CN111240603A - Method and device for protecting target LBA range data, computer equipment and storage medium - Google Patents

Method and device for protecting target LBA range data, computer equipment and storage medium Download PDF

Info

Publication number
CN111240603A
CN111240603A CN202010070414.7A CN202010070414A CN111240603A CN 111240603 A CN111240603 A CN 111240603A CN 202010070414 A CN202010070414 A CN 202010070414A CN 111240603 A CN111240603 A CN 111240603A
Authority
CN
China
Prior art keywords
data
lba range
range data
target
target lba
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010070414.7A
Other languages
Chinese (zh)
Inventor
尹子航
肖蔓君
黄华坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Union Memory Information System Co Ltd
Original Assignee
Shenzhen Union Memory Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Union Memory Information System Co Ltd filed Critical Shenzhen Union Memory Information System Co Ltd
Priority to CN202010070414.7A priority Critical patent/CN111240603A/en
Publication of CN111240603A publication Critical patent/CN111240603A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/064Management of blocks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0652Erasing, e.g. deleting, data cleaning, moving of data to a wastebasket

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method, a device, computer equipment and a storage medium for protecting target LBA range data, wherein the method comprises the following steps: acquiring all LBA range data; screening the LBA range data to obtain target LBA range data; and carrying out reinforced protection processing on the target LBA range data. The invention adopts data protection intensity of different degrees for different LBA range data, and can carry out enhanced protection processing aiming at more important target LBA range data, thereby ensuring that the target LBA range data is safer and more reliable, effectively avoiding the damage or loss of key data, and improving the overall stability and safety of the storage medium.

Description

Method and device for protecting target LBA range data, computer equipment and storage medium
Technical Field
The present invention relates to the field of SSD data security, and more particularly, to a method and apparatus for protecting target LBA range data, a computer device, and a storage medium.
Background
LBA (Logical Block Address) a common mechanism for describing a Block where data is located on a computer storage device, and is generally used for an auxiliary memory device such as a hard disk, where LBA may refer to an Address of a certain data Block or a data Block pointed to by a certain Address. At present, for the data protection of the LBA, a general method is to perform data protection on an SLC area or a TLC area through a RAID scheme, and this method does not use data protection strengths of different degrees for different data areas, and the protection strengths of all data areas are the same, and if data in a specific LBA range (for example, a Windows file system) is damaged to the same extent as that of ordinary user data and cannot be recovered, compared with the case where only the ordinary user data is lost, the damage of critical data will bring a greater loss to the user.
However, due to the difference in data types, certain LBA range data needs to be protected more strongly than normal user data, thereby enhancing the overall stability and data security of the SSD.
Disclosure of Invention
The present invention is directed to overcome the defects of the prior art, and provides a method, an apparatus, a computer device, and a storage medium for protecting target LBA range data.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect the invention employs: a method of protecting target LBA range data, comprising the steps of:
acquiring all LBA range data;
screening the LBA range data to obtain target LBA range data;
and carrying out reinforced protection processing on the target LBA range data.
Further, the step of performing the enhanced protection processing on the target LBA range data includes:
and backing up the target LBA range data to obtain backup data, and storing the backup data.
Further, the step of performing the enhanced protection processing on the target LBA range data includes:
and carrying out exclusive OR operation on all page data in the target LBA range data to obtain check data, and storing the check data separately.
Further, the step of performing the enhanced protection processing on the target LBA range data includes:
the number of times of erasing of the target block for storing the target LBA range data is periodically acquired,
judging whether the erasing times of the target block is greater than a preset threshold value K or not;
and if so, moving the data of the target block to a free block with the least erasing times for storage.
Further, after the step of performing the enhanced protection processing on the target LBA range data, the method includes:
acquiring a reading state of a target block for storing target LBA range data;
judging whether the reading state of the target block is failure;
and if the data is failed, moving the data of the original block to a free block with the least erasing times for storage.
The second aspect of the present invention employs: an apparatus to protect target LBA range data, comprising:
the data acquisition unit is used for acquiring all LBA range data;
the target screening unit is used for screening the LBA range data to obtain target LBA range data;
and the reinforced protection unit is used for carrying out reinforced protection processing on the target LBA range data.
Further, the enhanced protection unit comprises a backup subunit and a check subunit;
the backup subunit is configured to backup the target LBA range data to obtain backup data, and store the backup data;
and the checking subunit is used for performing exclusive or operation on all page data in the target LBA range data to obtain checking data and storing the checking data separately.
Furthermore, the reinforced protection unit comprises an acquisition subunit, a judgment subunit and a moving subunit;
the acquiring subunit is configured to acquire the erasing times of the target block for storing the target LBA range data at regular time, or acquire the read state of the target block for storing the target LBA range data;
the judging subunit is configured to judge whether the erasing frequency of the target block is greater than a preset threshold K, or judge whether the read state of the target block is a failure;
and the moving subunit is used for moving the data of the target block to the idle block with the least erasing times for storage.
The third aspect of the present invention employs: a computer device comprising a memory having stored thereon a computer program and a processor implementing the method of protecting target LBA range data as described above when the computer program is executed by the processor.
The fourth aspect of the present invention employs: a storage medium storing a computer program which, when executed by a processor, implements a method of protecting target LBA range data as described above.
Compared with the prior art, the invention has the beneficial effects that: the invention provides a method for protecting target LBA range data, which adopts data protection strength of different degrees for different LBA range data, can perform reinforced protection processing aiming at more important target LBA range data, ensures that the target LBA range data is safer and more reliable, effectively avoids the damage or loss of key data, and improves the overall stability and safety of a storage medium.
The invention is further described below with reference to the accompanying drawings and specific embodiments.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a method for protecting target LBA range data according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for protecting target LBA range data according to an embodiment of the present invention;
fig. 3 is a sub-flow diagram of a method for protecting target LBA range data according to an embodiment of the present invention;
fig. 4 is a sub-flow diagram of a method for protecting target LBA range data according to an embodiment of the present invention;
FIG. 5 is a schematic block diagram of an apparatus for protecting target LBA range data according to an embodiment of the present invention;
FIG. 6 is a schematic block diagram of an enhanced protection unit of an apparatus for protecting target LBA range data according to an embodiment of the present invention;
fig. 7 is a first schematic view of an enhanced protection processing application scenario according to an embodiment of the present invention;
fig. 8 is a schematic diagram of a second application scenario of enhanced protection processing according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a third application scenario of enhanced protection processing according to an embodiment of the present invention;
FIG. 10 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic view illustrating an application scenario of a method for protecting target LBA range data according to an embodiment of the present invention. Fig. 2 is a schematic flowchart of a method for protecting target LBA range data according to an embodiment of the present invention. The method for protecting the target LBA range data is applied to a server, the server and a terminal perform data interaction, the server acquires the LBA range data of a storage medium of the terminal, screens the LBA range data to obtain the target LBA range data, and then performs enhanced protection processing on the target LBA range data, so that the damage or loss of key data can be effectively avoided, and the overall stability and the safety of the storage medium are improved.
Fig. 2 is a flowchart illustrating a method for protecting target LBA range data according to an embodiment of the present invention. As shown in fig. 2, the method includes the following steps S110 to S150.
And S10, acquiring all LBA range data.
In this embodiment, an LBA (Logical Block Address) is a general mechanism describing a Block where data is located on a computer storage device or a storage medium, and is generally used in an auxiliary memory device such as an SSD (Solid State Disk).
The method includes the steps of acquiring all the LBA range data, namely acquiring all the data of different data areas on the SSD, wherein different data have different importance degrees to users, some data are only common data, and only conventional protection is needed, and some data are key data and need better protection, so that the LBA range data can be correspondingly protected according to the importance of the data, and the safety and the stability of the key data are ensured.
And S20, screening the LBA range data to obtain target LBA range data.
In this embodiment, normally, the LBA range data includes type data with different degrees of importance, and in this embodiment, the LBA range data specifically includes normal data and more important key data, where the normal data includes, for example, normal user data and the like, and the key data includes, for example, Windows file system data, information data that a user needs to be protected additionally, and the like. Different data is stored in different LBA ranges, and compared with general data, some specific LBA range data (critical data) need to be protected with higher strength, so that the overall stability and data security of the SSD are enhanced.
Therefore, after all the LBA range data are acquired, the LBA range data may be screened according to a preset rule, the key data which needs to be protected with higher strength is determined, and the LBA range data corresponding to the key data is used as the target LBA range data, so that the target LBA range data is protected in a reinforcement manner in the following process, better protection is provided for the key data, and the overall stability and the security of the SSD are improved.
And S30, performing reinforced protection processing on the target LBA range data.
In this embodiment, the screened target LBA range data (critical data) is subjected to enhanced protection processing to ensure better protection of the target LBA range data, ensure that the target LBA range data is safer and more reliable, effectively avoid damage or loss of the critical data, and improve the overall stability and security of the SSD.
In one embodiment, step S30 includes step S310.
And S310, backing up the target LBA range data to obtain backup data, and storing the backup data.
In this embodiment, the target LBA range data is backed up to obtain backup data, and the backup data and the target LBA range data are separately stored, so that when the original data of the target LBA range is damaged or lost, the state of the original data can be restored to a previous state at a certain time point through the backup data; specifically, during backup, the backup refresh time may be set to be T (unit: hour), and a backup operation is performed every T hours to obtain a new backup data.
As shown in fig. 7, original data 1 is backed up into backup data information 2 at intervals of T hours, and backup data 2 is backed up into backup data 3 at intervals of T hours. And analogizing in sequence, after the Nth T time period, the Nth backup data is obtained, a plurality of backup data is obtained through multiple backups, and the backup data is separately stored in different data areas, so that when the original data has errors, the data can be restored through the available backup data, and the safety of the original data is improved.
In one embodiment, step S30 includes step S320.
S320, performing exclusive OR operation on all page data in the target LBA range data to obtain check data, and storing the check data separately.
In this embodiment, the check data is Parity data, and as shown in fig. 8, in the scheme, a copy data is generated by performing an exclusive or operation on Page (Page) data of target LBA range data, and the copy data is separately stored in one SLC block to form RAID scheme protection.
As shown in FIG. 3, in one embodiment, step S30 includes steps S331-S33.
S331, periodically acquiring the number of times of erasing the target block for storing the target LBA range data.
S332, judging whether the erasing times of the target block are larger than a preset threshold value K.
And S333, if the number of the data in the target block is larger than the number of the data in the target block, the data in the target block is moved to a free block with the minimum erasing times for storage.
In this embodiment, when the number of times of erasing the data block is large, the data stored in the data block is more likely to cause a problem, and when the number of times of erasing exceeds a preset threshold K, the data in the data block needs to be moved, where the preset threshold K may be preset according to the actual situation. As shown in fig. 9, the data of the target block may be moved to a free block with the least number of erasures for storage, so as to avoid the problem of corresponding data. And regularly acquiring the erasing times of the target block, and judging whether the data on the target block needs to be moved or not through the erasing times so as to further ensure the stability and the integrity of the original data on the target block.
As shown in FIG. 4, in one embodiment, step S30 includes steps S341-S43.
S341, obtain the read status of the target block for storing the target LBA range data.
And S342, judging whether the reading state of the target block is failure.
And S343, if the data is failed, moving the data of the original block to a free block with the least erasing times for storage.
In the present embodiment, when the read state of a data block is an error, the data stored on the data block is prone to problems. As shown in fig. 9, the data of the target block may be moved to a free block with the least number of erasures for storage, so as to avoid the problem of corresponding data. The reading state of the target block is regularly acquired, whether the data on the target block needs to be moved or not is judged through the reading state, and the stability and the integrity of the original data on the target block are further ensured.
It should be understood that, in an embodiment, the step S30 may adopt one or more of the data strengthening protection manners corresponding to the steps S310, S320, S331 to S333, and S341 to S343, that is, the present invention may adopt the above-mentioned various data strengthening protection manners to effectively protect the target LBA range data, so as to improve the security of the target LBA range data. Furthermore, the present invention may also adopt other data enhanced protection methods besides the 4 data enhanced protection methods described above.
The invention provides a method for protecting target LBA range data, which adopts data protection strength of different degrees for different LBA range data, can perform reinforced protection processing aiming at more important target LBA range data, ensures that the target LBA range data is safer and more reliable, effectively avoids the damage or loss of key data, and improves the overall stability and safety of a storage medium.
Fig. 5 is a schematic block diagram of an apparatus for protecting target LBA range data according to an embodiment of the present invention. As shown in fig. 5, the present invention also provides a device for protecting target LBA range data, corresponding to the above method for protecting target LBA range data. The apparatus for protecting target LBA range data includes a unit for executing the method for protecting target LBA range data, and the apparatus may be configured in a desktop computer, a tablet computer, a laptop computer, or the like. Specifically, referring to fig. 5, the apparatus for protecting target LBA range data includes a data obtaining unit 10, a target screening unit 20, and an enhanced protection unit 30.
A data obtaining unit 10, configured to obtain all LBA range data.
In this embodiment, an LBA (Logical Block Address) is a general mechanism describing a Block where data is located on a computer storage device or a storage medium, and is generally used in an auxiliary memory device such as an SSD (Solid State Disk).
The method includes the steps of acquiring all the LBA range data, namely acquiring all the data of different data areas on the SSD, wherein different data have different importance degrees to users, some data are only common data, and only conventional protection is needed, and some data are key data and need better protection, so that the LBA range data can be correspondingly protected according to the importance of the data, and the safety and the stability of the key data are ensured.
The target screening unit 20 is configured to screen the LBA range data to obtain target LBA range data.
In this embodiment, normally, the LBA range data includes type data with different degrees of importance, and in this embodiment, the LBA range data specifically includes normal data and more important key data, where the normal data includes, for example, normal user data and the like, and the key data includes, for example, Windows file system data, information data that a user needs to be protected additionally, and the like. Different data is stored in different LBA ranges, and compared with general data, some specific LBA range data (critical data) need to be protected with higher strength, so that the overall stability and data security of the SSD are enhanced.
Therefore, after all the LBA range data are acquired, the LBA range data may be screened according to a preset rule, the key data which needs to be protected with higher strength is determined, and the LBA range data corresponding to the key data is used as the target LBA range data, so that the target LBA range data is protected in a reinforcement manner in the following process, better protection is provided for the key data, and the overall stability and the security of the SSD are improved.
The enhanced protection unit 30 is configured to perform enhanced protection processing on the target LBA range data.
In this embodiment, the target LBA range data after screening is subjected to enhanced protection processing to ensure better protection of the target LBA range data, ensure that the target LBA range data is safer and more reliable, effectively avoid damage or loss of key data, and improve the overall stability and security of the SSD.
As shown in fig. 6, in an embodiment, the enhanced protection unit 30 includes a backup subunit 31, a checking subunit 32, an obtaining subunit 33, a determining subunit 34, and a moving subunit 35.
And the backup subunit 31 is configured to backup the target LBA range data to obtain backup data, and store the backup data.
In this embodiment, the target LBA range data is backed up to obtain backup data, and the backup data and the target LBA range data are separately stored, so that when the original data of the target LBA range is damaged or lost, the state of the original data can be restored to a previous state at a certain time point through the backup data; specifically, during backup, the backup refresh time may be set to T (unit: hour), and the backup operation is performed once every T hours, and the backup data is updated.
As shown in fig. 7, original data 1 is backed up into backup data information 2 at intervals of T hours, and backup data 2 is backed up into backup data 3 at intervals of T hours. And analogizing in sequence, after the Nth T time period, the Nth backup data is obtained, a plurality of backup data is obtained through multiple backups, and the backup data is separately stored in different data areas, so that when the original data has errors, the data can be restored through the available backup data, and the safety of the original data is improved.
And the checking subunit 32 is configured to perform an exclusive or operation on all page data in the target LBA range data to obtain check data, and store the check data separately.
In this embodiment, the check data is Parity data, the scheme generates a copy of Parity data from Page (Page) data of target LBA range data through an exclusive or operation, as shown in fig. 8, and separately stores the Parity data in an SLC block to form RAID scheme protection, where the Parity data may be used for error correction of data, and it is ensured that when an error occurs in critical data, effective error correction can be performed.
The obtaining subunit 33 is configured to obtain the number of times of erasing the target block used for storing the target LBA range data at regular time, or obtain the read state of the target block used for storing the target LBA range data.
The determining subunit 34 is configured to determine whether the number of times of erasing the target block is greater than a preset threshold K, or whether the read state of the target block is a failure.
And a moving subunit 35, configured to move the data of the target block to a free block with the minimum erasing frequency for storage.
In this embodiment, when the number of times of erasing the data block is large, the data stored in the data block is more likely to cause a problem, and when the number of times of erasing exceeds a preset threshold K, the data in the data block needs to be moved, where the preset threshold K may be determined according to actual details. As shown in fig. 9, the data of the target block may be moved to a free block with the least number of erasures for storage, so as to avoid the problem of corresponding data. And regularly acquiring the erasing times of the target block, and judging whether the data on the target block needs to be moved or not through the erasing times so as to further ensure the stability and the integrity of the original data on the target block.
When the read state of the data block is an error, the data stored in the data block is prone to be out of order, and as shown in fig. 9, the data in the target block can be moved to a free block with the least erase times for storage, so as to avoid the problem of corresponding data out of order. The reading state of the target block is regularly acquired, whether the data on the target block needs to be moved or not is judged through the reading state, and the stability and the integrity of the original data on the target block are further ensured.
The device for protecting the target LBA range data provided by the invention adopts different degrees of data protection intensity for different LBA range data, and can perform enhanced protection processing on more important target LBA range data, so that the target LBA range data is ensured to be safer and more reliable, the damage or loss of key data is effectively avoided, and the overall stability and safety of a storage medium are improved.
It should be noted that, as can be clearly understood by those skilled in the art, the above-mentioned apparatus for protecting target LBA range data and the specific implementation process of each unit may refer to the corresponding description in the foregoing method embodiment, and for convenience and brevity of description, no further description is provided here.
Referring to fig. 10, fig. 10 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 500 may be a terminal or a server, where the terminal may be an electronic device with a communication function, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, and a wearable device. The server may be an independent server or a server cluster composed of a plurality of servers.
Referring to fig. 10, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer programs 5032 include program instructions that, when executed, cause the processor 502 to perform a method of protecting target LBA range data.
The processor 502 is used to provide computing and control capabilities to support the operation of the overall computer device 500.
The memory 504 provides an environment for the execution of the computer program 5032 in the non-volatile storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be caused to perform a method for protecting target LBA range data.
The network interface 505 is used for network communication with other devices. Those skilled in the art will appreciate that the configuration shown in fig. 10 is a block diagram of only a portion of the configuration relevant to the present teachings and is not intended to limit the computing device 500 to which the present teachings may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Wherein the processor 502 is adapted to run a computer program 5032 stored in the memory.
It should be understood that, in the embodiment of the present Application, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field-Programmable Gate arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
It will be understood by those skilled in the art that all or part of the flow of the method implementing the above embodiments may be implemented by a computer program instructing associated hardware. The computer program includes program instructions, and the computer program may be stored in a storage medium, which is a computer-readable storage medium. The program instructions are executed by at least one processor in the computer system to implement the flow steps of the embodiments of the method described above.
Accordingly, the present invention also provides a storage medium. The storage medium may be a computer-readable storage medium.
The storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk, which can store various computer readable storage media.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. For example, various elements or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs. The units in the device of the embodiment of the invention can be merged, divided and deleted according to actual needs. In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method of protecting target LBA range data, comprising the steps of:
acquiring all LBA range data;
screening the LBA range data to obtain target LBA range data;
and carrying out reinforced protection processing on the target LBA range data.
2. The method of claim 1, wherein the step of performing an enhanced protection process on the target LBA range data includes:
and backing up the target LBA range data to obtain backup data, and storing the backup data.
3. The method of claim 1, wherein the step of performing an enhanced protection process on the target LBA range data includes:
and carrying out exclusive OR operation on all page data in the target LBA range data to obtain check data, and storing the check data separately.
4. The method of claim 1, wherein the step of performing an enhanced protection process on the target LBA range data includes:
acquiring the erasing times of a target block for storing target LBA range data at fixed time;
judging whether the erasing times of the target block is greater than a preset threshold value K or not;
and if so, moving the data of the target block to a free block with the least erasing times for storage.
5. The method of claim 1, wherein the step of performing an enhanced protection process on the target LBA range data is followed by:
acquiring a reading state of a target block for storing target LBA range data;
judging whether the reading state of the target block is failure;
and if the data is failed, moving the data of the original block to a free block with the least erasing times for storage.
6. An apparatus for protecting target LBA range data, comprising:
the data acquisition unit is used for acquiring all LBA range data;
the target screening unit is used for screening the LBA range data to obtain target LBA range data;
and the reinforced protection unit is used for carrying out reinforced protection processing on the target LBA range data.
7. The apparatus for protecting target LBA range data according to claim 6, wherein the hardened protection unit includes a backup subunit and a check subunit;
the backup subunit is configured to backup the target LBA range data to obtain backup data, and store the backup data;
and the checking subunit is used for performing exclusive or operation on all page data in the target LBA range data to obtain checking data and storing the checking data separately.
8. The apparatus for protecting target LBA range data according to claim 6, wherein the hardened protection unit further includes an acquisition subunit, a determination subunit, and a transfer subunit;
the acquiring subunit is configured to acquire the erasing times of the target block for storing the target LBA range data at regular time, or acquire the read state of the target block for storing the target LBA range data;
the judging subunit is configured to judge whether the erasing frequency of the target block is greater than a preset threshold K, or judge whether the read state of the target block is a failure;
and the moving subunit is used for moving the data of the target block to the idle block with the least erasing times for storage.
9. A computer device, characterized in that the computer device comprises a memory having stored thereon a computer program and a processor which, when executing the computer program, implements a method of protecting target LBA range data according to any one of claims 1 to 5.
10. A storage medium storing a computer program which, when executed by a processor, implements a method of protecting target LBA range data according to any one of claims 1 to 5.
CN202010070414.7A 2020-01-21 2020-01-21 Method and device for protecting target LBA range data, computer equipment and storage medium Pending CN111240603A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010070414.7A CN111240603A (en) 2020-01-21 2020-01-21 Method and device for protecting target LBA range data, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010070414.7A CN111240603A (en) 2020-01-21 2020-01-21 Method and device for protecting target LBA range data, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111240603A true CN111240603A (en) 2020-06-05

Family

ID=70871470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010070414.7A Pending CN111240603A (en) 2020-01-21 2020-01-21 Method and device for protecting target LBA range data, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111240603A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080082736A1 (en) * 2004-03-11 2008-04-03 Chow David Q Managing bad blocks in various flash memory cells for electronic data flash card
US20120047314A1 (en) * 2010-08-20 2012-02-23 Transcend Information , Inc. Data backup method for flash memory module and solid state drive
CN102609332A (en) * 2011-01-19 2012-07-25 上海华虹集成电路有限责任公司 Power failure protection method for intelligent IC (integrated circuit) card data
US20130067146A1 (en) * 2011-09-13 2013-03-14 Kabushiki Kaisha Toshiba Memory device, control method for the memory device, and controller
US20130159603A1 (en) * 2011-12-20 2013-06-20 Fusion-Io, Inc. Apparatus, System, And Method For Backing Data Of A Non-Volatile Storage Device Using A Backing Store
CN108073363A (en) * 2017-12-28 2018-05-25 深圳市得微电子有限责任公司 Date storage method, storage device and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080082736A1 (en) * 2004-03-11 2008-04-03 Chow David Q Managing bad blocks in various flash memory cells for electronic data flash card
US20120047314A1 (en) * 2010-08-20 2012-02-23 Transcend Information , Inc. Data backup method for flash memory module and solid state drive
CN102609332A (en) * 2011-01-19 2012-07-25 上海华虹集成电路有限责任公司 Power failure protection method for intelligent IC (integrated circuit) card data
US20130067146A1 (en) * 2011-09-13 2013-03-14 Kabushiki Kaisha Toshiba Memory device, control method for the memory device, and controller
US20130159603A1 (en) * 2011-12-20 2013-06-20 Fusion-Io, Inc. Apparatus, System, And Method For Backing Data Of A Non-Volatile Storage Device Using A Backing Store
CN108073363A (en) * 2017-12-28 2018-05-25 深圳市得微电子有限责任公司 Date storage method, storage device and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张际平: "《校园网络技术与管理》", 30 November 2001, 东南大学出版社, pages: 161 - 164 *
赵淑梅等: "《档案物理管理与保护教程》", 31 August 2014, 辽宁大学出版社, pages: 90 - 98 *

Similar Documents

Publication Publication Date Title
AU2017228544B2 (en) Nonvolatile media dirty region tracking
US9372743B1 (en) System and method for storage management
US9727601B2 (en) Predicting validity of data replication prior to actual replication in a transaction processing system
KR102031606B1 (en) Versioned memory implementation
CN113391947B (en) SSD RAID stripe power failure rapid recovery method, device, computer equipment and storage medium
CN110333971B (en) SSD bad block table backup method and device, computer equipment and storage medium
US7409585B2 (en) Automatic media repair after read failure due to media error
CN114780298B (en) File data processing method and device, computer terminal and storage medium
CN107992268B (en) Bad block marking method and related device
CN110471625B (en) Bad block information protection method and device, computer equipment and storage medium
US9268640B1 (en) Limiting data loss on parity RAID groups
CN113641309A (en) Weak block identification method and device of SSD, computer equipment and storage medium
CN111913835A (en) Data multi-backup storage method and device based on cross mapping, computer equipment and storage medium
US8261133B1 (en) Protection and recovery of non-redundant information stored in a memory
CN110865772A (en) Method and device for protecting system data physical block erasure count value, computer equipment and storage medium
CN111240603A (en) Method and device for protecting target LBA range data, computer equipment and storage medium
CN111857882A (en) Extensible SSD (solid State disk) firmware loading method and device, computer equipment and storage medium
CN110729014A (en) Method and device for backing up erase count table in SSD (solid State disk) storage, computer equipment and storage medium
US20220188221A1 (en) Regression testing method and regression testing apparatus
US20220374310A1 (en) Write request completion notification in response to partial hardening of write data
US20150067252A1 (en) Communicating outstanding maintenance tasks to improve disk data integrity
EP2820548B1 (en) Versioned memories using a multi-level cell
EP3916558A1 (en) Data protection
JP6648723B2 (en) Storage array device, recovery method, and recovery program
CN113312309A (en) Management method and device of snapshot chain and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination