System backup and recovery method, and backpu and recovery server

A backup server and system recovery technology, applied in the field of communication, can solve the problems of low reliability, limited range, and inability to perform identity verification, and achieve the effect of high reliability and solving identity verification problems

Active Publication Date: 2009-06-24
XFUSION DIGITAL TECH CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to various reasons, the IP addresses of the active and standby machines in many current systems often change during operation, especially when using such as DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol) protocol to dynamically obtain the IP address , this method of authentication is even less feasible
In addition, when the system crashes, the operating system cannot be started, and the server cannot obtain the IP address of the host computer that needs to recover the system, which further limits the scope of application of this IP address-based authentication method.
[0004] It can be seen from the above description that due to the low reliability of the dual-machine backup method in the prior art, the authentication based on the IP address of the multi-machine backup method cannot be applied to the scheme of dynamically obtaining the IP address, nor can it be used when the system crashes. Therefore, the above two solutions cannot effectively solve the problems of low reliability and inability to perform identity verification during the system backup process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System backup and recovery method, and backpu and recovery server
  • System backup and recovery method, and backpu and recovery server
  • System backup and recovery method, and backpu and recovery server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The invention adopts the MAC (Medium Access Control) address of each backup target board as its identity mark, and proposes a backup target board authentication method based on the MAC address and a backup recovery server using the method. Since the MAC address is a globally unique address assigned by the hardware device manufacturer during the manufacturing process, each MAC address can uniquely identify the backup target board using the MAC address. The technical solutions of the present invention will be described below in conjunction with the accompanying drawings.

[0039] figure 1 It is a flow chart of the system backup method of the present invention. Such as figure 1As shown, the process starts at step 100. In step 100, the backup target board sends a backup request to the backup server; wherein, the backup request can be sent periodically or temporarily according to the received instruction. After receiving the backup request from the backup target board, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system backup method with ID checking. The backup server judges whether the MAC address of backup aim board of sending the backup request is legal or not; if yes, then responding the request; otherwise, rejecting the request. This invention offers also a system restoration method as well as a backup and restoration server related to the above two methods. Using MAC address in multi-host backup to verify ID of backup aim board exerts advantages of hi-reliability of multi backup as well as realizes the ID checking in multi backup system based on the aid of the uniqueness of the MAC address.

Description

technical field [0001] The present invention relates to data processing technology in the communication field, and more specifically, relates to a system backup and recovery method and a backup and recovery server. Background technique [0002] The rapid development of network technology and new computer architecture has put forward higher requirements for the reliability of the central server and other types of servers that carry important data in the network. Stand-alone operation is no longer competent, and important data servers must be equipped with backup and recovery. Program. Currently, the most widely used system backup and recovery method is active-standby dual-machine backup. When this method is used, during the system operation, the two machines maintain the synchronization of the system and data through the communication cable. The current working machine is the master machine, and the other machine The station is a standby machine, and the standby machine cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L1/22H04L9/32H04L12/24G06F11/20
Inventor 彭鹏飞张汇
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products