CN116541210B - Backup method and system for source file - Google Patents

Backup method and system for source file Download PDF

Info

Publication number
CN116541210B
CN116541210B CN202310753285.5A CN202310753285A CN116541210B CN 116541210 B CN116541210 B CN 116541210B CN 202310753285 A CN202310753285 A CN 202310753285A CN 116541210 B CN116541210 B CN 116541210B
Authority
CN
China
Prior art keywords
file
source
head
size
con
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310753285.5A
Other languages
Chinese (zh)
Other versions
CN116541210A (en
Inventor
向君
郑华山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Rongjian Software Technology Co ltd
Shanghai Hejian Industrial Software Group Co Ltd
Original Assignee
Chengdu Rongjian Software Technology Co ltd
Shanghai Hejian Industrial Software Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Rongjian Software Technology Co ltd, Shanghai Hejian Industrial Software Group Co Ltd filed Critical Chengdu Rongjian Software Technology Co ltd
Priority to CN202310753285.5A priority Critical patent/CN116541210B/en
Publication of CN116541210A publication Critical patent/CN116541210A/en
Application granted granted Critical
Publication of CN116541210B publication Critical patent/CN116541210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to the technical field of electronic design automation, in particular to a backup method and a backup system of source files, which are characterized in that N source files related to current compiling are obtained, the file content and attribute information of each source file are obtained, the attribute information of each source file is written into a file header of an integrated file, and the file content of the N source files is written into a file body of the integrated file according to the sequence of the source files corresponding to the attribute information in the file header; and encrypting and compressing the obtained integrated file to obtain a target file, and backing up the target file to a designated position. The application can solve the problem of source file security by writing N source files related to compiling into the same integrated file for encryption compression and backing up to the appointed position, avoids source file leakage, only needs to execute one copy operation when copying, only needs to execute one read operation when a Debug tool reads the source file, and improves management and reading efficiency.

Description

Backup method and system for source file
Technical Field
The application relates to the technical field of electronic design automation, in particular to a backup method and system of source files.
Background
In chip verification, after compiling and simulating are performed, debugging and finding out potential problems are often needed to be performed by using a Debug tool, and therefore, the Debug tool needs to read a source file for checking. This will create two problems: 1) The safety is relatively low. When a user performs debugging, the source file needs to be copied to a debugging directory appointed in a debugging database (debug design database) for backup, and the backup method may cause source file leakage, so that safety risks are caused. 2) Managing and reading source files is inefficient. As integrated chip sizes become larger, the number of source files for chip design and verification increases exponentially, and source files are scattered in different directories, and some source files are also integrated in some libraries, which is inefficient for Debug tool management and reading.
Disclosure of Invention
Aiming at the technical problems, the application adopts the following technical scheme: a method of backing up source files, the method comprising:
s100, when a compiler compiles, N source files SF= { SF related to current compilation is obtained 1 ,SF 2 ,…,SF i ,…,SF N And SF(s) i For the ith source file, i has a value ranging from 1 to N.
S200, acquiring file content Con= { Con of each source file in SF 1 ,Con 2 ,…,Con i ,…,Con N Sum attribute information at= { AT 1 ,AT 2 ,…,AT i ,…,AT N }, wherein Con i Is SF i Content of file, AT i Is SF i Attribute information of (a), AT i Including SF i Middle Con i Byte size of (2) i And SF (sulfur hexafluoride) i The file number Num of the full path name of (a) i
S300, writing the attribute information of each source file into the header of the integrated file to obtain header head= { header composed of N attribute information 1 ,head 2 ,…,head i ,…head N },head i ={Num i ,size i },head i For SF in header i Attribute information of (2); wherein the header is located at the beginning of the integrated file.
S400, according to the attribute information in the file headerWriting the file contents of N source files in Con to the positions after the file heads in the integrated file to obtain a file Body body= { Body of the integrated file formed by the N file contents 1 ,body 2 ,…,body i ,…body N A body therein i For SF in a document body i File content Con i
S500, encrypting and compressing the integrated file to obtain a target file, and backing up the target file to a designated position.
The application further provides a backup system of source files, the system comprising a processor and a non-transitory computer readable storage medium having stored therein at least one instruction or at least one program loaded by the processor and executing the method as described above.
Compared with the prior art, the method and the system for backing up the source file have obvious beneficial effects, can achieve quite technical progress and practicality, have wide industrial utilization value, and have at least the following beneficial effects:
the embodiment of the application provides a backup method and a backup system for source files, which can solve the problem of source file security by writing N source files related to compiling into the same integrated file for encryption compression and backing up to a designated position, avoid source file leakage, only need to execute one copy operation during copying, only need to execute one read operation during reading the source file by a Debug tool, and improve management and reading efficiency.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a backup method of a source file according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to fall within the scope of the application.
Referring to FIG. 1, a method for backing up source files is shown, the method comprising the steps of:
s100, when a compiler compiles, N source files SF= { SF related to current compilation is obtained 1 ,SF 2 ,…,SF i ,…,SF N And SF(s) i For the ith source file, i has a value ranging from 1 to N.
S200, acquiring file content Con= { Con of each source file in SF 1 ,Con 2 ,…,Con i ,…,Con N Sum attribute information at= { AT 1 ,AT 2 ,…,AT i ,…,AT N }, wherein Con i Is SF i Content of file, AT i Is SF i Attribute information of (a), AT i Including SF i Middle Con i Byte size of (2) i And SF (sulfur hexafluoride) i The file number Num of the full path name of (a) i
It should be noted that, when the compiler compiles, another thread needs to be restarted to collect all source files for backup. Wherein Con i Code stored in a source file; the full path name (full name) of a source file includes the storage path and name of the source file. File number Num i Is SF i Is a unique identity of the full path name.
Optionally, the file sequence number Num i Positively correlated with the order in which the source files were acquired.
As a preferred embodiment, the file sequence number Num i For source file SF i Is a sequence number of the acquisition sequence of (a).
As a preferred embodiment, the file sequence number Num i Are numbered according to the sequence of the preset rule arrangement sequence.
Alternatively, the preset rule is an order arranged by byte size, or an order arranged by the first letter of the file name. Other methods of arranging sequences according to preset rules in the prior art fall within the scope of the present application.
Through SF i File number Num of the file i Instead of SF i The file sequence number can save more memory space than the full path name.
S300, writing the attribute information of each source file into the header of the integrated file to obtain header head= { header composed of N attribute information 1 ,head 2 ,…,head i ,…head N },head i ={Num i ,size i },head i For SF in header i Attribute information of (2); wherein the header is located at the beginning of the integrated file.
S400, writing file contents of N source files in Con to positions behind file headers in the integrated file according to the source file sequence corresponding to the attribute information in the file headers to obtain a file body= { Body of the integrated file formed by the N file contents 1 ,body 2 ,…,body i ,…body N A body therein i For SF in a document body i File content Con i
In the integrated file, attribute information in the same order in the header and file contents in the same order in the body belong to the same source file.
As a preferred embodiment, the jth source file SF is used j File content Con j The step of writing the file body comprises the following steps:
s410, obtaining attribute information Head1= { Head corresponding to the first j-1 source files by reading the attribute information of all the source files written in the file header 1 ,head 2 ,…,head r …,head j-1 }, head therein r For the r-th source file SF r The value of r ranges from 1 to j-1.
It should be noted that, each time the header of the integrated file is read, all attribute information in the header needs to be read. Therefore, when the file content of any one of the source files is written or read, the attribute information of all source files before the source file can be acquired according to the read attribute information.
S420, extracting the byte size corresponding to the first j-1 source files from the Head1 to obtain j-1 byte sizes of size1 = { size 1 ,size 2 ,…,size r ,…,size j-1 },size r Is SF r Byte size of file content.
S430, obtaining the byte offset offs of the start byte of the j-th source file written in the file body according to the size1 j
S440, according to offs j Content Con of j-th source file j Writing in file body to generate body j
Preferably, S430 further includes:
s431, when j=1, offs 1 =0. That is, the first source file SF written in the file body of the integrated file 1 The start byte of (a) is the reference byte, SF 1 Byte offset offs of the start byte of (a) 1 =0。
S432, when j is greater than 1, offs j The method meets the following conditions: offs j =∑ j-1 r=1 size r
As an example, the first source file SF 1 The first source file SF as a reference 1 Byte offset offs of (a) 1 The byte offset of the second source file relative to the start address is 0, the byte offset of the third source file relative to the start address is the sum of the sizes of the first two source files, and so on, the byte offset of the j-th source file relative to the start address is the sum of the sizes of the first j-1 source files.
The byte offset of the start byte of the source file to be written in the file body can be quickly obtained through the steps of S410-S440, and the source file to be written in the file body can be quickly written in the file body.
S500, encrypting and compressing the integrated file to obtain a target file, and backing up the target file to a designated position.
The designated location is a backup location designated in advance by the user.
As a preferred embodiment, the encryption algorithm that encrypts the integrated file is a hash encryption algorithm. The efficiency of the hash encryption algorithm is higher. In the prior art, the method for encrypting the integrated file falls into the protection scope of the application.
It should be noted that, in the prior art, the method capable of compressing the integrated file is within the protection scope of the present application.
The integrated file is encrypted, so that the security of the integrated file can be improved, the leakage of a source file is prevented, and the encryption operation can be completed only by executing one encryption operation on the integrated file. N source files are integrated into one integrated file for compression, and compared with the prior art, the compression ratio can be improved and the compression efficiency is higher by compressing each source file. The N source files are integrated into one integrated file, and only one copy operation is needed to be executed when the target file is backed up to the appointed position, so that compared with the operation that the N source files are required to be copied to the appointed position one by one in the prior art, the hardware resource of a computer can be saved.
In summary, the embodiment of the application provides a backup method for source files, which obtains N source files related to current compiling and obtains file content and attribute information of each source file. Writing the attribute information of each source file into the file header of the integrated file, and writing the file contents of the N source files into the file body of the integrated file according to the sequence of the source files corresponding to the attribute information in the file header; and encrypting and compressing the obtained integrated file to obtain a target file, and backing up the target file to a designated position. The application can solve the problem of source file security by writing N source files related to compiling into the same integrated file for encryption compression and backing up to the appointed position, avoids source file leakage, only needs to execute one copy operation when copying, only needs to execute one read operation when a Debug tool reads the source file, and improves management and reading efficiency.
As a preferred embodiment, the method further comprises:
s600, detecting the timestamps t= { T of N source files 1 ,T 2 ,…,T i ,…,T N },T i Is SF i Is a time stamp of (2); when T is unchanged, the integrated file is not updated; when T is i Is updated to T i And (c) regenerating the integrated file according to steps S100-S500.
As a preferred embodiment, when T i Is updated to T i And (c) updating the integrated file according to the following steps:
s610, obtain T i (corresponding ith source file SF) i ' and SF i ' File content Con i ' and File Attribute AT i ´,AT i ' include SF i ' Con in i ' byte size i ' and SF i ' File sequence number Num of full path name i ´。
As a preferred embodiment, when there are multiple timestamps in T for update, T is the timestamp with the smallest sequential number in T i And updating the integrated file.
S620, updating the ith source file SF i Obtaining attribute information and file content of the ith source file to the nth source file as a starting point to obtain AT' = { AT i ´, AT i+1 ´,…,AT N 'and Con' = { Con i ´, Con i+1 ´…,Con N ' x }. Note that, AT i+1 ´,…,AT N Any one of the attribute information of (a) may be attribute information corresponding to the source file after the change of the time stamp, or may be attribute information corresponding to the source file after the change of the time stampMore attribute information corresponding to the source file. When the time stamp of any one source file integrated in the integrated file is changed, the source file corresponding to the changed time stamp and the source files after the changed time stamp are required to be rewritten in the integrated file. Con (Con) i+1 ´…,Con N And the same shall not be repeated.
S630, updating the file header Head according to the AT 'to obtain Head' = { Head 1 ,head 2 ,…,head i ´, head i+1 ´,…,head N ´},head i ´={Num i ´,size i ´}。
S640, updating the file Body according to the Con 'to obtain Body' = { Body 1 ,body 2 ,…,body i ´, body i ´,…body N ´},body i For SF in a document body i ' File content Con i ´。
When the source file is updated, the update range can be reduced and the update speed can be increased by the steps of steps S610 to S640.
As a preferred embodiment, the step of reading the content of the corresponding file of the kth source file by the Debug tool includes:
s701, decompressing and decrypting the target file to obtain a temporary file;
s702, obtaining Head2= { Head by reading attribute information of the first k-1 source files of the header in the temporary file 1 ,head 2 ,…,head f ,…,head k-1 }, head of f For the f-th source file SF f The value of f ranges from 1 to k-1.
S703, extracting the byte size corresponding to each source file from the Head2 to obtain the size of k-1 bytes, size2 = { size 1 ,size 2 ,…,size f ,…,size k-1 },size f For the f-th source file SF f Byte size of file content.
S704, obtaining the byte offset offs of the initial byte in the kth source file according to the size2 k1
S705 according to offs k1 And the byte size of the kth source file k ObtainingByte offset offs of termination bytes in kth source file k2 Wherein, offs k2 The method meets the following conditions: offs k2 = offs k1 +size k
S706, according to the byte offset offs of the start byte of the kth source file k1 And a byte offset offs of termination bytes k2 And reading the file content of the j-th source file.
Preferably, S704 further includes:
s7041, when k=1, offs 01 =0. That is, the first source file SF written in the file body of the integrated file 1 The start byte of (a) is the reference byte, SF 1 The byte offset of the start byte of (2) is 0.
S7042, when k is greater than 1, offs k1 The method meets the following conditions: offs k1 =∑ k-1 f=1 size f
The file content of the source file can be quickly read through the above-mentioned S401-S406. And after integrating N source files into one integrated file, the Debug tool only needs to execute one read-write operation when reading the source files, namely only needs to execute one I/O operation.
Preferably, the file sequence number is obtained according to the full path name of the source file, the byte offset is obtained by searching the file header in the integrated file according to the file sequence number index, and the corresponding file content is obtained according to the byte offset.
Based on the same inventive concept as the above method embodiment, the present application further provides a backup system of a source file, where the system includes a processor and a non-transitory computer readable storage medium, where at least one instruction or at least one program is stored in the non-transitory computer readable storage medium, where the at least one instruction or the at least one program is loaded by the processor and executed by the processor, where the backup method of a source file is described in detail in the above embodiment and is not repeated.
While certain specific embodiments of the application have been described in detail by way of example, it will be appreciated by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the application. Those skilled in the art will also appreciate that many modifications may be made to the embodiments without departing from the scope and spirit of the application. The scope of the present disclosure is defined by the appended claims.

Claims (9)

1. A method for backing up a source file, the method comprising:
s100, when a compiler compiles, N source files SF= { SF related to current compilation is obtained 1 ,SF 2 ,…,SF i ,…,SF N And SF(s) i For the ith source file, the value range of i is 1 to N;
s200, acquiring file content Con= { Con of each source file in SF 1 ,Con 2 ,…,Con i ,…,Con N Sum attribute information at= { AT 1 ,AT 2 ,…,AT i ,…,AT N }, wherein Con i Is SF i Content of file, AT i Is SF i Attribute information of (a), AT i Including SF i Middle Con i Byte size of (2) i And SF (sulfur hexafluoride) i The file number Num of the full path name of (a) i The file sequence number Num i Is SF i A unique identity of the full path name;
s300, writing the attribute information of each source file into the header of the integrated file to obtain header head= { header composed of N attribute information 1 ,head 2 ,…,head i ,…head N },head i ={Num i ,size i },head i For SF in header i Attribute information of (2); wherein the header is located at the beginning of the integrated file;
s400, according to the source text corresponding to the attribute information in the file headerThe file sequence, the file contents of N source files in Con are written into the position behind the file header in the integrated file, and the file Body body= { Body of the integrated file formed by N file contents is obtained 1 ,body 2 ,…,body i ,…body N A body therein i For SF in a document body i File content Con i
Wherein the jth source file SF is to j File content Con j The step of writing the file body comprises the following steps:
s410, obtaining attribute information Head1= { Head corresponding to the first j-1 source files by reading the attribute information of all the source files written in the file header 1 ,head 2 ,…,head r …,head j-1 }, head therein r For the r-th source file SF r The value range of r is 1 to j-1;
s420, extracting the byte size corresponding to the first j-1 source files from the Head1 to obtain j-1 byte sizes of size1 = { size 1 ,size 2 ,…,size r ,…,size j-1 },size r Is SF r Byte size of file content;
s430, obtaining the byte offset offs of the start byte of the j-th source file written in the file body according to the size1 j
S440, according to offs j Content Con of j-th source file j Writing in file body to generate body j
S500, encrypting and compressing the integrated file to obtain a target file, and backing up the target file to a designated position.
2. The method of claim 1, wherein the encryption algorithm that encrypts the integrated file is a hash encryption algorithm.
3. The method of claim 1, wherein said Num is i For source file SF i Is a sequence number of the acquisition sequence of (a).
4. The method of claim 1, wherein S430 further comprises:
s431, when j=1, offs 1 =0;
S432, when j is greater than 1, offs j The method meets the following conditions: offs j =∑ j-1 r=1 size r
5. The method according to claim 1, wherein the method further comprises:
s600, detecting the timestamps t= { T of N source files 1 ,T 2 ,…,T i ,…,T N },T i Is SF i Is a time stamp of (2); when T is unchanged, the integrated file is not updated; when T is i Is updated to T i And (c) regenerating the integrated file according to steps S100-S500.
6. The method according to claim 1, wherein the method further comprises:
s600, detecting the timestamps t= { T of N source files 1 ,T 2 ,…,T i ,…,T N },T i Is SF i Is a time stamp of (2); when T is unchanged, the integrated file is not updated; when T is i Is updated to T i And (c) updating the integrated file according to the following steps:
s610, obtain T i (corresponding ith source file SF) i ' and SF i ' File content Con i ' and File Attribute AT i ´,AT i ' include SF i ' Con in i ' byte size i ' and SF i ' File sequence number Num of full path name i ´;
S620, SF i Obtaining attribute information and file content of the ith source file to the nth source file as a starting point to obtain AT' = { AT i ´, AT i+1 ´,…,AT N 'and Con' = { Con i ´, Con i+1 ´…,Con N ´};
S630, updating the file header Head according to the AT 'to obtain Head' = { Head 1 ,head 2 ,…,head i ´,head i+1 ´,…,head N ´},head i ´={Num i ´,size i ´};
S640, updating the file Body according to the Con 'to obtain Body' = { Body 1 ,body 2 ,…,body i ´, body i ´,…body N ´},body i For SF in a document body i ' File content Con i ´。
7. The method of claim 1, wherein the step of reading the content of the corresponding file of the kth source file comprises:
s701, decompressing and decrypting the target file to obtain a temporary file;
s702, obtaining Head2= { Head by reading attribute information of the first k-1 source files of the header in the temporary file 1 ,head 2 ,…,head f ,…,head k-1 }, head of f For the f-th source file SF f The value range of f is 1 to k-1;
s703, extracting the byte size corresponding to each source file from the Head2 to obtain the size of k-1 bytes, size2 = { size 1 ,size 2 ,…,size f ,…,size k-1 },size f For the f-th source file SF f Byte size of file content;
s704, obtaining the byte offset offs of the initial byte in the kth source file according to the size2 k1
S705 according to offs k1 And the byte size of the kth source file k Obtaining byte offset offs of termination bytes in the kth source file k2 Wherein, offs k2 The method meets the following conditions: offs k2 = offs k1 +size k
S706, according to the byte offset offs of the start byte of the kth source file k1 And a byte offset offs of termination bytes k2 And reading the file content of the j-th source file.
8. The method of claim 7, wherein S704 further comprises:
s7041, when k=1, offs 01 =0;
S7042, when k is greater than 1, offs k1 The method meets the following conditions: offs k1 =∑ k-1 f=1 size f
9. A backup system for a source file, the system comprising a processor and a non-transitory computer readable storage medium having at least one instruction or at least one program stored therein, wherein the at least one instruction or the at least one program is loaded and executed by the processor to implement the method of any one of claims 1-8.
CN202310753285.5A 2023-06-26 2023-06-26 Backup method and system for source file Active CN116541210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310753285.5A CN116541210B (en) 2023-06-26 2023-06-26 Backup method and system for source file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310753285.5A CN116541210B (en) 2023-06-26 2023-06-26 Backup method and system for source file

Publications (2)

Publication Number Publication Date
CN116541210A CN116541210A (en) 2023-08-04
CN116541210B true CN116541210B (en) 2023-11-17

Family

ID=87454408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310753285.5A Active CN116541210B (en) 2023-06-26 2023-06-26 Backup method and system for source file

Country Status (1)

Country Link
CN (1) CN116541210B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453490A (en) * 2008-12-23 2009-06-10 上海爱数软件有限公司 Synthesized backup method and apparatus
JP2012123664A (en) * 2010-12-09 2012-06-28 Renesas Electronics Corp Build execution support system, build execution support method, and build execution support program
US9596291B1 (en) * 2015-11-30 2017-03-14 International Business Machines Corporation Migration of data storage
CN107832625A (en) * 2017-11-21 2018-03-23 江苏神州信源系统工程有限公司 A kind for the treatment of method and apparatus of document
CN109032844A (en) * 2018-07-13 2018-12-18 深圳麦风科技有限公司 Merge the method and device of multiple mobile device backups
CN111984591A (en) * 2019-05-21 2020-11-24 北京京东尚科信息技术有限公司 File storage method, file reading method, file storage device, file reading device, equipment and computer readable storage medium
CN113282521A (en) * 2021-05-19 2021-08-20 武汉天喻信息产业股份有限公司 Method and device for prolonging service life of smart card
CN113312325A (en) * 2021-05-24 2021-08-27 康键信息技术(深圳)有限公司 Track data transmission method, device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11036592B2 (en) * 2017-09-14 2021-06-15 Commvault Systems, Inc. Distributed content indexing architecture with separately stored file previews

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101453490A (en) * 2008-12-23 2009-06-10 上海爱数软件有限公司 Synthesized backup method and apparatus
JP2012123664A (en) * 2010-12-09 2012-06-28 Renesas Electronics Corp Build execution support system, build execution support method, and build execution support program
US9596291B1 (en) * 2015-11-30 2017-03-14 International Business Machines Corporation Migration of data storage
CN107832625A (en) * 2017-11-21 2018-03-23 江苏神州信源系统工程有限公司 A kind for the treatment of method and apparatus of document
CN109032844A (en) * 2018-07-13 2018-12-18 深圳麦风科技有限公司 Merge the method and device of multiple mobile device backups
CN111984591A (en) * 2019-05-21 2020-11-24 北京京东尚科信息技术有限公司 File storage method, file reading method, file storage device, file reading device, equipment and computer readable storage medium
CN113282521A (en) * 2021-05-19 2021-08-20 武汉天喻信息产业股份有限公司 Method and device for prolonging service life of smart card
CN113312325A (en) * 2021-05-24 2021-08-27 康键信息技术(深圳)有限公司 Track data transmission method, device, equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
The Composite-file File System: Decoupling the One-to-One Mapping of Files and Metadata for Better Performance;Shuanglong Zhang 等;《the Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST ’16)》;15-22 *
基于Hadoop海量小文件存储技术研究;谢磊;《中国优秀硕士学位论文全文数据库 信息科技辑》(第12期);I137-63 *
多模态医疗数据中海量小文件存储优化方法;曾梦 等;《软件学报》;第34卷(第3期);1451-1469 *

Also Published As

Publication number Publication date
CN116541210A (en) 2023-08-04

Similar Documents

Publication Publication Date Title
US7366859B2 (en) Fast incremental backup method and system
US9766983B2 (en) Proximity and in-memory map based signature searching for duplicate data
CN106933703B (en) Database data backup method and device and electronic equipment
US8849876B2 (en) Methods and apparatuses to optimize updates in a file system based on birth time
EP1744246B1 (en) File system having deferred verification of data integrity
US10248556B2 (en) Forward-only paged data storage management where virtual cursor moves in only one direction from header of a session to data field of the session
CA2550974C (en) Optimized start-up verification of file system integrity
CN102473223B (en) Information processing device and information processing method
US20070005627A1 (en) File system having transaction record coalescing
KR20070003579A (en) File system storing transaction recordes in flash-like media
US20120296878A1 (en) File set consistency verification system, file set consistency verification method, and file set consistency verification program
KR101765517B1 (en) Method and apparatus for journaling database
KR20070003577A (en) File system having inverted hierarchical structure
US10380141B1 (en) Fast incremental backup method and system
CN116541210B (en) Backup method and system for source file
WO2016117007A1 (en) Database system and database management method
CN113326063B (en) Data processing method, electronic device and storage medium
US11620270B2 (en) Representing and managing sampled data in storage systems
JP4754007B2 (en) Information processing apparatus, information processing method, program, and recording medium
US11442929B2 (en) Double header logging of slotted page structures
CN112380174B (en) XFS file system analysis method containing deleted files, terminal device and storage medium
US20220100415A1 (en) Method, device, and computer program product for storage management
US11256583B2 (en) Efficient handling of RAID-F component repair failures
Liu et al. LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing
CN114780499A (en) Batch processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant