WO2020147413A1 - 一种数据备份方法、装置及计算机设备 - Google Patents

一种数据备份方法、装置及计算机设备 Download PDF

Info

Publication number
WO2020147413A1
WO2020147413A1 PCT/CN2019/118651 CN2019118651W WO2020147413A1 WO 2020147413 A1 WO2020147413 A1 WO 2020147413A1 CN 2019118651 W CN2019118651 W CN 2019118651W WO 2020147413 A1 WO2020147413 A1 WO 2020147413A1
Authority
WO
WIPO (PCT)
Prior art keywords
storage
node
active
active node
peer
Prior art date
Application number
PCT/CN2019/118651
Other languages
English (en)
French (fr)
Inventor
郑映锋
雷琼
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020147413A1 publication Critical patent/WO2020147413A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation

Definitions

  • This application belongs to the field of data storage technology, and in particular relates to a data backup method, device and computer equipment.
  • the traditional Internet uses the client to connect to the server, and the centralized server on the website is used to realize data backup.
  • the centralized server will become a distributed server, such as peer-to-peer. to Peer, P2P) technology.
  • P2P technology combines many users into a network, shares bandwidth, and processes information through distributed multiple clients.
  • each client terminal is both a client and a server.
  • the current distributed data backup method mainly relies on cloud storage to implement data backup, which causes the problem of high backup cost and the risk of data loss.
  • the current distributed data backup method has the problems of high data backup cost and risk of data loss.
  • embodiments of the present application provide a data backup method, device, and computer equipment to solve the problems of high data backup cost and risk of data loss in current distributed data backup methods.
  • the first aspect of the present application provides a data backup method, which is applied to a first node, and includes:
  • the authorization information includes a list of active nodes and a storage authorization signature
  • a storage completion instruction is sent to the management platform to control the central storage node to synchronize all data files stored in the peer-to-peer storage network, where
  • the central storage node is any node in the active node list, and the central storage node is designated by the control platform.
  • the second aspect of the present application provides a data backup method, which is applied to a management platform, and includes:
  • the authorization information includes an active node list and a storage authorization signature;
  • the active node list includes multiple active nodes And the identification of the central storage node;
  • control the central storage node in the active node list After receiving the storage completion instruction, control the central storage node in the active node list to synchronously backup all data files stored in the peer-to-peer storage network.
  • the third aspect of the present application provides a data backup device applied to a first node, including:
  • the request sending module is used to send a storage request for storing fragmented files to the management platform;
  • An information receiving module for receiving authorization information returned by the management platform; the authorization information includes a list of active nodes and a storage authorization signature;
  • a storage module configured to send the fragment files to each active node in the active node list for storage based on the active node list, and verify the accuracy of storage through a storage authorization signature
  • the verification module is used to verify whether the fragment file is successfully stored in each active node in the active node list
  • the backup module is used to send a storage completion instruction to the management platform to control the central storage node to store all data files stored in the peer-to-peer storage network if the fragmented file is successfully stored to each active node in the active node list Synchronous backup is performed, wherein the central storage node is any node in the active node list, and the central storage node is designated by the control platform.
  • the fourth aspect of the present application provides a data backup device applied to a management platform, including:
  • the obtaining module is used to obtain the active node in the peer-to-peer storage network after receiving the storage request of the first node;
  • the authorization module is configured to return authorization information to the first node according to the active node to control the first node to store fragmented files, the authorization information includes a list of active nodes and a storage authorization signature; the list of active nodes Including the identification of multiple active nodes and central storage nodes;
  • the synchronization module is used to control the central storage node in the active node list to synchronously backup all data files stored in the point-to-point storage network after receiving the storage completion instruction.
  • the fifth aspect of the present application provides a computer device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor.
  • the processor executes the computer program, the following is achieved step:
  • the authorization information includes a list of active nodes and a stored authorization signature
  • a storage completion instruction is sent to the management platform to control the central storage node to synchronize all data files stored in the peer-to-peer storage network, where
  • the central storage node is any node in the active node list, and the central storage node is designated by the control platform.
  • the sixth aspect of the present application provides a computer device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor.
  • the processor executes the computer program, the following is achieved step:
  • the authorization information includes an active node list and a storage authorization signature;
  • the active node list includes multiple active nodes And the identification of the central storage node;
  • control the central storage node in the active node list After receiving the storage completion instruction, control the central storage node in the active node list to synchronously backup all data files stored in the peer-to-peer storage network.
  • the data backup method, system and computer equipment provided by this application store fragmented files through the active nodes of the point-to-point storage network, and synchronize the stored data files through the central storage node, so as to realize the data files in the point-to-point storage network.
  • Effective storage while ensuring that the central storage node also has a reliable data storage, without relying on cloud storage for data backup, and at the same time, it can effectively avoid data loss, effectively solving the current distributed data backup method that has high data backup costs and existence The problem of data loss risk.
  • FIG. 1 is a schematic diagram of the implementation process of a data backup method provided in Embodiment 1 of the present application;
  • FIG. 2 is a schematic diagram of the implementation steps of the data backup method in Embodiment 1 of the present application;
  • FIG. 3 is a schematic diagram of the implementation process of step S103 corresponding to Embodiment 1 provided in Embodiment 2 of the present application;
  • FIG. 4 is a schematic diagram of the implementation process of a data backup method provided in Embodiment 3 of the present application.
  • FIG. 5 is a schematic structural diagram of a data backup device provided in Embodiment 4 of the present application.
  • FIG. 6 is a schematic structural diagram of the storage module 103 in the fourth embodiment provided by the fifth embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of a data backup device provided in Embodiment 6 of the present application.
  • FIG. 8 is a schematic diagram of a computer device provided in Embodiment 7 of the present application.
  • FIG. 9 is a schematic diagram of a computer device provided in Embodiment 8 of the present application.
  • peer-to-peer storage network (P2P storage network) to implement distributed data backup.
  • the peer-to-peer storage network includes multiple nodes, each node corresponds to a client terminal, and the client terminal has the ability to store data.
  • this embodiment provides a data backup method, which is applied to the first node, that is, implemented based on the first node that initiated the storage request, which specifically includes:
  • Step S101 Send a storage request for storing fragmented files to the management platform.
  • the above-mentioned first node refers to the node in the peer-to-peer storage network that initiates the storage request.
  • the node mentioned in this embodiment refers to the client terminal in the peer-to-peer storage network. The terminal is both a client and a server.
  • Step S102 Receive authorization information returned by the management platform.
  • the above authorization information includes a list of active nodes and storage authorization signatures.
  • the management platform After the management platform returns the authorization information, the first node receives the authorization information, and obtains the list of active nodes in the peer-to-peer storage network and the status of each active node according to the authorization information. Store authorized signatures.
  • Step S103 Based on the active node list, store the fragment file to each active node in the active node list, and verify the accuracy of the storage through a storage authorization signature.
  • the management platform issues storage authorization signatures (TOKEN signatures) to each active node while generating a list of active nodes, and verifies the accuracy of nodes by storing authorization signatures (TOKEN signatures).
  • Storage accuracy refers to verifying whether the node is a node of the peer-to-peer storage network and whether the storage space of the node meets the storage requirements.
  • the first node sends the fragmented file to each node in the active node list, and verifies the accuracy of the storage through the storage authorization signature, that is, the first node sends the corresponding occupation request to each node, the The occupancy request carries the storage authorization signature corresponding to the node. After receiving the occupancy request, each node authenticates the storage authorization signature. After the authentication is passed, the fragment file carried by the occupancy request is stored. The first node feeds back storage success information.
  • the first node correspondingly sends each fragment file to the corresponding node for storage according to the received active node list.
  • Step S104 Verify whether the fragment file is successfully stored in each active node in the active node list.
  • each active node when each active node has completed storage, it will feed back storage success information to the first node, and verify whether the shard file is successfully stored to the active node by detecting whether the first node receives the storage success information fed back by each active node In each active node of the list. Specifically, when the first node receives the storage success information fed back by all active nodes that sent the occupation request, the fragment file is successfully stored in each active node.
  • Step S105 If the fragmented file is successfully stored in each active node in the active node list, a storage completion instruction is sent to the management platform, and the storage node of the control center performs data files stored in the peer-to-peer storage network. Synchronous backup.
  • the first node sends a storage completion instruction to the management platform, and the management platform receives the storage After completing the instruction, control the central storage node in the active node list to synchronously backup all data files stored in the peer-to-peer storage network.
  • the aforementioned central storage node is any node in the active node list, and the central storage node is designated by the control platform.
  • the above-mentioned central storage node is used to: within a preset time interval, periodically send a detection instruction to each node in the point-to-point storage network to detect whether the data file stored by each node is lost; If the data file stored by the node is lost, then distribute the fragment files of the lost data file to each non-central storage node in the point-to-point storage network; detect whether the stored data file is lost; if the stored data file is lost, then The node storing the lost data file in the peer-to-peer storage network obtains the lost data file to recover the data.
  • the central storage node periodically uses the Challenge Code guarantee to each node of the peer-to-peer storage network within a preset time interval to detect whether the node data is lost. If there is data loss, the fragmented file is distributed from the central storage node to the peer-to-peer storage Each non-central storage node of the network detects whether there is data loss in the central storage node in real time. If the central storage node has data loss, data recovery is performed from the point-to-point storage network.
  • the aforementioned central storage node is any storage node in the aforementioned peer-to-peer storage network. After authorization by the management platform, the storage node is used as a central storage node and the central storage node is identified.
  • the management platform can flexibly set the central storage node according to actual needs, which will not be repeated here.
  • each user's existing home hardware box can be used to implement data fragmented storage.
  • first set points for each client each user's existing home hardware box.
  • the original points can be set according to the storage space of the client. If you need to store files, calculate the corresponding deducted points according to the size of the file to be stored.
  • the client cannot meet the points deduction requirements, and the file to be stored will not be saved at this time Store, if the current point of the client is greater than or equal to the corresponding deducted points, after the storage is completed, the corresponding deducted points will be deducted from the current points.
  • the management platform when the storage time reaches a certain time limit, the management platform will issue corresponding reward points to the corresponding client.
  • the reward points are calculated based on the storage time and the amount of storage space occupied. In specific applications, the above points can be used for shopping on the network platform and other operations.
  • the storage request is resent to the management center.
  • the main execution subjects involved in the above data backup method include: a first node, a management platform, a peer-to-peer storage network, and a central storage node in the peer-to-peer storage network.
  • S1 The first node sends a storage request to the management platform according to the size of the fragmented file
  • the management platform After receiving the storage request, the management platform obtains active nodes from other nodes in the peer-to-peer storage network;
  • the management platform generates an active node list according to the feedback active nodes, and generates the storage authorization signature of each active node, and sends authorization information such as the active node list and the storage authorization signature to the first node;
  • the first node sends the fragmented file to each active node of the peer-to-peer storage network according to the received active node category and storage authorization signature;
  • Each active node verifies the storage authorization signature (verifies the TOKEN signature);
  • S8 The first node verifies whether all the fragmented files are successfully stored
  • the management platform After receiving the storage completion instruction, the management platform sends a backup control instruction to the central storage node to enable the central storage node to synchronize all data files stored in the peer-to-peer storage network.
  • the aforementioned data backup method further includes the following steps:
  • Step S106 Perform data fragmentation processing on the file to be stored to generate a fragmented file.
  • the first node performs data fragmentation according to the file to be stored, and sends a storage request to the management platform according to the size of the fragmented file after the data fragmentation.
  • data sharding generally uses the key or the hash value of the key to calculate the distribution position of the key.
  • Data slicing is generally implemented at the interface layer, and the purpose is to evenly divide the data into different virtual servers (Vserver) .
  • the interface layer uses a consistent hashing ring cutting algorithm to achieve data fragmentation.
  • each virtual server VServer needs to have multiple VNodes (virtual nodes) , Find the corresponding VNode on the hash ring according to Hash(Key), and then determine the virtual server Vserver to which it belongs according to the mapping table of VNode and VServer.
  • the correspondence between Hash (key) and Vnode, and the correspondence between Vnode and Vserver are determined and unique, and the correspondence is the mapping table of consistent hash.
  • the data backup method provided in this embodiment stores fragmented files through the active nodes of the point-to-point storage network, and synchronizes the backup of the stored data files through the central storage node, which realizes the effective storage of data files in the point-to-point storage network while ensuring
  • the central storage node also has a reliable data storage. It does not need to rely on cloud storage for data backup. At the same time, it can effectively avoid data loss, effectively solving the problems of high data backup costs and data loss risks in current distributed data backup methods.
  • step S103 in the first embodiment specifically includes:
  • Step S201 Send an occupation request to each active node in the active node list based on the active node list, where the occupation request includes the fragment file and the storage authorization signature of the corresponding node.
  • each active node is used to verify the storage authorization signature after receiving the occupancy request, and if the verification is successful, store the fragment file, and feed back to the first node after the storage is completed Store success information.
  • the first node sends the fragmented data to each node in the active node list based on the active node list sent by the management platform, and verifies the storage accuracy through the storage authorization signature (TOKEN signature).
  • TOKEN signature storage authorization signature
  • a node sends an occupation request to the node the token signature corresponding to the node is attached.
  • the node receives the occupation request it verifies the TOKEN signature carried in the first node request. If the verification is successful, the first node sends the fragments Data is stored. It should be noted that how the node verifies the TOKEN signature is an existing technology, which will not be repeated here.
  • this embodiment provides a data backup method, which is applied to a management platform, that is, implemented based on the management platform, which specifically includes:
  • Step S301 After receiving the storage request of the first node, obtain the active node in the peer-to-peer storage network.
  • the management platform after receiving the storage request, searches for storage nodes that meet the storage space conditions according to the storage request, and uses all storage nodes that meet the storage space conditions as active nodes in the peer-to-peer storage network to generate an active node list.
  • Step S302 Return authorization information to the first node according to the active node to control the first node to store the fragment file.
  • the authorization information includes a list of active nodes and storage authorization signatures; the list of active nodes includes identifications of multiple active nodes and central storage nodes.
  • the above storage request carries file size information of the fragmented file.
  • the management platform verifies the legitimacy of the storage request; after the legitimacy verification of the storage request passes, obtains the active node in the peer-to-peer storage network;
  • the file size information determines the active node whose storage space is greater than or equal to the file size of the fragmented file, generates an active node list and issues an authorized storage authorization signature; generates authorization information including the active node list and the storage authorization signature, and Returning the authorization information to the first node.
  • the management platform when the management platform generates a list of active nodes, it issues storage authorization signatures (TOKEN signatures) to each active node, and stores the accuracy of nodes by storing authorization signatures (TOKEN signatures).
  • TOKEN signatures storage authorization signatures
  • Step S303 After receiving the storage completion instruction, control the central storage node in the active node list to synchronously backup all data files stored in the peer-to-peer storage network.
  • the management platform designates the central storage node while generating the active node list, and after authorization by the management platform, the storage node is used as the central storage node and the central storage node is identified.
  • the central storage node is found according to the identifier, and the data stored in each node of the point-to-point storage network is synchronized and backed up through the management platform control center storage node.
  • the data backup system provided in this embodiment can also store fragmented files through the active nodes of the point-to-point storage network, and synchronize the stored data files through the central storage node, thus realizing the effective storage of data files in the point-to-point storage network At the same time, it ensures that the central storage node also has a reliable data storage, without relying on cloud storage for data backup, and can effectively avoid data loss, effectively solving the current distributed data backup method that has high data backup costs and data loss The question of risk.
  • this embodiment provides a data backup device 100, which is applied to a first node and is used to perform the method steps in Embodiment 1. It includes a request sending module 101, an information receiving module 102, a storage module 103, The verification module 104 and the backup module 105.
  • the request sending module 101 is configured to send a storage request for storing fragmented files to the management platform.
  • the information receiving module 102 is configured to receive authorization information returned by the management platform, where the authorization information includes a list of active nodes and a storage authorization signature.
  • the storage module 103 is configured to send the fragmented file to each active node in the active node list for storage based on the active node list, and verify the accuracy of the storage through a storage authorization signature.
  • the verification module 104 is configured to verify whether the fragment file is successfully stored in each active node in the active node list.
  • the backup module 105 is configured to send a storage completion instruction to the management platform to control the central storage node to store all data files stored in the peer-to-peer storage network if the fragmented file is successfully stored in each active node in the active node list Synchronous backup is performed, wherein the central storage node is any node in the active node list, and the central storage node is designated by the control platform.
  • the aforementioned data backup system further includes a fragmentation module, and the aforementioned fragmentation module is configured to perform data fragmentation processing on the file to be stored to generate fragmented files.
  • the data backup device provided in the embodiment of the present application is based on the same concept as the method embodiment shown in FIG. 1 of the present application, and the technical effect brought by it is the same as the method embodiment shown in FIG. 1 of the present application.
  • the specific content Please refer to the description in the method embodiment shown in FIG. 1 of this application, which will not be repeated here.
  • the data backup device can also store fragmented files through the active nodes of the peer-to-peer storage network, and synchronize the stored data files through the central storage node, thereby realizing the data files in the peer-to-peer storage network.
  • Effective storage while ensuring that the central storage node also has a reliable data storage, without relying on cloud storage for data backup, and at the same time, it can effectively avoid data loss, effectively solving the current distributed data backup method that has high data backup costs and existence The problem of data loss risk.
  • the storage module 103 in the fourth embodiment includes a structure for executing the method steps in the embodiment corresponding to FIG. 3, and it includes a sending unit 201.
  • the sending unit 201 is configured to send an occupation request to each active node in the active node list based on the active node list, where the occupation request includes a fragment file and a storage authorization signature of the corresponding node; wherein each active node uses After receiving the occupancy request, verify the storage authorization signature, if the verification is successful, store the fragment file, and feed back storage success information to the first node after the storage is completed.
  • Embodiment 6 is a diagrammatic representation of Embodiment 6
  • this embodiment provides a data backup device 300 that is applied to a management platform and is used to perform the method steps in the third embodiment, which includes an acquisition module 301, an authorization module 302, and a synchronization module 303.
  • the obtaining module 301 is configured to obtain active nodes in the peer-to-peer storage network after receiving the storage request of the first node.
  • the authorization module 302 is configured to return authorization information to the first node according to the active node to control the first node to store fragmented files, the authorization information includes a list of active nodes and a storage authorization signature; the list of active nodes Including the identification of multiple active nodes and central storage nodes.
  • the synchronization module 303 is configured to control the central storage node in the active node list to synchronously backup all data files stored in the peer-to-peer storage network after receiving the storage completion instruction.
  • the aforementioned synchronization module includes:
  • the verification unit is configured to verify the validity of the storage request after receiving the storage request
  • An obtaining unit configured to obtain an active node in the peer-to-peer storage network after the validity verification of the storage request is passed;
  • the determining unit is configured to determine an active node whose storage space is greater than or equal to the file size of the fragment file according to the file size information.
  • the data backup device provided in the embodiment of the present application is based on the same concept as the method embodiment shown in FIG. 4 of the present application, and its technical effect is the same as that of the method embodiment shown in FIG. 4 of the present application.
  • the specific content Please refer to the description in the method embodiment shown in FIG. 4 of this application, which will not be repeated here.
  • the data backup device can also store fragmented files through the active nodes of the peer-to-peer storage network, and synchronize the stored data files through the central storage node, thereby realizing the data files in the peer-to-peer storage network.
  • Effective storage while ensuring that the central storage node also has a reliable data storage, without relying on cloud storage for data backup, and at the same time, it can effectively avoid data loss, effectively solving the current distributed data backup method that has high data backup costs and existence The problem of data loss risk.
  • FIG. 8 is a schematic diagram of a computer device provided in Embodiment 5 of the present application.
  • the computer device 7 of this embodiment includes a processor 70, a memory 71, and a computer program 72, such as a program, stored in the memory 71 and running on the processor 70.
  • the processor 70 executes the computer program 72, the steps in the at least one image processing method embodiment described above are implemented, for example, steps S101 to S105 shown in FIG. 1.
  • the processor 70 executes the computer program 72, the function of the at least one module/unit in the foregoing apparatus embodiment, for example, the function of the modules 101 to 105 shown in FIG. 5, is realized.
  • the computer program 72 may be divided into one or more modules/units, and the one or more modules/units are stored in the memory 71 and executed by the processor 70 to complete This application.
  • the one or more modules/units may be a series of computer program instruction segments capable of completing specific functions, and the instruction segments are used to describe the execution process of the computer program 72 in the computer device 7.
  • the computer program 72 may be divided into a request sending module, an information receiving module, a storage module, a verification module, and a backup module.
  • the specific functions of the at least one module are as follows:
  • the request sending module is used to send a storage request for storing fragmented files to the management platform;
  • the information receiving module is used to receive the authorization information returned by the management platform;
  • the storage module is used to send the fragment files to each active node in the active node list for storage based on the active node list, and Verify storage accuracy through storage authorization signature;
  • the verification module is used to verify whether the fragment file is successfully stored in each active node in the active node list
  • the backup module is used to send a storage completion instruction to the management platform to control the central storage node to store all data files stored in the peer-to-peer storage network if the fragmented file is successfully stored to each active node in the active node list Synchronous backup is performed, wherein the central storage node is any node in the active node list, and the central storage node is designated by the control platform.
  • the computer device 7 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud management server.
  • the computer device may include, but is not limited to, a processor 70 and a memory 71.
  • FIG. 8 is only an example of the computer device 7 and does not constitute a limitation on the computer device 7. It may include more or less components than those shown in the figure, or combine certain components, or different components.
  • the computer device may also include input and output devices, network access devices, buses, and the like.
  • the so-called processor 70 may be a central processing unit (Central Processing Unit (CPU), can also be other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (Application Specific Integrated Circuit (ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory 71 may be an internal storage unit of the computer device 7, such as a hard disk or memory of the computer device 7.
  • the memory 71 may also be an external storage device of the computer device 7, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), or a secure digital (Secure Digital, SD) equipped on the computer device 7. Flash memory card Card) etc.
  • the memory 71 may also include both an internal storage unit of the computer device 7 and an external storage device.
  • the memory 71 is used to store the computer program and other programs and data required by the computer device.
  • the memory 71 can also be used to temporarily store data that has been or will be output.
  • FIG. 9 is a schematic diagram of a computer device provided in Embodiment 5 of the present application.
  • the computer device 8 of this embodiment includes: a processor 80, a memory 81, and a computer program 82, such as a program, stored in the memory 81 and running on the processor 80.
  • the processor 80 executes the computer program 82, the steps in the at least one image processing method embodiment described above are implemented, for example, steps S301 to S303 shown in FIG. 4.
  • the processor 80 executes the computer program 82, the function of the at least one module/unit in the foregoing apparatus embodiment, for example, the function of the modules 301 to 303 shown in FIG. 7 is realized.
  • the computer program 82 may be divided into one or more modules/units, and the one or more modules/units are stored in the memory 81 and executed by the processor 80 to complete This application.
  • the one or more modules/units may be a series of computer program instruction segments capable of completing specific functions, and the instruction segments are used to describe the execution process of the computer program 82 in the computer device 8.
  • the computer program 82 may be divided into a request acquisition module, an authorization module, and a synchronization module, and the specific functions of the at least one module are as follows:
  • the obtaining module is used to obtain the active node in the peer-to-peer storage network after receiving the storage request of the first node;
  • the authorization module is configured to return authorization information to the first node according to the active node to control the first node to store fragmented files, the authorization information includes a list of active nodes and a storage authorization signature; the list of active nodes Including the identification of multiple active nodes and central storage nodes;
  • the synchronization module is used to control the central storage node in the active node list to synchronously backup all data files stored in the point-to-point storage network after receiving the storage completion instruction.
  • the computer device 8 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud management server.
  • the computer device may include, but is not limited to, a processor 80 and a memory 81.
  • FIG. 9 is only an example of the computer device 8 and does not constitute a limitation on the computer device 8. It may include more or less components than shown in the figure, or a combination of certain components, or different components.
  • the computer device may also include input and output devices, network access devices, buses, and the like.
  • the so-called processor 80 may be a central processing unit (Central Processing Unit (CPU), can also be other general-purpose processors, digital signal processors (DSP), application-specific integrated circuits (Application Specific Integrated Circuit (ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
  • the memory 81 may be an internal storage unit of the computer device 8, such as a hard disk or memory of the computer device 8.
  • the memory 81 may also be an external storage device of the computer device 8, such as a plug-in hard disk, a smart memory card (Smart Media Card, SMC), and a secure digital (Secure Digital, SD) equipped on the computer device 8. Flash memory card Card) etc.
  • the memory 81 may also include both an internal storage unit of the computer device 8 and an external storage device.
  • the memory 81 is used to store the computer program and other programs and data required by the computer device.
  • the memory 81 can also be used to temporarily store data that has been output or will be output.
  • the description of the at least one embodiment has a focus on at least one.
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM random access memory
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDRSDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronous chain (Synchlink) DRAM
  • RDRAM direct RAM
  • DRAM direct memory bus dynamic RAM
  • RDRAM memory bus dynamic RAM

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

一种数据备份方法、装置及计算机设备,包括向管理平台发送用于存储分片文件的存储请求(S101);接收管理平台返回的授权信息(S102);基于活跃节点列表,将分片文件存储至活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性(S103);验证分片文件是否成功存储至活跃节点列表中的各活跃节点(S104);若分片文件成功存储至活跃节点列表中的各活跃节点,则发送存储完成指令至管理平台以控制中心存储节点对存储于点对点存储网络的所有数据文件进行同步备份(S105),实现了数据文件在点对点存储网络的有效存储,同时保证了中心存储节点也有一份可靠的数据存储,能够有效地避免数据丢失。

Description

一种数据备份方法、装置及计算机设备
本申请申明享有2019年1月16日递交的申请号为201910041425.X、名称为“一种数据备份方法、装置及计算机设备”中国专利申请的优先权,该中国专利申请的整体内容以参考的方式结合在本申请中。
技术领域
本申请属于数据存储技术领域,尤其涉及一种数据备份方法、装置及计算机设备。
背景技术
传统的互联网采用客户机连接服务器方式,使用网站上集中的服务器来实现数据备份,但随着互连网的发展趋势将由集中式走向分布式,集中的服务器将变成分布式的服务器,如点对点(Peer to Peer,P2P)技术。P2P技术将许多用户结合成一个网络,共享带宽,通过分布式的多个客户端共同处理信息。与传统的客户机连接服务器模式不同,点对点工作方式中,每一个客户终端既是客户机又是服务器。然而目前的分布式数据备份方法主要依靠云存储器实现数据备份,使得备份成本高的问题,且存在数据丢失风险。
综上所述,目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
技术问题
有鉴于此,本申请实施例提供了一种数据备份方法、装置及计算机设备,以解决目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
技术解决方案
本申请的第一方面提供了一种数据备份方法,所述方法应用于第一节点,包括:
向管理平台发送用于存储分片文件的存储请求;所述授权信息包括活跃节点列表以及存储授权签名;
接收所述管理平台返回的授权信息;
基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性;
验证所述分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
本申请第二方面提供了一种数据备份方法,所述方法应用于管理平台,包括:
在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
本申请的第三方面提供了一种数据备份装置,应用于第一节点,包括:
请求发送模块,用于向管理平台发送用于存储分片文件的存储请求;
信息接收模块,用于接收所述管理平台返回的授权信息;所述授权信息包括活跃节点列表以及存储授权签名;
存储模块,用于基于所述活跃节点列表把所述分片文件分别发送到所述活跃节点列表中的各活跃节点进行存储,并通过存储授权签名验证存储的准确性;
验证模块,用于验证分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
备份模块,用于若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
本申请第四方面提供了一种数据备份装置,应用于管理平台,包括:
获取模块,用于在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
授权模块,用于根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
同步模块,用于在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
本申请的第五方面提供了一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现以下步骤:
向管理平台发送用于存储分片文件的存储请求;
接收所述管理平台返回的授权信息;所述授权信息包括活跃节点列表以及存储授权签名;
基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性;
验证所述分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
本申请的第六方面提供了一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现以下步骤:
在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
有益效果
本申请提供的一种数据备份方法、系统及计算机设备,通过点对点存储网络的活跃节点存储分片文件,并通过中心存储节点对存储的数据文件进行同步备份,实现了数据文件在点对点存储网络的有效存储,同时保证了中心存储节点也有一份可靠的数据存储,无需依靠云存储器实现数据备份,同时能够有效地避免数据丢失,有效地解决了目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
附图说明
图1是本申请实施例一提供的一种数据备份方法的实现流程示意图;
图2是本申请实施例一的数据备份方法的实现步骤示意图;
图3是本申请实施例二提供的对应实施例一步骤S103的实现流程示意图;
图4是本申请实施例三提供的一种数据备份方法的实现流程示意图;
图5是本申请实施例四提供的一种数据备份装置的结构示意图;
图6是本申请实施例五提供的对应实施例四中存储模块103的结构示意图;
图7是本申请实施例六提供的一种数据备份装置的结构示意图;
图8是本申请实施例七提供的计算机设备的示意图;
图9是本申请实施例八提供的计算机设备的示意图。
本发明的实施方式
以下描述中,为了说明而不是为了限定,提出了诸如特定系统结构、技术之类的具体细节,以便透彻理解本申请实施例。然而,本领域的技术人员应当清楚,在没有这些具体细节的其它实施例中也可以实现本申请。在其它情况中,省略对众所周知的系统、电路以及方法的详细说明,以免不必要的细节妨碍本申请的描述。
为了说明本申请所述的技术方案,下面通过具体实施例来进行说明。
需要说明的是,本申请是基于点对点存储网络(P2P存储网络)来实现分布式数据备份,点对点存储网络包括多个节点,各个节点对应一个客户终端,客户终端具备存储数据的能力。
实施例一:
如图1所示,本实施例提供了一种数据备份方法,应用于第一节点,即基于发起存储请求的第一节点来实现,其具体包括:
步骤S101:向管理平台发送用于存储分片文件的存储请求。
在具体应用中,当需要对文件进行分片式存储时,首先需要确定点对点存储网络的各个客户端(各节点)能够存放的文件的空间大小。在第一节点向管理平台发送了用于存储分片文件的存储请求后,管理平台根据存储请求来获取点对点网络中的活跃节点。需要说明的是,上述第一节点是指发起存储请求的点对点存储网络中的节点,还需要说明的是,本实施例中的所提及的节点是指点对点存储网络中的客户终端,该客户终端既是客户机又是服务器。
步骤S102:接收所述管理平台返回的授权信息。
在具体应用中,上述授权信息包括活跃节点列表以及存储授权签名,当管理平台返回授权信息后,第一节点接收该授权信息,根据授权信息获取该点对点存储网络的活跃节点列表以及各个活跃节点的存储授权签名。
步骤S103:基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性。
在具体应用中,管理平台在生成活跃节点列表的同时,向各个活跃节点下发存储授权签名(TOKEN签名),通过存储授权签名(TOKEN签名)来验证节点的准确性。存储准确性是指对该节点是否为该点对点存储网络的节点及该节点的存储空间是否满足存储要求进行验证。
在具体应用中,第一节点分别将分片文件发送到该活跃节点列表的各节点中,并通过存储授权签名验证存储的准确性,即通过第一节点向各节点发送对应的占用请求,该占用请求携带该节点对应的存储授权签名,各节点在接收到占用请求后,对存储授权签名进行认证,认证通过后再将该占用请求所携带的分片文件进行存储,在存储完成后,向第一节点反馈存储成功信息。
在具体应用中,第一节点根据接收到的活跃节点列表,对应地将各个分片文件发送到对应地节点中进行存储。
步骤S104:验证所述分片文件是否成功存储至所述活跃节点列表中的各活跃节点。
在具体应用中,当各活跃节点存储完成后会向第一节点反馈存储成功信息,通过检测第一节点是否接收到各个活跃节点反馈的存储成功信息来验证分片文件是否成功存储至该活跃节点列表的各活跃节点中。具体的,当第一节点接收到其发送占用请求的全部活跃节点反馈的存储成功信息时,分片文件成功存储至各活跃节点。
步骤S105:若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台,以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
在具体应用中,为了保证有一份可靠度数据存储,在分片文件成功存储至所述活跃节点列表中的各活跃节点后,第一节点向管理平台发送存储完成指令,管理平台在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
在具体应用中,上述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
在一个实施例中,上述中心存储节点用于:在预设时间间隔内,定时向所述点对点存储网络中的各节点发送检测指令,以检测所述各节点存储的数据文件是否丢失;若有节点存储的数据文件丢失,则分发丢失的数据文件的分片文件到所述点对点存储网络中的各非中心存储节点;检测存储的数据文件是否丢失;若存储的数据文件丢失,则从所述点对点存储网络中存储有丢失的数据文件的节点获取丢失的数据文件,以恢复数据。
在具体应用中,中心存储节点在预设时间间隔内向点对点存储网络的各个节点定期使用Challenge Code保证以检测节点数据是否丢失,如果有数据丢失,则从中心存储节点分发该分片文件到点对点存储网络的各非中心存储节点,并实时检测中心存储节点是否存在数据丢失,若中心存储节点有数据丢失,则从点对点存储网络进行数据恢复。
需要说明的是,上述中心存储节点是上述点对点存储网络中的任一存储节点,通过管理平台授权后,将该存储节点作为中心存储节点,并对该中心存储节点进行标识。管理平台可以根据实际需求灵活设置中心存储节点,在此不再加以赘述。
在实际应用中,为了更方便地构建数据备份网络,可以使用各个用户现有的家庭硬件盒子的存储空间来实现数据的分片存储。为了使客户能够更多地使用现有的家庭硬件盒子来进行数据备份,首先为各个客户端(各用户现有家庭硬件盒子)设置积分,原始积分的设置可以根据客户端的存储空间来进行设置。在若需要存储文件时,根据待存储文件的大小来计算相应扣除的积分,若该客户端的目前积分小于相应扣除的积分,则该客户端无法满足积分扣除要求,则此时不对该待存储文件进行存储,若该客户端的目前积分大于或等于相应扣除的积分,则在存储完成后,从该目前积分中扣除该相应扣除的积分。
在具体应用中,当存储时间达到一定时限后,管理平台会向相应的客户端发放相应的奖励积分,奖励积分基于存储时长和所占用的存储空间大小进行计算。在具体应用中,上述积分可以用于网络平台的购物等操作。
在一个实施例中,若存在分片文件存储失败,则重新发送存储请求至管理中心。
为了说明上述数据备份方法,请参见图2,根据图2对数据备份方法进行详细说明如下:
如图2所示,上述数据备份方法涉及到的主要执行主体包括:第一节点、管理平台、点对点存储网络以及该点对点存储网络中的中心存储节点。
S1:第一节点根据分片文件的大小向管理平台发送存储请求;
S2:管理平台接收到存储请求后,从点对点存储网络的其他节点中获取活跃节点;
S3:向管理平台反馈活跃节点;
S4:管理平台根据反馈的活跃节点生成活跃节点列表,并生成各个活跃节点的存储授权签名,并将该活跃节点列表和存储授权签名等授权信息发送给第一节点;
S5:第一节点根据接收到的活跃节点类别和存储授权签名向点对点存储网络的各活跃节点发送分片文件;
S6:各活跃节点验证存储授权签名(验证TOKEN签名);
S7:各活跃节点存储完成分片文件后,向第一节点反馈存储成功信息;
S8:第一节点验证分片文件是否全部存储成功;
S9:第一节点在验证了分片文件全部存储成功后,向管理平台发送存储完成指令;
S10:管理平台接收到存储完成指令后,向中心存储节点发送备份控制指令,使中心存储节点对存储于点对点存储网络的所有数据文件进行同步备份。
S11:中心存储节点在点对点存储网络的某一节点存在数据丢失的情况时,向非中心存储节点下发该丢失的分片文件;
S12:存在分片文件存储失败,则重新执行S1。
在一个实施例中,上述数据备份方法还包括以下步骤:
步骤S106:对待存储的文件进行数据分片处理,生成分片文件。
在具体应用中,第一节点会根据待存储文件进行数据分片,并根据数据分片后的分片文件的大小向管理平台发送存储请求。
在具体应用中,数据分片一般是使用Key或者Key的哈希值来计算Key的分布位置,数据分片一般在接口层实现,目的就是讲数据均匀地划分到不同的虚拟服务器(Vserver)中,接口层使用了一致性哈希的割环算法来实现数据分片,在割环算法中,为了让数据均匀分布到各个虚拟服务器VServer,每个虚拟服务器VServer需要有多个VNode(虚拟节点),根据Hash(Key)在哈希环上找到对应的VNode,再根据VNode和VServer的映射表确定所属的虚拟服务器Vserver。其中Hash(key)与Vnode的对应关系,以及Vnode与Vserver的对应关系确定且唯一,对应关系即一致性哈希的映射表。
本实施例提供的数据备份方法,通过点对点存储网络的活跃节点存储分片文件,并通过中心存储节点对存储的数据文件进行同步备份,实现了数据文件在点对点存储网络的有效存储,同时保证了中心存储节点也有一份可靠的数据存储,无需依靠云存储器实现数据备份,同时能够有效地避免数据丢失,有效地解决了目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
实施例二:
如图3所示,在本实施例中,实施例一中的步骤S103具体包括:
步骤S201:基于所述活跃节点列表向所述活跃节点列表中的各活跃节点发送占用请求,所述占用请求包括分片文件和对应节点的存储授权签名。
在具体应用中,各活跃节点用于在接收到所述占用请求后,验证所述存储授权签名,若验证成功,则存储所述分片文件,并在存储完成后向所述第一节点反馈存储成功信息。
在具体应用中,第一节点基于管理平台发过来的活跃节点列表,将分片数据分别发送到该活跃节点列表中的各个节点,并通过存储授权签名(TOKEN签名)验证存储准确性,即第一节点向节点发送占用请求时附带着该节点对应的TOKEN签名,节点收到占用请求后,验证第一节点请求里面带着的TOKEN签名,如果验证成功,则将第一节点发送过来的分片数据进行存储。需要说明的是,节点如何对TOKEN签名进行验证作为现有技术,在此不加以赘述。
实施例三:
如图4所示,本实施例提供了一种数据备份方法,应用于管理平台,即基于管理平台实现,其具体包括:
步骤S301:在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点。
在具体应用中,管理平台在接收到存储请求后,根据存储请求查找满足存储空间条件的存储节点,并将所有满足存储空间条件的存储节点作为该点对点存储网络的活跃节点,生成活跃节点列表。
步骤S302:根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储。
在具体应用中,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识。
在一个实施例中,上述存储请求携带有分片文件的文件大小信息。
在具体应用中,管理平台在接收到所述存储请求后,对所述存储请求的合法性进行验证;所述存储请求的合法性验证通过后,获取点对点存储网络中的活跃节点;根据所述文件大小信息确定存储空间大于或等于所述分片文件的文件大小的活跃节点,生成活跃节点列表并签发授权存储授权签名;生成包括所述活跃节点列表和所述存储授权签名的授权信息,并向所述第一节点返回所述授权信息。
在具体应用中,管理平台在生成活跃节点列表的同时,向各个活跃节点下发存储授权签名(TOKEN签名),通过存储授权签名(TOKEN签名)来存储节点的准确性。
步骤S303:在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
在具体应用中,管理平台在生成活跃节点列表的同时指定中心存储节点,通过管理平台授权后,将该存储节点作为中心存储节点,并对该中心存储节点进行标识。根据标识查找到中心存储节点,并通过管理平台控制中心存储节点对点对点存储网络的各节点所存储的数据进行同步备份。
本实施例提供的一种数据备份系统,同样能够通过点对点存储网络的活跃节点存储分片文件,并通过中心存储节点对存储的数据文件进行同步备份,实现了数据文件在点对点存储网络的有效存储,同时保证了中心存储节点也有一份可靠的数据存储,无需依靠云存储器实现数据备份,同时能够有效地避免数据丢失,有效地解决了目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
实施例四:
如图5所示,本实施例提供一种数据备份装置100,应用于第一节点,用于执行实施例一中的方法步骤,其包括请求发送模块101、信息接收模块102、存储模块103、验证模块104以及备份模块105。
请求发送模块101用于向管理平台发送用于存储分片文件的存储请求。
信息接收模块102用于接收所述管理平台返回的授权信息,所述授权信息包括活跃节点列表以及存储授权签名。
存储模块103用于基于所述活跃节点列表把所述分片文件分别发送到所述活跃节点列表中的各活跃节点进行存储,并通过存储授权签名验证存储的准确性。
验证模块104用于验证分片文件是否成功存储至所述活跃节点列表中的各活跃节点。
备份模块105用于若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
在一个实施例中,上述数据备份系统还包括分片模块,上述分片模块用于对待存储的文件进行数据分片处理,生成分片文件。
需要说明的是,本申请实施例提供的数据备份装置,由于与本申请图1所示方法实施例基于同一构思,其带来的技术效果与本申请图1所示方法实施例相同,具体内容可参见本申请图1所示方法实施例中的叙述,此处不再赘述。
因此,本实施例提供的一种数据备份装置,同样能够通过点对点存储网络的活跃节点存储分片文件,并通过中心存储节点对存储的数据文件进行同步备份,实现了数据文件在点对点存储网络的有效存储,同时保证了中心存储节点也有一份可靠的数据存储,无需依靠云存储器实现数据备份,同时能够有效地避免数据丢失,有效地解决了目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
实施例五:
如图6所示,在本实施例中,实施例四中的存储模块103包括用于执行图3所对应的实施例中的方法步骤的结构,其包括发送单元201。
发送单元201用于基于所述活跃节点列表向所述活跃节点列表中的各活跃节点发送占用请求,所述占用请求包括分片文件和对应节点的存储授权签名;其中,所述各活跃节点用于在接收到所述占用请求后,验证所述存储授权签名,若验证成功,则存储所述分片文件,并在存储完成后向所述第一节点反馈存储成功信息。
实施例六:
如图7所示,本实施例提供一种数据备份装置300,应用于管理平台,用于执行实施例三中的方法步骤,其包括获取模块301、授权模块302以及同步模块303。
获取模块301用于在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点。
授权模块302用于根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识。
同步模块303用于在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
进一步地,上述同步模块包括:
验证单元,用于在接收到所述存储请求后,对所述存储请求的合法性进行验证;
获取单元,用于所述存储请求的合法性验证通过后,获取点对点存储网络中的活跃节点;
确定单元,用于根据所述文件大小信息确定存储空间大于或等于所述分片文件的文件大小的活跃节点。
需要说明的是,本申请实施例提供的数据备份装置,由于与本申请图4所示方法实施例基于同一构思,其带来的技术效果与本申请图4所示方法实施例相同,具体内容可参见本申请图4所示方法实施例中的叙述,此处不再赘述。
因此,本实施例提供的一种数据备份装置,同样能够通过点对点存储网络的活跃节点存储分片文件,并通过中心存储节点对存储的数据文件进行同步备份,实现了数据文件在点对点存储网络的有效存储,同时保证了中心存储节点也有一份可靠的数据存储,无需依靠云存储器实现数据备份,同时能够有效地避免数据丢失,有效地解决了目前分布式数据备份方法存在数据备份成本高及存在数据丢失风险的问题。
实施例七:
图8是本申请实施例五提供的计算机设备的示意图。如图8所示,该实施例的计算机设备7包括:处理器70、存储器71以及存储在所述存储器71中并可在所述处理器70上运行的计算机程序72,例如程序。所述处理器70执行所述计算机程序72时实现上述所述至少一个图片处理方法实施例中的步骤,例如图1所示的步骤S101至S105。或者,所述处理器70执行所述计算机程序72时实现上述装置实施例中所述至少一个模块/单元的功能,例如图5所示模块101至105的功能。
示例性的,所述计算机程序72可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器71中,并由所述处理器70执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序72在所述计算机设备7中的执行过程。例如,所述计算机程序72可以被分割成请求发送模块、信息接收模块、存储模块、验证模块以及备份模块,所述至少一个模块具体功能如下:
请求发送模块,用于向管理平台发送用于存储分片文件的存储请求;
信息接收模块,用于接收所述管理平台返回的授权信息;存储模块,用于基于所述活跃节点列表把所述分片文件分别发送到所述活跃节点列表中的各活跃节点进行存储,并通过存储授权签名验证存储的准确性;
验证模块,用于验证分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
备份模块,用于若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
所述计算机设备7可以是桌上型计算机、笔记本、掌上电脑及云端管理服务器等计算设备。所述计算机设备可包括,但不仅限于,处理器70、存储器71。本领域技术人员可以理解,图8仅仅是计算机设备7的示例,并不构成对计算机设备7的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述计算机设备还可以包括输入输出设备、网络接入设备、总线等。
所称处理器70可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器71可以是所述计算机设备7的内部存储单元,例如计算机设备7的硬盘或内存。所述存储器71也可以是所述计算机设备7的外部存储设备,例如所述计算机设备7上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器71还可以既包括所述计算机设备7的内部存储单元也包括外部存储设备。所述存储器71用于存储所述计算机程序以及所述计算机设备所需的其他程序和数据。所述存储器71还可以用于暂时地存储已经输出或者将要输出的数据。
实施例八:
图9是本申请实施例五提供的计算机设备的示意图。如图9所示,该实施例的计算机设备8包括:处理器80、存储器81以及存储在所述存储器81中并可在所述处理器80上运行的计算机程序82,例如程序。所述处理器80执行所述计算机程序82时实现上述所述至少一个图片处理方法实施例中的步骤,例如图4所示的步骤S301至S303。或者,所述处理器80执行所述计算机程序82时实现上述装置实施例中所述至少一个模块/单元的功能,例如图7所示模块301至303的功能。
示例性的,所述计算机程序82可以被分割成一个或多个模块/单元,所述一个或者多个模块/单元被存储在所述存储器81中,并由所述处理器80执行,以完成本申请。所述一个或多个模块/单元可以是能够完成特定功能的一系列计算机程序指令段,该指令段用于描述所述计算机程序82在所述计算机设备8中的执行过程。例如,所述计算机程序82可以被分割成请求获取模块、授权模块以及同步模块,所述至少一个模块具体功能如下:
获取模块,用于在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
授权模块,用于根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
同步模块,用于在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
所述计算机设备8可以是桌上型计算机、笔记本、掌上电脑及云端管理服务器等计算设备。所述计算机设备可包括,但不仅限于,处理器80、存储器81。本领域技术人员可以理解,图9仅仅是计算机设备8的示例,并不构成对计算机设备8的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如所述计算机设备还可以包括输入输出设备、网络接入设备、总线等。
所称处理器80可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器 (Digital Signal Processor,DSP)、专用集成电路 (Application Specific Integrated Circuit,ASIC)、现成可编程门阵列 (Field-Programmable Gate Array,FPGA) 或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
所述存储器81可以是所述计算机设备8的内部存储单元,例如计算机设备8的硬盘或内存。所述存储器81也可以是所述计算机设备8的外部存储设备,例如所述计算机设备8上配备的插接式硬盘,智能存储卡(Smart Media Card, SMC),安全数字(Secure Digital, SD)卡,闪存卡(Flash Card)等。进一步地,所述存储器81还可以既包括所述计算机设备8的内部存储单元也包括外部存储设备。所述存储器81用于存储所述计算机程序以及所述计算机设备所需的其他程序和数据。所述存储器81还可以用于暂时地存储已经输出或者将要输出的数据。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述所述至少一个功能单元、模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述系统的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。实施例中的所述至少一个功能单元、模块可以集成在一个处理单元中,也可以是所述至少一个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中,上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。另外,所述至少一个功能单元、模块的具体名称也只是为了便于相互区分,并不用于限制本申请的保护范围。上述无线终端中单元、模块的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在上述实施例中,对所述至少一个实施例的描述都所述至少一个有侧重,某个实施例中没有详述或记载的部分,可以参见其它实施例的相关描述。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的所述至少一个示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink) DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述所述至少一个实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请所述至少一个实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种数据备份方法,其特征在于,所述方法应用于第一节点,包括:
    向管理平台发送用于存储分片文件的存储请求;
    接收所述管理平台返回的授权信息;所述授权信息包括活跃节点列表以及存储授权签名;
    基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性;
    验证所述分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
    若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述管理平台指定。
  2. 根据权利要求1所述的数据备份方法,其特征在于,基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性,包括:
    基于所述活跃节点列表向所述活跃节点列表中的各活跃节点发送占用请求,所述占用请求包括分片文件和对应节点的存储授权签名;其中,所述各活跃节点用于在接收到所述占用请求后,验证所述存储授权签名,若验证成功,则存储所述分片文件,并在存储完成后向第一节点反馈存储成功信息。
  3. 根据权利要求1所述的数据备份方法,其特征在于,所述活跃节点列表包括中心存储节点;
    所述中心存储节点用于:
    在预设时间间隔内,定时向所述点对点存储网络中的各节点发送检测指令,以检测所述各节点存储的数据文件是否丢失;
    若有节点存储的数据文件丢失,则分发丢失的数据文件的分片文件到所述点对点存储网络中的各非中心存储节点;
    检测存储的数据文件是否丢失;
    若存储的数据文件丢失,则从所述点对点存储网络中存储有丢失的数据文件的节点获取丢失的数据文件,以恢复数据。
  4. 一种数据备份方法,其特征在于,所述方法应用于管理平台,包括:
    在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
    根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
    在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
  5. 根据权利要求4所述的数据备份方法,其特征在于,所述在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点,包括:
    在接收到所述存储请求后,对所述存储请求的合法性进行验证;
    所述存储请求的合法性验证通过后,获取点对点存储网络中的活跃节点;
    根据所述文件大小信息确定存储空间大于或等于所述分片文件的文件大小的活跃节点。
  6. 一种数据备份装置,其特征在于,应用于第一节点,包括:
    请求发送模块,用于向管理平台发送用于存储分片文件的存储请求;
    信息接收模块,用于接收所述管理平台返回的授权信息;所述授权信息包括活跃节点列表以及存储授权签名;
    存储模块,用于基于所述活跃节点列表把所述分片文件分别发送到所述活跃节点列表中的各活跃节点进行存储,并通过存储授权签名验证存储的准确性;
    验证模块,用于验证分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
    备份模块,用于若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述控制平台指定。
  7. 根据权利要求6所述的数据备份装置,其特征在于,所述存储模块包括:
    发送单元,用于基于所述活跃节点列表向所述活跃节点列表中的各活跃节点发送占用请求,所述占用请求包括分片文件和对应节点的存储授权签名;其中,所述各活跃节点用于在接收到所述占用请求后,验证所述存储授权签名,若验证成功,则存储所述分片文件,并在存储完成后向第一节点反馈存储成功信息。
  8. 根据权利要求6所述的数据备份装置,其特征在于,所述活跃节点列表包括中心存储节点;
    所述中心存储节点用于:
    在预设时间间隔内,定时向所述点对点存储网络中的各节点发送检测指令,以检测所述各节点存储的数据文件是否丢失;
    若有节点存储的数据文件丢失,则分发丢失的数据文件的分片文件到所述点对点存储网络中的各非中心存储节点;
    检测存储的数据文件是否丢失;
    若存储的数据文件丢失,则从所述点对点存储网络中存储有丢失的数据文件的节点获取丢失的数据文件,以恢复数据。
  9. 一种数据备份装置,其特征在于,应用于管理平台,包括:
    获取模块,用于在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
    授权模块,用于根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
    同步模块,用于在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
  10. 根据权利要求9所述的数据备份装置,其特征在于,所述同步模块包括:
    验证单元,用于在接收到所述存储请求后,对所述存储请求的合法性进行验证;
    获取单元,用于所述存储请求的合法性验证通过后,获取点对点存储网络中的活跃节点;
    确定单元,用于根据所述文件大小信息确定存储空间大于或等于所述分片文件的文件大小的活跃节点。
  11. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    向管理平台发送用于存储分片文件的存储请求;
    接收所述管理平台返回的授权信息;所述授权信息包括活跃节点列表以及存储授权签名;
    基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性;
    验证所述分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
    若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述管理平台指定。
  12. 根据权利要求11所述的计算机设备,其特征在于,基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性,包括:
    基于所述活跃节点列表向所述活跃节点列表中的各活跃节点发送占用请求,所述占用请求包括分片文件和对应节点的存储授权签名;其中,所述各活跃节点用于在接收到所述占用请求后,验证所述存储授权签名,若验证成功,则存储所述分片文件,并在存储完成后向第一节点反馈存储成功信息。
  13. 根据权利要求11所述的计算机设备,其特征在于,所述活跃节点列表包括中心存储节点;
    所述中心存储节点用于:
    在预设时间间隔内,定时向所述点对点存储网络中的各节点发送检测指令,以检测所述各节点存储的数据文件是否丢失;
    若有节点存储的数据文件丢失,则分发丢失的数据文件的分片文件到所述点对点存储网络中的各非中心存储节点;
    检测存储的数据文件是否丢失;
    若存储的数据文件丢失,则从所述点对点存储网络中存储有丢失的数据文件的节点获取丢失的数据文件,以恢复数据。
  14. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
    根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
    在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
  15. 根据权利要求14所述的计算机设备,其特征在于,所述在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点,包括:
    在接收到所述存储请求后,对所述存储请求的合法性进行验证;
    所述存储请求的合法性验证通过后,获取点对点存储网络中的活跃节点;
    根据所述文件大小信息确定存储空间大于或等于所述分片文件的文件大小的活跃节点。
  16. 一种计算机非易失性可读存储介质,所述计算机非易失性可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下步骤:
    向管理平台发送用于存储分片文件的存储请求;
    接收所述管理平台返回的授权信息;所述授权信息包括活跃节点列表以及存储授权签名;
    基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性;
    验证所述分片文件是否成功存储至所述活跃节点列表中的各活跃节点;
    若分片文件成功存储至所述活跃节点列表中的各活跃节点,则发送存储完成指令至所述管理平台以控制中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份,其中,所述中心存储节点为活跃节点列表中的任意节点,所述中心存储节点由所述管理平台指定。
  17. 根据权利要求16所述的计算机非易失性可读存储介质,其特征在于,基于所述活跃节点列表,将所述分片文件存储至所述活跃节点列表中的各活跃节点,并通过存储授权签名验证存储的准确性,包括:
    基于所述活跃节点列表向所述活跃节点列表中的各活跃节点发送占用请求,所述占用请求包括分片文件和对应节点的存储授权签名;其中,所述各活跃节点用于在接收到所述占用请求后,验证所述存储授权签名,若验证成功,则存储所述分片文件,并在存储完成后向第一节点反馈存储成功信息。
  18. 根据权利要求16所述的计算机非易失性可读存储介质,其特征在于,所述活跃节点列表包括中心存储节点;
    所述中心存储节点用于:
    在预设时间间隔内,定时向所述点对点存储网络中的各节点发送检测指令,以检测所述各节点存储的数据文件是否丢失;
    若有节点存储的数据文件丢失,则分发丢失的数据文件的分片文件到所述点对点存储网络中的各非中心存储节点;
    检测存储的数据文件是否丢失;
    若存储的数据文件丢失,则从所述点对点存储网络中存储有丢失的数据文件的节点获取丢失的数据文件,以恢复数据。
  19. 一种计算机非易失性可读存储介质,所述计算机非易失性可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下步骤:
    在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点;
    根据所述活跃节点向所述第一节点返回授权信息,以控制第一节点对分片文件进行存储,所述授权信息包括活跃节点列表以及存储授权签名;所述活跃节点列表包括多个活跃节点和中心存储节点的标识;
    在接收到存储完成指令后,控制所述活跃节点列表中的中心存储节点对存储于所述点对点存储网络的所有数据文件进行同步备份。
  20. 根据权利要求19所述的计算机非易失性可读存储介质,其特征在于,所述在接收到第一节点的存储请求后,获取点对点存储网络中的活跃节点,包括:
    在接收到所述存储请求后,对所述存储请求的合法性进行验证;
    所述存储请求的合法性验证通过后,获取点对点存储网络中的活跃节点;
    根据所述文件大小信息确定存储空间大于或等于所述分片文件的文件大小的活跃节点。
PCT/CN2019/118651 2019-01-16 2019-11-15 一种数据备份方法、装置及计算机设备 WO2020147413A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910041425.XA CN109885424B (zh) 2019-01-16 2019-01-16 一种数据备份方法、装置及计算机设备
CN201910041425.X 2019-01-16

Publications (1)

Publication Number Publication Date
WO2020147413A1 true WO2020147413A1 (zh) 2020-07-23

Family

ID=66926108

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/118651 WO2020147413A1 (zh) 2019-01-16 2019-11-15 一种数据备份方法、装置及计算机设备

Country Status (2)

Country Link
CN (1) CN109885424B (zh)
WO (1) WO2020147413A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI829475B (zh) * 2022-12-15 2024-01-11 信驊科技股份有限公司 產生包括多個影像的佈局的影像處理裝置和影像處理方法

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109885424B (zh) * 2019-01-16 2024-05-31 平安科技(深圳)有限公司 一种数据备份方法、装置及计算机设备
CN113890880A (zh) * 2021-09-19 2022-01-04 苏州浪潮智能科技有限公司 一种多节点间的数据同步方法、系统、设备及存储介质
CN114625106B (zh) * 2022-03-07 2024-05-14 深圳市元征科技股份有限公司 车辆诊断的方法、装置、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345690A (zh) * 2007-07-12 2009-01-14 中国电信股份有限公司 电信级p2p网络的内容分级存储及传送方法
WO2009135374A1 (zh) * 2008-05-05 2009-11-12 中兴通讯股份有限公司 Iptv媒体交付系统、iptv媒体内容发布方法、及媒体交付系统
CN103166991A (zh) * 2011-12-14 2013-06-19 中国电信股份有限公司 一种基于p2p和云存储实现跨节点存储的方法和装置
CN109885424A (zh) * 2019-01-16 2019-06-14 平安科技(深圳)有限公司 一种数据备份方法、装置及计算机设备

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184104B (zh) * 2007-12-21 2010-12-15 腾讯科技(深圳)有限公司 一种分布式存储系统及方法
US20140081911A1 (en) * 2011-01-10 2014-03-20 Netapp, Inc. Optimizing automatic deletion of backup files
CN105490999A (zh) * 2014-12-23 2016-04-13 哈尔滨安天科技股份有限公司 一种基于xmpp协议的分布式存储系统
CN106375404B (zh) * 2016-08-30 2019-10-25 华为技术有限公司 数据存储控制方法、数据存储方法、数据获取方法及装置
CN107819891B (zh) * 2017-10-16 2020-01-24 平安科技(深圳)有限公司 数据处理方法、装置、计算机设备和存储介质
CN107995270A (zh) * 2017-11-24 2018-05-04 成都赤乌软件技术有限公司 一种基于区块链实现分布式文件存储的方法
CN108156040A (zh) * 2018-01-30 2018-06-12 北京交通大学 一种分布式云存储系统中的中央控制节点
CN108769171B (zh) * 2018-05-18 2021-09-17 百度在线网络技术(北京)有限公司 分布式存储的副本保持验证方法、装置、设备及存储介质
CN109194708B (zh) * 2018-07-24 2021-07-13 哈尔滨工程大学 一种基于区块链技术的分布式存储系统及其身份认证方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101345690A (zh) * 2007-07-12 2009-01-14 中国电信股份有限公司 电信级p2p网络的内容分级存储及传送方法
WO2009135374A1 (zh) * 2008-05-05 2009-11-12 中兴通讯股份有限公司 Iptv媒体交付系统、iptv媒体内容发布方法、及媒体交付系统
CN103166991A (zh) * 2011-12-14 2013-06-19 中国电信股份有限公司 一种基于p2p和云存储实现跨节点存储的方法和装置
CN109885424A (zh) * 2019-01-16 2019-06-14 平安科技(深圳)有限公司 一种数据备份方法、装置及计算机设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI829475B (zh) * 2022-12-15 2024-01-11 信驊科技股份有限公司 產生包括多個影像的佈局的影像處理裝置和影像處理方法

Also Published As

Publication number Publication date
CN109885424B (zh) 2024-05-31
CN109885424A (zh) 2019-06-14

Similar Documents

Publication Publication Date Title
US11055419B2 (en) Decentralized data authentication system for creation of integrated lifetime health records
WO2020147413A1 (zh) 一种数据备份方法、装置及计算机设备
TWI734426B (zh) 使用可信執行環境檢索區塊鏈網路的公開資料
US11038891B2 (en) Decentralized identity management system
CN108111604B (zh) 区块链共识方法、装置和系统、标识信息处理方法和装置
TWI705690B (zh) 分布式網路中進行主節點變更的系統
CN110059494B (zh) 一种区块链交易数据的隐私保护方法及区块链系统
WO2021018088A1 (zh) 可信认证方法,网络设备、系统及存储介质
CN107967416B (zh) 版权维权检测的方法、装置和系统
US20190130190A1 (en) Media authentication using distributed ledger
CN111045855B (zh) 备份数据的方法、装置和计算机程序产品
WO2020151330A1 (zh) 数据持有性验证方法及终端设备
CN114391241B (zh) 具有可调整法定数量的区块链分片
WO2020143317A1 (zh) 分片文件验证方法及终端设备
TW202111568A (zh) 可信賴執行環境中基於錯誤校正編碼的共享區塊鏈資料儲存
CN112600678B (zh) 一种数据处理方法、装置、设备及存储介质
US20200120039A1 (en) Systems and methods for controlling access to broker resources
TW202119243A (zh) 優先化共用區塊鏈資料儲存
WO2010015143A1 (zh) 一种分布式文件系统及其数据块一致性管理的方法
WO2021051581A1 (zh) 服务器集群文件同步方法及装置、电子设备及存储介质
WO2022179115A1 (zh) 用户认证方法、装置、服务器及存储介质
CN112988674B (zh) 大数据文件的处理方法、装置、计算机设备及存储介质
TW202119210A (zh) 基於錯誤校正碼的共享區塊鏈資料儲存的資料安全性
CN110119390B (zh) 基于区块链的金融信息外包管理系统
WO2021068477A1 (zh) 区块处理方法、装置、计算机设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19909783

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19909783

Country of ref document: EP

Kind code of ref document: A1