Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33results about How to "Achieve data recovery" patented technology

Method for recovering flash memory data at power-off of built-in Linux system

ActiveCN101477482AAvoid data lossSolve the shortcomings of low reading and writing efficiencySpecial data processing applicationsRedundant operation error correctionTemporary fileJFFS2
A method for recovering flash data in the event of power-off in an embedded Linux system solves the problem that sudden power-off at the time of read and write data flashing causes the defects of data loss or file system damage. The invention adopts the technical scheme as follows: defining and dividing a root file system in the flash memory into a fixation area, a modification area and a backup area; giving deferent loading manners to the subareas through a system file JFFS2; distributing configuration information in the root file system to the catalogues in the fixation area; and storing the temporary file produced during the system operation in the root file system in the memory. When data loss is caused by accidental power-off of the file system, the Linux system transfers the file system in spare subarea to carry out recovery of default setting and judges whether the current file system is damaged or not; whether to continuously conduct file loading to the file system is decided according to the detection to the system file with important parameters of system setting. The invention has the beneficial effects that the data recovery to the flash in the event of power-off is realized, and data loss in flashing process is avoided.
Owner:SHENZHEN GONGJIN ELECTRONICS CO LTD

Method for realizing security electronic mail based on digital envelope

The invention relates to the technical field of information security, and in particular relates to a method for realizing a security electronic mail based on a digital envelope. According to the invention, on the basis of the digital envelope technology based on PKI symmetric and asymmetric key algorithms, mail encryption and decryption information, user key information, data recovery information, mail ciphertext and other information are assembled into the digital envelope; and thus, encryption, decryption and data recovery of the electronic mail are realized. According to the invention, a session key is encrypted by obtaining all public key certificates of each receiver from a LDAP, such that interconnection and intercommunication of multiple certificates of one person are realized; when a mail blind copying function is started, mail information can be decrypted only by the private key of a blind copying user; therefore, the identity confidentiality of the blind copying user is ensured; in an emergency case that the private key of the user is lost or damaged, mail information can be decrypted without recovering the private key of the user through a KMC; and, by means of a high-grade security protection mechanism that the encrypted private key cannot be derived and a strict service approval signature mechanism, the security of recovered information is ensured from the perspectives of technologies and management.
Owner:BC P INC CHINA NAT PETROLEUM CORP +2

Application method for accurately obtaining LLR information

The invention discloses an application method for accurately obtaining LLR information. The method is characterized by comprising the steps of selecting statistics samples; calculating Optimal Vref of each sample; by setting multi-level multi-bit reading voltages, calculating the LLR information corresponding to the multi-level reading voltages, and performing multi-bit LDPC decoding; and by comparing iterative frequencies and decoding results of the multi-bit LDPC decoding corresponding to different reading voltages, recording the reading voltage with the lowest iterative frequency and the decoding correctness as a multi-bit optimal reading voltage, wherein the corresponding LLR information is initial LLR information of a batch of products, and the batch of the products finitely adopt the optimal reading voltage to read data by default and adopt the initial LLR information to decode the data. An empirical value is obtained by adding statistics and serves as a parameter during normal decoding to ensure normal NAND reading-writing efficiency; and when the normal decoding fails and data recovery needs to be carried out, the scheme can estimate more accurate multi-bit LLR information, thereby reducing the error code rate and realizing the data recovery.
Owner:RAMAXEL TECH SHENZHEN

Heterogeneous database unified disaster recovery backup method and device based on virtualization and snapshot

The invention relates to a heterogeneous database unified disaster recovery backup method and device based on virtualization and snapshot, and the method comprises the following steps: constructing a virtual machine matched with a source end hardware environment by using a virtualization technology, maintaining a standby database in the virtual machine, and keeping the standby database in data synchronization with a source database of a source end and in operation; carrying out primary full-amount backup; monitoring whether a source end generates a new log event or not in real time, and if yes, backing up the new log event and controlling the virtual machine to perform log synchronization at the same time; whether a snapshot instruction is generated or not is monitored in real time, and if yes, a data snapshot of a storage volume corresponding to a standby library in the virtual machine is obtained, and a virtual snapshot library is generated; and when recovery is executed, realizing data recovery based on the virtual snapshot library. Compared with the prior art, the method has the advantages that the reliability and the data security of a database system can be ensured, and meanwhile, physical resources are flexibly distributed and scheduled according to needs.
Owner:SHANGHAI DRAGONNET TECH

A method for analyzing data storage structure of nand FLASH memory chip

The invention discloses a data storage structure analyzing method of a NAND FLASH memory chip. The method comprises: determining the size of physical blocks and the size of physical pages of the chip, and opening a physical image as read-only; carrying out valid block judgement; analyzing the structure of the pages by utilizing the physical pages where continuous data exists; determining the positions of logical block numbers and the positions of logical page numbers according to the changes over bits of each physical page admin area; conducting data interleave analyzing and data merging according to the data continuity condition of a data volume which can reflect the continuity about data; judging whether or not to conduct data segmenting according to the duplication of the logical block numbers; conducting data reorganizing; and deleting the admin area data, and finally obtaining a logical image file. According to the data storage structure analyzing method of the NAND FLASH memory chip, the conversion from the physical image to the logical image of the storage chip is realized on the premise that an NAND FLASH control circuit is not used, thus the aim that conducting data recovering and obtaining evidence after this class of devices are damaged is achieved.
Owner:中国人民解放军61660部队

An application method for accurately obtaining llr information

The invention discloses an application method for accurately obtaining LLR information. The method is characterized by comprising the steps of selecting statistics samples; calculating Optimal Vref of each sample; by setting multi-level multi-bit reading voltages, calculating the LLR information corresponding to the multi-level reading voltages, and performing multi-bit LDPC decoding; and by comparing iterative frequencies and decoding results of the multi-bit LDPC decoding corresponding to different reading voltages, recording the reading voltage with the lowest iterative frequency and the decoding correctness as a multi-bit optimal reading voltage, wherein the corresponding LLR information is initial LLR information of a batch of products, and the batch of the products finitely adopt the optimal reading voltage to read data by default and adopt the initial LLR information to decode the data. An empirical value is obtained by adding statistics and serves as a parameter during normal decoding to ensure normal NAND reading-writing efficiency; and when the normal decoding fails and data recovery needs to be carried out, the scheme can estimate more accurate multi-bit LLR information, thereby reducing the error code rate and realizing the data recovery.
Owner:RAMAXEL TECH SHENZHEN

A method and system for preventing ransomware attacks based on solid-state storage devices

The invention discloses a method and system for preventing ransomware attacks based on solid-state storage devices, which realizes detection of ransomware in the firmware flash memory conversion layer of the solid-state storage devices, and utilizes the characteristics of non-in-situ update of solid-state storage devices to realize data lightweight backup and data backup. recover. The ransomware detection module establishes a fine-grained access model according to the special data access mode when the ransomware attacks the user; the data backup module adopts the method of periodic backup when the detection module does not detect the ransomware. The important metadata including the page usage table is backed up, and the garbage collection strategy is used to ensure that the data of the current backup version will not be physically deleted; the data recovery module adds the backup data version and the write operation by adding the backup data version in the OOB area of ​​the corresponding physical page during the write operation. The serial number and target logical block address information are used to reconstruct the backup metadata by the dichotomy method, thereby realizing the rapid recovery of user data.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

A Realization Method of Secure E-mail Based on Digital Envelope

The invention relates to the technical field of information security, and in particular relates to a method for realizing a security electronic mail based on a digital envelope. According to the invention, on the basis of the digital envelope technology based on PKI symmetric and asymmetric key algorithms, mail encryption and decryption information, user key information, data recovery information, mail ciphertext and other information are assembled into the digital envelope; and thus, encryption, decryption and data recovery of the electronic mail are realized. According to the invention, a session key is encrypted by obtaining all public key certificates of each receiver from a LDAP, such that interconnection and intercommunication of multiple certificates of one person are realized; when a mail blind copying function is started, mail information can be decrypted only by the private key of a blind copying user; therefore, the identity confidentiality of the blind copying user is ensured; in an emergency case that the private key of the user is lost or damaged, mail information can be decrypted without recovering the private key of the user through a KMC; and, by means of a high-grade security protection mechanism that the encrypted private key cannot be derived and a strict service approval signature mechanism, the security of recovered information is ensured from the perspectives of technologies and management.
Owner:BC P INC CHINA NAT PETROLEUM CORP +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products