CN116301668A - CDP-based data storage system and method - Google Patents

CDP-based data storage system and method Download PDF

Info

Publication number
CN116301668A
CN116301668A CN202310593509.0A CN202310593509A CN116301668A CN 116301668 A CN116301668 A CN 116301668A CN 202310593509 A CN202310593509 A CN 202310593509A CN 116301668 A CN116301668 A CN 116301668A
Authority
CN
China
Prior art keywords
data
cdp
unit
target
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310593509.0A
Other languages
Chinese (zh)
Other versions
CN116301668B (en
Inventor
石建磊
王彩燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhiqu Technology Co ltd
Original Assignee
Beijing Zhiqu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhiqu Technology Co ltd filed Critical Beijing Zhiqu Technology Co ltd
Priority to CN202310593509.0A priority Critical patent/CN116301668B/en
Publication of CN116301668A publication Critical patent/CN116301668A/en
Application granted granted Critical
Publication of CN116301668B publication Critical patent/CN116301668B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0604Improving or facilitating administration, e.g. storage management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a CDP-based data storage system and a CDP-based data storage method, which belong to the technical field of data storage, realize bidirectional data backup, recover data of any version at any time, and acquire data of a corresponding version from a CDP backup center when client data is damaged, so that effective data backup is realized, the data is easier to recover, and network security protection is also performed when the data is recovered from the CDP backup center, thereby realizing safe data storage.

Description

CDP-based data storage system and method
Technical Field
The invention belongs to the technical field of data storage, and particularly relates to a CDP-based data storage system and method.
Background
At present, with the rapid development of computers and networks, data are closely related to artificial life and work, data security is becoming more and more important, existing data storage often adopts a method of storing the data in a local hard disk or manually backing up and storing the data at intervals, and the data stored in the local hard disk often cannot be recovered after viruses in the computer are adopted. By adopting the manual backup storage method, the defect that some data cannot be backed up and stored in real time exists, and the data which cannot be backed up after viruses in a computer cannot be recovered.
Disclosure of Invention
The invention provides a CDP-based data storage system and a CDP-based data storage method, which are used for solving the problems in the prior art.
In a first aspect, the present invention provides a CDP-based data storage system, including a CDP proxy module, a CDP backup center, a CDP restoration center, and a security protection center, where the CDP proxy module is disposed on a client;
the CDP proxy module is used for configuring a data area to be protected on the client and protecting data in the data area;
the CDP backup center is used for carrying out secondary backup on a data area to be protected on the client so as to realize bidirectional data backup of data;
the CDP recovery center is used for acquiring target version data corresponding to the data recovery request from the CDP backup center according to the data recovery request of the client and transmitting the target version data to the client;
the safety protection center is used for carrying out network safety protection when the CDP proxy module backs up the data of each version to the CDP backup center or the CDP recovery center responds to the data recovery request of the client.
Further, the CDP proxy module comprises a first configuration management unit, a file interception unit, a first inverse operation acquisition unit and a first delta data acquisition unit;
The first configuration management unit is configured to configure a data area to be protected on the client and an IP address of the CDP backup center, and send a data protection request to the CDP backup center according to the IP address of the CDP backup center, where the data protection request includes the data area to be protected on the client;
the file interception unit is used for intercepting data operation, target data before the operation and target data after the operation in a data area to be protected by the client, and synchronizing the data operation, the target data before the operation and the target data after the operation to the CDP backup center;
the first inverse operation obtaining unit is used for obtaining the inverse operation of the data operation when the data operation is not the writing operation, generating a version number of the target data, and storing the inverse operation and the version number in association with the target data after the operation;
the first delta data obtaining unit is used for determining that the inverse operation of the data operation is a deleting operation when the data operation is a writing operation, obtaining the first delta data according to the target data before the operation and the target data after the operation, generating a version number of the target data, and storing the deleting operation, the first delta data and the version number in association with the target data after the operation.
Further, the obtaining the first delta data according to the target data before the operation and the target data after the operation includes:
partitioning target data before operation in a fixed-length partitioning or unequal-length partitioning mode to obtain N first data blocks, and sequentially numbering the first data blocks;
partitioning the target data after the operation in a fixed-length partitioning or unequal-length partitioning mode to obtain N second data blocks, and sequentially numbering the second data blocks, wherein each first data block corresponds to one second data block;
acquiring a first weak check value and a first MD5 check value corresponding to a first data block, and acquiring a second weak check value and a second MD5 check value corresponding to a second data block;
judging whether the first weak check value of the first data block is the same as the second weak check value of the second data block corresponding to the first data block, if so, entering an MD5 check flow, otherwise, taking the second data block as first differential data;
judging whether a first MD5 check value of a first data block is identical to a second MD5 check value of a second data block corresponding to the first data block, if so, the two data blocks are identical, otherwise, the second data block is used as first differential data;
All the first data blocks and the second data blocks are traversed to acquire first delta data between target data before operation and target data after operation.
Further, the CDP backup center includes a second configuration management unit, an operation synchronization unit, a second delta data acquisition unit, a second inverse operation acquisition unit, a storage unit, and a version management unit;
the second configuration management unit is used for receiving the data protection request sent by the first configuration management unit and establishing connection between the CDP proxy module and the CDP backup center according to the data area to be protected on the client side in the data protection request;
the operation synchronization unit is used for receiving the data operation transmitted by the file interception unit, the target data before the operation and the target data after the operation;
the second delta data obtaining unit is used for determining that the inverse operation of the data operation is a deleting operation when the data operation is a writing operation, obtaining second delta data according to target data before the operation and target data after the operation, generating a version number of the target data, and storing the deleting operation, the second delta data and the version number in a storage unit in association with the target data after the operation;
The second inverse operation obtaining unit is configured to obtain an inverse operation of the data operation when the data operation is not a write operation, generate a version number of the target data, and store the inverse operation and the version number in association with the target data after the operation in the storage unit;
the storage unit is used for storing the data generated by the second differential data acquisition unit and the second inverse operation acquisition unit;
and the version management unit is used for judging whether the version number generated by the CDP proxy module is the same as the version number stored in the storage unit in the current backup, if so, ending the data backup, otherwise, synchronizing the version number.
Further, the CDP recovery center comprises a request receiving unit, a request checking unit and a data recovery unit;
the request receiving unit is used for receiving a data recovery request transmitted by a client, wherein the data recovery request comprises a target version number of data to be recovered and a current version number of the data to be recovered;
the request checking unit is used for acquiring current data corresponding to the current version number, inverse operation between the target version number and the current version number and first delta data from the client, acquiring the current data corresponding to the current version number, inverse operation between the target version number and the current version number and second delta data from the storage unit, judging whether the inverse operation acquired from the client, the inverse operation acquired from the first delta data and the inverse operation acquired from the storage unit and the second delta data are the same, if yes, generating a checking result to be checked, scheduling the data recovery unit to recover the data, otherwise, generating a checking result to be checked, and scheduling the data recovery unit to recover the data;
The data recovery unit is used for directly and remotely scheduling the current data in the client, the inverse operation between the target version number and the current version number and the first delta data when the verification result is that the verification is passed, and carrying out data recovery; and when the verification result is that the verification fails, directly and remotely scheduling the current data, the inverse operation between the target version number and the current version number and the second delta data in the storage unit, and carrying out data recovery.
Further, the safety protection center comprises a safety protection model training unit and a network safety protection unit;
the safety protection model training unit is used for acquiring historical flow data and abnormal recognition results corresponding to the historical flow data, wherein the historical flow data and the abnormal recognition results corresponding to the historical flow data are prestored data, constructing a safety protection model by adopting a convolutional neural network, and training the safety protection model by adopting the historical flow data and the abnormal recognition results corresponding to the historical flow data to obtain a trained safety protection model;
the network safety protection unit is used for carrying out abnormal identification on the flow characteristics by adopting a trained safety protection model when the CDP agent module backs up the data of each version to the CDP backup center or the CDP recovery center responds to the data recovery request of the client, so as to obtain an abnormal identification result corresponding to the flow characteristics.
Further, training the safety protection model by adopting historical flow data and an abnormal recognition result corresponding to the historical flow data to obtain a trained safety protection model, including:
initializing network parameters of a safety protection model by adopting a chaos sequence strategy to obtain parameter individuals, and obtaining a plurality of parameter individuals;
taking the data normalized by the historical flow data as input data of a safety protection model, acquiring actual output data of the safety protection model, and taking an abnormal recognition result corresponding to the historical flow data as expected output data to acquire an adaptability value of each parameter individual;
taking the parameter individual with the maximum fitness value as the optimal individual, and carrying out global search on all the parameter individuals on the basis of the optimal individual to obtain the parameter individual after primary updating;
further carrying out local search on the parameter individuals after primary updating to obtain parameter individuals after secondary updating;
determining a final updated value of each parameter individual based on the parameter individual after primary updating and the parameter individual after secondary updating;
based on the parameter individuals updated by the final updated values, judging whether the fitness value of the parameter individuals is larger than a set threshold or the current updating times T is larger than the maximum updating times T, if so, taking the parameter individuals with the largest fitness value as final network parameters of the safety protection model to obtain the safety protection model after training, otherwise, entering the next training.
Further, the fitness value of each parameter individual is:
Figure SMS_1
wherein ,
Figure SMS_2
indicating fitness values, i=1, 2, …, I indicating parameter individual total number, p=1, 2, …, P indicating historical flow data total number, k=1, 2, …, K indicating safety protection model output total number; />
Figure SMS_3
Represents the kth actual output when the p-th historical flow data is input, < >>
Figure SMS_4
Represents the kth expected output when the p-th historical traffic data is input;
the global search is specifically:
Figure SMS_5
Figure SMS_6
Figure SMS_7
wherein ,
Figure SMS_9
indicating the update frequency of the ith parameter individual, < +.>
Figure SMS_11
Representing the upper limit of update frequency,/-, for>
Figure SMS_12
Representing the update frequency lower bound->
Figure SMS_14
Representing a random number between (0, 1); />
Figure SMS_16
Represents the update step size of the ith parameter individual at the time of the t-th training, and +.>
Figure SMS_18
Update after crossing boundary>
Figure SMS_21
;/>
Figure SMS_8
Representing the updated step size of the ith parameter individual at the time of t-1 training,
Figure SMS_10
representing inertial weights, ++>
Figure SMS_13
Represents the ith parameter individual of the t-1 th training,/th parameter individual of the t>
Figure SMS_15
Represents the best individual at training time t-1, < ->
Figure SMS_17
Indicating a preset maximum number of updates, < >>
Figure SMS_19
Representing updated->
Figure SMS_20
Further, the parameter individuals after the secondary updating are:
Figure SMS_22
wherein ,
Figure SMS_23
representing updated->
Figure SMS_24
,/>
Figure SMS_25
Represents update coefficients, and->
Figure SMS_26
Is [ -1,1]Constant between->
Figure SMS_27
Representation of Average loudness of all parameter individuals in the training, and +.>
Figure SMS_28
Represents a random number between (0, 1, ">
Figure SMS_29
Representing the pulse transmitting frequency corresponding to the ith parameter individual in the t-1 th training;
the final updated value for each parameter individual is:
Figure SMS_30
Figure SMS_31
Figure SMS_32
wherein ,
Figure SMS_34
representing the final updated value of the ith parameter individual in the current update,/for the current update>
Figure SMS_37
Indicating the loudness of the ith parameter individual at the time of the t-1 training, +.>
Figure SMS_41
Representing parameter individual->
Figure SMS_44
Is adapted to the value of->
Figure SMS_45
Representing the maximum fitness value corresponding to the parameter individual after the initial update,/for the parameter individual>
Figure SMS_46
Representing updated->
Figure SMS_47
Initial +.>
Figure SMS_33
0.95%>
Figure SMS_35
Represents the attenuation coefficient between (0, 1, ">
Figure SMS_36
Representing updated->
Figure SMS_38
,/>
Figure SMS_39
Greater than 0->
Figure SMS_40
Representing an increase factor>
Figure SMS_42
An initial pulse emission frequency representing the ith parameter individual, and +.>
Figure SMS_43
In a second aspect, the present invention provides a CDP-based data storage method, including:
establishing connection between the CDP proxy module and the CDP backup center, and completely backing up the data in the data area to be protected configured on the client side by the CDP proxy module to the CDP backup center;
when the CDP proxy module monitors that the data in the data area to be protected changes, the transformed version data is stored in the client, and meanwhile, the transformed version data in the CDP backup center is stored, so that bidirectional backup is realized;
When the CDP recovery center receives a data recovery request sent by a client, acquiring target version data corresponding to the data recovery request from the CDP backup center according to the data recovery request of the client, and transmitting the target version data to the client;
when the CDP proxy module backs up the data of each version to the CDP backup center, or the CDP recovery center responds to the data recovery request of the client, the network security protection is carried out through the security protection center.
The CDP-based data storage system and the CDP-based data storage method realize bidirectional data backup, can recover data of any version at any time, can acquire data of a corresponding version from a CDP backup center when client data is damaged, realize effective data backup, and can recover data more easily, and simultaneously realize network safety protection when the data is recovered from the CDP backup center, thereby realizing safe storage of the data.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic structural diagram of a CDP-based data storage system according to an embodiment of the present invention.
Fig. 2 is a flowchart of a CDP-based data storage method according to an embodiment of the present invention.
Specific embodiments of the present invention have been shown by way of the above drawings and will be described in more detail below. The drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but rather to illustrate the inventive concepts to those skilled in the art by reference to the specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the invention. Rather, they are merely examples of apparatus and methods consistent with aspects of the invention as detailed in the accompanying claims.
Embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Example 1
As shown in fig. 1, a CDP (Customer Data Platform, persistent data protection) -based data storage system includes a CDP proxy module, a CDP backup center, a CDP restore center, and a security protection center, where the CDP proxy module is disposed on a client.
The CDP proxy module is used for configuring a data area to be protected on the client and protecting the data in the data area.
Optionally, before the connection is established, account information may be applied to the CDP backup center by the CDP proxy module, and after the CDP backup center assigns a unique ID (identity) and a password to the client, the user may recover data from the CDP backup center according to the unique ID and the password even after the computer is damaged or has a virus in the computer. When the client corresponding to the user runs normally, the data can be recovered from the client, and the efficiency is improved.
And the CDP backup center is used for carrying out secondary backup on the data area to be protected on the client so as to realize bidirectional data backup of the data.
And the CDP recovery center is used for acquiring target version data corresponding to the data recovery request from the CDP backup center according to the data recovery request of the client and transmitting the target version data to the client.
Optionally, the CDP backup center may record account information of the user and associated data, and when the user logs into the account at other devices, the data may also be restored directly from the CDP backup center.
And the safety protection center is used for carrying out network safety protection when the CDP proxy module backs up the data of each version to the CDP backup center or the CDP recovery center responds to the data recovery request of the client.
For example, network security protection can be network intrusion detection to detect whether data interaction is abnormal, and when the data interaction is abnormal, an abnormal prompt is sent to an administrator, so that the security of the data can be effectively ensured. In the prior art, a data backup system often adopts a regional network to operate, and does not have the functions of remote backup and remote recovery, so that the data security is ensured through network security protection during remote data storage.
In one possible implementation, the CDP proxy module includes a first configuration management unit, a file interception unit, a first inverse operation acquisition unit, and a first delta data acquisition unit.
The first configuration management unit is used for configuring the data area to be protected on the client and the IP address of the CDP backup center, and sending a data protection request to the CDP backup center according to the IP address of the CDP backup center, wherein the data protection request comprises the data area to be protected on the client.
The connection between the CDP proxy module and the CDP backup center can be established according to the IP address of the CDP backup center, and when the connection is established for the first time, the data area to be protected on the client can be completely backed up so as to realize data synchronization.
The file interception unit is used for intercepting data operation, target data before the operation and target data after the operation in a data area to be protected by the client, and synchronizing the data operation, the target data before the operation and the target data after the operation to the CDP backup center.
Optionally, the data operations in the data area to be protected may include operations of renaming, deleting, creating and modifying attributes, and the like, which are not described in detail herein. The operation of the data can be monitored in real time through the file interception unit, so that each version of the data is backed up, and a user can restore the data to any version.
