A kind of method and system of data remote synchronization | |
CN108154045B (en) | A method of creation authentic data library | |
CN116800541A (en) | Classified and hierarchical access control and access method for flight operation data | |
Jogdand et al. | CSaaS-a multi-cloud framework for secure file storage technology using open ZFS | |
Kanimozhi et al. | Immediate detection of data corruption by integrating blockchain in cloud computing | |
US20090276851A1 (en) | Detecting malicious behavior in a series of data transmission de-duplication requests of a de-duplicated computer system | |
Zhang et al. | Multi-level container checkpoint performance optimization strategy in SDDC | |
RU2720951C1 (en) | Method and distributed computer system for data processing | |
Nikolovski et al. | On the requirements for successful business continuity in the context of disaster recovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 101399 No. 2 East Airport Road, Shunyi Airport Economic Core Area, Beijing (1st, 5th and 7th floors of Industrial Park 1A-4) Applicant after: Zhongke Star Map Co., Ltd. Address before: 101399 Building 1A-4, National Geographic Information Technology Industrial Park, Guomen Business District, Shunyi District, Beijing Applicant before: Space Star Technology (Beijing) Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Chen Wei Inventor after: Liu Bin Inventor after: Wu Fangcai Inventor after: Chu Yongquan Inventor before: Liu Bin Inventor before: Wu Fangcai Inventor before: Chu Yongquan |