CN113342579A - Data restoration method and device - Google Patents

Data restoration method and device Download PDF

Info

Publication number
CN113342579A
CN113342579A CN202110758038.5A CN202110758038A CN113342579A CN 113342579 A CN113342579 A CN 113342579A CN 202110758038 A CN202110758038 A CN 202110758038A CN 113342579 A CN113342579 A CN 113342579A
Authority
CN
China
Prior art keywords
data
host
information
restored
requester
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110758038.5A
Other languages
Chinese (zh)
Inventor
柳文龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Happly Sunshine Interactive Entertainment Media Co Ltd
Original Assignee
Hunan Happly Sunshine Interactive Entertainment Media Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Happly Sunshine Interactive Entertainment Media Co Ltd filed Critical Hunan Happly Sunshine Interactive Entertainment Media Co Ltd
Priority to CN202110758038.5A priority Critical patent/CN113342579A/en
Publication of CN113342579A publication Critical patent/CN113342579A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Library & Information Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a data recovery method and a data recovery device, wherein mirror images of recycle bins in each host device connected with a main system are sequentially made in advance and stored in a mirror image database; after receiving the data reduction request information sent by the data reduction requesting party passing the identity authentication; matching the restored data request information with mirror image file information in a mirror image database; when the matching is successful, searching corresponding restored data information from the mirror database according to the restored data request information; and finally, restoring the searched restored data information to a host corresponding to the host ID of the data restoration requester or/and a host corresponding to the data restoration receiving host ID. By the data restoration method and the data restoration device, not only can the original path be used for restoring data information, but also the deleted data in the original equipment can be restored to other host equipment connected with the main system, and data loss is effectively prevented.

Description

Data restoration method and device
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a data restoring method and apparatus.
Background
At present, more and more enterprises begin to perform enterprise informatization construction, and through development and utilization of information resources, the efficiency and level of production, management and decision-making are continuously improved, so that the operational benefits of the enterprises and the competitiveness of the enterprises are improved. Based on the high requirements of enterprise-level applications for data security, a facilitator will typically provide: data timing backup and disaster recovery backup; and the data security of the client is guaranteed by technologies such as a transmission encryption technology SSL and a server digital security certificate. However, in the current enterprise-level application system, for abnormally deleted data such as misoperations and malicious deletion, the system processes the abnormally deleted data according to the normally deleted data, and the abnormally deleted data cannot be recovered properly, which causes unavoidable loss to the enterprise, so how to recover the abnormally deleted data properly becomes an urgent problem in terms of ensuring data security.
The data restoration method of the current application system mainly comprises a data deletion step and a data restoration step. The data deleting step comprises a first step that a user selects data and deletes the data; secondly, acquiring information of data to be deleted; thirdly, deleting the target data to be deleted from the database table; and fourthly, recording the data deletion log in a database table. The data restoring step comprises the following steps: a system administrator enters a recycle bin to search target data to be restored; and analyzing data from all table field names of the recycle bin table records and values corresponding to fields stored in a value packaging mode, restoring the data into one record of the database table with the table name field value as the table name, inserting the record into the table, and deleting the record in the recycle bin table.
The data reduction method has the following defects: the data can only be restored through the original path, the deleted data in the original equipment cannot be restored to other equipment, and meanwhile, data loss may be caused in the restoration process, so that inconvenience is brought to the use of a user.
Disclosure of Invention
In view of the limitation that only the original path can restore the data information, the present application provides a data restoring method and apparatus, which can not only restore the data information by the original path, but also restore the deleted data in the original device to other host devices, and simultaneously can prevent the data from being lost.
In order to achieve the above object, the present application provides the following technical solutions:
a method of data reduction, comprising:
receiving restored data request information sent by a restored data requester passing identity authentication, wherein the restored data request information comprises deleted data time, a deleted data name, a host ID of the restored data requester, restored data requester information and a data restoration receiving host ID;
matching the restored data request information with image file information in an image database, wherein the image database is used for sequentially making image files for recycle bins in all extensions connected with the main system and storing the image files into the image database;
when the matching is successful, searching corresponding restored data information from the mirror database according to the restored data request information;
and restoring the searched restored data information to a host corresponding to the host ID of the data restoration requester or/and a host corresponding to the data restoration receiving host ID.
Further, the method comprises:
and sending prompt information to the data reduction requesting party, and displaying the prompt information on a page of the host corresponding to the host ID of the data reduction requesting party.
Specifically, the effective identification of the identity authentication of the reduced data requester at least comprises one of a job number ID, a face identification mode and a fingerprint identification mode of the reduced data requester.
Specifically, the image file is displayed by a node graph, the main node is an extension ID, the first sub-node is a data name of a file recovered from each ID extension, and the second sub-node is a time of recovering the file from each ID extension.
Specifically, the image files are displayed in a list, specifically, the same data names on the same ID extension are the same folder, and the data information in the folders is sorted according to the image time.
A data recovery apparatus comprising:
the first processing unit is used for receiving restored data request information sent by a restored data requester which passes identity authentication, wherein the restored data request information comprises deleted data time, a deleted data name, a host ID of the restored data requester, restored data requester information and a data restoration receiving host ID;
the second processing unit is used for matching the restored data request information with image file information in a mirror database, wherein the mirror database is used for sequentially making image files for recycle bins in all extension sets connected with the main system and storing the image files into the mirror database;
the third processing unit is used for searching corresponding restored data information from the mirror database by the main system according to the restored data request information after the matching is successful;
and the fourth processing unit is used for restoring the searched restored data information to the host corresponding to the host ID of the data restoring requester or/and the host corresponding to the data restoring receiving host ID.
Further, the apparatus further comprises:
and the fifth processing unit is used for sending prompt information to the data reduction requesting party and displaying the prompt information on a page of the host corresponding to the host ID of the data reduction requesting party.
Specifically, the effective identification of the identity authentication of the reduced data requester at least comprises one of a job number ID, a face identification mode and a fingerprint identification mode of the reduced data requester.
A storage medium comprising a stored program, wherein, when the program runs, a device on which the storage medium is located is controlled to execute the data recovery method as described above.
An electronic device comprising at least one processor, and at least one memory, bus connected with the processor; the processor and the memory complete mutual communication through the bus; the processor is configured to call program instructions in the memory to perform the data reduction method as described above.
According to the data recovery method and device, mirror images are made in sequence for recycle bins in each host device connected with the main system in advance, and the mirror images are stored in a mirror image database; after receiving the request information of the reduced data sent by the request party of the reduced data passing the identity authentication (the request information of the reduced data comprises the deleted data time, the deleted data name, the host ID of the request party of the reduced data, the request party information of the reduced data and the ID of the host of the data reduction receiving); matching the restored data request information with mirror image file information in a mirror image database; when the matching is successful, searching corresponding restored data information from the mirror database according to the restored data request information; and finally, restoring the searched restored data information to a host corresponding to the host ID of the data restoration requester or/and a host corresponding to the data restoration receiving host ID. By the data restoration method and the data restoration device, not only can the original path be used for restoring data information, but also the deleted data in the original equipment can be restored to other host equipment connected with the main system, and data loss is effectively prevented.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a data recovery system disclosed in an embodiment of the present application;
fig. 2 is a schematic flow chart of a data reduction method disclosed in an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data recovery apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application.
Detailed Description
The present application provides a data reduction method and apparatus, which are applied to a data reduction system shown in fig. 1, where the data reduction system includes: the system comprises an information comparison module 10, a main system 20, a mirror database 30 and at least two host devices 40 connected with the main system 20, wherein the information comparison module 10, the main system 20 and the mirror database 30 are in communication connection, mirror files are sequentially made in advance for recycle bins in the host devices 40 connected with the main system 20 and are stored in the mirror database 30; after receiving the restored data request information sent by the restored data requester passing the identity authentication (the restored data request information includes the deleted data time, the deleted data name, the host ID of the restored data requester, the restored data requester information and the data restoration receiving host ID), the information comparison module 10 matches the restored data request information with the mirror image file information in the mirror image database; when the matching is successful, the main system 20 searches corresponding reduction data information from the mirror database 30 according to the reduction data request information, and reduces the searched reduction data information to a host corresponding to the host ID of the reduction data requester or/and a host corresponding to the data reduction receiving host ID.
The application provides a data recovery method and device, and aims to: how to realize not only the data information can be restored by the original path, but also the deleted data in the original equipment can be restored to other host equipment, and meanwhile, the data loss can be prevented.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 2 is a schematic flow chart of a data reduction method according to an embodiment of the present application. As shown in fig. 2, an embodiment of the present application provides a data restoring method, which includes the following steps:
s201: receiving reduced data request information sent by a reduced data requester passing identity authentication;
in this step, the requester after passing the identity authentication sends a data restoring request to the host system by using the host connected to the host system, where the data restoring request includes data restoring request information such as deleted data time, deleted data name, host ID of the data restoring requester, data restoring requester information, and data restoring receiving host ID, and specifically, the deleted data time includes year, month, day, and hour.
It should be noted that the effective identification of the identity authentication for the data reduction requester at least includes one of the job number ID, the face identification method and the fingerprint identification method of the data reduction requester.
In the embodiment of the application, after the identity of the data reduction requester is safely and effectively identified, the data reduction requester sends the data reduction request to the main system by using the host which is connected with the main system, so that the situation that external personnel randomly use equipment to recover data is avoided, and the data information safety can be ensured.
S202: and matching the restored data request information with the mirror image file information in the mirror image database, executing the step S203 when the matching is successful, and directly feeding back 'information is wrong and cannot be restored temporarily' when the matching is unsuccessful.
In the embodiment of the present application, it should be noted that mirror images need to be sequentially made to recycle bins in each host device connected to the host system in advance, and the mirror images are stored in a mirror database. The mirror image file made by the recycle bin is used for analyzing the back recombined data, so that the safety of the whole recovery process is ensured, and the secondary damage of the original data can be avoided.
Specifically, the information comparison module uses the mirror image file in the mirror image database as a reference point, matches the restored data request information with the mirror image file, such as deletion time, and searches whether the restored data request information exists.
In a specific embodiment, the image file may be displayed in a node diagram, where a master node is an extension ID, a first branch node is a data name of a file recovered from each ID extension, and a second branch node is a time of recovering the file from each ID extension.
In a specific embodiment, the image files are displayed in a list, specifically, the same data names on the same ID extension are the same folder, and the data information in the folders is sorted according to the image time.
In the specific embodiment, the backup time of the image file is 3-5 years, the start time is based on the backup time of the data information, and the highest authority administrator has the right to change the backup time, so that the situation that the mirror database is used for a very large amount of files in the backup recycle bin is effectively avoided.
In a specific embodiment, the backup information of the image file is classified and set by a highest-authority administrator, and the classified setting includes a picture image, a chart image, a video image and a chat record image.
S203: searching corresponding restored data information from the mirror database according to the restored data request information;
s204: restoring the searched restored data information to a host corresponding to the host ID of the restored data requester or/and a host corresponding to the data restoration receiving host ID;
s205: and sending prompt information to the data reduction requesting party, and displaying the prompt information on a page of the host corresponding to the host ID of the data reduction requesting party.
In the data recovery method provided by the embodiment of the application, image files are sequentially made in advance for recycle bins in each host device connected with the host system, and the image files are stored in a mirror database; after receiving the request information of the reduced data sent by the request party of the reduced data passing the identity authentication (the request information of the reduced data comprises the deleted data time, the deleted data name, the host ID of the request party of the reduced data, the request party information of the reduced data and the ID of the host of the data reduction receiving); matching the restored data request information with mirror image file information in a mirror image database; when the matching is successful, searching corresponding restored data information from the mirror database according to the restored data request information; and finally, restoring the searched restored data information to a host corresponding to the host ID of the data restoration requester or/and a host corresponding to the data restoration receiving host ID. By the data restoration method, not only can the original path be used for restoring data information, but also the deleted data in the original equipment can be restored to other host equipment connected with the main system, and data loss is effectively prevented.
To sum up, the embodiment of the present application sequentially makes image files to recycle bins in each extension set connected to a main system, stores the image files in a mirror database for storage, the backup time of the image files is 3-5 years, a highest authority administrator has the right to change the backup time, so as to effectively avoid the situation that the mirror database is used for stagnation due to excessive file contents of the backup recycle bins, when the image files are used, after the identity of a data reduction requester is safely and effectively identified, the requester sends a data reduction request to the main system by using a host connected with the main system, an information comparison module receives the data reduction request and automatically matches whether the request information is consistent, after the matching is successful, the main system receives the reduction information, accesses the mirror database, searches for the data reduction information, and reduces the corresponding data information to a requested data reduction receiving ID host, the embodiment of the application can avoid external personnel from using equipment to recover data at will, ensure the safety of data information, utilize the mirror image files made to the recovery station to recombine the data after analysis, is convenient to ensure the safety of the whole recovery process, avoid secondary damage of original data, make the mirror image files to the recovery station in each extension, and greatly save backup space by comparing the mirror image files made to all hard disks in the extension.
Referring to fig. 3, based on the data restoring method disclosed in the foregoing embodiment, the present embodiment correspondingly discloses a data restoring apparatus, which includes:
the first processing unit 301 is configured to receive restored data request information sent by a restored data requesting party that passes the identity authentication.
And the requester after the identity authentication sends a data restoring request to the host system by using the host connected with the host system, wherein the data restoring request includes data restoring request information such as deleted data time, a deleted data name, a host ID of the data restoring requester, data restoring requester information, a data restoring receiving host ID and the like, and the deleted data time specifically includes year, month, day and hour.
It should be noted that the effective identification of the identity authentication for the data reduction requester at least includes one of the job number ID, the face identification method and the fingerprint identification method of the data reduction requester.
In the embodiment of the application, after the identity of the data reduction requester is safely and effectively identified, the data reduction requester sends the data reduction request to the main system by using the host which is connected with the main system, so that the situation that external personnel randomly use equipment to recover data is avoided, and the data information safety can be ensured.
The second processing unit 302 is configured to match the request information of the restored data with the information of the mirror image file in the mirror image database.
In the embodiment of the present application, it should be noted that mirror images need to be sequentially made to recycle bins in each host device connected to the host system in advance, and the mirror images are stored in a mirror database. The mirror image file made by the recycle bin is used for analyzing the back recombined data, so that the safety of the whole recovery process is ensured, and the secondary damage of the original data can be avoided.
Specifically, the information comparison module uses the mirror image file in the mirror image database as a reference point, matches the restored data request information with the mirror image file, such as deletion time, and searches whether the restored data request information exists.
In a specific embodiment, the image file may be displayed in a node diagram, where a master node is an extension ID, a first branch node is a data name of a file recovered from each ID extension, and a second branch node is a time of recovering the file from each ID extension.
In a specific embodiment, the image files are displayed in a list, specifically, the same data names on the same ID extension are the same folder, and the data information in the folders is sorted according to the image time.
In the specific embodiment, the backup time of the image file is 3-5 years, the start time is based on the backup time of the data information, and the highest authority administrator has the right to change the backup time, so that the situation that the mirror database is used for a very large amount of files in the backup recycle bin is effectively avoided.
A third processing unit 303, configured to, after matching is successful, the host system searches for corresponding restored data information from the mirror database according to the restored data request information;
a fourth processing unit 304, configured to restore the searched restored data information to the host corresponding to the host ID of the data restoring requester or/and the host corresponding to the data restoring receiving host ID.
A fifth processing unit 305, configured to send a prompt message to the request for reduced data, and display the prompt message on a page of a host corresponding to the host ID of the request for reduced data.
The data recovery device comprises a processor and a memory, wherein the first processing unit, the second processing unit, the third processing unit, the fourth processing unit, the fifth processing unit and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, the data information can be restored by the original path by adjusting the kernel parameters, the deleted data in the original equipment can be restored to other host equipment, and meanwhile, the data loss can be prevented.
An embodiment of the present application provides a storage medium on which a program is stored, the program implementing the data restoring method when executed by a processor.
The embodiment of the application provides a processor, wherein the processor is used for running a program, and the data recovery method is executed when the program runs.
An embodiment of the present application provides an electronic device, as shown in fig. 4, the electronic device 40 includes at least one processor 401, and at least one memory 402 and a bus 403 connected to the processor; the processor 401 and the memory 402 complete communication with each other through the bus 403; the processor 401 is configured to call the program instructions in the memory 402 to execute the data restoring method described above.
The electronic device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
receiving restored data request information sent by a restored data requester passing identity authentication, wherein the restored data request information comprises deleted data time, a deleted data name, a host ID of the restored data requester, restored data requester information and a data restoration receiving host ID;
matching the restored data request information with image file information in an image database, wherein the image database is used for sequentially making image files for recycle bins in all extensions connected with the main system and storing the image files into the image database;
when the matching is successful, searching corresponding restored data information from the mirror database according to the restored data request information;
and restoring the searched restored data information to a host corresponding to the host ID of the data restoration requester or/and a host corresponding to the data restoration receiving host ID.
Further, the method further comprises:
and sending prompt information to the data reduction requesting party, and displaying the prompt information on a page of the host corresponding to the host ID of the data reduction requesting party.
Specifically, the effective identification of the identity authentication of the reduced data requester at least comprises one of a job number ID, a face identification mode and a fingerprint identification mode of the reduced data requester.
Specifically, the image file is displayed by a node graph, the main node is an extension ID, the first sub-node is a data name of a file recovered from each ID extension, and the second sub-node is a time of recovering the file from each ID extension.
Specifically, the image files are displayed in a list, specifically, the same data names on the same ID extension are the same folder, and the data information in the folders is sorted according to the image time.
The present application is described in terms of flowcharts and/or block diagrams of methods, apparatus (systems), computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method of data reduction, comprising:
receiving restored data request information sent by a restored data requester passing identity authentication, wherein the restored data request information comprises deleted data time, a deleted data name, a host ID of the restored data requester, restored data requester information and a data restoration receiving host ID;
matching the restored data request information with image file information in an image database, wherein the image database is used for sequentially making image files for recycle bins in all extensions connected with the main system and storing the image files into the image database;
when the matching is successful, searching corresponding restored data information from the mirror database according to the restored data request information;
and restoring the searched restored data information to a host corresponding to the host ID of the data restoration requester or/and a host corresponding to the data restoration receiving host ID.
2. The method of claim 1, further comprising:
and sending prompt information to the data reduction requesting party, and displaying the prompt information on a page of the host corresponding to the host ID of the data reduction requesting party.
3. The method according to claim 1, wherein the effective identification of the identity authentication of the recovery data requester at least comprises one of a job number ID, a face recognition mode and a fingerprint recognition mode of the recovery data requester.
4. The method of claim 1, wherein the image file is displayed in a node map, the primary node is an extension ID, the first child node is a data name of a file recycled from each ID extension, and the second child node is a time of the file recycled from each ID extension.
5. The method according to claim 1, characterized in that the image files are presented in a list, specifically, the same data names on the same ID extension are the same folder, and the data information in the folders is sorted in the order of the image time.
6. A data recovery apparatus, comprising:
the first processing unit is used for receiving restored data request information sent by a restored data requester which passes identity authentication, wherein the restored data request information comprises deleted data time, a deleted data name, a host ID of the restored data requester, restored data requester information and a data restoration receiving host ID;
the second processing unit is used for matching the restored data request information with image file information in a mirror database, wherein the mirror database is used for sequentially making image files for recycle bins in all extension sets connected with the main system and storing the image files into the mirror database;
the third processing unit is used for searching corresponding restored data information from the mirror database by the main system according to the restored data request information after the matching is successful;
and the fourth processing unit is used for restoring the searched restored data information to the host corresponding to the host ID of the data restoring requester or/and the host corresponding to the data restoring receiving host ID.
7. The apparatus of claim 6, further comprising:
and the fifth processing unit is used for sending prompt information to the data reduction requesting party and displaying the prompt information on a page of the host corresponding to the host ID of the data reduction requesting party.
8. The method according to claim 6, wherein the effective identification of the identity authentication of the recovery data requester at least comprises one of a job number ID, a face recognition mode and a fingerprint recognition mode of the recovery data requester.
9. A storage medium, characterized in that the storage medium comprises a stored program, wherein, when the program runs, a device on which the storage medium is located is controlled to execute the data restoration method according to any one of claims 1 to 5.
10. An electronic device comprising at least one processor, and at least one memory, bus connected to the processor; the processor and the memory complete mutual communication through the bus; the processor is configured to invoke program instructions in the memory to perform the data reduction method of any of claims 1 to 5.
CN202110758038.5A 2021-07-05 2021-07-05 Data restoration method and device Pending CN113342579A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110758038.5A CN113342579A (en) 2021-07-05 2021-07-05 Data restoration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110758038.5A CN113342579A (en) 2021-07-05 2021-07-05 Data restoration method and device

Publications (1)

Publication Number Publication Date
CN113342579A true CN113342579A (en) 2021-09-03

Family

ID=77482507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110758038.5A Pending CN113342579A (en) 2021-07-05 2021-07-05 Data restoration method and device

Country Status (1)

Country Link
CN (1) CN113342579A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969218A (en) * 2022-06-01 2022-08-30 广东森克电子有限公司 Data loss prevention system for industrial computer

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101187887A (en) * 2006-11-15 2008-05-28 鸿富锦精密工业(深圳)有限公司 Storage device with temporary data protection function and the method
CN102253871A (en) * 2011-07-13 2011-11-23 重庆大学 Data backup and reduction method, device and system
CN103473296A (en) * 2013-09-04 2013-12-25 国云科技股份有限公司 Recycle bin mechanism and recycle bin system applicable to cloud computing
US20140074790A1 (en) * 2012-09-12 2014-03-13 International Business Machines Corporation Using a metadata image of a file system and archive instance to restore data objects in the file system
CN107819891A (en) * 2017-10-16 2018-03-20 平安科技(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110888847A (en) * 2019-12-16 2020-03-17 新华三技术有限公司成都分公司 Recycle bin system and file recycling method
CN111291006A (en) * 2020-01-21 2020-06-16 苏州浪潮智能科技有限公司 Data recovery processing method, device and equipment and readable storage medium
CN111475470A (en) * 2020-03-27 2020-07-31 苏州浪潮智能科技有限公司 Method and system for recovering deleted files and directories of recycle bin

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101187887A (en) * 2006-11-15 2008-05-28 鸿富锦精密工业(深圳)有限公司 Storage device with temporary data protection function and the method
CN102253871A (en) * 2011-07-13 2011-11-23 重庆大学 Data backup and reduction method, device and system
US20140074790A1 (en) * 2012-09-12 2014-03-13 International Business Machines Corporation Using a metadata image of a file system and archive instance to restore data objects in the file system
CN103473296A (en) * 2013-09-04 2013-12-25 国云科技股份有限公司 Recycle bin mechanism and recycle bin system applicable to cloud computing
CN107819891A (en) * 2017-10-16 2018-03-20 平安科技(深圳)有限公司 Data processing method, device, computer equipment and storage medium
CN110888847A (en) * 2019-12-16 2020-03-17 新华三技术有限公司成都分公司 Recycle bin system and file recycling method
CN111291006A (en) * 2020-01-21 2020-06-16 苏州浪潮智能科技有限公司 Data recovery processing method, device and equipment and readable storage medium
CN111475470A (en) * 2020-03-27 2020-07-31 苏州浪潮智能科技有限公司 Method and system for recovering deleted files and directories of recycle bin

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969218A (en) * 2022-06-01 2022-08-30 广东森克电子有限公司 Data loss prevention system for industrial computer

Similar Documents

Publication Publication Date Title
US9223661B1 (en) Method and apparatus for automatically archiving data items from backup storage
CN111723056B (en) Small file processing method, device, equipment and storage medium
CN107291768B (en) Index establishing method and device
KR102248386B1 (en) Database data modification request processing method and device
US20170371894A1 (en) Samba configuration management method and system for network device
CN107580032B (en) Data processing method, device and equipment
US20190114440A1 (en) File system content based security
CN111708794B (en) Data comparison method and device based on big data platform and computer equipment
WO2021068348A1 (en) Task deployment method and system, and storage medium
CN112596951A (en) NAS data disaster tolerance method, device, equipment and storage medium
CN106776795B (en) Data writing method and device based on Hbase database
CN105260639A (en) Face recognition system data update method and device
CN114328029B (en) Backup method and device of application resources, electronic equipment and storage medium
CN111209061B (en) User information filling method, device, computer equipment and storage medium
US20180121531A1 (en) Data Updating Method, Device, and Related System
CN110336813B (en) Access control method, device, equipment and storage medium
US10133639B2 (en) Privacy protection of media files for automatic cloud backup systems
CN113342579A (en) Data restoration method and device
US20170228292A1 (en) Privacy Protection of Media Files For Automatic Cloud Backup Systems
CN115098889B (en) Authority management method, device, equipment and storage medium
CN108090128B (en) Recovery method and device for merged storage space and electronic equipment
US11308048B2 (en) Database migration method, apparatus, device, and computer-readable medium
CN113722152A (en) Data incremental backup method, device, equipment and storage medium
CN112765129A (en) Method and equipment for realizing database data version management
CN107844491B (en) Method and equipment for realizing strong consistency read operation in distributed system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination