CN108845896A - Component-tracking system and method after disaster - Google Patents

Component-tracking system and method after disaster Download PDF

Info

Publication number
CN108845896A
CN108845896A CN201810754163.7A CN201810754163A CN108845896A CN 108845896 A CN108845896 A CN 108845896A CN 201810754163 A CN201810754163 A CN 201810754163A CN 108845896 A CN108845896 A CN 108845896A
Authority
CN
China
Prior art keywords
user
request message
module
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810754163.7A
Other languages
Chinese (zh)
Inventor
库曼
郑邦东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN201810754163.7A priority Critical patent/CN108845896A/en
Publication of CN108845896A publication Critical patent/CN108845896A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention provides component-tracking system and method after a kind of disaster, is related to remote backup technical field, system includes:Strange land central server;Strange land central server includes:Information interception module, information storage module and enquiry module;Information interception module, for intercepting the user's request message for being transmitted to production center server by adapter;Information storage module, for user's request message to be saved and updated;Enquiry module, user's request message based on preservation provides query page, so that user carries out inquiry tracking to data.The present invention carries out strange land storage by interception message and to message, when ensure that the system log of disaster production development central server is unavailable, reliable and effective transaction Trace Data is also preserved in strange land, it is concentrated use in system queries mode and carries out data and remedy, greatly improve data tracing efficiency, the fast reaction in disaster recovery increases the timeliness and accuracy of data recovery.

Description

Component-tracking system and method after disaster
Technical field
The present invention relates to remote backup technical fields, more particularly, to component-tracking system and method after a kind of disaster.
Background technique
The construction of large enterprise's application system generallys use the mode of centralization, and IT system is concentrated on the production center, and Set up different area pattern Disaster Preparation Center.When the reasons such as natural calamity, which occurs, in the production center breaks down, strange land Disaster Preparation Center can be with The recovery of business is carried out with Backup Data.Due to Disaster Preparation Center with the production center distance generally hundreds of or even thousands of kilometers with On, data transmission delay is larger, and in disaster recovery switching, switchback, business Tiao Xian department needs to weight when interrupting IT system It wants business datum to be checked, and under the cooperation of Information technology department, the data of loss is remedied.
Above-mentioned Backup Data is usually the system log of backup in the database in advance, and system log is handled by system Finished data, the original transaction that may be initiated with channel have differences, and not can guarantee transaction letter by system log amended record The accuracy of breath, in addition, checking Transaction Information by manual contact client or carrying out voucher amended record, the information ratio of acquisition by hand It relatively obscures and may differ greatly with actual conditions, and efficiency is lower, data remedy overlong time.
Summary of the invention
In view of this, being reported the purpose of the present invention is to provide component-tracking system and method after a kind of disaster by interception Text simultaneously carries out strange land storage to message, when ensure that the system log of disaster production development central server is unavailable, in strange land Reliable and effective transaction Trace Data is also preserved, system queries mode is concentrated use in and carries out data and remedy, greatly improve Data tracing efficiency, the fast reaction in disaster recovery increase the timeliness and accuracy of data recovery.
In a first aspect, the embodiment of the invention provides component-tracking systems after a kind of disaster, including:Strange land center service Device;
Strange land central server includes:Information interception module, information storage module and enquiry module;
Information interception module requests report by the user that adapter is transmitted to production center server for intercepting Text;
Information storage module, for user's request message to be saved and updated;
Enquiry module, user's request message based on preservation provide query page, chase after so that user carries out inquiry to data Track.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein letter Ceasing interception module includes:Sniffer;
When the operating mode of adapter is set to Promiscuous mode by sniffer, sniffer interception is suitable by network It is transmitted to user's request message of production center server with card, and user's request message is transmitted in information storage module.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein letter Ceasing memory module includes:Transaction trace backup database;
Transaction trace backup database saves user's request message, and updates the user in preset time and request report Text.
With reference to first aspect, the embodiment of the invention provides the third possible embodiments of first aspect, wherein looks into Asking module includes:Man-machine interactive system;
Man-machine interactive system receives the inquiry instruction of user, and shows query result to user according to inquiry instruction.
With reference to first aspect, the embodiment of the invention provides the 4th kind of possible embodiments of first aspect, wherein uses Family request message includes:External client, internal customer and special line are to message transmitted by the server of the production center.
With reference to first aspect, the embodiment of the invention provides the 5th kind of possible embodiments of first aspect, wherein pre- If the time is 2 hours.
With reference to first aspect, the embodiment of the invention provides the 6th kind of possible embodiments of first aspect, wherein looks into Asking instruction includes:At least one of serial number, mechanism number, customer number, exchange hour.
With reference to first aspect, the embodiment of the invention provides the 7th kind of possible embodiments of first aspect, wherein net Network adapter includes:Ethernet card.
With reference to first aspect, the embodiment of the invention provides the 8th kind of possible embodiments of first aspect, wherein also Including:Packet parsing module;
Packet parsing module is used for the user's request message being truncated to according to information interception module, parses request message Serial number, mechanism number, customer number, exchange hour information, and the information parsed is transmitted in information storage module.
Second aspect, the embodiment of the present invention provide data tracing method after a kind of disaster, are applied to strange land central server, Method includes:
Interception is transmitted to user's request message of production center server from adapter;
User's request message is saved and updated;
User's request message based on preservation provides query page, so that user carries out inquiry tracking to data.
The embodiment of the present invention brings following beneficial effect:
The component-tracking system after disaster provided in an embodiment of the present invention, including:Strange land central server;It is genuinely convinced in strange land Business device include:Information interception module, information storage module and enquiry module;Information interception module, it is suitable by network for intercepting User's request message of production center server is transmitted to card;Information storage module, for being protected to user's request message It deposits and updates;Enquiry module, user's request message based on preservation provide query page, chase after so that user carries out inquiry to data Track.The present invention carries out strange land storage, the system that ensure that disaster production development central server by interception message and to message When log is unavailable, reliable and effective transaction Trace Data is also preserved in strange land, system queries mode is concentrated use in and is counted According to remedying, greatly improve data tracing efficiency, the fast reaction in disaster recovery, increase data recovery timeliness and Accuracy.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention are in specification, claims And specifically noted structure is achieved and obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic diagram of component-tracking system after a kind of disaster provided in an embodiment of the present invention;
Fig. 2 is the schematic diagram of component-tracking system after another disaster provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of component-tracking system after another disaster provided in an embodiment of the present invention;
Fig. 4 is the flow chart of data tracing method after a kind of disaster provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Data remedy method after existing calamity, and the system log and manual contact backed up before needing to rely on, which are audited, mends Record, data restore that accuracy is not high and inefficiency.Based on this, the embodiment of the present invention provides component-tracking system after a kind of disaster And method, strange land storage is carried out by interception message and to message, ensure that the system day of disaster production development central server When will is unavailable, reliable and effective transaction Trace Data is also preserved in strange land, system queries mode is concentrated use in and carries out data It remedies, greatly improves data tracing efficiency, the fast reaction in disaster recovery increases the timeliness and standard of data recovery True property.For convenient for understanding the present embodiment, first to data tracing system after a kind of disaster disclosed in the embodiment of the present invention System describes in detail.
Embodiment one:
The embodiment of the invention provides component-tracking systems after a kind of disaster, shown referring to figures 1-3, data after the disaster Tracing system includes:Strange land central server 11, the strange land central server 11 include:Information interception module 111, information storage Module 112 and enquiry module 113.
Wherein, information interception module 111 is transmitted to production center server 13 by adapter 12 for intercepting User's request message;Information storage module 112, for user's request message to be saved and updated;Enquiry module 113, base Query page is provided in user's request message of preservation, so that user carries out inquiry tracking to data.
Specifically, during user's request message uploads to production center server 13 by adapter 12, The information interception module 111 of strange land central server 11, the above-mentioned user's request message of real-time interception, and the message being truncated to is sent out It is sent in information storage module 112, so that information storage module 112 saves above-mentioned user's request message.It is then based on User's request message of above-mentioned preservation provides a user query page by enquiry module 113, for its carry out data query and Tracking.
Above-mentioned user's request message includes:External client, internal customer and special line are to transmitted by production center server 13 Message.
Compared with the system log of data backup in the prior art, original user request message is to handle to add without system The data of work, it is relatively reliable.By interception original user request message and the storage of real-time perfoming strange land, when ensure that disaster occurs When local system logs are unavailable, reliable and effective transaction Trace Data is also preserved in strange land.User is concentrated use in system and looks into Inquiry mode carries out data tracing amended record, compared with the mode of present manual contact client, greatly improves efficiency.It is extensive in disaster Fast reaction when multiple, increases the timeliness of disaster recovery.
Information interception module 111 includes as a preferred implementation manner,:Sniffer 1111.In the case where common, network Adapter 12 receive packet related with the address of oneself, that is, are transferred to the letter of local host (production center server 13) Breath packet.Sniffer 1111Sniffer tool can be by adapter 12 (Network Interface Card, abbreviation NIC) It is set to mixed and disorderly (promiscuous) mode state, each packet of transmission on network is received, numerous associations can also be directed to View carries out detailed construction Decoding Analysis.Adapter 12 includes more commonly used Ethernet card.When pass through sniffer 1111 When the operating mode of Ethernet card is set to Promiscuous mode, sniffer 1111, which can be truncated to, is transmitted to production by Ethernet card XML format user's request message of the http protocol of central server 13, and user's request message is transmitted to information storage mould In block 112.
Sniffer 1111Sniffer is divided to for two kinds of software and hardware, the Sniffer of software have NetXray, Packetboy, Net Monitor, Sniffer Pro, WireShark, WinNetCap etc., its advantage is that it is quality-high and inexpensive, it is easy to learn to use, It is also easy to exchange simultaneously, the Sniffer of hardware is commonly referred to as protocol analyzer, and the sniffer 1111 of two kinds of forms can be real-time Above-mentioned user's request message is grabbed, so that it is guaranteed that the accuracy of 11 storing datas of strange land central server.
Above- mentioned information memory module 112 includes:Transaction trace backup database 1121.Transaction trace backup database 1121 User's request message is saved, and updates user's request message in preset time.In the present embodiment, above-mentioned preset time It is set as 2 hours.The above-mentioned user's request message grabbed in real time is transmitted to transaction trace backup database by sniffer 1111 In 1121, redundant digit is deleted in the data message traded in 1121 storage system time 2 hs of trace backup database, timing According to, on the one hand can reduce the storage pressure of server, on the other hand, the processing speed of server can also be improved.
In the present embodiment, component-tracking system further includes after disaster:Packet parsing module, packet parsing module are used for root It is believed that user's request message that breath interception module 111 is truncated to, parses serial number, mechanism number, the Ke Hubian of request message Number, exchange hour information, and the information parsed is transmitted in information storage module 112.
Above-mentioned enquiry module 113 includes:Man-machine interactive system 1131, the inquiry that man-machine interactive system 1131 receives user refer to It enables, and query result is shown to user according to inquiry instruction.Inquiry instruction includes:Serial number, mechanism number, customer number, transaction At least one of time.
When the standby handover success, not yet public business of enterprise's calamity, industry user can look into man-machine interactive system 1131 Ask the complete message record of account sexual transaction when disaster occurs, the foundation remedied as data.
Component-tracking system after disaster provided by the embodiment of the present invention intercepts user's request message by sniffer 1111 And strange land storage is carried out to message, when ensure that the system log of disaster production development central server 13 is unavailable, in strange land Reliable and effective transaction Trace Data is also preserved, provides data tracing interface by enquiry module 113, so that enterprise's industrial customers It is concentrated use in system queries mode and carries out data and remedy, greatly improve data tracing efficiency, it is quickly anti-in disaster recovery It answers, increases the timeliness and accuracy of data recovery.
Embodiment two:
The embodiment of the present invention provides data tracing method after a kind of disaster, is applied to strange land central server, referring to fig. 4 institute Show, this approach includes the following steps:
S101:Interception is transmitted to user's request message of production center server from adapter.
When specific implementation, the process of production center server is uploaded to by adapter in user's request message In, the above-mentioned user's request message of strange land central server real-time interception, and by the packet storage being truncated in corresponding data trace In mark database.Above-mentioned user's request message includes:External client, internal customer and special line are to transmitted by the server of the production center Message.
In the case where common, adapter only receives packet related with the address of oneself, that is, is transferred to this landlord The packet of machine (production center server).And work as sniffer Sniffer tool for adapter (Network Interface Card, abbreviation NIC) when being set to mixed and disorderly (promiscuous) mode state, it can receive transmission on network Each packet can also carry out detailed construction Decoding Analysis for numerous agreements.In the present embodiment, pass through sniffer pair User's request message grabs, specifically, smelling when the operating mode of Ethernet card is set to Promiscuous mode by sniffer It visits device and is truncated to the XML format user's request message for being transmitted to the http protocol of production center server by Ethernet card, and User's request message is transmitted in the data Trace Data library of strange land central server.
S102:User's request message is saved and updated.
Strange land central server saves above-mentioned user's request message, and updates the user in preset time and request report Text.In the present embodiment, above-mentioned preset time is set as 2 hours.Storage system time 2 h in transaction trace backup database Interior data message, timing delete redundant data, on the one hand can reduce the storage pressure of server, on the other hand, can be with Improve the processing speed of server.
S103:User's request message based on preservation provides query page, so that user carries out inquiry tracking to data.
Query page is provided a user by man-machine interactive system, man-machine interactive system receives the inquiry instruction of user, and Query result is shown to user according to inquiry instruction.Inquiry instruction includes:Serial number, mechanism number, customer number, in exchange hour At least one of.
When the standby handover success, not yet public business of enterprise's calamity, industry user can inquire calamity in man-machine interactive system The complete message record of account sexual transaction when hardly possible occurs, the foundation remedied as data.
Data tracing method after disaster provided by the embodiment of the present invention passes through interception message and carries out strange land to message and deposits Storage, when ensure that the system log of disaster production development central server is unavailable, also preserves reliable and effective friendship in strange land Easy Trace Data is concentrated use in system queries mode and carries out data and remedy, greatly improves data tracing efficiency, extensive in disaster Fast reaction when multiple increases the timeliness and accuracy of data recovery.
The computer program product of data tracing method after disaster provided by the embodiment of the present invention, including store processing The computer readable storage medium of the executable non-volatile program code of device, the instruction that said program code includes can be used for holding Row previous methods method as described in the examples, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description And the specific work process of electronic equipment, it can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
The flow chart and block diagram in the drawings show multiple embodiment method and computer program products according to the present invention Architecture, function and operation in the cards.In this regard, each box in flowchart or block diagram can represent one A part of module, section or code, a part of the module, section or code include it is one or more for realizing The executable instruction of defined logic function.It should also be noted that in some implementations as replacements, function marked in the box It can also can occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be substantially parallel Ground executes, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram And/or the combination of each box in flow chart and the box in block diagram and or flow chart, it can the function as defined in executing Can or the dedicated hardware based system of movement realize, or can come using a combination of dedicated hardware and computer instructions real It is existing.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of logical function partition, there may be another division manner in actual implementation, in another example, multiple units or components can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be through some communication interfaces, device or unit it is indirect Coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, of the invention Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention State all or part of the steps of method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can be with Store the medium of program code.
Finally it should be noted that:Embodiment described above, only a specific embodiment of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, those skilled in the art should understand that:Anyone skilled in the art In the technical scope disclosed by the present invention, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover in protection of the invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. component-tracking system after a kind of disaster, which is characterized in that including:Strange land central server;
The strange land central server includes:Information interception module, information storage module and enquiry module;
The information interception module requests report by the user that adapter is transmitted to production center server for intercepting Text;
The information storage module, for user's request message to be saved and updated;
The enquiry module, user's request message based on the preservation provides query page, so that user looks into data Ask tracking.
2. system according to claim 1, which is characterized in that the information interception module includes:Sniffer;
When the operating mode of the adapter is set to Promiscuous mode by the sniffer, the sniffer interception is logical User's request message that the adapter is transmitted to the production center server is crossed, and user's request message is passed It transports in the information storage module.
3. system according to claim 1, which is characterized in that the information storage module includes:Transaction trace backup number According to library;
The transaction trace backup database saves user's request message, and updates the user in preset time and ask Seek message.
4. system according to claim 1, which is characterized in that the enquiry module includes:Man-machine interactive system;
The man-machine interactive system receives the inquiry instruction of user, and shows query result to user according to the inquiry instruction.
5. system according to claim 1, which is characterized in that user's request message includes:External client, internal visitor Family and special line are to message transmitted by the server of the production center.
6. system according to claim 3, which is characterized in that the preset time is 2 hours.
7. system according to claim 4, which is characterized in that the inquiry instruction includes:Serial number, mechanism number, client At least one of number, exchange hour.
8. system according to claim 2, which is characterized in that the adapter includes:Ethernet card.
9. system according to claim 3, which is characterized in that further include:Packet parsing module;
The packet parsing module is used for the user's request message being truncated to according to the information interception module, parses request The serial number of message, mechanism number, customer number, exchange hour information, and the information parsed is transmitted to the information In memory module.
10. data tracing method after a kind of disaster, which is characterized in that it is applied to strange land central server, the method includes:
Interception is transmitted to user's request message of production center server from adapter;
User's request message is saved and updated;
User's request message based on the preservation provides query page, so that user carries out inquiry tracking to data.
CN201810754163.7A 2018-07-10 2018-07-10 Component-tracking system and method after disaster Pending CN108845896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810754163.7A CN108845896A (en) 2018-07-10 2018-07-10 Component-tracking system and method after disaster

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810754163.7A CN108845896A (en) 2018-07-10 2018-07-10 Component-tracking system and method after disaster

Publications (1)

Publication Number Publication Date
CN108845896A true CN108845896A (en) 2018-11-20

Family

ID=64196135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810754163.7A Pending CN108845896A (en) 2018-07-10 2018-07-10 Component-tracking system and method after disaster

Country Status (1)

Country Link
CN (1) CN108845896A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688198A (en) * 2018-11-23 2019-04-26 四川九洲电器集团有限责任公司 Distributed system and fault detection method
CN109901949A (en) * 2019-02-25 2019-06-18 中国工商银行股份有限公司 The application disaster recovery and backup systems and method of dual-active data center
CN111190771A (en) * 2019-12-27 2020-05-22 柏科数据技术(深圳)股份有限公司 Block tracking technology for disaster recovery

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2406181A (en) * 2003-09-16 2005-03-23 Siemens Ag A copy machine for replicating a memory in a computer
CN1630160A (en) * 2004-08-27 2005-06-22 江苏省电力公司南京供电公司 Method for establishing electric network monitoring disaster back-up system
CN102194200A (en) * 2011-04-15 2011-09-21 太原罗克佳华工业有限公司 Method and system for supervising public accumulation fund data
US8195758B1 (en) * 2008-10-09 2012-06-05 The United States Of America As Represented By The Secretary Of The Navy Control for signal redundancy
CN102752404A (en) * 2012-07-25 2012-10-24 高旭磊 Novel backup method and system for disaster recovery
CN108304281A (en) * 2018-02-28 2018-07-20 南京铱迅信息技术股份有限公司 A kind of method that virtual machine is backed up in realtime

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2406181A (en) * 2003-09-16 2005-03-23 Siemens Ag A copy machine for replicating a memory in a computer
US20050091462A1 (en) * 2003-09-16 2005-04-28 Siemens Aktiengesellschaft Copy machine for generating or updating an identical memory in redundant computer systems
CN1630160A (en) * 2004-08-27 2005-06-22 江苏省电力公司南京供电公司 Method for establishing electric network monitoring disaster back-up system
US8195758B1 (en) * 2008-10-09 2012-06-05 The United States Of America As Represented By The Secretary Of The Navy Control for signal redundancy
CN102194200A (en) * 2011-04-15 2011-09-21 太原罗克佳华工业有限公司 Method and system for supervising public accumulation fund data
CN102752404A (en) * 2012-07-25 2012-10-24 高旭磊 Novel backup method and system for disaster recovery
CN108304281A (en) * 2018-02-28 2018-07-20 南京铱迅信息技术股份有限公司 A kind of method that virtual machine is backed up in realtime

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
吴晓刚: "《计算机网络技术与网络安全》", 30 September 2016, 光明日报出版社 *
孙启善等: "《中文版3ds Max 9/VRay 1.5效果图制作完全自学手册》", 31 January 2009, 兵器工业出版社 *
杨凯: "银联数据异地灾难备份架构设计探讨", 《中国金融电脑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688198A (en) * 2018-11-23 2019-04-26 四川九洲电器集团有限责任公司 Distributed system and fault detection method
CN109688198B (en) * 2018-11-23 2022-05-13 四川九洲电器集团有限责任公司 Distributed system and fault detection method
CN109901949A (en) * 2019-02-25 2019-06-18 中国工商银行股份有限公司 The application disaster recovery and backup systems and method of dual-active data center
CN109901949B (en) * 2019-02-25 2021-06-18 中国工商银行股份有限公司 Application disaster recovery system and method for double-activity data center
CN111190771A (en) * 2019-12-27 2020-05-22 柏科数据技术(深圳)股份有限公司 Block tracking technology for disaster recovery

Similar Documents

Publication Publication Date Title
US11238069B2 (en) Transforming a data stream into structured data
CN108845896A (en) Component-tracking system and method after disaster
CN109388417B (en) Communication protocol updating method, system and terminal equipment
CN110019267A (en) A kind of metadata updates method, apparatus, system, electronic equipment and storage medium
CN111740868B (en) Alarm data processing method and device and storage medium
US10783453B2 (en) Systems and methods for automated incident response
US8417669B2 (en) Auto-correction in database replication
CN112906024A (en) Data desensitization method, device, storage medium and server
EP3738048A1 (en) Recommending visual and execution templates to enable automation of control and data exploration across systems
CN109947729A (en) A kind of real-time data analysis method and device
CN111917630A (en) Data transmission method, data transmission device, storage medium and electronic device
CN108388631A (en) A kind of method, agent apparatus and system threatening intelligence sharing
CN109978547A (en) Risk behavior control method and system, equipment and storage medium
CN107295086A (en) Collect group session anti-loss method and system
CN106716400B (en) A kind of partition management method and device of tables of data
CN109710653A (en) A kind of test data source configuration method and device
CN112860954A (en) Real-time computing method and real-time computing system
EP2950258A1 (en) Survey data processing
CN100433642C (en) Fault positioning, debugging method and system thereof
CN105049463A (en) Distributed database, method of sharing data, and apparatus for a distributed database
CN105892957A (en) Distributed transaction execution method based on dynamic fragmentation
CN101834873A (en) Data transmission method for business database
CN109634976A (en) O&M method, apparatus, system and the readable storage medium storing program for executing of non-relational database
CN109510859A (en) A kind of statistical method and device of the amount of reach of PUSH message
CN111190964B (en) Data docking method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181120

RJ01 Rejection of invention patent application after publication