CN115437835A - Data recovery method, device and storage medium - Google Patents

Data recovery method, device and storage medium Download PDF

Info

Publication number
CN115437835A
CN115437835A CN202110626936.5A CN202110626936A CN115437835A CN 115437835 A CN115437835 A CN 115437835A CN 202110626936 A CN202110626936 A CN 202110626936A CN 115437835 A CN115437835 A CN 115437835A
Authority
CN
China
Prior art keywords
backed
configuration data
network element
check code
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110626936.5A
Other languages
Chinese (zh)
Inventor
张永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202110626936.5A priority Critical patent/CN115437835A/en
Priority to PCT/CN2022/095527 priority patent/WO2022253125A1/en
Publication of CN115437835A publication Critical patent/CN115437835A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the invention provides a data recovery method, data recovery equipment and a storage medium, and belongs to the field of communication. The method comprises the following steps: acquiring backed-up configuration data of a network element to be restored and a first check code generated when the backed-up configuration data is backed up; generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data; and if the first check code is the same as the second check code, sending the second check code and the backed-up configuration data to the network element to be restored so that the network element to be restored can generate a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, performing data restoration according to the backed-up configuration data. The backed-up configuration data of the network element to be restored and the received backed-up configuration data are verified through the verification code, so that the backed-up configuration data of which the data are tampered or lost can be prevented from being used as the restoration data of the network element, and the safety of restoring the network element data is improved.

