CN111752755A - Relay protection key data redundancy storage and reliability recovery system and method - Google Patents

Relay protection key data redundancy storage and reliability recovery system and method Download PDF

Info

Publication number
CN111752755A
CN111752755A CN202010572182.5A CN202010572182A CN111752755A CN 111752755 A CN111752755 A CN 111752755A CN 202010572182 A CN202010572182 A CN 202010572182A CN 111752755 A CN111752755 A CN 111752755A
Authority
CN
China
Prior art keywords
data
memory
area
nonvolatile
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010572182.5A
Other languages
Chinese (zh)
Other versions
CN111752755B (en
Inventor
郑奕
李友军
周华良
郑玉平
崔玉
戴欣欣
巴超
周化
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nari Technology Co Ltd
NARI Nanjing Control System Co Ltd
State Grid Electric Power Research Institute
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Nari Technology Co Ltd
NARI Nanjing Control System Co Ltd
State Grid Electric Power Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Nari Technology Co Ltd, NARI Nanjing Control System Co Ltd, State Grid Electric Power Research Institute filed Critical State Grid Corp of China SGCC
Priority to CN202010572182.5A priority Critical patent/CN111752755B/en
Publication of CN111752755A publication Critical patent/CN111752755A/en
Application granted granted Critical
Publication of CN111752755B publication Critical patent/CN111752755B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1008Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
    • G06F11/1012Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices using codes or arrangements adapted for a specific type of error

Abstract

The invention discloses a system and a method for redundant storage and reliability recovery of relay protection key data, which realize reliable backup of the relay protection key data of secondary equipment of a transformer substation and reliable recovery when the device is abnormal, and have the characteristics of low cost, no influence on the operating efficiency of a CPU (central processing unit), high reliability of backup data, easiness in implementation of embedded equipment and the like.

Description

Relay protection key data redundancy storage and reliability recovery system and method
Technical Field
The invention belongs to the field of embedded industrial control, and particularly relates to a system and a method for redundant storage and reliability recovery of relay protection key data.
Background
The relay protection is used as a first line of defense of the power system, four basic requirements of selectivity, rapidity, sensitivity and reliability are technically required to be met, and reliable operation of the relay protection has important significance on safety and stability of the power system. The relay protection equipment adopts a file system or a nonvolatile memory to store event, fixed value, whole group, waveform and other key data, but the conditions of key data damage, loss or incomplete structure caused by abnormal power failure of a device or displacement of data under unknown reasons often occur, so that the relay protection equipment is abnormal in operation or cannot be started normally.
At present, a mainstream backup system is composed of a backup server and a client, and the server and the client perform data backup and recovery in a file transmission manner. Considering that the operating environment of the embedded device is generally complex and has many unexpected situations, the embedded device generally performs frequent failure recovery, and requires a fast recovery process, and it is desirable to achieve self-recovery capability, and external media backup and network backup are difficult to meet the requirements.
In view of this, in order to ensure real-time performance, reliability and integrity of operation data of the relay protection device, a method, a device and a system for redundant storage and reliability recovery of relay protection critical data are needed, and normal operation of the device and correct processing of the critical data can still be recovered under abnormal conditions.
The current data backup modes mainly include three modes, one mode is dual-computer redundancy backup, two devices are connected through a heartbeat channel to form a dual-computer system which is used for mutual backup, the working state of the dual-computer redundancy backup is monitored, and when the main device is shut down, the backup device can take over the interrupted work in real time to ensure the normal operation of the system.
The second is remote database backup and restore, which is to create a copy of the runtime database on a backup machine separate from the runtime. After receiving a backup command issued by the client in a control mode, the server compresses the file to be backed up into a firmware package, and the client acquires the backup file from the server in a file transmission mode to complete backup. And the server side analyzes and verifies the firmware packet transmitted by the client side after receiving the firmware packet, and if the verification is successful, the analyzed backup file is used for carrying out reduction operation.
The third is single device data backup and recovery, a database backup recovery module is added in a software layer, data backup space is reserved on system hardware storage equipment, meanwhile, a storage space for storing check codes is provided for each main database, and the system can recover data from the other database when one database is abnormal.
The dual-computer redundancy backup technology system is easy to install and relatively stable, but has the defects of large hardware investment, higher price, long dual-computer switching time, incapability of recovering fault data and the like.
The remote database backup and recovery technology avoids strong coupling of a main database and a backup database, improves reliability and automation degree of backup and recovery, but still does not solve the problems of low speed, poor real-time performance and the like of data recovery of a fault through network connection between a server side and a client side.
The existing single-device data backup and recovery technology realizes the real-time backup and recovery functions of data for a database, but the data backup and recovery are carried out through a processor, all data are processed at the same level speed, and the situation that the performance of an embedded system is not high cannot be met.
Disclosure of Invention
The purpose of the invention is as follows: in order to solve the problems of low switching speed of double computers, low real-time performance of remote database backup, low running efficiency of a processor due to single device backup and the like, the invention provides a system and a method for restoring the redundancy storage and reliability of relay protection key data, which realize the reliable backup of the relay protection key data of transformer substation secondary equipment and the reliable restoration when the device is abnormal, and have the characteristics of low cost, no influence on the running efficiency of a CPU, high reliability of backup data, easy realization of embedded equipment and the like.
The technical scheme is as follows: a relay protection key data redundancy storage and reliability recovery system comprises a memory data area for storing memory data, a nonvolatile data area for storing nonvolatile data and a processor;
the memory data area and the nonvolatile data area both comprise a data storage space for storing relay protection key data and a check code storage space for storing a check code corresponding to the relay protection key data;
the processor is used for carrying out data backup and recovery, calculation and judgment on the check codes in the memory data area and the nonvolatile data area, and comprises the steps of circularly checking data and the check codes in the memory data area, backing up data successfully verified in the memory data area to the nonvolatile data area, and correspondingly replacing data failed in verification in the memory data area with data successfully verified in the nonvolatile data storage area, so that data recovery is realized.
Further, the memory data area includes a memory operation area and a memory backup area, and the nonvolatile data area includes a nonvolatile main backup area and a nonvolatile secondary backup area; and dividing the memory operation area, the memory backup area, the nonvolatile main backup area and the nonvolatile secondary backup area into a data storage space and a check code storage space.
Further, the memory data are stored in a classified mode according to the relay protection data types, the data corresponding to each type are stored in the memory data area by taking the memory pages as units, and each memory page is checked independently to obtain the check code.
Further, the nonvolatile data are stored in a classified mode according to the relay protection data types, data corresponding to each type are stored in the nonvolatile data area by taking the data block as a unit, and each data block is verified independently to obtain a check code.
Further, the memory page size is consistent with the data block size.
The invention also discloses a relay protection key data redundancy storage and reliability recovery method, which comprises the following steps:
when the system is electrified and initialized, cross checking is carried out on data and check codes of the nonvolatile main backup area and the nonvolatile secondary backup area, the data and the check codes which are successfully checked are restored to the memory operating area and the memory backup area, a time stamp of the check moment is added to the data which are failed in the check, and the data are stored in a log file mode for error analysis;
when data needs to be written into the memory operating area, calculating a check code of a memory page where the data is located, updating the check code to a check code storage space corresponding to the memory page, backing up the data in the memory operating area to a memory backup area, and backing up the corresponding check code to the check code storage space of the memory backup area;
when the system normally operates, circularly checking whether the data in the memory operation area is matched with the check code, if the data in the memory operation area is not matched with the check code, performing cross check on the memory operation area and the memory backup area, and recovering the successfully checked data from the memory backup area to the memory operation area; if the successfully verified data does not exist, the successfully cross-verified data in the nonvolatile data storage area is restored to the memory operating area and the memory backup area, the time stamp of the verification time is added to the failed data, and the data is stored in a log file form for error analysis.
Further, when the system normally operates, the process of performing cross check on the memory operation area and the memory backup area is as follows: performing cross check on the data and the check codes of the memory operation area and the memory backup area in different periods according to the relay protection data types;
restoring the successfully cross-checked data of the memory operation area and the memory backup area from the memory backup area to the memory operation area and backing up the successfully checked data to the nonvolatile main backup area and the nonvolatile secondary backup area;
when the system normally operates, the process of restoring the data successfully cross-verified in the nonvolatile data storage area to the memory operation area and the memory backup area is as follows:
performing cross check on the data and the check codes of the nonvolatile main backup area and the nonvolatile secondary backup area, and if the check passes, restoring the data and the check codes to the memory operation area and the memory backup area; if the verification fails, adding a timestamp of the verification time to the data failed in verification, storing the data in a log file form, recalculating the verification code from the data in the memory operation area, and backing up the data to the memory backup area, the nonvolatile main backup area and the nonvolatile secondary backup area.
Further, the step of cross-checking the data and the check code of the nonvolatile primary backup area and the nonvolatile secondary backup area includes:
step A1: verifying the data of the nonvolatile main backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space of the nonvolatile main backup area, if the check codes are consistent, considering the data to be valid, and executing the step A6; if the check codes are not consistent, executing the step A2;
step A2: verifying the data of the nonvolatile primary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space of the nonvolatile secondary backup area, if the check codes are consistent, considering the data to be valid, and executing the step A6; if the check codes are not consistent, executing the step A3;
step A3: verifying the data in the nonvolatile secondary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space of the nonvolatile primary backup area, if the check codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A4;
step A4: verifying the data in the nonvolatile secondary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space in the nonvolatile secondary backup area, if the check codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A5;
step A5: verifying the data of the primary nonvolatile backup area according to the data blocks, storing the calculated verification code into a verification code storage space of the primary nonvolatile backup area, backing up the data and the verification code into a secondary nonvolatile backup area, and executing the step A6;
step A6: and carrying out backup or recovery operation on the successfully verified data.
Further, the step of cross-checking the data and the check code in the memory operating area and the memory backup area includes:
step B1: checking the data in the memory operation area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory operation area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B2;
step B2: checking the data in the memory operation area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory backup area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B3;
step B3: checking the data in the memory backup area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory operation area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B4;
step B4: checking the data in the memory backup area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory backup area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B5;
step B5: checking the data in the memory operation area according to the page, storing the calculated check code into the check code storage space of the memory operation area, backing up the data and the check code to the memory backup area at the same time, and executing step B6;
step B6: and carrying out backup or recovery operation on the successfully verified data.
Has the advantages that: compared with the prior art, the invention has the following advantages:
1. according to the recovery system, data are stored in the memory data area and the nonvolatile data area by taking the memory pages and the data blocks in different types as units, each page and each data block are independently verified, double-copy cross verification is used in the data backup and recovery process, reliable backup of relay protection key data of the secondary equipment of the transformer substation and reliable recovery when the device is abnormal are realized, and the reliability of backup data is high;
2. the recovery method of the invention divides the high-speed data and the low-speed data according to the read-write frequency of the relay protection key data, and the processor performs cross check according to different periods and backups to the nonvolatile data storage area, thereby reducing the cost of data backup and recovery, ensuring the reliability and stability of data backup and recovery, and improving the operating efficiency of the processor.
Drawings
FIG. 1 is a schematic diagram of a data backup and recovery system according to the present invention;
FIG. 2 is a schematic diagram of the data cross-checking method of the present invention.
Detailed Description
The technical solution of the present invention will be further explained with reference to the accompanying drawings and examples.
The invention discloses a relay protection key data redundancy storage and reliability recovery method and system, and relates to data backup and recovery of secondary equipment such as a transformer substation protection device, a measurement and control device and a phasor measurement device.
Example 1:
referring to fig. 1, the system for redundant storage and reliability recovery of relay protection critical data of the embodiment includes a memory data area, a nonvolatile data area, and a processor; the memory data area comprises a memory operation area and a memory backup area; the nonvolatile data area comprises a nonvolatile main backup area and a nonvolatile secondary backup area, and the processor is used for carrying out data backup and recovery on the memory data area and the nonvolatile data area, and calculating and judging the check code.
Check code storage spaces and data storage spaces are divided in the memory operation area, the memory backup area, the nonvolatile main backup area and the nonvolatile secondary backup area, the check code storage spaces store check codes obtained through calculation according to stored data, and the data storage spaces are used for storing relay protection key data.
The method comprises the following steps that memory data are divided into a whole set of data, event data, waveform data, fixed value data and the like according to relay protection data types, each type of data takes a memory page as a unit, each page is independently verified, and a check code is calculated based on a SM3 (password hash) algorithm; the nonvolatile data are divided into a whole group of data, event data, waveform data, fixed value data and the like according to the relay protection data types, each type of data takes a data block as a unit, each block is independently verified, and the verification code is calculated based on the SM3 algorithm; the page size of the memory data is consistent with the data block size of the non-volatile data.
Example 2:
referring to fig. 1 and fig. 2, on the basis of embodiment 1, this embodiment provides a method for redundant storage and reliability recovery of relay protection critical data, which is performed according to the following steps:
step 1: when initializing a data space, storing the memory data in a classified manner according to the relay protection data types, wherein each type of data takes a memory page as a unit and each page is independently verified, and the verification code is based on the abstract of the SM 3; the nonvolatile data are stored according to the relay protection data types in a classified mode, each type of data takes a data block as a unit, each block is verified independently, and the verification code is based on the abstract of the SM 3.
The check code and the content of the memory data are stored separately, the space size of the data content is distributed in advance, the memory pages are divided, and each page generates a summary according to the SM3 algorithm of the state password and stores the summary into the check code area. The SM3 cryptographic hash algorithm has a digest length of 256 bits, and the check code region needs to be allocated with n × 256 bit space, where n is the number of memory pages.
The check code and the content of the nonvolatile data are stored separately, the size of the data content space is allocated in advance, the data content is divided according to blocks, a summary generated by each block according to the SM3 algorithm is stored in a check code area, the check code area needs to be allocated with n x 256 bit spaces, wherein n is the number of the data blocks. The size of the blocks in the contents of the non-volatile data area is consistent with the page size of the contents of the memory area.
Step 2: the system is electrified and initialized, and the processor carries out cross check on the data and the check codes of the nonvolatile main backup area and the nonvolatile secondary backup area; the successfully verified data are restored to the memory operation area and the memory backup area, and the system operates normally; and adding a time stamp of the verification time to the data which fails to be verified, and storing the abnormal data in a log file form.
And step 3: when data needs to be written into the memory operating area, writing a data mark 1, writing relay protection data into the memory operating area according to types through a processor, calculating a check code of a memory page where the data is located, and updating a check code storage space corresponding to the page; and meanwhile, data in the memory operation area is backed up to the memory backup area, the calculated check code is backed up to the check code storage space of the memory backup area, and the data writing mark is set to be 0 after the operation is finished. If data are written in the data during backup, verification or recovery, the operation is stopped after the current page needing backup, verification or recovery is finished, and the data are backed up, verified or recovered again after the data are written in.
And 4, step 4: when the write data flag is 0, for different types of relay protection data, the processor performs cross check on the data and check codes of the memory operating area and the memory backup area according to different periods, and if the check is passed, the data is backed up to the nonvolatile main backup area and the nonvolatile secondary backup area; if the verification is not passed, executing the step 5;
the relay protection key data can be divided into event data, whole group of fault data, fixed value data and the like according to the type of the relay protection data, and the event data, the whole group of fault data, the fixed value data and the like correspond to high-speed data and low-speed data respectively according to the read-write frequency degree of the data. High-speed data refers to online data which needs to be frequently accessed by a computing node, and the processor backs up data in a memory area to a nonvolatile data storage area according to a short period, such as events, fixed values, real-time whole groups and the like; the low-speed data refers to data which are not frequently accessed in an off-line mode, and the processor backs up data in the memory area to a nonvolatile data storage area according to a long period, such as a whole history group.
And 5: performing cross check on the data and the check codes of the nonvolatile main backup area and the nonvolatile secondary backup area, and if the check passes, restoring the data and the check codes to the memory operation area and the memory backup area; if the verification fails, recalculating the verification code for the data in the memory operation area, and backing up the data to a memory backup area, a nonvolatile main backup area and a nonvolatile secondary backup area;
in this embodiment, a timestamp of the verification time is added to the data that fails to be verified, the abnormal data is stored in the form of a log file, and the latest N pieces of abnormal information are stored, so as to facilitate analysis of abnormal problems.
The method for cross-checking the data and the check codes of the nonvolatile main backup area and the nonvolatile secondary backup area comprises the following steps:
step A1: performing SM3 algorithm verification on the data of the nonvolatile main backup area according to the data block, comparing the calculated verification code with the verification code corresponding to the storage space of the verification code of the nonvolatile main backup area, if the verification codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A2;
step A2: performing SM3 algorithm verification on the data of the nonvolatile primary backup area according to the data block, comparing the calculated verification code with the verification code corresponding to the storage space of the verification code of the nonvolatile secondary backup area, if the verification codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A3;
step A3: performing SM3 algorithm verification on the data in the nonvolatile secondary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space in the nonvolatile main backup area, if the check codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A4;
step A4: performing SM3 algorithm verification on the data in the nonvolatile secondary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space in the nonvolatile secondary backup area, if the check codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A5;
step A5: performing SM3 algorithm verification on data of the primary nonvolatile backup area according to the data blocks, storing the calculated verification code into a verification code storage space, backing up the data and the verification code to a secondary nonvolatile backup area, and executing the step A6;
step A6: and carrying out backup or recovery operation on the successfully verified data.
The method for cross-checking the data and the check codes of the memory operation area and the memory backup area comprises the following steps:
step B1: performing SM3 algorithm verification on the data in the memory operation area according to the page, comparing the calculated verification code with the verification code corresponding to the verification code storage space in the memory operation area, if the verification codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B2;
step B2: performing SM3 algorithm verification on the data in the memory operation area according to the page, comparing the calculated verification code with the verification code corresponding to the verification code storage space in the memory backup area, if the verification codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B3;
step B3: performing SM3 algorithm verification on the data in the memory backup area according to the page, comparing the calculated verification code with the verification code corresponding to the storage space of the verification code in the memory operation area, if the verification codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B4;
step B4: performing SM3 algorithm verification on the data in the memory backup area according to the page, comparing the calculated verification code with the verification code corresponding to the storage space of the verification code in the memory backup area, if the verification codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B5;
step B5: performing SM3 algorithm verification on the data in the memory operation area according to the page, storing the calculated verification code into a verification code storage space, backing up the data and the verification code to a memory backup area, and executing the step B6;
step B6: and carrying out backup or recovery operation on the successfully verified data.

Claims (9)

1. The utility model provides a relay protection key data redundancy storage and reliability recovery system which characterized in that: the device comprises a memory data area for storing memory data, a nonvolatile data area for storing nonvolatile data and a processor;
the memory data area and the nonvolatile data area both comprise a data storage space for storing relay protection key data and a check code storage space for storing a check code corresponding to the relay protection key data;
the processor is used for carrying out data backup and recovery, calculation and judgment on the check codes in the memory data area and the nonvolatile data area, and comprises the steps of circularly checking data and the check codes in the memory data area, backing up data successfully verified in the memory data area to the nonvolatile data area, and correspondingly replacing data failed in verification in the memory data area with data successfully verified in the nonvolatile data storage area, so that data recovery is realized.
2. The relay protection key data redundancy storage and reliability recovery system according to claim 1, wherein: the memory data area comprises a memory operation area and a memory backup area, and the nonvolatile data area comprises a nonvolatile main backup area and a nonvolatile secondary backup area; the memory operation area, the memory backup area, the nonvolatile main backup area and the nonvolatile secondary backup area are all divided into a data storage space and a check code storage space.
3. The relay protection key data redundancy storage and reliability recovery system according to claim 1, wherein: the memory data are stored in a classified mode according to the relay protection data types, data corresponding to each type are stored in a memory data area by taking a memory page as a unit, and each memory page is checked independently to obtain a check code.
4. The relay protection key data redundancy storage and reliability recovery system according to claim 3, wherein: the nonvolatile data are stored in a classified mode according to relay protection data types, data corresponding to each type are stored in a nonvolatile data area by taking a data block as a unit, and each data block is verified independently to obtain a check code.
5. The relay protection key data redundancy storage and reliability recovery system according to claim 4, wherein: the size of the memory page is consistent with the size of the data block.
6. The method for the relay protection key data redundancy storage and reliability recovery system based on any one of claims 1 to 5, characterized in that: the method comprises the following steps: when the system is electrified and initialized, cross checking is carried out on data and check codes of the nonvolatile main backup area and the nonvolatile secondary backup area, the data and the check codes which are successfully checked are restored to the memory operating area and the memory backup area, a time stamp of the check moment is added to the data which are failed in the check, and the data are stored in a log file mode for error analysis;
when data needs to be written into the memory operating area, calculating a check code of a memory page where the data is located, updating the check code to a check code storage space corresponding to the memory page, backing up the data in the memory operating area to a memory backup area, and backing up the corresponding check code to the check code storage space of the memory backup area;
when the system normally operates, circularly checking whether the data in the memory operation area is matched with the check code, if the data in the memory operation area is not matched with the check code, performing cross check on the memory operation area and the memory backup area, and recovering the successfully checked data from the memory backup area to the memory operation area; if the successfully verified data does not exist, the successfully cross-verified data in the nonvolatile data storage area is restored to the memory operating area and the memory backup area, the time stamp of the verification time is added to the failed data, and the data is stored in a log file form for error analysis.
7. The method of claim 6, wherein: when the system normally operates, the process of cross-checking the memory operation area and the memory backup area comprises the following steps: performing cross check on the data and the check codes of the memory operation area and the memory backup area in different periods according to the relay protection data types;
performing cross check on the memory operation area and the memory backup area, recovering successfully checked data from the memory backup area to the memory operation area, and backing up the successfully checked data to the nonvolatile main backup area and the nonvolatile secondary backup area;
when the system normally operates, the process of restoring the data successfully cross-verified in the nonvolatile data storage area to the memory operation area and the memory backup area is as follows:
performing cross check on the data and the check codes of the nonvolatile main backup area and the nonvolatile secondary backup area, and if the check passes, restoring the data and the check codes to the memory operation area and the memory backup area; if the verification fails, adding a timestamp of the verification time to the data failed in verification, storing the data in a log file form, recalculating the verification code from the data in the memory operation area, and backing up the data to the memory backup area, the nonvolatile main backup area and the nonvolatile secondary backup area.
8. The method of claim 7, wherein: the step of cross-checking the data and the check code of the nonvolatile primary backup area and the nonvolatile secondary backup area comprises the following steps:
step A1: verifying the data of the nonvolatile main backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space of the nonvolatile main backup area, if the check codes are consistent, considering the data to be valid, and executing the step A6; if the check codes are not consistent, executing the step A2;
step A2: verifying the data of the nonvolatile primary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space of the nonvolatile secondary backup area, if the check codes are consistent, considering the data to be valid, and executing the step A6; if the check codes are not consistent, executing the step A3;
step A3: verifying the data in the nonvolatile secondary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space of the nonvolatile primary backup area, if the check codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A4;
step A4: verifying the data in the nonvolatile secondary backup area according to the data blocks, comparing the calculated check code with the check code corresponding to the check code storage space in the nonvolatile secondary backup area, if the check codes are consistent, determining that the data is valid, and executing the step A6; if the check codes are not consistent, executing the step A5;
step A5: verifying the data of the primary nonvolatile backup area according to the data blocks, storing the calculated verification code into a verification code storage space of the primary nonvolatile backup area, backing up the data and the verification code into a secondary nonvolatile backup area, and executing the step A6;
step A6: and carrying out backup or recovery operation on the successfully verified data.
9. The method of claim 7, wherein: the step of cross-checking the data and the check codes of the memory operation area and the memory backup area comprises the following steps:
step B1: checking the data in the memory operation area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory operation area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B2;
step B2: checking the data in the memory operation area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory backup area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B3;
step B3: checking the data in the memory backup area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory operation area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B4;
step B4: checking the data in the memory backup area according to the page, comparing the calculated check code with the check code corresponding to the check code storage space in the memory backup area, if the check codes are consistent, considering the data to be valid, and executing the step B6; if the check codes are not consistent, executing step B5;
step B5: checking the data in the memory operation area according to the page, storing the calculated check code into the check code storage space of the memory operation area, backing up the data and the check code to the memory backup area at the same time, and executing step B6;
step B6: and carrying out backup or recovery operation on the successfully verified data.
CN202010572182.5A 2020-06-22 2020-06-22 Relay protection key data redundancy storage and reliability recovery system and method Active CN111752755B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010572182.5A CN111752755B (en) 2020-06-22 2020-06-22 Relay protection key data redundancy storage and reliability recovery system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010572182.5A CN111752755B (en) 2020-06-22 2020-06-22 Relay protection key data redundancy storage and reliability recovery system and method

Publications (2)

Publication Number Publication Date
CN111752755A true CN111752755A (en) 2020-10-09
CN111752755B CN111752755B (en) 2022-09-23

Family

ID=72676399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010572182.5A Active CN111752755B (en) 2020-06-22 2020-06-22 Relay protection key data redundancy storage and reliability recovery system and method

Country Status (1)

Country Link
CN (1) CN111752755B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948165A (en) * 2021-02-26 2021-06-11 许继集团有限公司 Reliability guarantee method for memory data of relay protection device
CN117234798A (en) * 2023-09-03 2023-12-15 国网江苏省电力有限公司信息通信分公司 Enterprise-level data backup and recovery method and system for electric power field

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1783025A (en) * 2004-12-03 2006-06-07 华为技术有限公司 Embedded system data back-up device and method
CN101452410A (en) * 2007-12-06 2009-06-10 中兴通讯股份有限公司 Data backup system for embedded database, and data backup and recovery method
CN105808390A (en) * 2016-04-29 2016-07-27 合肥美的电冰箱有限公司 Home appliance information self-checking and self-recovery method and system and home appliances
CN111176890A (en) * 2019-12-16 2020-05-19 上海航天控制技术研究所 Data storage and exception recovery method for satellite-borne software

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1783025A (en) * 2004-12-03 2006-06-07 华为技术有限公司 Embedded system data back-up device and method
CN101452410A (en) * 2007-12-06 2009-06-10 中兴通讯股份有限公司 Data backup system for embedded database, and data backup and recovery method
CN105808390A (en) * 2016-04-29 2016-07-27 合肥美的电冰箱有限公司 Home appliance information self-checking and self-recovery method and system and home appliances
CN111176890A (en) * 2019-12-16 2020-05-19 上海航天控制技术研究所 Data storage and exception recovery method for satellite-borne software

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948165A (en) * 2021-02-26 2021-06-11 许继集团有限公司 Reliability guarantee method for memory data of relay protection device
CN112948165B (en) * 2021-02-26 2024-02-13 许继集团有限公司 Relay protection device memory data reliability guarantee method
CN117234798A (en) * 2023-09-03 2023-12-15 国网江苏省电力有限公司信息通信分公司 Enterprise-level data backup and recovery method and system for electric power field
CN117234798B (en) * 2023-09-03 2024-01-30 国网江苏省电力有限公司信息通信分公司 Enterprise-level data backup and recovery method and system for electric power field

Also Published As

Publication number Publication date
CN111752755B (en) 2022-09-23

Similar Documents

Publication Publication Date Title
EP3519965B1 (en) Systems and methods for healing images in deduplication storage
CN111752755B (en) Relay protection key data redundancy storage and reliability recovery system and method
EP0768605A2 (en) Reconstructing data blocks in a RAID array data storage system having storage device metadata and RAIDset metada
JP5852674B2 (en) Method for detecting data loss in data transfer between information devices
CN113626256B (en) Virtual machine disk data backup method, device, terminal and storage medium
US9442814B2 (en) Systems and methods for improved fault tolerance in RAID configurations
EP3658995B1 (en) Interruption recovery method for machine tool machining file and machine tool applying same
US8639968B2 (en) Computing system reliability
CN104598335A (en) Method and device for restoring backup of NV parameters
CN115129507A (en) Method, device, equipment and medium for realizing rapid RAID array reorganization
US7260739B2 (en) Method, apparatus and program storage device for allowing continuous availability of data during volume set failures in a mirrored environment
CN105138280A (en) Data write-in method, apparatus and system
CN110245038B (en) Data cross backup and recovery device and method
CN114968119A (en) Data protection method, device, equipment and storage medium
CN113377569A (en) Method, apparatus and computer program product for recovering data
CN102520223B (en) Software anti-interference method used for electric energy meter
CN111428280B (en) SoC (System on chip) security chip key information integrity storage and error self-repairing method
CN110990197B (en) Optimization method of application-level multi-layer check point based on supercomputer
CN112445432B (en) Method and device for maintaining redundant VPD (virtual private device) in double-control system
CN112286727B (en) Space-time isolation domain rapid recovery method and system based on incremental snapshot
CN114064346A (en) Erasure code data consistency guaranteeing method and system
CN107544868B (en) Data recovery method and device
CN102567216B (en) Improve the reliable storage method of service life of flash memory
CN113868000B (en) Link fault repairing method, system and related components
CN115329391B (en) Text database protection method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant