CN108845896A - Component-tracking system and method after disaster - Google Patents
Component-tracking system and method after disaster Download PDFInfo
- Publication number
- CN108845896A CN108845896A CN201810754163.7A CN201810754163A CN108845896A CN 108845896 A CN108845896 A CN 108845896A CN 201810754163 A CN201810754163 A CN 201810754163A CN 108845896 A CN108845896 A CN 108845896A
- Authority
- CN
- China
- Prior art keywords
- user
- request message
- module
- data
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention provides component-tracking system and method after a kind of disaster, is related to remote backup technical field, system includes:Strange land central server;Strange land central server includes:Information interception module, information storage module and enquiry module;Information interception module, for intercepting the user's request message for being transmitted to production center server by adapter;Information storage module, for user's request message to be saved and updated;Enquiry module, user's request message based on preservation provides query page, so that user carries out inquiry tracking to data.The present invention carries out strange land storage by interception message and to message, when ensure that the system log of disaster production development central server is unavailable, reliable and effective transaction Trace Data is also preserved in strange land, it is concentrated use in system queries mode and carries out data and remedy, greatly improve data tracing efficiency, the fast reaction in disaster recovery increases the timeliness and accuracy of data recovery.
Description
Technical field
The present invention relates to remote backup technical fields, more particularly, to component-tracking system and method after a kind of disaster.
Background technique
The construction of large enterprise's application system generallys use the mode of centralization, and IT system is concentrated on the production center, and
Set up different area pattern Disaster Preparation Center.When the reasons such as natural calamity, which occurs, in the production center breaks down, strange land Disaster Preparation Center can be with
The recovery of business is carried out with Backup Data.Due to Disaster Preparation Center with the production center distance generally hundreds of or even thousands of kilometers with
On, data transmission delay is larger, and in disaster recovery switching, switchback, business Tiao Xian department needs to weight when interrupting IT system
It wants business datum to be checked, and under the cooperation of Information technology department, the data of loss is remedied.
Above-mentioned Backup Data is usually the system log of backup in the database in advance, and system log is handled by system
Finished data, the original transaction that may be initiated with channel have differences, and not can guarantee transaction letter by system log amended record
The accuracy of breath, in addition, checking Transaction Information by manual contact client or carrying out voucher amended record, the information ratio of acquisition by hand
It relatively obscures and may differ greatly with actual conditions, and efficiency is lower, data remedy overlong time.
Summary of the invention
In view of this, being reported the purpose of the present invention is to provide component-tracking system and method after a kind of disaster by interception
Text simultaneously carries out strange land storage to message, when ensure that the system log of disaster production development central server is unavailable, in strange land
Reliable and effective transaction Trace Data is also preserved, system queries mode is concentrated use in and carries out data and remedy, greatly improve
Data tracing efficiency, the fast reaction in disaster recovery increase the timeliness and accuracy of data recovery.
In a first aspect, the embodiment of the invention provides component-tracking systems after a kind of disaster, including:Strange land center service
Device;
Strange land central server includes:Information interception module, information storage module and enquiry module;
Information interception module requests report by the user that adapter is transmitted to production center server for intercepting
Text;
Information storage module, for user's request message to be saved and updated;
Enquiry module, user's request message based on preservation provide query page, chase after so that user carries out inquiry to data
Track.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein letter
Ceasing interception module includes:Sniffer;
When the operating mode of adapter is set to Promiscuous mode by sniffer, sniffer interception is suitable by network
It is transmitted to user's request message of production center server with card, and user's request message is transmitted in information storage module.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein letter
Ceasing memory module includes:Transaction trace backup database;
Transaction trace backup database saves user's request message, and updates the user in preset time and request report
Text.
With reference to first aspect, the embodiment of the invention provides the third possible embodiments of first aspect, wherein looks into
Asking module includes:Man-machine interactive system;
Man-machine interactive system receives the inquiry instruction of user, and shows query result to user according to inquiry instruction.
With reference to first aspect, the embodiment of the invention provides the 4th kind of possible embodiments of first aspect, wherein uses
Family request message includes:External client, internal customer and special line are to message transmitted by the server of the production center.
With reference to first aspect, the embodiment of the invention provides the 5th kind of possible embodiments of first aspect, wherein pre-
If the time is 2 hours.
With reference to first aspect, the embodiment of the invention provides the 6th kind of possible embodiments of first aspect, wherein looks into
Asking instruction includes:At least one of serial number, mechanism number, customer number, exchange hour.
With reference to first aspect, the embodiment of the invention provides the 7th kind of possible embodiments of first aspect, wherein net
Network adapter includes:Ethernet card.
With reference to first aspect, the embodiment of the invention provides the 8th kind of possible embodiments of first aspect, wherein also
Including:Packet parsing module;
Packet parsing module is used for the user's request message being truncated to according to information interception module, parses request message
Serial number, mechanism number, customer number, exchange hour information, and the information parsed is transmitted in information storage module.
Second aspect, the embodiment of the present invention provide data tracing method after a kind of disaster, are applied to strange land central server,
Method includes:
Interception is transmitted to user's request message of production center server from adapter;
User's request message is saved and updated;
User's request message based on preservation provides query page, so that user carries out inquiry tracking to data.
The embodiment of the present invention brings following beneficial effect:
The component-tracking system after disaster provided in an embodiment of the present invention, including:Strange land central server;It is genuinely convinced in strange land
Business device include:Information interception module, information storage module and enquiry module;Information interception module, it is suitable by network for intercepting
User's request message of production center server is transmitted to card;Information storage module, for being protected to user's request message
It deposits and updates;Enquiry module, user's request message based on preservation provide query page, chase after so that user carries out inquiry to data
Track.The present invention carries out strange land storage, the system that ensure that disaster production development central server by interception message and to message
When log is unavailable, reliable and effective transaction Trace Data is also preserved in strange land, system queries mode is concentrated use in and is counted
According to remedying, greatly improve data tracing efficiency, the fast reaction in disaster recovery, increase data recovery timeliness and
Accuracy.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims
And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic diagram of component-tracking system after a kind of disaster provided in an embodiment of the present invention;
Fig. 2 is the schematic diagram of component-tracking system after another disaster provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of component-tracking system after another disaster provided in an embodiment of the present invention;
Fig. 4 is the flow chart of data tracing method after a kind of disaster provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Data remedy method after existing calamity, and the system log and manual contact backed up before needing to rely on, which are audited, mends
Record, data restore that accuracy is not high and inefficiency.Based on this, the embodiment of the present invention provides component-tracking system after a kind of disaster
And method, strange land storage is carried out by interception message and to message, ensure that the system day of disaster production development central server
When will is unavailable, reliable and effective transaction Trace Data is also preserved in strange land, system queries mode is concentrated use in and carries out data
It remedies, greatly improves data tracing efficiency, the fast reaction in disaster recovery increases the timeliness and standard of data recovery
True property.For convenient for understanding the present embodiment, first to data tracing system after a kind of disaster disclosed in the embodiment of the present invention
System describes in detail.
Embodiment one:
The embodiment of the invention provides component-tracking systems after a kind of disaster, shown referring to figures 1-3, data after the disaster
Tracing system includes:Strange land central server 11, the strange land central server 11 include:Information interception module 111, information storage
Module 112 and enquiry module 113.
Wherein, information interception module 111 is transmitted to production center server 13 by adapter 12 for intercepting
User's request message;Information storage module 112, for user's request message to be saved and updated;Enquiry module 113, base
Query page is provided in user's request message of preservation, so that user carries out inquiry tracking to data.
Specifically, during user's request message uploads to production center server 13 by adapter 12,
The information interception module 111 of strange land central server 11, the above-mentioned user's request message of real-time interception, and the message being truncated to is sent out
It is sent in information storage module 112, so that information storage module 112 saves above-mentioned user's request message.It is then based on
User's request message of above-mentioned preservation provides a user query page by enquiry module 113, for its carry out data query and
Tracking.
Above-mentioned user's request message includes:External client, internal customer and special line are to transmitted by production center server 13
Message.
Compared with the system log of data backup in the prior art, original user request message is to handle to add without system
The data of work, it is relatively reliable.By interception original user request message and the storage of real-time perfoming strange land, when ensure that disaster occurs
When local system logs are unavailable, reliable and effective transaction Trace Data is also preserved in strange land.User is concentrated use in system and looks into
Inquiry mode carries out data tracing amended record, compared with the mode of present manual contact client, greatly improves efficiency.It is extensive in disaster
Fast reaction when multiple, increases the timeliness of disaster recovery.
Information interception module 111 includes as a preferred implementation manner,:Sniffer 1111.In the case where common, network
Adapter 12 receive packet related with the address of oneself, that is, are transferred to the letter of local host (production center server 13)
Breath packet.Sniffer 1111Sniffer tool can be by adapter 12 (Network Interface Card, abbreviation NIC)
It is set to mixed and disorderly (promiscuous) mode state, each packet of transmission on network is received, numerous associations can also be directed to
View carries out detailed construction Decoding Analysis.Adapter 12 includes more commonly used Ethernet card.When pass through sniffer 1111
When the operating mode of Ethernet card is set to Promiscuous mode, sniffer 1111, which can be truncated to, is transmitted to production by Ethernet card
XML format user's request message of the http protocol of central server 13, and user's request message is transmitted to information storage mould
In block 112.
Sniffer 1111Sniffer is divided to for two kinds of software and hardware, the Sniffer of software have NetXray, Packetboy,
Net Monitor, Sniffer Pro, WireShark, WinNetCap etc., its advantage is that it is quality-high and inexpensive, it is easy to learn to use,
It is also easy to exchange simultaneously, the Sniffer of hardware is commonly referred to as protocol analyzer, and the sniffer 1111 of two kinds of forms can be real-time
Above-mentioned user's request message is grabbed, so that it is guaranteed that the accuracy of 11 storing datas of strange land central server.
Above- mentioned information memory module 112 includes:Transaction trace backup database 1121.Transaction trace backup database 1121
User's request message is saved, and updates user's request message in preset time.In the present embodiment, above-mentioned preset time
It is set as 2 hours.The above-mentioned user's request message grabbed in real time is transmitted to transaction trace backup database by sniffer 1111
In 1121, redundant digit is deleted in the data message traded in 1121 storage system time 2 hs of trace backup database, timing
According to, on the one hand can reduce the storage pressure of server, on the other hand, the processing speed of server can also be improved.
In the present embodiment, component-tracking system further includes after disaster:Packet parsing module, packet parsing module are used for root
It is believed that user's request message that breath interception module 111 is truncated to, parses serial number, mechanism number, the Ke Hubian of request message
Number, exchange hour information, and the information parsed is transmitted in information storage module 112.
Above-mentioned enquiry module 113 includes:Man-machine interactive system 1131, the inquiry that man-machine interactive system 1131 receives user refer to
It enables, and query result is shown to user according to inquiry instruction.Inquiry instruction includes:Serial number, mechanism number, customer number, transaction
At least one of time.
When the standby handover success, not yet public business of enterprise's calamity, industry user can look into man-machine interactive system 1131
Ask the complete message record of account sexual transaction when disaster occurs, the foundation remedied as data.
Component-tracking system after disaster provided by the embodiment of the present invention intercepts user's request message by sniffer 1111
And strange land storage is carried out to message, when ensure that the system log of disaster production development central server 13 is unavailable, in strange land
Reliable and effective transaction Trace Data is also preserved, provides data tracing interface by enquiry module 113, so that enterprise's industrial customers
It is concentrated use in system queries mode and carries out data and remedy, greatly improve data tracing efficiency, it is quickly anti-in disaster recovery
It answers, increases the timeliness and accuracy of data recovery.
Embodiment two:
The embodiment of the present invention provides data tracing method after a kind of disaster, is applied to strange land central server, referring to fig. 4 institute
Show, this approach includes the following steps:
S101:Interception is transmitted to user's request message of production center server from adapter.
When specific implementation, the process of production center server is uploaded to by adapter in user's request message
In, the above-mentioned user's request message of strange land central server real-time interception, and by the packet storage being truncated in corresponding data trace
In mark database.Above-mentioned user's request message includes:External client, internal customer and special line are to transmitted by the server of the production center
Message.
In the case where common, adapter only receives packet related with the address of oneself, that is, is transferred to this landlord
The packet of machine (production center server).And work as sniffer Sniffer tool for adapter (Network
Interface Card, abbreviation NIC) when being set to mixed and disorderly (promiscuous) mode state, it can receive transmission on network
Each packet can also carry out detailed construction Decoding Analysis for numerous agreements.In the present embodiment, pass through sniffer pair
User's request message grabs, specifically, smelling when the operating mode of Ethernet card is set to Promiscuous mode by sniffer
It visits device and is truncated to the XML format user's request message for being transmitted to the http protocol of production center server by Ethernet card, and
User's request message is transmitted in the data Trace Data library of strange land central server.
S102:User's request message is saved and updated.
Strange land central server saves above-mentioned user's request message, and updates the user in preset time and request report
Text.In the present embodiment, above-mentioned preset time is set as 2 hours.Storage system time 2 h in transaction trace backup database
Interior data message, timing delete redundant data, on the one hand can reduce the storage pressure of server, on the other hand, can be with
Improve the processing speed of server.
S103:User's request message based on preservation provides query page, so that user carries out inquiry tracking to data.
Query page is provided a user by man-machine interactive system, man-machine interactive system receives the inquiry instruction of user, and
Query result is shown to user according to inquiry instruction.Inquiry instruction includes:Serial number, mechanism number, customer number, in exchange hour
At least one of.
When the standby handover success, not yet public business of enterprise's calamity, industry user can inquire calamity in man-machine interactive system
The complete message record of account sexual transaction when hardly possible occurs, the foundation remedied as data.
Data tracing method after disaster provided by the embodiment of the present invention passes through interception message and carries out strange land to message and deposits
Storage, when ensure that the system log of disaster production development central server is unavailable, also preserves reliable and effective friendship in strange land
Easy Trace Data is concentrated use in system queries mode and carries out data and remedy, greatly improves data tracing efficiency, extensive in disaster
Fast reaction when multiple increases the timeliness and accuracy of data recovery.
The computer program product of data tracing method after disaster provided by the embodiment of the present invention, including store processing
The computer readable storage medium of the executable non-volatile program code of device, the instruction that said program code includes can be used for holding
Row previous methods method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description
And the specific work process of electronic equipment, it can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
The flow chart and block diagram in the drawings show multiple embodiment method and computer program products according to the present invention
Architecture, function and operation in the cards.In this regard, each box in flowchart or block diagram can represent one
A part of module, section or code, a part of the module, section or code include it is one or more for realizing
The executable instruction of defined logic function.It should also be noted that in some implementations as replacements, function marked in the box
It can also can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be substantially parallel
Ground executes, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram
And/or the combination of each box in flow chart and the box in block diagram and or flow chart, it can the function as defined in executing
Can or the dedicated hardware based system of movement realize, or can come using a combination of dedicated hardware and computer instructions real
It is existing.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit,
Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can
To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect
Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, of the invention
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words
The form of product embodies, which is stored in a storage medium, including some instructions use so that
One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention
State all or part of the steps of method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-
Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can be with
Store the medium of program code.
Finally it should be noted that:Embodiment described above, only a specific embodiment of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, those skilled in the art should understand that:Anyone skilled in the art
In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention
Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. component-tracking system after a kind of disaster, which is characterized in that including:Strange land central server;
The strange land central server includes:Information interception module, information storage module and enquiry module;
The information interception module requests report by the user that adapter is transmitted to production center server for intercepting
Text;
The information storage module, for user's request message to be saved and updated;
The enquiry module, user's request message based on the preservation provides query page, so that user looks into data
Ask tracking.
2. system according to claim 1, which is characterized in that the information interception module includes:Sniffer;
When the operating mode of the adapter is set to Promiscuous mode by the sniffer, the sniffer interception is logical
User's request message that the adapter is transmitted to the production center server is crossed, and user's request message is passed
It transports in the information storage module.
3. system according to claim 1, which is characterized in that the information storage module includes:Transaction trace backup number
According to library;
The transaction trace backup database saves user's request message, and updates the user in preset time and ask
Seek message.
4. system according to claim 1, which is characterized in that the enquiry module includes:Man-machine interactive system;
The man-machine interactive system receives the inquiry instruction of user, and shows query result to user according to the inquiry instruction.
5. system according to claim 1, which is characterized in that user's request message includes:External client, internal visitor
Family and special line are to message transmitted by the server of the production center.
6. system according to claim 3, which is characterized in that the preset time is 2 hours.
7. system according to claim 4, which is characterized in that the inquiry instruction includes:Serial number, mechanism number, client
At least one of number, exchange hour.
8. system according to claim 2, which is characterized in that the adapter includes:Ethernet card.
9. system according to claim 3, which is characterized in that further include:Packet parsing module;
The packet parsing module is used for the user's request message being truncated to according to the information interception module, parses request
The serial number of message, mechanism number, customer number, exchange hour information, and the information parsed is transmitted to the information
In memory module.
10. data tracing method after a kind of disaster, which is characterized in that it is applied to strange land central server, the method includes:
Interception is transmitted to user's request message of production center server from adapter;
User's request message is saved and updated;
User's request message based on the preservation provides query page, so that user carries out inquiry tracking to data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810754163.7A CN108845896A (en) | 2018-07-10 | 2018-07-10 | Component-tracking system and method after disaster |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810754163.7A CN108845896A (en) | 2018-07-10 | 2018-07-10 | Component-tracking system and method after disaster |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108845896A true CN108845896A (en) | 2018-11-20 |
Family
ID=64196135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810754163.7A Pending CN108845896A (en) | 2018-07-10 | 2018-07-10 | Component-tracking system and method after disaster |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108845896A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688198A (en) * | 2018-11-23 | 2019-04-26 | 四川九洲电器集团有限责任公司 | Distributed system and fault detection method |
CN109901949A (en) * | 2019-02-25 | 2019-06-18 | 中国工商银行股份有限公司 | The application disaster recovery and backup systems and method of dual-active data center |
CN111190771A (en) * | 2019-12-27 | 2020-05-22 | 柏科数据技术(深圳)股份有限公司 | Block tracking technology for disaster recovery |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2406181A (en) * | 2003-09-16 | 2005-03-23 | Siemens Ag | A copy machine for replicating a memory in a computer |
CN1630160A (en) * | 2004-08-27 | 2005-06-22 | 江苏省电力公司南京供电公司 | Method for establishing electric network monitoring disaster back-up system |
CN102194200A (en) * | 2011-04-15 | 2011-09-21 | 太原罗克佳华工业有限公司 | Method and system for supervising public accumulation fund data |
US8195758B1 (en) * | 2008-10-09 | 2012-06-05 | The United States Of America As Represented By The Secretary Of The Navy | Control for signal redundancy |
CN102752404A (en) * | 2012-07-25 | 2012-10-24 | 高旭磊 | Novel backup method and system for disaster recovery |
CN108304281A (en) * | 2018-02-28 | 2018-07-20 | 南京铱迅信息技术股份有限公司 | A kind of method that virtual machine is backed up in realtime |
-
2018
- 2018-07-10 CN CN201810754163.7A patent/CN108845896A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2406181A (en) * | 2003-09-16 | 2005-03-23 | Siemens Ag | A copy machine for replicating a memory in a computer |
US20050091462A1 (en) * | 2003-09-16 | 2005-04-28 | Siemens Aktiengesellschaft | Copy machine for generating or updating an identical memory in redundant computer systems |
CN1630160A (en) * | 2004-08-27 | 2005-06-22 | 江苏省电力公司南京供电公司 | Method for establishing electric network monitoring disaster back-up system |
US8195758B1 (en) * | 2008-10-09 | 2012-06-05 | The United States Of America As Represented By The Secretary Of The Navy | Control for signal redundancy |
CN102194200A (en) * | 2011-04-15 | 2011-09-21 | 太原罗克佳华工业有限公司 | Method and system for supervising public accumulation fund data |
CN102752404A (en) * | 2012-07-25 | 2012-10-24 | 高旭磊 | Novel backup method and system for disaster recovery |
CN108304281A (en) * | 2018-02-28 | 2018-07-20 | 南京铱迅信息技术股份有限公司 | A kind of method that virtual machine is backed up in realtime |
Non-Patent Citations (3)
Title |
---|
吴晓刚: "《计算机网络技术与网络安全》", 30 September 2016, 光明日报出版社 * |
孙启善等: "《中文版3ds Max 9/VRay 1.5效果图制作完全自学手册》", 31 January 2009, 兵器工业出版社 * |
杨凯: "银联数据异地灾难备份架构设计探讨", 《中国金融电脑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109688198A (en) * | 2018-11-23 | 2019-04-26 | 四川九洲电器集团有限责任公司 | Distributed system and fault detection method |
CN109688198B (en) * | 2018-11-23 | 2022-05-13 | 四川九洲电器集团有限责任公司 | Distributed system and fault detection method |
CN109901949A (en) * | 2019-02-25 | 2019-06-18 | 中国工商银行股份有限公司 | The application disaster recovery and backup systems and method of dual-active data center |
CN109901949B (en) * | 2019-02-25 | 2021-06-18 | 中国工商银行股份有限公司 | Application disaster recovery system and method for double-activity data center |
CN111190771A (en) * | 2019-12-27 | 2020-05-22 | 柏科数据技术(深圳)股份有限公司 | Block tracking technology for disaster recovery |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11238069B2 (en) | Transforming a data stream into structured data | |
CN108845896A (en) | Component-tracking system and method after disaster | |
CN109388417B (en) | Communication protocol updating method, system and terminal equipment | |
CN110019267A (en) | A kind of metadata updates method, apparatus, system, electronic equipment and storage medium | |
CN111740868B (en) | Alarm data processing method and device and storage medium | |
US10783453B2 (en) | Systems and methods for automated incident response | |
US8417669B2 (en) | Auto-correction in database replication | |
CN112906024A (en) | Data desensitization method, device, storage medium and server | |
EP3738048A1 (en) | Recommending visual and execution templates to enable automation of control and data exploration across systems | |
CN109947729A (en) | A kind of real-time data analysis method and device | |
CN111917630A (en) | Data transmission method, data transmission device, storage medium and electronic device | |
CN108388631A (en) | A kind of method, agent apparatus and system threatening intelligence sharing | |
CN109978547A (en) | Risk behavior control method and system, equipment and storage medium | |
CN107295086A (en) | Collect group session anti-loss method and system | |
CN106716400B (en) | A kind of partition management method and device of tables of data | |
CN109710653A (en) | A kind of test data source configuration method and device | |
CN112860954A (en) | Real-time computing method and real-time computing system | |
EP2950258A1 (en) | Survey data processing | |
CN100433642C (en) | Fault positioning, debugging method and system thereof | |
CN105049463A (en) | Distributed database, method of sharing data, and apparatus for a distributed database | |
CN105892957A (en) | Distributed transaction execution method based on dynamic fragmentation | |
CN101834873A (en) | Data transmission method for business database | |
CN109634976A (en) | O&M method, apparatus, system and the readable storage medium storing program for executing of non-relational database | |
CN109510859A (en) | A kind of statistical method and device of the amount of reach of PUSH message | |
CN111190964B (en) | Data docking method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181120 |
|
RJ01 | Rejection of invention patent application after publication |