And the first inverse operation acquisition unit is used for acquiring the inverse operation of the data operation when the data operation is not the write operation, generating a version number of the target data, and storing the inverse operation and the version number in association with the target data after the operation.
Alternatively, when the data is operated as deleted, the reverse operation is newly created, and the target data after the operation is empty, so that the deleted copy can be saved for subsequent restoration. When the data is written, the data only relates to the increment of the data, so that the difference calculation can be directly carried out, and the mutual conversion can be carried out only by replacing the difference data between two versions of the same data. When the data operation is other operations, the reverse operation can be directly recorded, and the current version is used as the basis, so that the reverse operation between the versions can be restored to any version.
And the first delta data acquisition unit is used for determining that the inverse operation of the data operation is a deletion operation when the data operation is a write operation, acquiring the first delta data according to the target data before the operation and the target data after the operation, generating a version number of the target data, and storing the deletion operation, the first delta data and the version number in association with the target data after the operation.
Alternatively, the forward operation between every two versions can be recorded, so that the user can restore the data to another version according to the data of any one version in the middle and the corresponding version number.
In one possible embodiment, acquiring the first delta data according to the target data before the operation and the target data after the operation includes:
and partitioning the target data before operation in a fixed-length partitioning or unequal-length partitioning mode to obtain N first data blocks, and sequentially numbering the first data blocks.
And partitioning the target data after the operation in a fixed-length partitioning or unequal-length partitioning mode to obtain N second data blocks, and sequentially numbering the second data blocks, wherein each first data block corresponds to one second data block.
And acquiring a first weak check value and a first MD5 check value corresponding to the first data block, and acquiring a second weak check value and a second MD5 check value corresponding to the second data block.
Judging whether the first weak check value of the first data block is the same as the second weak check value of the second data block corresponding to the first data block, if so, entering an MD5 check flow, otherwise, taking the second data block as first differential data.
Judging whether the first MD5 check value of the first data block is identical to the second MD5 check value of the second data block corresponding to the first data block, if so, the two data blocks are identical, otherwise, the second data block is used as first differential data.
All the first data blocks and the second data blocks are traversed to acquire first delta data between target data before operation and target data after operation.
Alternatively, in addition to checking the data block with the weak check value and the MD5 check value, other data block attributes may be used for checking, for example, the length of the data, the hash value of the data, and so on.
In one possible implementation, the CDP backup center includes a second configuration management unit, an operation synchronization unit, a second delta data acquisition unit, a second inverse operation acquisition unit, a storage unit, and a version management unit.
The second configuration management unit is used for receiving the data protection request sent by the first configuration management unit and establishing connection between the CDP proxy module and the CDP backup center according to the data area to be protected on the client side in the data protection request.
Optionally, the second configuration management unit may be further configured to assign an account and audit the account application sent by the CDP proxy module by the administrator.
And the operation synchronization unit is used for receiving the data operation transmitted by the file interception unit, the target data before the operation and the target data after the operation.
When the connection is established for the first time, the data in the data area to be protected in the CDP proxy module can be completely synchronized to the CDP backup center to serve as the basis for the storage of the follow-up data version.
And the second delta data acquisition unit is used for determining that the inverse operation of the data operation is a deletion operation when the data operation is a write operation, acquiring the second delta data according to the target data before the operation and the target data after the operation, generating a version number of the target data, and storing the deletion operation, the second delta data and the version number in the storage unit in association with the target data after the operation.
And the second inverse operation acquisition unit is used for acquiring the inverse operation of the data operation when the data operation is not the write operation, generating a version number of the target data, and storing the inverse operation and the version number in the storage unit in association with the target data after the operation.
And a storage unit for storing the data generated by the second delta data acquisition unit and the second inverse operation acquisition unit.
And the version management unit is used for judging whether the version number generated by the CDP proxy module is the same as the version number stored in the storage unit in the current backup, if so, ending the data backup, otherwise, synchronizing the version number.
The invention can restore the data of the version to the data of other versions by recording the difference and the operation between the versions, thus greatly reducing the occupation of the data storage space, realizing bidirectional data backup and effectively ensuring the safety of the data.
In one possible implementation, the CDP recovery center includes a request receiving unit, a request checking unit, and a data recovery unit.
The request receiving unit is used for receiving a data recovery request transmitted by the client, wherein the data recovery request comprises a target version number of data to be recovered and a current version number of the data to be recovered.
And the request checking unit is used for acquiring current data corresponding to the current version number, inverse operation between the target version number and the current version number and first differential data from the client, acquiring the current data corresponding to the current version number, inverse operation between the target version number and the current version number and second differential data from the storage unit, judging whether the inverse operation and the first differential data acquired from the client are identical to the inverse operation and the second differential data acquired from the storage unit, if so, generating a checking result to be checked and passing, scheduling the data recovery unit to recover the data, otherwise, generating a checking result to be checked and not passing, and scheduling the data recovery unit to recover the data.
And the data recovery unit is used for directly and remotely scheduling the current data in the client, the inverse operation between the target version number and the current version number and the first delta data when the verification result is that the verification is passed, and carrying out data recovery. And when the verification result is that the verification fails, directly and remotely scheduling the current data, the inverse operation between the target version number and the current version number and the second delta data in the storage unit, and carrying out data recovery.
Alternatively, the stored data on the CDP backup center is not allowed to be modified except for the administrator and synchronization operations, so the data on the CDP backup center can be considered unchanged. The CDP recovery center and the CDP backup center can be arranged on the same server, when a data recovery request of a client arrives, the data can be compared first to verify whether the data backed up in the client changes, and when the data changes, the data of the CDP backup center is used as the standard to ensure the accuracy of the data; when the data is not changed, the CDP proxy module can be remotely controlled to directly recover the data at the client, so that the accuracy of data recovery is ensured, the occupation of a network can be reduced, and the transmission of the data is quickened.
In one possible implementation, the security center includes a security model training unit and a network security unit.
The safety protection model training unit is used for acquiring historical flow data and abnormal recognition results corresponding to the historical flow data, wherein the historical flow data and the abnormal recognition results corresponding to the historical flow data are prestored data, constructing a safety protection model by adopting a convolutional neural network, and training the safety protection model by adopting the historical flow data and the abnormal recognition results corresponding to the historical flow data to obtain a trained safety protection model.
And the network safety protection unit is used for carrying out abnormal identification on the flow characteristics by adopting a trained safety protection model when the CDP proxy module backs up the data of each version to the CDP backup center or the CDP recovery center responds to the data recovery request of the client so as to obtain an abnormal identification result corresponding to the flow characteristics.
Optionally, other neural network models can be used as a safety protection model to realize the identification of network traffic.
In the prior art, the convolutional neural network is trained by a gradient descent method, so that the convolutional neural network is prone to being trapped into local optimum, and the recognition effect is poor.
In one possible implementation manner, training the safety protection model by using the historical flow data and the abnormal recognition result corresponding to the historical flow data to obtain a trained safety protection model, including:
initializing network parameters of the safety protection model by adopting a chaos sequence strategy to obtain parameter individuals, and obtaining a plurality of parameter individuals.
Taking the data normalized by the historical flow data as input data of the safety protection model, obtaining actual output data of the safety protection model, and taking an abnormal recognition result corresponding to the historical flow data as expected output data, and obtaining the fitness value of each parameter individual.
And taking the parameter individual with the maximum fitness value as the optimal individual, and carrying out global search on all the parameter individuals on the basis of the optimal individual to obtain the parameter individual after primary updating.
And further carrying out local search on the parameter individuals after primary updating to obtain parameter individuals after secondary updating.
And determining a final updated value of each parameter individual based on the parameter individual after primary updating and the parameter individual after secondary updating.
Based on the parameter individuals updated by the final updated values, judging whether the fitness value of the parameter individuals is larger than a set threshold or the current updating times T is larger than the maximum updating times T, if so, taking the parameter individuals with the largest fitness value as final network parameters of the safety protection model to obtain the safety protection model after training, otherwise, entering the next training.
Alternatively, when the training number reaches the maximum update number T, it is possible to search only the globally preferred location, but not the optimal point, so that the gradient descent method may be further used for optimization to determine the globally optimal location.
In one possible embodiment, the fitness value of each parameter individual is:
Figure SMS_48
wherein ,
Figure SMS_49
indicating fitness values, i=1, 2, …, I indicating parameter individual total number, p=1, 2, …, P indicating historical flow data total number, k=1, 2, …, K indicating safety protection model output total number; />
Figure SMS_50
Represents the kth actual output when the p-th historical flow data is input, < >>
Figure SMS_51
Represents the kth expected output when the p-th historical traffic data is input.
In one possible implementation, the global search is specifically:
the global search is specifically:
Figure SMS_52
Figure SMS_53
Figure SMS_54
wherein ,
Figure SMS_56
represents the ithUpdate frequency of parameter individual,/->
Figure SMS_59
Representing the upper limit of update frequency,/-, for>
Figure SMS_62
Representing the update frequency lower bound->
Figure SMS_64
Representing a random number between (0, 1); />
Figure SMS_66
Represents the update step size of the ith parameter individual at the time of the t-th training, and +.>
Figure SMS_67
Update after crossing boundary>
Figure SMS_68
;/>
Figure SMS_55
Representing the updated step size of the ith parameter individual at the time of t-1 training,
Figure SMS_57
representing inertial weights, ++>
Figure SMS_58
Represents the ith parameter individual of the t-1 th training,/th parameter individual of the t>
Figure SMS_60
Represents the best individual at training time t-1, < ->
Figure SMS_61
Indicating a preset maximum number of updates, < >>
Figure SMS_63
Representing updated->
Figure SMS_65
In one possible implementation, the parameter individuals after the secondary updating are:
Figure SMS_69
wherein ,
Figure SMS_70
representing updated->
Figure SMS_71
,/>
Figure SMS_72
Represents update coefficients, and->
Figure SMS_73
Is [ -1,1 ]Constant between->
Figure SMS_74
Representing the average loudness of all parameter individuals in the present training, < ->
Figure SMS_75
Represents a random number between (0, 1, ">
Figure SMS_76
And the pulse transmitting frequency corresponding to the ith parameter individual in the t-1 training is shown.
The final updated value for each parameter individual is:
Figure SMS_77
Figure SMS_78
Figure SMS_79
wherein ,
Figure SMS_80
representing the final updated value of the ith parameter individual in the current update,/for the current update>
Figure SMS_82
Indicating the loudness of the ith parameter individual at the time of the t-1 training, +.>
Figure SMS_83
Representing parameter individual->
Figure SMS_84
Is adapted to the value of->
Figure SMS_86
Representing the maximum fitness value corresponding to the parameter individual after the initial update,/for the parameter individual>
Figure SMS_87
Representing updated->
Figure SMS_89
Initial +.>
Figure SMS_81
0.95%>
Figure SMS_85
Represents the attenuation coefficient between (0, 1, ">
Figure SMS_88
Representing updated->
Figure SMS_90
,/>
Figure SMS_91
Greater than 0->
Figure SMS_92
Representing an increase factor>
Figure SMS_93
Representation ofAn initial pulse emission frequency of the ith parameter individual, and +.>
Figure SMS_94
Example 2
As shown in fig. 2, the present invention provides a CDP-based data storage method, including:
s1, establishing connection between the CDP proxy module and the CDP backup center, and completely backing up the data in the data area to be protected configured on the client side by the CDP proxy module to the CDP backup center.
And S2, when the CDP proxy module monitors that the data in the data area to be protected changes, the transformed version data is stored in the client, and meanwhile, the transformed version data in the CDP backup center is stored, so that bidirectional backup is realized.
And S3, when the CDP recovery center receives the data recovery request sent by the client, acquiring target version data corresponding to the data recovery request from the CDP backup center according to the data recovery request of the client, and transmitting the target version data to the client.
When the CDP proxy module backs up the data of each version to the CDP backup center, or the CDP recovery center responds to the data recovery request of the client, the network security protection is carried out through the security protection center.
The technical solution in this embodiment is similar to the principle and beneficial effects of the solution in embodiment 1, and will not be described here again.
The CDP-based data storage system provided by the invention realizes bidirectional data backup, can recover data of any version at any time, can acquire data of a corresponding version from a CDP backup center when the data of a client is damaged, realizes effective data backup, is easier to recover data, and also performs network security protection when the data is recovered from the CDP backup center, thereby realizing safe data storage.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This invention is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. The CDP-based data storage system is characterized by comprising a CDP agent module, a CDP backup center, a CDP recovery center and a safety protection center, wherein the CDP agent module is arranged on a client;
the CDP proxy module is used for configuring a data area to be protected on the client and protecting data in the data area;
the CDP backup center is used for carrying out secondary backup on a data area to be protected on the client so as to realize bidirectional data backup of data;
the CDP recovery center is used for acquiring target version data corresponding to the data recovery request from the CDP backup center according to the data recovery request of the client and transmitting the target version data to the client;
the safety protection center is used for carrying out network safety protection when the CDP proxy module backs up the data of each version to the CDP backup center or the CDP recovery center responds to the data recovery request of the client.
2. The CDP-based data storage system of claim 1, wherein the CDP proxy module comprises a first configuration management unit, a file interception unit, a first inverse operation acquisition unit, and a first delta data acquisition unit;
the first configuration management unit is configured to configure a data area to be protected on the client and an IP address of the CDP backup center, and send a data protection request to the CDP backup center according to the IP address of the CDP backup center, where the data protection request includes the data area to be protected on the client;
the file interception unit is used for intercepting data operation, target data before the operation and target data after the operation in a data area to be protected by the client, and synchronizing the data operation, the target data before the operation and the target data after the operation to the CDP backup center;
the first inverse operation obtaining unit is configured to obtain an inverse operation of the data operation when the data operation is not a write operation, generate a version number of the target data, and store the inverse operation and the version number in association with the target data after the operation;
the first delta data obtaining unit is used for determining that the inverse operation of the data operation is a deleting operation when the data operation is a writing operation, obtaining the first delta data according to the target data before the operation and the target data after the operation, generating a version number of the target data, and storing the deleting operation, the first delta data and the version number in association with the target data after the operation.
3. The CDP-based data storage system of claim 2, wherein the obtaining the first delta data based on the target data before the operation and the target data after the operation comprises:
partitioning target data before operation in a fixed-length partitioning or unequal-length partitioning mode to obtain N first data blocks, and sequentially numbering the first data blocks;
partitioning the target data after the operation in a fixed-length partitioning or unequal-length partitioning mode to obtain N second data blocks, sequentially numbering the second data blocks, wherein each first data block corresponds to one second data block;
acquiring a first weak check value and a first MD5 check value corresponding to a first data block, and acquiring a second weak check value and a second MD5 check value corresponding to a second data block;
judging whether the first weak check value of the first data block is the same as the second weak check value of the second data block corresponding to the first data block, if so, entering an MD5 check flow, otherwise, taking the second data block as first differential data;
judging whether a first MD5 check value of a first data block is identical to a second MD5 check value of a second data block corresponding to the first data block, if so, the two data blocks are identical, otherwise, the second data block is used as first differential data;
All the first data blocks and the second data blocks are traversed to acquire first delta data between target data before operation and target data after operation.
4. The CDP-based data storage system of claim 3, wherein the CDP backup center includes a second configuration management unit, an operation synchronization unit, a second delta data acquisition unit, a second inverse operation acquisition unit, a storage unit, and a version management unit;
the second configuration management unit is used for receiving the data protection request sent by the first configuration management unit and establishing connection between the CDP proxy module and the CDP backup center according to the data area to be protected on the client side in the data protection request;
the operation synchronization unit is used for receiving the data operation transmitted by the file interception unit, the target data before the operation and the target data after the operation;
the second delta data obtaining unit is used for determining that the inverse operation of the data operation is a deleting operation when the data operation is a writing operation, obtaining second delta data according to target data before the operation and target data after the operation, generating a version number of the target data, and storing the deleting operation, the second delta data and the version number in a storage unit in association with the target data after the operation;
The second inverse operation obtaining unit is configured to obtain an inverse operation of the data operation when the data operation is not a write operation, generate a version number of the target data, and store the inverse operation and the version number in association with the target data after the operation in the storage unit;
the storage unit is used for storing the data generated by the second differential data acquisition unit and the second inverse operation acquisition unit;
and the version management unit is used for judging whether the version number generated by the CDP proxy module is the same as the version number stored in the storage unit in the current backup, if so, ending the data backup, otherwise, synchronizing the version number.
5. The CDP-based data storage system of claim 4, wherein the CDP recovery center includes a request receiving unit, a request checking unit, and a data recovery unit;
the request receiving unit is used for receiving a data recovery request transmitted by a client, wherein the data recovery request comprises a target version number of data to be recovered and a current version number of the data to be recovered;
the request checking unit is used for acquiring current data corresponding to the current version number, inverse operation between the target version number and the current version number and first delta data from the client, acquiring the current data corresponding to the current version number, inverse operation between the target version number and the current version number and second delta data from the storage unit, judging whether the inverse operation acquired from the client, the inverse operation acquired from the first delta data and the inverse operation acquired from the storage unit and the second delta data are the same, if yes, generating a checking result to be checked, scheduling the data recovery unit to recover the data, otherwise, generating a checking result to be checked, and scheduling the data recovery unit to recover the data;
The data recovery unit is used for directly and remotely scheduling the current data in the client, the inverse operation between the target version number and the current version number and the first delta data when the verification result is that the verification is passed, and carrying out data recovery; and when the verification result is that the verification fails, directly and remotely scheduling the current data, the inverse operation between the target version number and the current version number and the second delta data in the storage unit, and carrying out data recovery.
6. The CDP-based data storage system of claim 5, wherein the security center comprises a security model training unit and a network security unit;
the safety protection model training unit is used for acquiring historical flow data and abnormal recognition results corresponding to the historical flow data, wherein the historical flow data and the abnormal recognition results corresponding to the historical flow data are prestored data, constructing a safety protection model by adopting a convolutional neural network, and training the safety protection model by adopting the historical flow data and the abnormal recognition results corresponding to the historical flow data to obtain a trained safety protection model;
the network safety protection unit is used for carrying out abnormal identification on the flow characteristics by adopting a trained safety protection model when the CDP agent module backs up the data of each version to the CDP backup center or the CDP recovery center responds to the data recovery request of the client, so as to obtain an abnormal identification result corresponding to the flow characteristics.
7. The CDP-based data storage system of claim 6, wherein training the safety protection model using the historical traffic data and the anomaly recognition results corresponding to the historical traffic data to obtain a trained safety protection model comprises:
initializing network parameters of a safety protection model by adopting a chaos sequence strategy to obtain parameter individuals, and obtaining a plurality of parameter individuals;
taking the data normalized by the historical flow data as input data of a safety protection model, acquiring actual output data of the safety protection model, and taking an abnormal recognition result corresponding to the historical flow data as expected output data to acquire an adaptability value of each parameter individual;
taking the parameter individual with the maximum fitness value as the optimal individual, and carrying out global search on all the parameter individuals on the basis of the optimal individual to obtain the parameter individual after primary updating;
further carrying out local search on the parameter individuals after primary updating to obtain parameter individuals after secondary updating;
determining a final updated value of each parameter individual based on the parameter individual after primary updating and the parameter individual after secondary updating;
based on the parameter individuals updated by the final updated values, judging whether the fitness value of the parameter individuals is larger than a set threshold or the current updating times T is larger than the maximum updating times T, if so, taking the parameter individuals with the largest fitness value as final network parameters of the safety protection model to obtain the safety protection model after training, otherwise, entering the next training.
8. The CDP-based data storage system of claim 7 wherein the fitness value of each parameter individual is:
Figure QLYQS_1
wherein ,
Figure QLYQS_2
indicating fitness values, i=1, 2, …, I indicating parameter individual total number, p=1, 2, …, P indicating historical flow data total number, k=1, 2, …, K indicating safety protection model output total number; />
Figure QLYQS_3
Represents the kth actual output when the p-th historical flow data is input, < >>
Figure QLYQS_4
Represents the kth expected output when the p-th historical traffic data is input;
the global search is specifically:
Figure QLYQS_5
Figure QLYQS_6
Figure QLYQS_7
wherein ,
Figure QLYQS_9
indicating the update frequency of the ith parameter individual, < +.>
Figure QLYQS_11
Representing the upper limit of update frequency,/-, for>
Figure QLYQS_13
Representing the update frequency lower bound->
Figure QLYQS_15
Representing a random number between (0, 1); />
Figure QLYQS_17
Represents the update step size of the ith parameter individual at the time of the t-th training, and +.>
Figure QLYQS_19
Update after crossing boundary>
Figure QLYQS_21
;/>
Figure QLYQS_8
Representing the update step size of the ith parameter individual at the time of the t-1 th training, +.>
Figure QLYQS_10
Representing inertial weights, ++>
Figure QLYQS_12
Represents the ith parameter individual of the t-1 th training,/th parameter individual of the t>
Figure QLYQS_14
Represents the best individual at training time t-1, < ->
Figure QLYQS_16
Indicating a preset maximum number of updates, < >>
Figure QLYQS_18
Representing updated->
Figure QLYQS_20
9. The CDP-based data storage system of claim 8 wherein the secondarily updated individual parameters are:
Figure QLYQS_22
wherein ,
Figure QLYQS_23
representing updated->
Figure QLYQS_24
,/>
Figure QLYQS_25
Represents update coefficients, and->
Figure QLYQS_26
Is [ -1,1]Constant between->
Figure QLYQS_27
Representing the average loudness of all parameter individuals in the present training, < ->
Figure QLYQS_28
Represents a random number between (0, 1, ">
Figure QLYQS_29
Representing the pulse transmitting frequency corresponding to the ith parameter individual in the t-1 th training;
the final updated value for each parameter individual is:
Figure QLYQS_30
Figure QLYQS_31
Figure QLYQS_32
wherein ,
Figure QLYQS_34
representing the final updated value of the ith parameter individual in the current update,/for the current update>
Figure QLYQS_35
Indicating the loudness of the ith parameter individual at the time of the t-1 training, +.>
Figure QLYQS_36
Representing parameter individual->
Figure QLYQS_37
Is adapted to the value of->
Figure QLYQS_39
Representing the maximum fitness value corresponding to the parameter individual after the initial update,/for the parameter individual>
Figure QLYQS_40
Representing updated->
Figure QLYQS_42
Initial +.>
Figure QLYQS_33
0.95%>
Figure QLYQS_38
Represents the attenuation coefficient between (0, 1, ">
Figure QLYQS_41
Representing updated->
Figure QLYQS_43
,/>
Figure QLYQS_44
Greater than 0->
Figure QLYQS_45
Representing an increase factor>
Figure QLYQS_46
An initial pulse emission frequency representing the ith parameter individual, and +.>
Figure QLYQS_47
10. A CDP-based data storage method, comprising:
establishing connection between the CDP proxy module and the CDP backup center, and completely backing up the data in the data area to be protected configured on the client side by the CDP proxy module to the CDP backup center;
when the CDP proxy module monitors that the data in the data area to be protected changes, the transformed version data is stored in the client, and meanwhile, the transformed version data in the CDP backup center is stored, so that bidirectional backup is realized;
When the CDP recovery center receives a data recovery request sent by a client, acquiring target version data corresponding to the data recovery request from the CDP backup center according to the data recovery request of the client, and transmitting the target version data to the client;
when the CDP proxy module backs up the data of each version to the CDP backup center, or the CDP recovery center responds to the data recovery request of the client, the network security protection is carried out through the security protection center.
CN202310593509.0A 2023-05-25 2023-05-25 CDP-based data storage system and method Active CN116301668B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310593509.0A CN116301668B (en) 2023-05-25 2023-05-25 CDP-based data storage system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310593509.0A CN116301668B (en) 2023-05-25 2023-05-25 CDP-based data storage system and method

Publications (2)

Publication Number Publication Date
CN116301668A true CN116301668A (en) 2023-06-23
CN116301668B CN116301668B (en) 2023-08-04

Family

ID=86822575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310593509.0A Active CN116301668B (en) 2023-05-25 2023-05-25 CDP-based data storage system and method

Country Status (1)

Country Link
CN (1) CN116301668B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109710453A (en) * 2017-10-26 2019-05-03 深圳市沃土科技有限公司 A kind of continuous data store method
WO2020227429A1 (en) * 2019-05-06 2020-11-12 Strong Force Iot Portfolio 2016, Llc Platform for facilitating development of intelligence in an industrial internet of things system
CN112436957A (en) * 2020-11-03 2021-03-02 深圳市永达电子信息股份有限公司 PDRR network security guarantee model parallel implementation system based on cloud computing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109710453A (en) * 2017-10-26 2019-05-03 深圳市沃土科技有限公司 A kind of continuous data store method
WO2020227429A1 (en) * 2019-05-06 2020-11-12 Strong Force Iot Portfolio 2016, Llc Platform for facilitating development of intelligence in an industrial internet of things system
CN112436957A (en) * 2020-11-03 2021-03-02 深圳市永达电子信息股份有限公司 PDRR network security guarantee model parallel implementation system based on cloud computing

Also Published As

Publication number Publication date
CN116301668B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
US11113156B2 (en) Automated ransomware identification and recovery
US10701096B1 (en) Systems and methods for anomaly detection on core banking systems
AU2012395331B2 (en) Method and apparatus for recovering data
CN106610854A (en) Model update method and device
CN101025741A (en) Database back up system and method
CN114422224B (en) Threat information intelligent analysis method and system for attack tracing
CN110188103A (en) Data account checking method, device, equipment and storage medium
CN105743732B (en) Method and system for recording transmission path and distribution condition of local area network files
US20230195870A1 (en) System for face authentication and method for face authentication
CN107294924A (en) Detection method, the device and system of leak
US11349855B1 (en) System and method for detecting encrypted ransom-type attacks
CN116301668B (en) CDP-based data storage system and method
EP2372552B1 (en) Automated relocation of in-use multi-site protected data storage
CN112506699A (en) Data security backup method, equipment and system
KR101931683B1 (en) Security patch system employing unidirectional data transmission apparatus and method of operating the same
CN102637169A (en) Safe and practical method and system for database backup
CN114398635A (en) Layered security federal learning method and device, electronic equipment and storage medium
CN110413691A (en) Database backup method, restoration methods and device based on block chain
JP2003132019A (en) Hindrance-monitoring method for computer system
KR20210027730A (en) System and method for security of multimedia file and computer-readable recording medium
EP4332794A1 (en) Anomaly detection before backup
CN116305071B (en) Account password security system based on artificial intelligence
US20140047511A1 (en) Network storage system and method thereof
CN117155960A (en) Information management system and method
KR101735431B1 (en) System and method for recovering of flight data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant