WO2020048488A1 - 一种数据存储方法及存储装置 - Google Patents

一种数据存储方法及存储装置 Download PDF

Info

Publication number
WO2020048488A1
WO2020048488A1 PCT/CN2019/104417 CN2019104417W WO2020048488A1 WO 2020048488 A1 WO2020048488 A1 WO 2020048488A1 CN 2019104417 W CN2019104417 W CN 2019104417W WO 2020048488 A1 WO2020048488 A1 WO 2020048488A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
stored
security level
storage
equal parts
Prior art date
Application number
PCT/CN2019/104417
Other languages
English (en)
French (fr)
Inventor
夏伟强
汪渭春
林起芊
王伟
Original Assignee
杭州海康威视系统技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州海康威视系统技术有限公司 filed Critical 杭州海康威视系统技术有限公司
Publication of WO2020048488A1 publication Critical patent/WO2020048488A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1076Parity data used in redundant arrays of independent storages, e.g. in RAID systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0689Disk arrays, e.g. RAID, JBOD

Definitions

  • the present application relates to the field of data storage technology, and in particular, to a data storage method and a storage device.
  • Video cloud storage technology is a technology for data cloud storage.
  • the cloud storage server can receive data from the front-end camera equipment and store the data.
  • Current cloud storage servers usually store only one copy when storing data.
  • EC erasure code, erasure code
  • EC technology is a data encoding technology. It can add N original data, increase M data, and restore any original N data from N + M data to original data. That is, if there are any M or less The data is invalid, and the original data can still be restored from the remaining N copies.
  • the cloud storage server uses EC technology to store data, specifically, after receiving data from the front-end camera device, the received data can be divided into N shares according to a preset security level N + M value, and then these N shares The data generates M copies of verification data, and then stores the N + M pieces of data into N + M storage nodes respectively.
  • the data sent by the front-end camera equipment usually includes real-time video data, alarm video data, and smart stream data, where the real-time video data is video data recorded by the camera device under normal conditions; the alarm video data is recorded by the camera device under emergency conditions
  • Intelligent stream data is data obtained by the camera device after the video data is lightly calculated, and contains the feature information of the subject in the video, such as the characteristics of the person ’s gender and clothing color in the video.
  • Current cloud storage servers generally encode and store data sent by the same camera device with the same security level.
  • the purpose of the embodiments of the present application is to provide a data storage method and a storage device, so as to further ensure that when some storage nodes of a cloud storage server fail, important data stored therein can be restored.
  • an embodiment of the present application provides a data storage method, which is applied to a cloud storage server.
  • the method includes:
  • the method further includes:
  • the determining the data type of the data to be stored includes:
  • determining the security level of the data to be stored according to a preset corresponding relationship between different data types and different security levels includes:
  • determining that the security level of the data to be stored is N + M, where N and M are both integers greater than 1;
  • the security level of the data to be stored is N + (M + 2).
  • generating the verification data that conforms to the security level of the data to be stored according to the determined security level of the data to be stored includes:
  • the security level of the data to be stored is N + (M + 2)
  • the data to be stored is divided into N equal parts of the original data, and verification data of M + 2 equal parts is generated.
  • the storing the data to be stored and the verification data to N + M storage nodes respectively includes:
  • N N + M
  • M M
  • the method further includes:
  • Generate storage result information for the data to be stored where the storage result information includes: identification information that the data to be stored has been successfully stored, and a storage node name for storing the data to be stored.
  • an embodiment of the present application provides a data storage device, which is applied to a cloud storage server.
  • the device includes:
  • a first determining module configured to determine a data type of data to be stored
  • a second determining module configured to determine a security level of the data to be stored according to a preset corresponding relationship between different data types and different security levels
  • a first generating module configured to generate check data that meets the security level of the data to be stored according to the determined security level of the data to be stored;
  • the storage module is configured to store the data to be stored and the verification data to N + m storage nodes, respectively, where the number of N + m is consistent with the security level of the data to be stored.
  • the apparatus further includes:
  • the receiving module is configured to receive data to be stored sent by the front-end camera device.
  • the first determining module is specifically configured to:
  • the second determining module is specifically configured to:
  • determining that the security level of the data to be stored is N + M, where N and M are both integers greater than 1;
  • the security level of the data to be stored is N + (M + 2).
  • the first generating module is specifically configured to:
  • the security level of the data to be stored is N + (M + 2)
  • the data to be stored is divided into N equal parts of original data, and verification data of M + 2 equal parts is generated.
  • the storage module is specifically configured to:
  • the apparatus further includes:
  • a second generating module is configured to generate storage result information for the data to be stored, where the storage result information includes identification information that the data to be stored has been successfully stored, and storage for storing the data to be stored Node name.
  • an embodiment of the present application provides a cloud storage server, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions that can be executed by the processor.
  • the processor is prompted by the machine-executable instructions to implement the method steps of the data storage method provided by the first aspect of the embodiments of the present application.
  • an embodiment of the present application provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program, and the computer program is executed by a processor.
  • the data storage provided in the first aspect of the embodiment of the present application Method steps of the method.
  • an embodiment of the present application provides an application program for executing at runtime: the data storage method provided in the first aspect of the embodiment of the present application.
  • the cloud storage server determines the data type of the data to be stored, it can determine the corresponding security level of the data to be stored according to the preset corresponding relationship between different data types and different security levels, so that Generate verification data that meets the security level of the data to be stored.
  • the data to be stored is coded with EC technology, more copies of the verification data can be generated, and the data to be stored and the generated multiple copies of the verification data are separated.
  • N + m storage nodes to further ensure that when some storage nodes fail, the data with a higher security level can still be restored by the data stored in the storage nodes that have not failed, thereby further Keep your important data safe.
  • it is not necessary to achieve all the advantages described above at the same time.
  • FIG. 1a is a schematic flowchart of a data storage method according to an embodiment of the present application.
  • FIG. 1b is a schematic flowchart of step S104 in the embodiment of the present application.
  • FIG. 2 is another schematic flowchart of a data storage method according to an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a specific implementation of a data storage method according to an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a data storage device according to an embodiment of the present application.
  • FIG. 5 is another schematic structural diagram of a data storage device according to an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of a cloud storage server according to an embodiment of the present application.
  • network RAID Redundant Arrays of Independent Disks
  • network RAID can protect user data across nodes on the basis of saving user costs.
  • the implementation of network RAID is mainly based on EC technology.
  • critical data such as real-time video data, alarm video data, and intelligent streaming data, the security is consistent with ordinary data.
  • the security level of the data is N + M
  • the number of storage nodes that are simultaneously offline in the cluster is greater than M
  • the real-time streaming data, intelligent data, The alarm data and so on are all unreadable, and at this time, if you want to view the recording of the alarm event under the front-end camera device, you will not be able to view it, or you need to view the smart data under the front-end camera device.
  • a data storage method determines when a cloud storage server receives data sent from a front-end camera device, determines the data type of the received data, and according to the corresponding relationship between different data types and different security levels To determine the security level corresponding to the data, so as to generate check data that conforms to the security level of the data to be stored.
  • a cloud storage server receives data sent from a front-end camera device, determines the data type of the received data, and according to the corresponding relationship between different data types and different security levels To determine the security level corresponding to the data, so as to generate check data that conforms to the security level of the data to be stored.
  • an embodiment of the present application provides a data storage method, which is applied to a cloud storage server.
  • the process may include the following steps:
  • the cloud storage server After the cloud storage server receives the data to be stored, it can determine the data type of the received data. Specifically, it can determine that the data type is real-time video data, alarm video data, or intelligent stream data.
  • the real-time video data may be a video data stream recorded by the front-end camera device under normal conditions;
  • the alarm video data may be video data recorded by the front-end camera device in an emergency situation, for example, a moving object suddenly appears in the shooting range of the current camera device
  • the intelligent stream data may be data obtained by the front-end camera device after performing light calculation on the video data, and including the characteristic information of the shooting object in the video.
  • the front-end camera device can have data processing capabilities, so that it can obtain, for example, feature information of the photographic subject, such as information such as the gender and clothing color of the person.
  • the intelligent stream data received by the cloud storage server can be data in the format of JSON (JavaScript Object Notation, a lightweight array) string.
  • the data to be stored received by the cloud storage server may carry different data type identifiers, so that the cloud storage server may determine the data type of the data to be stored according to the data type identifier. .
  • the data type identifier is 1, it can be determined that the data type of the data to be stored is real-time video data; when the data type identifier is 2, it can be determined that the data type of the data to be stored is alarm video data; when the data When the type identifier is 3, it can be determined that the data type of the data to be stored is intelligent stream data.
  • the front-end camera device may send data to be stored in the form of a data packet. By adding the foregoing data type identification field to the header of the data packet, after the cloud storage server receives the data to be stored, the cloud storage server may identify the field according to the data type therein. Determine the data type of the received data to be stored.
  • S102 Determine the security level of the data to be stored according to the preset correspondence between different data types and different security levels.
  • the security level of a data can be expressed as the N + M value of the data, where N can refer to the number of original data obtained after dividing a data into N parts, and M can refer to the N original data The number of M pieces of verification data to be generated. It is redundant data obtained after calculation by algorithms in EC technology. Where N and M are integers greater than one.
  • a correspondence relationship between different data types and different security levels is preset, and this correspondence relationship may be stored in a cloud storage server.
  • the security levels of the real-time video data, the alarm video data, and the intelligent stream data are set to be sequentially increased.
  • the security level of real-time video data can be preset to N + M
  • the security level of alarm video data can be preset to N + (M + 1)
  • the security level of intelligent stream data can be preset to N + (M + 2)
  • the server can determine the security level of the data to be stored through a preset correspondence.
  • the security levels of the above three data types may also be preset to other values, as long as the security levels of real-time video data, alarm video data, and intelligent stream data are sequentially increased.
  • step S102 may specifically include:
  • the security level of the data to be stored is N + (M + 2).
  • the security level of the real-time video data, alarm video data, and intelligent stream data determined by the cloud storage server increases in order, indicating that the server can receive different types of data to be stored sent by the front-end camera device, and can pass different Security level, when some storage nodes of the cloud storage server fail, to further ensure that these data can be restored and recovered.
  • the number of copies of the verification data to be generated by the data to be stored may be determined according to the determined security level, and the data to be stored is encoded to generate the data to be stored
  • the check data of the data that is, the check data conforming to the security level of the data to be stored.
  • Data coding technology based on EC technology, it can convert N original data, increase M data, and restore any original N data from N + M data to original data, so it can be based on the security of the data to be stored. Level to generate verification data that meets the security level of the data to be stored.
  • step S104 may specifically include:
  • the security level of the data to be stored is N + M
  • the data to be stored is divided into N equal parts of the original data, and verification data of M equal parts is generated.
  • the security level of the data to be stored is N + (M + 1)
  • the data to be stored is divided into N equal parts of the original data, and verification data of M + 1 equal parts is generated.
  • the security level of the data to be stored is N + (M + 2)
  • the data to be stored is divided into N equal parts of the original data, and verification data of M + 2 equal parts is generated.
  • a larger number of verification data can be generated. For example, for the alarm video data with security level N + (M + 1), you can further set the security level to N + (M + 2), and the number of copies of the generated verification data is M + 2; for the security level, For the intelligent stream data of N + (M + 2), the security level can be further set to N + (M + 3), and the number of copies of the generated verification data is M + 3.
  • Data coding technology based on EC technology, it can convert N original data, increase M data, and restore any original N data from N + M data to original data, so it can be based on the security level of the data to be stored. Generate verification data that meets the security level of the data to be stored, and store the data and verification data in a number of storage nodes that are consistent with the security level of the data to be stored, that is, to N + m storage nodes respectively.
  • the data to be stored may be divided into multiple copies of original data, and the generated verification data that meets the security level of the data to be stored may also be multiple copies.
  • the data to be stored and the verification data may be stored in a storage node of the cloud storage server.
  • the above-mentioned multiple copies of the original data and multiple copies of the verification data can be stored in the same number of storage nodes as the sum of their numbers, and even when some storage nodes fail, they can still pass through the storage nodes that have not failed The data stored in is restored.
  • the sum of the number of copies of the original data and the verification data is the security level of the data, that is, the number of storage nodes used to store the data to be stored is consistent with the security level of the data to be stored.
  • step S104 may specifically include:
  • m is the number of storage nodes required to verify the data.
  • the security level of the data to be stored is N + (M + 1)
  • the number of original data divided by the data to be stored is N
  • the number of copies of the verification data generated by the data to be stored is (M + 1) copies
  • the security level of the data to be stored is N + (M + 2)
  • the number of original data divided by the data to be stored is N
  • the number of copies of the verification data generated by the data to be stored is (M + 2) copies
  • the cloud storage server determines the data type of the data to be stored, it can determine the corresponding security level of the data to be stored according to the preset corresponding relationship between different data types and different security levels, so that Generate verification data that meets the security level of the data to be stored.
  • the data to be stored is coded with EC technology, more copies of the verification data can be generated, and the data to be stored and the generated multiple copies of the verification data are separated.
  • N + m storage nodes to further ensure that when some storage nodes fail, the data with a higher security level can still be restored by the data stored in the storage nodes that have not failed, thereby further Keep your important data safe.
  • FIG. 2 is another schematic flowchart of a data storage method according to an embodiment of the present application. The process is applied to a cloud storage server and includes the following steps:
  • the cloud storage server can receive the data to be stored sent by the front-end camera device, and store the received data to be stored in its own storage node.
  • the cloud storage server can also receive data from different front-end camera devices.
  • S203 Determine the security level of the data to be stored according to the preset correspondence between different data types and different security levels.
  • steps S202 to S205 are performed with reference to the processes of S101 to S104 in FIG. 1a, and details are not described herein again.
  • S206 Generate storage result information for the data to be stored, where the storage result information includes an identifier of whether the data to be stored was successfully stored, and a name of a storage node for storing the data to be stored.
  • the cloud storage server may generate identification information for the data to be stored successfully. Exemplarily, the information may be identified as "successfully stored”.
  • the cloud storage server can also record the storage location of the stored data and its verification data, that is, which storage nodes are located, and the names of these storage nodes, so as to facilitate data query based on the storage location.
  • the stored data refers to the storage to be stored.
  • the stored data corresponding to the data.
  • a data storage method provided in the embodiment of the present application after the data to be stored sent by the front-end camera device is successfully stored, information about a storage result for the data to be stored can be generated, thereby facilitating data query according to the storage location and thus facilitating Query whether the data to be stored has been successfully stored, and query the storage location of the stored data in the cloud storage server.
  • a cloud storage server is provided with a video access module (AccessService) for receiving data sent from a front-end camera device;
  • Encoding unit Encoder
  • Encoder is used to perform EC encoding on the data and send the encoded data to the storage node;
  • the method includes the following steps:
  • the front-end device sends data to be stored to the video access module.
  • the front-end device can actively push data to the video access module, or it can send data to the video access module according to the acquisition request of the video access module.
  • the data can include data such as real-time video data, alarm video data, or intelligent streaming data.
  • the video access module After receiving the data to be stored, the video access module determines a data type of the received data, for example, real-time video data, alarm video data, or intelligent stream data.
  • a data type of the received data for example, real-time video data, alarm video data, or intelligent stream data.
  • the video access module obtains preset correspondences between different data types and different security levels, thereby determining the security level of the data to be stored.
  • the video access module sends the data to be stored and the security level corresponding to the data to be stored to the encoding calculation unit.
  • the encoding calculation unit encodes the data to be stored, and generates corresponding verification data that meets the security level of the data to be stored.
  • the encoding calculation unit sends the encoded data to a different data storage server.
  • the data storage server After the data storage server stores the encoded data, it returns the storage result information to the encoding calculation unit.
  • the encoding calculation unit returns the foregoing storage result information to the video access module.
  • a data storage method provided in the embodiment of the present application.
  • a cloud storage server receives data sent from a front-end camera device, it can determine a security level corresponding to the data to be stored according to different data types of the data, so as to generate data consistent with the data to be stored.
  • Security-level check data In this way, when the data is coded using EC technology, more copies of the check data can be generated, and then the data divided into multiple original data and the generated multiple check data are stored separately.
  • FIG. 4 is a schematic structural diagram of a data storage device according to an embodiment of the present application, including:
  • the first determining module 401 is configured to determine a data type of data to be stored.
  • the second determining module 402 is configured to determine a security level of data to be stored according to preset correspondences between different data types and different security levels.
  • the first generating module 403 is configured to generate verification data that conforms to the security level of the data to be stored according to the determined security level of the data to be stored.
  • the storage module 404 is configured to store the data and the verification data to N + m storage nodes, respectively, where the number of N + m is consistent with the security level of the data to be stored.
  • the first determining module 401 is specifically configured to determine a data type of the data to be stored according to a data type identifier in the data to be stored.
  • the second determining module 402 is specifically configured to:
  • the security level of the data to be stored is N + M, where N and M are both integers greater than 1.
  • the security level of the data to be stored is N + (M + 2).
  • the first generating module 403 is specifically configured to:
  • the security level of the data to be stored is N + M
  • the data to be stored is divided into N equal parts of the original data, and verification data of M equal parts is generated
  • the security level of the data to be stored is N + (M + 2)
  • the data to be stored is divided into N equal parts of the original data, and verification data of M + 2 equal parts is generated.
  • the storage module 404 is specifically configured to:
  • N + M the security level of the data to be stored is N + M
  • the cloud storage server determines the data type of the data to be stored, it can determine the corresponding security level of the data to be stored according to the preset corresponding relationship between different data types and different security levels, so that Generate verification data that meets the security level of the data to be stored.
  • the data to be stored is coded with EC technology, more copies of the verification data can be generated, and the data to be stored and the generated multiple copies of the verification data are separated.
  • N + m storage nodes to further ensure that when some storage nodes fail, the data with a higher security level can still be restored by the data stored in the storage nodes that have not failed, thereby further Keep your important data safe.
  • FIG. 5 is another schematic diagram of the structure of the data storage device according to the embodiment of the present application, including:
  • the receiving module 501 is configured to receive data to be stored sent by a front-end camera device.
  • the first determining module 401 is configured to determine a data type of data to be stored.
  • the second determining module 402 is configured to determine a security level of data to be stored according to preset correspondences between different data types and different security levels.
  • the first generating module 403 is configured to generate verification data that conforms to the security level of the data to be stored according to the determined security level of the data to be stored.
  • the storage module 404 is configured to store the data and the verification data to N + m storage nodes, respectively, where the number of N + m is consistent with the security level of the data to be stored.
  • the second generating module 502 is configured to generate storage result information for the data to be stored, where the storage result information includes identification information that the data to be stored has been successfully stored, and a storage node name for storing the data to be stored.
  • a data storage device provided in the embodiment of the present application can generate storage result information for the data to be stored after the data to be stored sent by the front-end camera device is successfully stored, thereby facilitating querying whether the data to be stored has been successfully stored. And query the storage location of the stored data in the cloud storage server.
  • the server 600 includes a processor 601 and a machine-readable storage medium 602.
  • the machine-readable storage medium stores a machine executable executable by the processor. Instructions, the processor is caused by machine-executable instructions to implement the following steps:
  • the data to be stored and the verification data are respectively stored to N + m storage nodes, and the number of N + m is consistent with the security level of the data to be stored.
  • a cloud storage server provided in the embodiment of the present application. After determining the data type of the data to be stored, the cloud storage server can determine the security level corresponding to the data to be stored according to preset correspondences between different data types and different security levels, thereby Generate verification data that meets the security level of the data to be stored. In this way, when the data to be stored is coded with EC technology, more copies of the verification data can be generated, and the data to be stored and the generated multiple copies of the verification data are separated. Store to N + m storage nodes to further ensure that when some storage nodes fail, the data with a higher security level can still be restored by the data stored in the storage nodes that have not failed, thereby further Keep your important data safe.
  • the machine-readable storage medium mentioned in the foregoing server may include Random Access Memory (RAM), and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
  • the storage medium may also be at least one storage device located far from the foregoing processor.
  • the above-mentioned processor may be a general-purpose processor, including a central processing unit (CPU), a network processor (NP), and the like; and a digital signal processor (DSP) Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU central processing unit
  • NP network processor
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • An embodiment of the present application further provides a computer-readable storage medium, and a computer program is stored in the computer-readable storage medium to perform the following steps:
  • the data to be stored and the verification data are respectively stored to N + m storage nodes, and the number of N + m is consistent with the security level of the data to be stored.
  • the cloud storage server after the cloud storage server determines the data type of the data to be stored, it can determine the corresponding security level of the data to be stored according to the preset corresponding relationship between different data types and different security levels.
  • the cloud storage server determines the corresponding security level of the data to be stored according to the preset corresponding relationship between different data types and different security levels.
  • the data is stored in N + m storage nodes respectively, to further ensure that when some storage nodes fail, the stored data with a higher security level can still be restored through the data stored in the storage nodes that have not failed, So as to further ensure the security of important data.
  • the embodiment of the present application further provides a computer program product, which is used to execute the following steps when it runs on a computer:
  • the data to be stored and the verification data are respectively stored to N + m storage nodes, and the number of N + m is consistent with the security level of the data to be stored.
  • the cloud storage server determines the data type of the data to be stored, it can determine the corresponding security level of the data to be stored according to preset correspondences between different data types and different security levels, thereby generating Verification data that conforms to the security level of the data to be stored.
  • the data to be stored is encoded with EC technology, more copies of the verification data can be generated, and the to-be-stored data and the generated multiple copies of the verification data are stored separately.
  • N + m storage nodes to further ensure that when some storage nodes fail, the data with a higher security level can still be restored from the data stored in the storage nodes that did not fail, thereby further ensuring Security of important data.
  • the device, the cloud storage server, and the storage medium in the embodiments of the present application are a device, a cloud storage server, and a storage medium to which the foregoing data storage method is applied, and all embodiments of the foregoing data storage method are applicable to the device, Both cloud storage servers and storage media can achieve the same or similar beneficial effects.

Abstract

本申请实施例提供了一种数据存储方法及存储装置,其中方法包括:确定待存储数据的数据类型;根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别;根据所确定的待存储数据的安全级别,生成符合待存储数据安全级别的校验数据;将待存储数据和校验数据分别存储至N+m个存储节点,其中,N+m数量与待存储数据的安全级别一致。本申请实施例提供的数据存储方法及存储装置,能够进一步保证重要数据的安全性。

Description

一种数据存储方法及存储装置
本申请要求于2018年09月04日提交中国专利局、申请号为201811025881.7,发明名称为“一种数据存储方法及存储装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及数据存储技术领域,特别是涉及一种数据存储方法及存储装置。
背景技术
视频云存储技术是一种用于数据云端存储的技术,云存储服务器可以接收来自前端摄像设备的数据,并对数据进行存储。目前的云存储服务器在对数据进行存储时,通常只保存一个副本,为了避免数据因存储节点故障丢失,多采用EC(erasure code,纠删码)技术存储数据。
EC技术是一种数据编码技术,它可以将N份原始数据,增加M份数据,并能通过N+M份中的任意N份数据,还原为原始数据,即,如果有任意小于等于M份的数据失效,仍然能够通过剩下的N份数据还原出原始数据。云存储服务器利用EC技术存储数据时,具体地,可以在接收来自前端摄像设备的数据后,根据预设的安全级别N+M值,将所接收的数据划分为N份,再为这N份数据生成M份校验数据,然后将这N+M份数据分别存储至N+M个存储节点中。
前端摄像设备发送的数据中,通常包括实时视频数据、告警视频数据和智能流数据,其中,实时视频数据为摄像设备在正常情况下录制的视频数据;告警视频数据为摄像设备在紧急情况下录制的视频数据;智能流数据为摄像设备对视频数据轻量计算后,得到的含有该视频中拍摄对象特征信息的数据,例如,视频中的人物性别、衣着颜色等特征。目前的云存储服务器,对于同一摄像设备发送的数据,通常采用相同的安全级别进行编码并存储。但是,云存储服务器中,对于存储该前端设备所发送数据的N+M个存储节点而言,当其中M个存储节点出现故障时(即M份数据失效时),由于实时视频数据、告警视频数据和智能流数据均采用相同的安全级别,不仅会导致实时视频数 据无法被还原,更会导致包括告警视频数据和智能流数据在内的重要程度更高的数据也无法被还原。
发明内容
本申请实施例的目的在于提供一种数据存储方法及存储装置,以进一步保证当云存储服务器的部分存储节点出现故障时,其中存储的重要数据能够被还原。具体技术方案如下:
第一方面,本申请实施例提供了一种数据存储方法,应用于云存储服务器,所述方法包括:
确定待存储数据的数据类型;
根据预设的不同数据类型与不同安全级别的对应关系,确定所述待存储数据的安全级别;
根据所确定的所述待存储数据的安全级别,生成符合所述待存储数据安全级别的校验数据;
将所述待存储数据和所述校验数据分别存储至N+m个存储节点,其中,N+m数量与所述待存储数据的安全级别一致。
可选地,所述确定待存储数据的数据类型之前,所述方法还包括:
接收由前端摄像设备发送的待存储数据。
可选地,所述确定待存储数据的数据类型,包括:
根据所述待存储数据中的数据类型标识,确定所述待存储数据的数据类型。
可选地,所述根据预设的不同数据类型与不同安全级别的对应关系,确定所述待存储数据的安全级别,包括:
当所述待存储数据的数据类型为实时视频数据时,确定所述待存储数据的安全级别为N+M,其中N和M均为大于1的整数;
当所述待存储数据的数据类型为告警视频数据时,确定所述待存储数据的安全级别为N+(M+1);
当所述待存储数据的数据类型为智能流数据时,确定所述待存储数据的安全级别为N+(M+2)。
可选地,所述根据所确定的所述待存储数据的安全级别,生成符合所述待存储数据安全级别的校验数据,包括:
当所述待存储数据的安全级别为N+M时,将所述待存储数据划分为N等份的原始数据,并生成M等份的校验数据;
当所述待存储数据的安全级别为N+(M+1)时,将所述待存储数据划分为N等份的原始数据,并生成M+1等份的校验数据;
当所述待存储数据的安全级别为N+(M+2)时,将所述待存储数据划分为N等份的原始数据,并生成M+2等份的校验数据。
可选地,所述将所述待存储数据和所述校验数据分别存储至N+M个存储节点,包括:
当所述待存储数据的安全级别为N+M时,将经EC纠删码编码后的N等份原始数据和M等份校验数据,分别存储至N+M个存储节点中,其中M=m;
当所述待存储数据的安全级别为N+(M+1)时,将经EC编码后的N等份原始数据和M+1等份校验数据,分别存储至N+(M+1)个存储节点中,其中M+1=m;
当所述待存储数据的安全级别为N+(M+2)时,将经EC编码后的N等份原始数据和M+2等份校验数据,分别存储至N+(M+2)个存储节点中,其中M+2=m。
可选地,所述将所述待存储数据和所述校验数据分别存储至N+M个存储节点之后,所述方法还包括:
生成针对所述待存储数据的存储结果信息,所述存储结果信息中包括:所述待存储数据已成功存储的标识信息,以及用于存储所述待存储数据的存储节点名称。
第二方面,本申请实施例提供了一种数据存储装置,应用于云存储服务器,所述装置包括:
第一确定模块,用于确定待存储数据的数据类型;
第二确定模块,用于根据预设的不同数据类型与不同安全级别的对应关系,确定所述待存储数据的安全级别;
第一生成模块,用于根据所确定的所述待存储数据的安全级别,生成符合所述待存储数据安全级别的校验数据;
存储模块,用于将所述待存储数据和所述校验数据分别存储至N+m个存储节点,其中,N+m数量与所述待存储数据的安全级别一致。
可选地,所述装置还包括:
接收模块,用于接收由前端摄像设备发送的待存储数据。
可选地,所述第一确定模块,具体用于:
根据所述待存储数据中的数据类型标识,确定所述待存储数据的数据类型。
可选地,所述第二确定模块,具体用于:
当所述待存储数据的数据类型为实时视频数据时,确定所述待存储数据的安全级别为N+M,其中N和M均为大于1的整数;
当所述待存储数据的数据类型为告警视频数据时,确定所述待存储数据的安全级别为N+(M+1);
当所述待存储数据的数据类型为智能流数据时,确定所述待存储数据的安全级别为N+(M+2)。
可选地,所述第一生成模块,具体用于:
当所述待存储数据的安全级别为N+M时,将所述待存储数据划分为N等份的原始数据,并生成M等份的校验数据;
当所述待存储数据的安全级别为N+(M+1)时,将所述待存储数据划分为N等份的原始数据,并生成M+1等份的校验数据;
当所述待存储数据的安全级别为N+(M+2)时,将所述待存储数据划分 为N等份的原始数据,并生成M+2等份的校验数据。
可选地,所述存储模块,具体用于:
当所述待存储数据的安全级别为N+M时,将经EC纠删码编码后的N等份原始数据和M等份校验数据,分别存储至N+m个存储节点中,其中M=m;
当所述待存储数据的安全级别为N+(M+1)时,将经EC编码后的N等份原始数据和M+1等份校验数据,分别存储至N+(M+1)个存储节点中,其中M+1=m;
当所述待存储数据的安全级别为N+(M+2)时,将经EC编码后的N等份原始数据和M+2等份校验数据,分别存储至N+(M+2)个存储节点中,其中M+2=m。
可选地,所述装置还包括:
第二生成模块,用于生成针对所述待存储数据的存储结果信息,所述存储结果信息中包括:所述待存储数据已成功存储的标识信息,以及用于存储所述待存储数据的存储节点名称。
第三方面,本申请实施例提供了一种云存储服务器,包括处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现本申请实施例第一方面提供的数据存储方法的方法步骤。
第四方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行本申请实施例第一方面提供的数据存储方法的方法步骤。
第五方面,本申请实施例提供了一种应用程序,用于在运行时执行:本申请实施例第一方面所提供的数据存储方法。
本申请实施例提供的一种数据存储方法,云存储服务器确定待存储数据的数据类型后,可以根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据对应的安全级别,从而生成符合该待存储数据安全级别的校验数据,这样,在对待存储数据采用EC技术编码时,可以生成更多份的校验 数据,进而将待存储数据和所生成的多份校验数据分别存储至N+m个存储节点中,以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据还原,从而进一步保证重要数据的安全性。当然,实施本申请的任一产品或方法必不一定需要同时达到以上所述的所有优点。
附图说明
为了更清楚地说明本申请实施例和现有技术的技术方案,下面对实施例和现有技术中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1a为本申请实施例提供的数据存储方法的一种流程示意图;
图1b本申请实施例中步骤S104的一种流程示意图;
图2为本申请实施例提供的数据存储方法的另一种流程示意图;
图3为本申请实施例提供的数据存储方法的一种具体实现流程示意图;
图4为本申请实施例提供的数据存储装置的一种结构示意图;
图5为本申请实施例提供的数据存储装置的另一种结构示意图;
图6为本申请实施例提供的云存储服务器的一种结构示意图。
具体实施方式
为使本申请的目的、技术方案、及优点更加清楚明白,以下参照附图并举实施例,对本申请进一步详细说明。显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
在常规的云存储系统中,前端摄像设备发送的视频数据往往只保存为一个副本,若发生机器故障,很容易造成数据丢失。目前,云存储系统中的网络RAID(Redundant Arrays of Independent Disks,磁盘阵列)可以在节约用户成本的基础上,对用户的数据进行跨节点保护,网络RAID的实现方式主要基于EC技术。但是对于一些关键性数据,例如,实时视频数据、告警视频数据和智能流数据等,在安全性方面还是与普通数据一致。针对某前端摄像设备发送的数据,如果该数据的安全级别为N+M,当集群中同时掉线的存储节点个数大于M个时,则该前端摄像设备对应的实时流数据、智能数据、告警数据等全部不可读,而这时如果想查看该前端摄像设备下的告警事件发生时的录像时,将无法查看,或者需要查看该前端摄像设备下的智能数据时,亦无法查看。
基于上述问题,本申请实施例提供的一种数据存储方法,当云存储服务器接收来自前端摄像设备所发送的数据时,确定所接收数据的数据类型,根据不同数据类型与不同安全级别的对应关系,确定该数据对应的安全级别,从而生成符合待存储数据安全级别的校验数据。这样,在对数据编码时,可以生成更多份的校验数据,即使当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据所还原。
如图1a所示,本申请实施例提供了一种数据存储方法,应用于云存储服务器,该过程可以包括以下步骤:
S101,确定待存储数据的数据类型。
云存储服务器接收待存储数据后,可以确定所接收数据的数据类型,具体地,可以确定数据类型为实时视频数据、告警视频数据或智能流数据。其中,实时视频数据可以是前端摄像设备在正常情况下录制的视频数据流;告警视频数据可以是前端摄像设备在紧急情况下录制的视频数据,例如:当前端摄像设备拍摄范围内突然出现运动物体时所拍摄的视频;智能流数据可以是前端摄像设备对视频数据进行轻量计算后,得到的含有该视频中拍摄对象特征信息的数据。前端摄像设备可以具有数据处理能力,从而能够得到例如拍摄对象的特征信息,例如,人物的性别、衣着颜色等信息。云存储服务器 所接收的智能流数据可以为JSON(JavaScript Object Notation,一种轻量级数组)字符串格式的数据。
作为本申请实施例一种可选的实施方式,云存储服务器所接收的待存储数据中,可以携带不同的数据类型标识,从而使云存储服务器可以根据数据类型标识,确定待存储数据的数据类型。示例性地,当数据类型标识为1时,可以确定该待存储数据的数据类型为实时视频数据;当数据类型标识为2时,可以确定该待存储数据的数据类型为告警视频数据;当数据类型标识为3时,可以确定该待存储数据的数据类型为智能流数据。具体地,前端摄像设备可以以数据包的形式发送待存储数据,通过在数据包的包头中添加上述数据类型标识字段,使云存储服务器接收待存储数据后,可以根据其中的数据类型标识字段,确定所接收待存储数据的数据类型。
S102,根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别。
在EC技术中,一个数据的安全级别可以表示为该数据的N+M数值,其中N可以指将一个数据划分为N份后得到的原始数据的份数,M可以指针对这N份原始数据所需生成的M份校验数据的份数,它是经EC技术中的算法计算后得到的冗余数据。其中的N和M均为大于1的整数。
本申请实施例中,预先设置了不同数据类型与不同的安全级别的对应关系,这个对应关系可以存储在云存储服务器中。本申请实施例中,为了进一步保证智能流数据及告警视频数据能够恢复,将实时视频数据、告警视频数据及智能流数据的安全级别设置为依次升高。例如:实时视频数据的安全级别可以预设为N+M,则告警视频数据的安全级别可以预设为N+(M+1),智能流数据的安全级别可以预设为N+(M+2),服务器在确定所接收待存储数据的数据类型后,即可通过预设的对应关系,确定该待存储数据的安全级别。
本申请实施例中,上述三种数据类型的安全级别还可以预设为其它数值,只要保证实时视频数据、告警视频数据及智能流数据的安全级别依次升高即可。
作为本申请实施例一种可选的实施方式,上述步骤S102具体可以包括:
当待存储数据的数据类型为实时视频数据时,确定待存储数据的安全级别为N+M。
当待存储数据的数据类型为告警视频数据时,确定待存储数据的安全级别为N+(M+1)。
当待存储数据的数据类型为智能流数据时,确定待存储数据的安全级别为N+(M+2)。
由上述内容可知,云存储服务器所确定的实时视频数据、告警视频数据及智能流数据的安全级别依次升高,说明服务器可以在接收前端摄像设备发送的不同类型的待存储数据后,可以通过不同的安全级别,在云存储服务器的部分存储节点出现故障时,以进一步保证这些数据能够被还原恢复。
S103,根据所确定的待存储数据的安全级别,生成符合待存储数据安全级别的校验数据。
本申请实施例中,在确定待存储数据的安全级别后,可以根据所确定的安全级别,确定该待存储数据需生成的校验数据的份数,对待存储数据进行编码,从而生成该待存储数据的校验数据,也即,符合该待存储数据安全级别的校验数据。
基于EC技术的数据编码技术,它可以将N份原始数据,增加M份数据,并能通过N+M份中的任意N份数据,还原为原始数据,因此可以根据所接收待存储数据的安全级别,生成符合待存储数据安全级别的校验数据。
作为本申请实施例一种可选的实施方式,上述步骤S104具体可以包括:
当待存储数据的安全级别为N+M时,将待存储数据划分为N等份的原始数据,并生成M等份的校验数据。
当待存储数据的安全级别为N+(M+1)时,将待存储数据划分为N等份的原始数据,并生成M+1等份的校验数据。
当待存储数据的安全级别为N+(M+2)时,将待存储数据划分为N等份的原始数据,并生成M+2等份的校验数据。
根据上述内容可知,随着待存储数据安全级别的升高,所生成校验数据 份数也随之增加,意味着该待存储数据的安全程度也在增加。这是由于对于所接收的待存储数据来说,在该待存储数据的原始数据份数一定的情况下,随着校验数据份数的增多,可以用于进行数据还原的数据数量也增多,即使原始数据或校验数据中的其中几份数据丢失,只要不小于M值,就可以利用剩余的数据还原出数据。
为了进一步保证数据的安全性,如果需要更高的安全级别,则可以生成更多份数的校验数据。例如,对于安全级别为N+(M+1)的告警视频数据,可以将其安全级别进一步设置为N+(M+2),则生成的校验数据份数为M+2份;对于安全级别为N+(M+2)的智能流数据,可以将其安全级别进一步设置为N+(M+3),则生成的校验数据份数为M+3份。
S104,将待存储数据和校验数据分别存储至N+m个存储节点,N+m数量与待存储数据的安全级别一致。
基于EC技术的数据编码技术,它可以将N份原始数据,增加M份数据,并能通过N+M份中的任意N份数据,还原为原始数据,因此可以根据待存储数据的安全级别,生成符合待存储数据安全级别的校验数据,并在与该待存储数据的安全级别一致数量的存储节点中,分别存储该数据和校验数据,即分别存储至N+m个存储节点。
本申请实施例中,在确定待存储数据的安全级别后,可以将该待存储数据划分为多份原始数据,所生成的符合该待存储数据安全级别的校验数据也可以为多份,因此可以将待存储数据和校验数据存储至云存储服务器的存储节点中。当然,可以将上述多份原始数据和多份校验数据,分别存储至与它们份数之和相同数量的存储节点中,即使当部分存储节点出现故障时,仍能够通过未出现故障的存储节点中所存储的数据所还原。而原始数据和校验数据的份数之和即为该数据的安全级别,也即,用于存储待存储数据的存储节点的数量与待存储数据的安全级别一致。
作为本申请实施例一种可选的实施方式,如图1b所示,上述步骤S104具体可以包括:
S1401,当待存储数据的安全级别为N+M时,将经EC纠删码编码后的N等 份原始数据和M等份校验数据,分别存储至N+M个存储节点中。
m为校验数据所需的存储节点数量,当待存储数据的安全级别增加时,m随之增大。如果确定该待存储数据的安全级别为N+M,则该待存储数据所划分的原始数据份数为N份,该待存储数据所生成的校验数据的份数为M份,因此可以将它们分别存储至N+M个存储节点中,此时M=m。即使当部分存储节点出现故障时,只要故障节点的数量不大于M值,仍能够通过未出现故障的存储节点中所存储的数据所还原。
S1402,当待存储数据的安全级别为N+(M+1)时,将经EC编码后的N等份原始数据和M+1等份校验数据,分别存储至N+(M+1)个存储节点中。
如果确定该待存储数据的安全级别为N+(M+1),则该待存储数据所划分的原始数据份数为N份,该待存储数据所生成的校验数据的份数为(M+1)份,因此可以将它们分别存储至N+(M+1)个存储节点中,此时M+1=m。即使当部分存储节点出现故障时,只要故障节点的数量不大于M+1值,仍能够通过未出现故障的存储节点中所存储的数据所还原。也就是说,可被容忍出现故障的节点数量,相比于步骤S1401中的存储节点数量增加一个,从而使数据的存储安全性得到提升。
S1403,当待存储数据的安全级别为N+(M+2)时,将经EC编码后的N等份原始数据和M+2等份校验数据,分别存储至N+(M+2)个存储节点中。
如果确定该待存储数据的安全级别为N+(M+2),则该待存储数据所划分的原始数据份数为N份,该待存储数据所生成的校验数据的份数为(M+2)份,因此可以将它们分别存储至N+(M+2)个存储节点中,此时M+2=m。即使当部分存储节点出现故障时,只要故障节点的数量不大于M+2值,仍能够通过未出现故障的存储节点中所存储的数据所还原。也就是说,可被容忍出现故障的节点数量,相比于步骤S1401中的存储节点数量增加两个,从而使数据的存储安全性进一步得到提升。
本申请实施例提供的一种数据存储方法,云存储服务器确定待存储数据的数据类型后,可以根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据对应的安全级别,从而生成符合该待存储数据安全级别的校 验数据,这样,在对待存储数据采用EC技术编码时,可以生成更多份的校验数据,进而将待存储数据和所生成的多份校验数据分别存储至N+m个存储节点中,以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据还原,从而进一步保证重要数据的安全性。
如图2所示,图2为本申请实施例提供的数据存储方法的另一种流程示意图,该流程应用于云存储服务器,包括以下步骤:
S201,接收由前端摄像设备发送的待存储数据。
云存储服务器可接收由前端摄像设备发送的待存储数据,并将所接收的待存储数据存储至自身的存储节点中,当然,云存储服务器也可以接收来自不同前端摄像设备的数据。
S202,确定待存储数据的数据类型。
S203,根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别。
S204,根据所确定的待存储数据的安全级别,生成符合待存储数据安全级别的校验数据。
S205,将待存储数据和校验数据分别存储至N+m个存储节点,N+m数量与待存储数据的安全级别一致。
本实施例中,步骤S202~S205参照图1a中S101至S104的流程执行,这里不再赘述。
S206,生成针对待存储数据的存储结果信息,其中存储结果信息中包括:待存储数据是否成功存储的标识,以及用于存储待存储数据的存储节点名称。
本申请实施例中,将待存储数据和待存储数据的校验数据进行存储后,表明待存储数据已经存储成功,则云存储服务器可以生成针对该待存储数据已成功存储的标识信息。示例性地,可以为“存储成功”标识信息。另外,云存储服务器还可以记录已存储数据及其校验数据的存储位置,即位于哪些存储 节点中,以及这些存储节点的名称,从而便于根据存储位置进行数据查询,上述已存储数据指待存储数据对应的已存储数据。
本申请实施例提供的一种数据存储方法,在前端摄像设备所发送的待存储数据被成功存储后,可以生成针对该待存储数据的存储结果信息,从而便于根据存储位置进行数据查询,从而便于查询待存储数据是否已经成功存储,以及查询已存储数据在云存储服务器中的存储位置。
如图3所示,本申请实施例提供的数据存储方法的一种具体实现流程,其中,云存储服务器中设置有视频接入模块(AccessService),用于接收来自前端摄像设备所发送的数据;编码计算单元(Encoder),用于对数据进行EC编码,并将编码后的数据发送至存储节点;多个存储节点,一个存储节点对应一个数据存储服务器(StoragerService),数据存储服务器用于将经编码后的数据存储到本地磁盘。该方法包括以下步骤:
S301,前端设备向视频接入模块发送待存储数据,当然,前端设备可以主动向视频接入模块推送数据,也可以根据视频接入模块的获取请求,向视频接入模块发送数据,所发送的数据中可以包括实时视频数据、告警视频数据或智能流数据等数据。
S302,视频接入模块接收待存储数据后,确定所接收数据的数据类型,例如:实时视频数据、告警视频数据或智能流数据。
S303,视频接入模块获取预设的不同数据类型与不同安全级别的对应关系,从而确定待存储数据的安全级别。
S304,视频接入模块将待存储数据和该待存储数据对应的安全级别发送至编码计算单元。
S305,编码计算单元对待存储数据进行编码,生成相应的符合该待存储数据安全级别的校验数据。
S306,编码计算单元将经编码后的数据,发送至不同的数据存储服务器中。
S307,数据存储服务器存储经编码的数据后,返回存储结果信息至编码计算单元。
S308,编码计算单元将上述存储结果信息返回至视频接入模块。
本申请实施例提供的一种数据存储方法,当云存储服务器接收来自前端摄像设备所发送的数据时,可以根据数据不同的数据类型,确定待存储数据对应的安全级别,从而生成符合待存储数据安全级别的校验数据,这样,在对数据采用EC技术编码时,可以生成更多份的校验数据,进而将划分为多份原始数据的数据,以及所生成的多份校验数据分别存储至多个数据存储服务器中。以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据所还原,从而进一步保证重要数据的安全性。
本申请实施例提供的数据存储装置的一种具体实施例,与图1所示流程相对应,参考图4,图4为本申请实施例的数据存储装置的一种结构示意图,包括:
第一确定模块401,用于确定待存储数据的数据类型。
第二确定模块402,用于根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别。
第一生成模块403,用于根据所确定的待存储数据的安全级别,生成符合待存储数据安全级别的校验数据。
存储模块404,用于将该数据和校验数据分别存储至N+m个存储节点,其中,N+m数量与待存储数据的安全级别一致。
其中,第一确定模块401具体用于:根据待存储数据中的数据类型标识,确定待存储数据的数据类型。
其中,第二确定模块402具体用于:
当待存储数据的数据类型为实时视频数据时,确定待存储数据的安全级别为N+M,其中N和M均为大于1的整数;
当待存储数据的数据类型为告警视频数据时,确定待存储数据的安全级别为N+(M+1);
当待存储数据的数据类型为智能流数据时,确定待存储数据的安全级别为N+(M+2)。
其中,第一生成模块403具体用于:
当待存储数据的安全级别为N+M时,将待存储数据划分为N等份的原始数据,并生成M等份的校验数据;
当待存储数据的安全级别为N+(M+1)时,将待存储数据划分为N等份的原始数据,并生成M+1等份的校验数据;
当待存储数据的安全级别为N+(M+2)时,将待存储数据划分为N等份的原始数据,并生成M+2等份的校验数据。
其中,存储模块404具体用于:
当待存储数据的安全级别为N+M时,将经EC纠删码编码后的N等份原始数据和M等份校验数据,分别存储至N+m个存储节点中,其中M=m;
当待存储数据的安全级别为N+(M+1)时,将经EC编码后的N等份原始数据和M+1等份校验数据,分别存储至N+(M+1)个存储节点中,其中M+1=m;
当待存储数据的安全级别为N+(M+2)时,将经EC编码后的N等份原始数据和M+2等份校验数据,分别存储至N+(M+2)个存储节点中,其中M+2=m。
本申请实施例提供的一种数据存储装置,云存储服务器确定待存储数据的数据类型后,可以根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据对应的安全级别,从而生成符合该待存储数据安全级别的校验数据,这样,在对待存储数据采用EC技术编码时,可以生成更多份的校验数据,进而将待存储数据和所生成的多份校验数据分别存储至N+m个存储节点中,以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据还原,从而进一步保证重要数据的安全性。
本申请实施例提供的数据存储装置的一种具体实施例,与图2所示流程相对应,参考图5,图5为本申请实施例的数据存储装置的另一种结构示意图,包括:
接收模块501,用于接收由前端摄像设备发送的待存储数据。
第一确定模块401,用于确定待存储数据的数据类型。
第二确定模块402,用于根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别。
第一生成模块403,用于根据所确定的待存储数据的安全级别,生成符合待存储数据安全级别的校验数据。
存储模块404,用于将该数据和校验数据分别存储至N+m个存储节点,其中,N+m数量与待存储数据的安全级别一致。
第二生成模块502,用于生成针对待存储数据的存储结果信息,其中存储结果信息中包括:待存储数据已成功存储的标识信息,以及用于存储待存储数据的存储节点名称。
本申请实施例提供的一种数据存储装置,在前端摄像设备所发送的待存储数据被成功存储后,可以生成针对该待存储数据的存储结果信息,从而便于查询待存储数据是否已经成功存储,以及查询已存储数据在云存储服务器中的存储位置。
本申请实施例还提供了一种云存储服务器,如图6所示,该服务器600包括处理器601和机器可读存储介质602,机器可读存储介质存储有能够被处理器执行的机器可执行指令,处理器被机器可执行指令促使实现以下步骤:
确定待存储数据的数据类型;
根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别;
根据所确定的数据的安全级别,生成符合待存储数据安全级别的校验数据;
将待存储数据和校验数据分别存储至N+m个存储节点,N+m数量与待存储数据的安全级别一致。
本申请实施例提供的一种云存储服务器,云存储服务器确定待存储数据的数据类型后,可以根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据对应的安全级别,从而生成符合该待存储数据安全级别的校验数据,这样,在对待存储数据采用EC技术编码时,可以生成更多份的校验数据,进而将待存储数据和所生成的多份校验数据分别存储至N+m个存储节点中,以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据还原,从而进一步保证重要数据的安全性。
上述服务器提到的机器可读存储介质可以包括随机存取存储器(Random Access Memory,简称RAM),也可以包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。可选的,存储介质还可以是至少一个位于远离前述处理器的存储装置。
上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)、网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(Digital Signal Processing,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现场可编程门阵列(Field-Programmable Gate Array,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。
本申请实施例还提供了一种计算机可读存储介质,计算机可读存储介质内存储有计算机程序,用以执行如下步骤:
确定待存储数据的数据类型;
根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别;
根据所确定的数据的安全级别,生成符合待存储数据安全级别的校验数 据;
将待存储数据和校验数据分别存储至N+m个存储节点,N+m数量与待存储数据的安全级别一致。
本申请实施例提供的一种计算机可读存储介质,云存储服务器确定待存储数据的数据类型后,可以根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据对应的安全级别,从而生成符合该待存储数据安全级别的校验数据,这样,在对待存储数据采用EC技术编码时,可以生成更多份的校验数据,进而将待存储数据和所生成的多份校验数据分别存储至N+m个存储节点中,以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据还原,从而进一步保证重要数据的安全性。
本申请实施例还提供了一种计算机程序产品,当其在计算机上运行时,用以执行如下步骤:
确定待存储数据的数据类型;
根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据的安全级别;
根据所确定的数据的安全级别,生成符合待存储数据安全级别的校验数据;
将待存储数据和校验数据分别存储至N+m个存储节点,N+m数量与待存储数据的安全级别一致。
本申请实施例提供的一种计算机程序,云存储服务器确定待存储数据的数据类型后,可以根据预设的不同数据类型与不同安全级别的对应关系,确定待存储数据对应的安全级别,从而生成符合该待存储数据安全级别的校验数据,这样,在对待存储数据采用EC技术编码时,可以生成更多份的校验数据,进而将待存储数据和所生成的多份校验数据分别存储至N+m个存储节点中,以进一步保证当部分存储节点出现故障时,所存储的具有更高安全等级的数据,仍能够通过未出现故障的存储节点中所存储的数据还原,从而进一步保证重要数据的安全性。
对于装置/服务器/存储介质实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
需要说明的是,本申请实施例的装置、云存储服务器及存储介质分别是应用上述数据存储方法的装置、云存储服务器及存储介质,则上述数据存储方法的所有实施例均适用于该装置、云存储服务器及存储介质,且均能达到相同或相似的有益效果。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的较佳实施例而已,并非用于限定本申请的保护范围。凡在本申请的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本申请的保护范围内。

Claims (17)

  1. 一种数据存储方法,其特征在于,应用于云存储服务器,所述方法包括:
    确定待存储数据的数据类型;
    根据预设的不同数据类型与不同安全级别的对应关系,确定所述待存储数据的安全级别;
    根据所确定的所述待存储数据的安全级别,生成符合所述待存储数据安全级别的校验数据;
    将所述待存储数据和所述校验数据分别存储至N+m个存储节点,其中,N+m数量与所述待存储数据的安全级别一致。
  2. 根据权利要求1所述的数据存储方法,其特征在于,所述确定待存储数据的数据类型之前,所述方法还包括:
    接收由前端摄像设备发送的待存储数据。
  3. 根据权利要求1所述的数据存储方法,其特征在于,所述确定待存储数据的数据类型,包括:
    根据所述待存储数据中的数据类型标识,确定所述待存储数据的数据类型。
  4. 根据权利要求1所述的数据存储方法,其特征在于,所述根据预设的不同数据类型与不同安全级别的对应关系,确定所述待存储数据的安全级别,包括:
    当所述待存储数据的数据类型为实时视频数据时,确定所述待存储数据的安全级别为N+M,其中N和M均为大于1的整数;
    当所述待存储数据的数据类型为告警视频数据时,确定所述待存储数据的安全级别为N+(M+1);
    当所述待存储数据的数据类型为智能流数据时,确定所述待存储数据的安全级别为N+(M+2)。
  5. 根据权利要求4所述的数据存储方法,其特征在于,所述根据所确定的所述待存储数据的安全级别,生成符合所述待存储数据安全级别的校验数据,包括:
    当所述待存储数据的安全级别为N+M时,将所述待存储数据划分为N等份的原始数据,并生成M等份的校验数据;
    当所述待存储数据的安全级别为N+(M+1)时,将所述待存储数据划分为N等份的原始数据,并生成M+1等份的校验数据;
    当所述待存储数据的安全级别为N+(M+2)时,将所述待存储数据划分为N等份的原始数据,并生成M+2等份的校验数据。
  6. 根据权利要求5所述的数据存储方法,其特征在于,所述将所述待存储数据和所述校验数据分别存储至N+m个存储节点,包括:
    当所述待存储数据的安全级别为N+M时,将经EC纠删码编码后的N等份原始数据和M等份校验数据,分别存储至N+M个存储节点中,其中M=m;
    当所述待存储数据的安全级别为N+(M+1)时,将经EC编码后的N等份原始数据和M+1等份校验数据,分别存储至N+(M+1)个存储节点中,其中M+1=m;
    当所述待存储数据的安全级别为N+(M+2)时,将经EC编码后的N等份原始数据和M+2等份校验数据,分别存储至N+(M+2)个存储节点中,其中M+2=m。
  7. 根据权利要求1或2所述的数据存储方法,其特征在于,所述将所述待存储数据和所述校验数据分别存储至N+m个存储节点之后,所述方法还包括:
    生成针对所述待存储数据的存储结果信息,所述存储结果信息中包括:所述待存储数据已成功存储的标识信息,以及用于存储所述待存储数据的存储节点名称。
  8. 一种数据存储装置,其特征在于,应用于云存储服务器,所述装置包括:
    第一确定模块,用于确定待存储数据的数据类型;
    第二确定模块,用于根据预设的不同数据类型与不同安全级别的对应关系,确定所述待存储数据的安全级别;
    第一生成模块,用于根据所确定的所述待存储数据的安全级别,生成符合所述待存储数据安全级别的校验数据;
    存储模块,用于将所述待存储数据和所述校验数据分别存储至N+m个存储节点,其中,N+m数量与所述待存储数据的安全级别一致。
  9. 根据权利要求8所述的数据存储装置,其特征在于,所述装置还包括:
    接收模块,用于接收由前端摄像设备发送的待存储数据。
  10. 根据权利要求8所述的数据存储装置,其特征在于,所述第一确定模块,具体用于:
    根据所述待存储数据中的数据类型标识,确定所述待存储数据的数据类型。
  11. 根据权利要求8所述的数据存储装置,其特征在于,所述第二确定模块,具体用于:
    当所述待存储数据的数据类型为实时视频数据时,确定所述待存储数据的安全级别为N+M,其中N和M均为大于1的整数;
    当所述待存储数据的数据类型为告警视频数据时,确定所述待存储数据的安全级别为N+(M+1);
    当所述待存储数据的数据类型为智能流数据时,确定所述待存储数据的安全级别为N+(M+2)。
  12. 根据权利要求11所述的数据存储装置,其特征在于,所述第一生成模块,具体用于:
    当所述待存储数据的安全级别为N+M时,将所述待存储数据划分为N等份的原始数据,并生成M等份的校验数据;
    当所述待存储数据的安全级别为N+(M+1)时,将所述待存储数据划分为N等份的原始数据,并生成M+1等份的校验数据;
    当所述待存储数据的安全级别为N+(M+2)时,将所述待存储数据划分为N等份的原始数据,并生成M+2等份的校验数据。
  13. 根据权利要求12所述的数据存储装置,其特征在于,所述存储模块,具体用于:
    当所述待存储数据的安全级别为N+M时,将经EC纠删码编码后的N等份原始数据和M等份校验数据,分别存储至N+m个存储节点中,其中M=m;
    当所述待存储数据的安全级别为N+(M+1)时,将经EC编码后的N等份原始数据和M+1等份校验数据,分别存储至N+(M+1)个存储节点中,其中M+1=m;
    当所述待存储数据的安全级别为N+(M+2)时,将经EC编码后的N等份原始数据和M+2等份校验数据,分别存储至N+(M+2)个存储节点中,其中M+2=m。
  14. 根据权利要求8或9所述的数据存储装置,其特征在于,所述装置还包括:
    第二生成模块,用于生成针对所述待存储数据的存储结果信息,所述存储结果信息中包括:所述待存储数据已成功存储的标识信息,以及用于存储所述待存储数据的存储节点名称。
  15. 一种云存储服务器,其特征在于,包括处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现权利要求1-7任一项所述的方法步骤。
  16. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-7任一项所述的方法步骤。
  17. 一种应用程序,其特征在于,用于在运行时执行:权利要求1-7任一项所述的方法步骤。
PCT/CN2019/104417 2018-09-04 2019-09-04 一种数据存储方法及存储装置 WO2020048488A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811025881.7 2018-09-04
CN201811025881.7A CN110874185B (zh) 2018-09-04 2018-09-04 一种数据存储方法及存储装置

Publications (1)

Publication Number Publication Date
WO2020048488A1 true WO2020048488A1 (zh) 2020-03-12

Family

ID=69716015

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/104417 WO2020048488A1 (zh) 2018-09-04 2019-09-04 一种数据存储方法及存储装置

Country Status (2)

Country Link
CN (1) CN110874185B (zh)
WO (1) WO2020048488A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112558875A (zh) * 2020-12-14 2021-03-26 北京百度网讯科技有限公司 数据校验方法、装置、电子设备及存储介质
CN113590042A (zh) * 2021-07-29 2021-11-02 杭州宏杉科技股份有限公司 一种数据保护存储方法、装置及设备
CN114218619A (zh) * 2021-12-20 2022-03-22 昊链(中山)科技有限责任公司 数据安全保护方法、装置、介质及电子设备
CN115085993A (zh) * 2022-06-08 2022-09-20 国汽智控(北京)科技有限公司 数据校验方法、装置及域控制器

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034567A (zh) * 2012-12-06 2013-04-10 华为技术有限公司 发现并修复损坏数据的装置和方法
CN104967691A (zh) * 2015-07-08 2015-10-07 浪潮(北京)电子信息产业有限公司 一种分布式存储控制方法及系统
US20160274980A1 (en) * 2015-03-20 2016-09-22 Electronics And Telecommunications Research Institute Distributed file system
CN107341070A (zh) * 2017-06-30 2017-11-10 长江大学 一种基于纠删码的随机写方法及系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006119941A (ja) * 2004-10-22 2006-05-11 Hitachi Ltd 動画像蓄積方法
CN101783795B (zh) * 2009-12-25 2013-02-13 天柏宽带网络技术(北京)有限公司 一种安全等级认证的方法和系统
CN104023246B (zh) * 2014-04-28 2018-01-30 深圳英飞拓科技股份有限公司 一种视频数据私有云存储系统和视频数据私有云存储方法
CN104657681B (zh) * 2015-03-13 2018-11-06 深圳酷派技术有限公司 一种数据存储方法及装置
CN106713940B (zh) * 2015-08-04 2019-12-20 杭州海康威视数字技术股份有限公司 视频流的存储方法、读取方法及装置
EP3430515B1 (en) * 2016-03-15 2021-09-22 Datomia Research Labs Ou Distributed storage system data management and security
CN110597453A (zh) * 2018-06-13 2019-12-20 杭州海康威视系统技术有限公司 一种云存储系统中的视频数据存储方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034567A (zh) * 2012-12-06 2013-04-10 华为技术有限公司 发现并修复损坏数据的装置和方法
US20160274980A1 (en) * 2015-03-20 2016-09-22 Electronics And Telecommunications Research Institute Distributed file system
CN104967691A (zh) * 2015-07-08 2015-10-07 浪潮(北京)电子信息产业有限公司 一种分布式存储控制方法及系统
CN107341070A (zh) * 2017-06-30 2017-11-10 长江大学 一种基于纠删码的随机写方法及系统

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112558875A (zh) * 2020-12-14 2021-03-26 北京百度网讯科技有限公司 数据校验方法、装置、电子设备及存储介质
CN113590042A (zh) * 2021-07-29 2021-11-02 杭州宏杉科技股份有限公司 一种数据保护存储方法、装置及设备
CN113590042B (zh) * 2021-07-29 2024-03-19 杭州宏杉科技股份有限公司 一种数据保护存储方法、装置及设备
CN114218619A (zh) * 2021-12-20 2022-03-22 昊链(中山)科技有限责任公司 数据安全保护方法、装置、介质及电子设备
CN115085993A (zh) * 2022-06-08 2022-09-20 国汽智控(北京)科技有限公司 数据校验方法、装置及域控制器

Also Published As

Publication number Publication date
CN110874185A (zh) 2020-03-10
CN110874185B (zh) 2021-12-17

Similar Documents

Publication Publication Date Title
WO2020048488A1 (zh) 一种数据存储方法及存储装置
US9542404B2 (en) Subpartitioning of a namespace region
US20160006461A1 (en) Method and device for implementation data redundancy
WO2020151323A1 (zh) 一种基于数据分片的数据存储方法、设备及介质
WO2018040589A1 (zh) 一种基于分布式存储系统的数据处理方法及存储设备
US9483482B2 (en) Partitioning file system namespace
KR102167613B1 (ko) 메시지 푸시 방법 및 장치
WO2019237774A1 (zh) 一种云存储系统中的视频数据存储方法及装置
CN110389859B (zh) 用于复制数据块的方法、设备和计算机程序产品
CN111046310A (zh) 页面处理方法、装置、服务器及计算机可读存储介质
WO2018233630A1 (zh) 故障发现
WO2019205788A1 (zh) 数据存储方法、存储服务器及云存储系统
CN112069169B (zh) 区块数据存储方法、装置、电子设备及可读存储介质
TWI663515B (zh) 用於物聯網設備於資料中心備份的分散式重複資料刪除儲存系統及其達成分散式重複資料刪除方法
US20160080462A1 (en) Data processing method and apparatus in service-oriented architecture system, and the service-oriented architecture system
CN109165112B (zh) 一种元数据集群的故障恢复方法、系统及相关组件
US20170116061A1 (en) Mechanism for Running Diagnostic Rules Across Multiple Nodes
CN107516048B (zh) 一种控制分布式文件系统中文件访问的方法与设备
KR20160042933A (ko) 데이터 피드 관리
US10169440B2 (en) Synchronous data replication in a content management system
CN111211993A (zh) 流式计算的增量持久化方法及其装置
US10951732B2 (en) Service processing method and device
US8095980B2 (en) Detecting malicious behavior in data transmission of a de-duplication system
WO2019072088A1 (zh) 一种文件管理方法、文件管理装置、电子设备及存储介质
US11704296B2 (en) Data management system, data management apparatus, and non-transitory computer readable medium storing data management program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19858154

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19858154

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19858154

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 04.02.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19858154

Country of ref document: EP

Kind code of ref document: A1