Description

Data recovery method, device and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a data recovery method, device, and storage medium.
Background
At present, a network management device manages a large number of network elements, the function of backing up and recovering network element configuration data is an important function required by network element management and daily maintenance work, and the network management device automatically backs up the configuration data of the network elements at regular time or manually by a user and stores the configuration data in a classified manner according to information such as backup time, network element identification and the like. When a certain network element has data abnormity and other problems, historical backup data which is backed up to the network management equipment by using the network element is restored to the network element, so that the network element is restored to normal operation.
As telecom operators and equipment vendors attach more and more importance to the security factor, the existing backup recovery mechanism needs to be strengthened in terms of security. That is, when uploading and downloading backup data files, due to network security factors, the backup data may be tampered by an attacker in the transmission process, or part of the data is lost due to network reasons, and the backup data files stored on the network management server may also be maliciously tampered by the attacker, or the file contents are changed by misoperation. If the modified configuration data is restored to the network element, the network element service will be seriously affected, which causes a bad effect. Therefore, it is an urgent problem to improve the security of the network element configuration data.
Disclosure of Invention
The embodiment of the invention provides a data recovery method, network management equipment and a storage medium, aiming at improving the safety of network element configuration data recovery.
In a first aspect, the present invention provides a data recovery method, including:
acquiring backed-up configuration data of a network element to be restored and a first check code generated when the backed-up configuration data is backed up;
generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data;
if the first check code is the same as the second check code, the second check code and the backed-up configuration data are sent to the network element to be restored, so that the network element to be restored generates a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, data restoration is performed according to the backed-up configuration data.
In a second aspect, an embodiment of the present invention further provides a data recovery method, including:
acquiring a data recovery instruction sent by network management equipment, wherein the data recovery instruction comprises a second check code;
downloading backed-up configuration data from the network management equipment according to the data recovery instruction;
generating a third check code according to the identification information of the network element and the downloaded backed-up configuration data;
and if the second check code is the same as the third check code, performing data recovery according to the downloaded backed-up configuration data.
In a third aspect, an embodiment of the present invention further provides a network management device, where the network management device includes a processor, a memory, a computer program stored on the memory and executable by the processor, and a data bus for implementing connection communication between the processor and the memory, where when the computer program is executed by the processor, the method implements any step of the data recovery method provided in this specification.
In a fourth aspect, an embodiment of the present invention further provides a storage medium for computer-readable storage, where the storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the steps of any method for configuring data by a network element as provided in the present specification.
The embodiment of the invention provides a data recovery method, network management equipment and a storage medium, and the embodiment of the invention obtains backed-up configuration data of a network element to be recovered and a first check code generated when the backed-up configuration data is backed up; then generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data; and if the first check code is the same as the second check code, sending the second check code and the backed-up configuration data to the network element to be restored so that the network element to be restored can generate a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, performing data restoration according to the backed-up configuration data. The backed-up configuration data of the network element to be recovered and the received backed-up configuration data are verified through the verification code, so that the backed-up configuration data of which the data is tampered or lost can be prevented from being used as the recovery data of the network element, and the safety of network element data recovery is improved.
Drawings
Fig. 1 is a schematic flowchart of a data recovery method according to an embodiment of the present invention;
FIG. 2 is a flow diagram illustrating sub-steps of the data recovery method of FIG. 1;
fig. 3 is a schematic flow chart of another data recovery method according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of another data recovery method according to an embodiment of the present invention;
fig. 5 is a schematic block diagram of a structure of a network management device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The flowcharts shown in the figures are illustrative only and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The embodiment of the invention provides a data recovery method, network management equipment and a storage medium. The data recovery method can be applied to network management equipment, wherein the network management equipment can be a server, a notebook computer, a desktop computer, a personal digital assistant and the like.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flowchart illustrating a data recovery method according to an embodiment of the present invention.
As shown in fig. 1, the data recovery method includes steps S101 to S103.
Step S101, obtaining the backed-up configuration data of the network element to be restored and a first check code generated when the backed-up configuration data is backed up.
The network element is a device managed by a network management device, for example, the network element may be a base station, a router, a switch, a server, and the like, the network management device may receive configuration data of the network element and backup and store the configuration data, and the network management device may further send the configuration data to the network element.
In an embodiment, a status identifier of each network element is obtained, the status identifier information includes a first identifier or a second identifier, the first identifier is used for indicating that the network element is in a fault state, and the second identifier is used for indicating that the status of the network element is in a normal state; and determining the network element corresponding to the first identifier as the network element to be restored, and acquiring the backed-up configuration data of the network element to be restored from the backup database. Wherein the first identifier may be a high level signal and the second identifier may be a low level signal. By obtaining the status identifier of each network element, when the network element is in a failure state, the backed-up configuration data of the network element to be restored (the network element in the failure state) can be automatically obtained from the backup database.
Illustratively, the network management device obtains status identification information of the network element 1, the network element 2, the network element 3, the network element 4, the network element 5, the network element 6, the network element 7, the network element 8, the network element 9, and the network element 10, where the status identification information of the network element 1 is second identification information, the status identification information of the network element 2 is first identification information, the status identification information of the network element 3 is second identification information, the status identification information of the network element 4 is second identification information, the status identification information of the network element 5 is second identification information, the status identification information of the network element 6 is second identification information, the status identification information of the network element 7 is first identification information, the status identification information of the network element 8 is second identification information, the status identification information of the network element 9 is second identification information, and the status identification information of the network element 10 is second identification information, then the network element 2 and the network element 7 are in a fault state, and the network element 2 and the network element 7 are determined to be recovered.
In an embodiment, the manner of obtaining the backed-up configuration data of the network element to be restored from the backup database may be: acquiring the backed-up time length of each backed-up configuration data of a network element to be restored in a backup database; and obtaining the backed-up configuration data with the shortest backed-up time length from the backup database. The backed-up configuration data with the shortest backed-up time duration is used as the recovery data of the network element to be recovered, so that the data loss can be reduced, and the security of the configuration data can be improved.
Illustratively, the configuration data backed up by the network element to be restored in the backup database includes backed-up configuration data a, backed-up configuration data B, backed-up configuration data C, backed-up configuration data D, and backed-up configuration data E, where the backup distance of the backed-up configuration data a is 5 days, the backup distance of the backed-up configuration data B is 8 days, the backup distance of the backed-up configuration data C is 10 days, the backup distance of the backed-up configuration data 12 is 5 days, the backup distance of the backed-up configuration data E is 15 days, the backup time of the backed-up configuration data a is determined to be the shortest according to the backup time of each backed-up configuration data, and the backed-up configuration data a is used as the restoration configuration data of the network element to be restored.
In an embodiment, the manner of obtaining the backed-up configuration data of the network element to be restored from the backup database may be: acquiring all backed-up configuration data of a network element to be restored from a backup database; any one backed-up configuration data is selected from all backed-up configuration data. Illustratively, the network element to be restored includes backed-up configuration data 1, backed-up configuration data 2, backed-up configuration data 3, backed-up configuration data 4, and backed-up configuration data 5, and the backed-up configuration data 3 is used as the restoration configuration data of the network element to be restored.
In an embodiment, the manner of obtaining the backed-up configuration data of the network element to be restored may be: displaying a network element recovery page, wherein the network element recovery page comprises identification information of a network element to be recovered in a fault state; acquiring selected identification information of a user in a network element recovery page, and displaying a backed-up configuration data list of a network element to be recovered corresponding to the selected identification information; and acquiring a file identifier selected by a user in the backed-up configuration data list, and acquiring backed-up configuration data corresponding to the file identifier from a backup database. The identification information and the file identification of the network element to be recovered may be set according to an actual situation, which is not specifically limited in the embodiment of the present application, for example, the identification information of the network element to be recovered may be an IP address of the network element to be recovered, and the file identification may be a file name. By providing the network element recovery page, the user can quickly select the network element to be recovered in the fault state and the backed-up configuration data of the network element to be recovered through the network element recovery page.
Exemplarily, the identification information of the network element to be restored is displayed on the display network element restoration page, the identification information is an IP address of the network element to be restored, the IP address of the network element to be restored selected by the user is obtained, a backed-up configuration data list corresponding to the IP address is queried from the backup database, the backed-up configuration data list includes a file 1, a file 2, a file 3, a file 4 and a file 5, the file identification selected by the user in the backed-up configuration data list is obtained as the file 4, the backed-up configuration data corresponding to the file 4 is obtained from the backup database, and the backed-up configuration data is used as the restoration configuration data of the network element to be restored. The page restored by the display network element may be displayed on a display screen set on the network management device or a display set independently of the network management device, the display independent of the network management device may include a mobile phone, a tablet computer, a personal computer, and the like, and the display screen includes an LED display screen, an OLED display screen, an LCD display screen, and the like.
In an embodiment, a first check code generated when backed up configuration data is obtained, where the first check code is generated according to identification information of a network element to be restored and the configuration data to be backed up.
Step S102, generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data.
The identification information includes at least one of a device serial number and a Mac Address (Media Access Control Address) of the network element to be recovered, and may also include other information, which is not specifically limited in this embodiment of the present application.
In one embodiment, as shown in fig. 2, step S102 includes substeps 1021 through step S1022.
And a substep S1021, splicing the identification information of the network element to be restored and the backed-up configuration data to obtain spliced configuration data.
The identification information of the network element to be restored and the backed-up configuration data are spliced to obtain spliced configuration data, where the splicing mode may be set according to an actual situation, and this is not specifically limited in this embodiment of the application, for example, the identification information is spliced behind the backed-up configuration data, or the backed-up configuration data is spliced behind the previous identification information.
Illustratively, the identification information of the network element to be restored is 12345QA, the backed-up configuration data is 789456QWER, and the identification information is spliced before the backed-up configuration data, so as to obtain spliced configuration data which is 12345QA789456QWER.
Illustratively, the identification information of the network element to be restored is 12345QA, the backed-up configuration data is 789456QWER, and the spliced configuration data is 789456QWER12345QA, which is obtained by splicing the backed-up configuration data before the identification information.
And a substep S1022, generating the second check code based on a preset check code generation algorithm and the spliced configuration data.
The preset Check code generation Algorithm is a preset Check code generation Algorithm, and the Check code generation Algorithm includes an information Digest Algorithm (MD 5 Message-Digest Algorithm, MD 5), a Secure Hash Algorithm1 (SHA-1), a Cyclic Redundancy Check (Cyclic Redundancy Check 32, crc 32), and certainly may be other Check code generation algorithms, which is not specifically limited in this application.
Illustratively, the spliced configuration data is operated through a preset check code generation algorithm to obtain a second check code. For example, the spliced configuration data is 789456QWER12345QA, and the spliced configuration data 789456QWER12345QA is calculated by a preset check code generation algorithm, so that the obtained second check code is 741QAZ.
Step S103, if the first check code is the same as the second check code, sending the second check code and the backed-up configuration data to the to-be-restored network element, so that the to-be-restored network element generates a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, performing data restoration according to the backed-up configuration data.
And determining whether the first check code and the second check code are the same, and if the first check code and the second check code are the same, determining that the backed-up configuration data is not tampered or has no data loss when stored in the network management equipment, wherein the backed-up configuration data is valid configuration data. By determining whether the first check code and the second check code are the same, whether the storage of the backed-up configuration data in the network management equipment is tampered or the data is lost can be further determined, and the accuracy of restoring the network element configuration data is improved.
In an embodiment, if the first check code and the second check code are different, it is determined that the backed-up configuration data is tampered or has data lost when stored in the network management device, and the backed-up configuration data is invalid configuration data, the backed-up configuration data is discarded, so as to prevent transmission of erroneous configuration data to the network element to be restored, and improve security and accuracy of restoration of the network element configuration data.
In an embodiment, when it is determined that the first check code and the second check code are the same, a data recovery instruction is sent to the to-be-recovered network element, where the data recovery instruction includes the second check code, a File Transfer Protocol (FTP) address or a File encryption Transfer Protocol (SFTP) address, a user name, a password, and a File storage location of backed-up configuration data, and the to-be-recovered network element finds the network management device according to the FTP address or the SFTP address, accesses the network management device through the user name and the password, and finds and downloads the backed-up configuration data according to the File storage location of the backed-up configuration data. The method for sending the data recovery instruction to the Network element to be recovered may be selected according to an actual situation, which is not specifically limited in this application, for example, the method for sending the data recovery instruction may be sent by a Simple Network Management Protocol (SNMP) or a Network configuration Protocol (NETCONF).
In an embodiment, when the to-be-restored network element receives the backed-up configuration data, a third check code is generated according to the received backed-up configuration data and the identification information of the to-be-restored network element, if the third check code is different from the second check code, it is determined that the received backed-up configuration data is tampered with or lost in the transmission process, the received backed-up configuration data is discarded, and if the third check code is the same as the second check code, it is determined that the received backed-up configuration data is valid configuration data, and data restoration is performed according to the backed-up configuration data. And determining whether the received backed-up configuration data is valid configuration data or not through the check code, if the backed-up configuration data is valid configuration data, performing data recovery according to the backed-up configuration data, and otherwise, discarding the backed-up configuration data, so that the safety and the accuracy of recovering the configuration data by the network element to be recovered are improved.
In an embodiment, the manner of generating the third check code according to the received backed-up configuration data and the identification information of the network element to be restored may be: and splicing the received backed-up configuration data and the identification information of the network element to be restored to obtain spliced backed-up configuration data, and generating a third check code based on a preset check code generation algorithm and the spliced backed-up configuration data. And calculating the spliced backed-up configuration data through a preset check code generation algorithm, so that a third check code can be accurately obtained.
In an embodiment, as shown in fig. 3, the data recovery method further includes steps S104 to S106.
Step S104, obtaining the configuration data to be backed up and a fourth check code sent by the network element to be backed up, wherein the fourth check code is generated by the network element to be backed up according to the configuration data to be backed up stored in the network element to be backed up and the identification information of the network element to be backed up.
The network management equipment sends a data backup instruction to the network element to be backed up, wherein the data backup instruction comprises an FTP (file transfer protocol) address or an SFTP (file transfer protocol) address, a user name and a password, and after the network element to be backed up receives the data backup instruction, a fourth check code is generated according to the configuration data to be backed up and the identification information of the network element, which are stored in the network element to be backed up. And the network element to be backed up finds the network management equipment according to the FTP address or the SFTP address, accesses the network management equipment according to the user name and the password, sends the configuration data to be backed up to the network management equipment, and sends the fourth check code to the network management equipment, wherein the sending of the data backup instruction and the sending of the fourth check code can be sent in an SNMP or NETCONF mode.
In an embodiment, the manner of generating the fourth check code according to the configuration data to be backed up and the identification information of the network element stored in the fourth check code may be: the configuration data to be backed up and the identification information of the network element, which are stored in the network element, are spliced to obtain spliced configuration data to be backed up, a fourth check code is generated based on a preset check code generation algorithm and the spliced configuration data to be backed up, and the spliced configuration data to be backed up is operated through the preset check code generation algorithm, so that the fourth check code can be accurately obtained.
In an embodiment, the configuration data to be backed up and the fourth check code sent by the network element to be backed up are received, so that the configuration data to be backed up and the fourth check code are obtained.
Step S105, generating a fifth check code according to the acquired configuration data to be backed up and the identification information of the network element to be backed up.
The acquired configuration data to be backed up and the identification information of the network element to be backed up are spliced to obtain spliced configuration data to be backed up, and a fifth check code is generated based on a preset check code generation algorithm and the spliced configuration data to be backed up, wherein the preset check code generation algorithm comprises at least one of MD5, SHA-1 and CRC32, and the acquired configuration data to be backed up is operated through the preset check code generation algorithm, so that the fifth check code can be accurately obtained.
Step S106, when the fourth check code is the same as the fifth check code, storing the configuration data to be backed up and the fifth check code to complete the backup of the configuration data of the network element to be backed up.
And determining whether the fourth check code is the same as the fifth check code, if the fourth check code is not the same as the fifth check code, determining that the configuration data to be backed up is tampered or has data loss in the transmission process, and discarding the acquired configuration data to be backed up. And if the fourth check code is the same as the fifth check code, determining that the data to be backed up is not subjected to tampering and data loss of the configuration data in the transmission process, and storing the configuration data to be backed up and the fifth check code to complete the backup of the configuration data of the network element to be backed up, wherein the configuration data to be backed up is valid data. And determining whether the fourth check code is the same as the fifth check code, and further determining whether the configuration data to be backed up is tampered or data is lost in the transmission process, so that the safety of the network element backup configuration data is improved.
In the data recovery method in the above embodiment, the backed-up configuration data of the network element to be recovered and the first check code generated when the backed-up configuration data is backed up are obtained; then generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data; and if the first check code is the same as the second check code, sending the second check code and the backed-up configuration data to the network element to be restored so that the network element to be restored can generate a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, performing data restoration according to the backed-up configuration data. The backed-up configuration data of the network element to be restored and the received backed-up configuration data are verified through the verification code, so that the backed-up configuration data of which the data are tampered or lost can be prevented from being used as the restoration data of the network element, and the safety of restoring the network element data is improved.
Referring to fig. 4, fig. 4 is a flowchart illustrating another data recovery method according to an embodiment of the present invention.
As shown in fig. 4, the method includes steps S201 to S204.
Step S201, obtaining a data recovery instruction sent by the network management device, where the data recovery instruction includes the second check code.
And receiving a data recovery instruction sent by the network management device, wherein the data recovery instruction comprises a second check code, a File Transfer Protocol (FTP) address or a File encryption Transfer Protocol (SFTP) address, a user name, a password and a File storage location of the backed-up configuration data.
And step S202, downloading the backed-up configuration data from the network management equipment according to the data recovery instruction.
In one embodiment, a file storage location of backed-up configuration data to be downloaded is obtained from a data recovery instruction; and downloading corresponding backed-up configuration data from the network management equipment according to the file storage position.
Illustratively, the network management device is found according to the FTP address or the SFTP address in the data recovery instruction, the network management device is accessed through the username and the password, and the corresponding backed-up configuration data is found and downloaded according to the file storage location of the backed-up configuration data.
Step S203, generating a third check code according to the identification information of the network element and the downloaded backed-up configuration data.
And splicing the identification information of the network element and the downloaded backed-up configuration data to obtain spliced backed-up configuration data, and generating a third check code based on a preset check code generation algorithm and the spliced backed-up configuration data. And calculating the spliced backed-up configuration data through a preset check code generation algorithm, so that a third check code can be accurately obtained.
And step S204, if the second check code is the same as the third check code, performing data recovery according to the downloaded backed-up configuration data.
And determining whether the second check code is the same as the third check code, if the third check code is different from the second check code, determining that stored data of the downloaded backed-up configuration data is tampered or data is lost in the transmission process, discarding the downloaded backed-up configuration data, and if the third check code is the same as the second check code, determining that the downloaded backed-up configuration data is valid configuration data, and performing data recovery according to the backed-up configuration data. And determining whether the downloaded backed-up configuration data is valid configuration data or not through the check code, if so, performing data recovery according to the backed-up configuration data, otherwise, discarding the backed-up configuration data, thereby improving the safety and accuracy of recovering the configuration data of the network element to be recovered.
It should be noted that, the data splicing sequence is the same, for example, the splicing mode after the data splicing identification information is configured, or the splicing mode before the data splicing identification information is configured, and all the check code generation algorithms are the same, for example, the check code generation algorithm is CRC32, and the generated check codes are the same by setting the data splicing sequence to be the same and the check code generation algorithm to be the same.
In the data recovery method in the above embodiment, a data recovery instruction sent by the network management device is obtained, where the data recovery instruction includes a second check code; downloading backed-up configuration data from the network management equipment according to a data recovery instruction; generating a third check code according to the identification information of the network element and the downloaded backed-up configuration data; and if the second check code is the same as the third check code, performing data recovery according to the downloaded backed-up configuration data. The downloaded backed-up configuration data is verified through the verification code, the backed-up configuration data which is tampered or lost can be prevented from being used as recovery data of the network element, and the safety of network element data recovery is improved.
Referring to fig. 5, fig. 5 is a schematic block diagram of a network management device according to an embodiment of the present invention.
As shown in fig. 5, the network management device 300 includes a processor 301 and a memory 302, and the processor 301 and the memory 302 are connected by a bus 303, such as an I2C (Inter-integrated Circuit) bus.
In particular, processor 301 is configured to provide computational and control capabilities to support the operation of the overall network management device. The Processor 301 may be a Central Processing Unit (CPU), and the Processor 301 may also be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Specifically, the Memory 302 may be a Flash chip, a Read-Only Memory (ROM) magnetic disk, an optical disk, a usb disk, or a removable hard disk.
It will be understood by those skilled in the art that the architecture shown in fig. 5 is a block diagram of only a portion of the architecture associated with the inventive arrangements, and does not constitute a limitation on the network management devices to which the inventive arrangements are applied, and that a particular server may include more or less components than shown, or combine certain components, or have a different arrangement of components.
The processor is configured to run a computer program stored in the memory, and when executing the computer program, implement any one of the data recovery methods provided by the embodiments of the present invention.
In one embodiment, the processor is configured to execute a computer program stored in the memory, and when executing the computer program, to perform the steps of:
acquiring backed-up configuration data of a network element to be restored and a first check code generated when the backed-up configuration data is backed up;
generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data;
if the first check code is the same as the second check code, sending the second check code and the backed-up configuration data to the to-be-restored network element so that the to-be-restored network element generates a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, performing data restoration according to the backed-up configuration data.
In an embodiment, when implementing the acquiring of the backed-up configuration data of the network element to be restored, the processor is configured to implement:
acquiring a state identifier of each network element, wherein the state identifier information comprises a first identifier or a second identifier, the first identifier is used for indicating that the network element is in a fault state, and the second identifier is used for indicating that the state of the network element is in a normal state;
and determining the network element corresponding to the state identifier as the first identifier as a network element to be restored, and acquiring backed-up configuration data of the network element to be restored from a backup database.
In an embodiment, when the processor obtains the backed-up configuration data of the network element to be restored from the backup database, the processor is configured to:
acquiring the backed-up time length of each backed-up configuration data of the network element to be restored in the backup database;
and acquiring the backed-up configuration data with the shortest backed-up time length from the backup database.
In an embodiment, when implementing the acquiring of the backed-up configuration data of the network element to be restored, the processor is configured to implement:
displaying a network element recovery page, wherein the network element recovery page comprises identification information of a network element to be recovered in a fault state;
acquiring selected identification information of a user in the network element recovery page, and displaying a backed-up configuration data list of the network element to be recovered corresponding to the selected identification information;
and acquiring a file identifier selected by a user in the backed-up configuration data list, and acquiring backed-up configuration data corresponding to the file identifier from a backup database.
In an embodiment, when the processor generates the second check code according to the identification information of the network element to be restored and the backed-up configuration data, the processor is configured to implement:
splicing the identification information of the network element to be restored and the backed-up configuration data to obtain spliced configuration data;
and generating the second check code based on a preset check code generation algorithm and the spliced configuration data.
In an embodiment, the processor in an implementation is further configured to implement:
acquiring configuration data to be backed up and a fourth check code sent by a network element to be backed up, wherein the fourth check code is generated by the network element to be backed up according to the configuration data to be backed up and identification information of the network element to be backed up, which are stored by the network element to be backed up;
generating a fifth check code according to the acquired configuration data to be backed up and the identification information of the network element to be backed up;
and when the fourth check code is the same as the fifth check code, storing the configuration data to be backed up and the fifth check code to complete the backup of the configuration data of the network element to be backed up.
It should be noted that, as will be clearly understood by those skilled in the art, for convenience and brevity of description, the specific working process of the network management device described above may refer to the corresponding process in the foregoing data recovery method embodiment, and details are not described herein again.
Embodiments of the present invention also provide a storage medium for a computer-readable storage, where the storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the steps of any data recovery method provided in this specification.
The storage medium may be an internal storage unit of the network management device described in the foregoing embodiment, for example, a hard disk or a memory of the network management device. The storage medium may also be an external storage device of the network management device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the network management device.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, or suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
It should be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or system comprising the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments. While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for data recovery, comprising:
acquiring backed-up configuration data of a network element to be restored and a first check code generated when the backed-up configuration data is backed up;
generating a second check code according to the identification information of the network element to be restored and the backed-up configuration data;
if the first check code is the same as the second check code, the second check code and the backed-up configuration data are sent to the network element to be restored, so that the network element to be restored generates a third check code based on the received backed-up configuration data and the identification information, and if the third check code is the same as the second check code, data restoration is performed according to the backed-up configuration data.
2. The method for recovering data according to claim 1, wherein the obtaining the backed-up configuration data of the network element to be recovered comprises:
acquiring a state identifier of each network element, wherein the state identifier information comprises a first identifier or a second identifier, the first identifier is used for indicating that the network element is in a fault state, and the second identifier is used for indicating that the state of the network element is in a normal state;
and determining the network element corresponding to the state identifier as the first identifier as a network element to be restored, and acquiring backed-up configuration data of the network element to be restored from a backup database.
3. The data recovery method according to claim 2, wherein the obtaining the backed-up configuration data of the network element to be recovered from the backup database comprises:
acquiring the backed-up time length of each backed-up configuration data of the network element to be restored in the backup database;
and acquiring the backed-up configuration data with the shortest backed-up time length from the backup database.
4. The method for recovering data according to claim 1, wherein the obtaining the backed-up configuration data of the network element to be recovered comprises:
displaying a network element recovery page, wherein the network element recovery page comprises identification information of a network element to be recovered in a fault state;
acquiring selected identification information of a user in the network element recovery page, and displaying a backed-up configuration data list of the network element to be recovered corresponding to the selected identification information;
and acquiring a file identifier selected by a user in the backed-up configuration data list, and acquiring backed-up configuration data corresponding to the file identifier from a backup database.
5. The data recovery method of claim 1, wherein the generating a second check code according to the identification information of the network element to be recovered and the backed-up configuration data comprises:
splicing the identification information of the network element to be restored and the backed-up configuration data to obtain spliced configuration data;
and generating the second check code based on a preset check code generation algorithm and the spliced configuration data.
6. The data recovery method of any one of claims 1-5, wherein the method further comprises:
acquiring configuration data to be backed up and a fourth check code sent by a network element to be backed up, wherein the fourth check code is generated by the network element to be backed up according to the configuration data to be backed up and identification information of the network element to be backed up, which are stored by the network element to be backed up;
generating a fifth check code according to the acquired configuration data to be backed up and the identification information of the network element to be backed up;
and when the fourth check code is the same as the fifth check code, storing the configuration data to be backed up and the fifth check code to complete the backup of the configuration data of the network element to be backed up.
7. A method for data recovery, comprising:
acquiring a data recovery instruction sent by network management equipment, wherein the data recovery instruction comprises a second check code;
downloading backed-up configuration data from the network management equipment according to the data recovery instruction;
generating a third check code according to the identification information of the network element and the downloaded backed-up configuration data;
and if the second check code is the same as the third check code, performing data recovery according to the downloaded backed-up configuration data.
8. The data recovery method of claim 7, wherein the downloading the backed-up configuration data from the network management device according to the data recovery instruction comprises:
acquiring a file storage position of the backed-up configuration data to be downloaded from the data recovery instruction;
and downloading corresponding backed-up configuration data from the network management equipment according to the file storage position.
9. A network management device comprising a processor, a memory, a computer program stored on the memory and executable by the processor, and a data bus for implementing a connection communication between the processor and the memory, wherein the computer program, when executed by the processor, implements the steps of the data recovery method of any one of claims 1 to 6.
10. A storage medium for computer readable storage, wherein the storage medium stores one or more programs, the one or more programs being executable by one or more processors to perform the steps of the data recovery method of any of claims 1 to 8.
CN202110626936.5A 2021-06-04 2021-06-04 Data recovery method, device and storage medium Pending CN115437835A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110626936.5A CN115437835A (en) 2021-06-04 2021-06-04 Data recovery method, device and storage medium
PCT/CN2022/095527 WO2022253125A1 (en) 2021-06-04 2022-05-27 Data recovery method and device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110626936.5A CN115437835A (en) 2021-06-04 2021-06-04 Data recovery method, device and storage medium

Publications (1)

Publication Number Publication Date
CN115437835A true CN115437835A (en) 2022-12-06

Family

ID=84271660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110626936.5A Pending CN115437835A (en) 2021-06-04 2021-06-04 Data recovery method, device and storage medium

Country Status (2)

Country Link
CN (1) CN115437835A (en)
WO (1) WO2022253125A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1815974A (en) * 2005-02-06 2006-08-09 华为技术有限公司 Method and system for duplicating and recovering network element configuration data
CN101202644A (en) * 2006-12-15 2008-06-18 中兴通讯股份有限公司 Data backup and recovery method
US20150100819A1 (en) * 2013-10-03 2015-04-09 Andrey Fedorov Method of Recovering Data in a Storage Device
CN107133120A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of calibration of file data, device
CN111984465A (en) * 2020-07-28 2020-11-24 北京人大金仓信息技术股份有限公司 Database remote backup method, device, medium and electronic equipment

Also Published As

Publication number Publication date
WO2022253125A1 (en) 2022-12-08

Similar Documents

Publication Publication Date Title
CN110737658B (en) Data fragment storage method, device, terminal and readable storage medium
JP5989807B2 (en) Software installation method, device and system
US9984255B2 (en) Methods and apparatus to enable runtime checksum verification of block device images
CN105138347A (en) Difference upgrade patch generating method, software upgrading method and corresponding apparatus
CN112035472B (en) Data processing method, device, computer equipment and storage medium
CN110058867B (en) Application program mirror image packaging and installing method, computer device and storage medium
AU2010353673A1 (en) Managing method, device and terminal for application program
CN111258756B (en) Load balancing method, device, computer equipment and readable storage medium
CN105981332A (en) Broadcasting management information using fountain codes
CN111654522B (en) File synchronization method, file synchronization server and storage medium
US20230095143A1 (en) Method for Performing Secure Boot Based on Redundant Cryptographic Algorithm and Device
US20160065375A1 (en) Dynamic integrity validation of a high level operating system
US11269540B2 (en) Method, apparatus, and computer program product for managing application system
CN105550071A (en) System file upgrading and detecting method and communication device
CN113961226B (en) Software development kit repairing method, terminal, server and equipment
CN111176685A (en) Upgrading method and device
CN112131041A (en) Method, apparatus and computer program product for managing data placement
CN111818087B (en) Block chain node access method, device, equipment and readable storage medium
CN113031997A (en) Upgrade package generation and management method and device, computer equipment and storage medium
CN115437835A (en) Data recovery method, device and storage medium
CN112866195B (en) Agile data transmission method and device, computer equipment and storage medium
CN112637160A (en) Login verification method, device, equipment and storage medium
CN107797800B (en) Data processing method for multiple associated service systems, electronic device and medium
EP3079093B1 (en) Methods and apparatus to enable runtime checksum verification of block device images
CN115460271B (en) Network control method and device based on edge calculation and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination