Safety storage method for data

A technology for safe storage and data storage, applied to the redundancy in computing for data error detection, electrical digital data processing, special data processing applications, etc. Safe storage and other issues to achieve the effect of improving data recovery efficiency, high data reading efficiency, and high data recovery efficiency

Active Publication Date: 2009-08-19
CHENGDU SOBEY DIGITAL TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, RAID technology also has obvious deficiencies: first, it needs to add expensive hardware RAID and use the same hard disk, so that its controllability can basically meet the requirements of reading and writing, and additional costs need to be added; second, RAID storage has poor scalability, The hard disk bundled usage mode of RAID makes it very difficult to increase or decrease the hard disk capacity; third, if the hard disk in the hard disk array is damaged and the new disk is not replaced in time, the security of data storage cannot be guaranteed at this time; fourth, only use for multiple hard drives, not multiple servers
[0012] Although RAID 1 technology adopts hard disk mirroring, which can guarantee the instant recovery of data, but because it is mirroring, the storage locations of the same data on the two disks are completely corresponding. If the track of the disk is damaged, the mirroring will lose its meaning and the data cannot be stored safely; and Because it is a mirroring technology, an even number of disks is required to achieve it, and if the damaged hard disk cannot be replaced in time, the security of the data will be affected; when reading data, the mirrored disk is often idle, and only one disk provides data , the reading and writing efficiency is low
[0013] For RAID 3 to 6 technologies, the data needs to be distributed and stored and the verification data to be calculated. The calculation of the verification is huge. After the disk is damaged, the rebuild of the RAID usually takes more than ten to twenty hours to complete, which affects the system. Normal operation, during this period, if another disk failure occurs, it will completely cause data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety storage method for data
  • Safety storage method for data
  • Safety storage method for data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The basic idea of ​​the present invention is to adopt distributed real-time backup storage, and trade space for safety. Access multiple storage devices in any known way in the computer system, and store any data in two different storage devices at the same time. When the data in a certain storage device is damaged, or the storage device is damaged, the corresponding Other storage devices for data take out data and store them in other storage devices, so as to ensure that any data has available data in the two storage devices at the same time. When reading data, read from one of the two storage devices. If a storage device storing data is damaged, read data directly from the other storage device.

[0054] In order to facilitate the understanding of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0055] figure 1 and figure 2 The provided hardware structure is the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data safe storage method. By accessing multiple storage devices in a computer system, any data is stored in two independent storage devices at the same time and associated. When the data in a certain storage device damage, or after the storage device is damaged, take out the data from another storage device that stores the corresponding data and store it in another storage device, so as to ensure that any data has available data in the two storage devices at the same time. When reading data, read from one of the two storage devices. If a storage device storing data is damaged, read data directly from the other storage device. The invention has low hardware cost, strong data security, and strong expansibility, and can increase or decrease storage device capacity arbitrarily. If data corruption is found in the system, it can also be restored online without affecting the reading and running of data.

Description

technical field [0001] The invention relates to a data safe storage method, in particular to a data safe storage method based on multiple storage devices, which can realize real-time backup and online recovery of data, and ensure the safety of stored data. [0002] In particular, it provides a data security storage method used in a storage system on a TV station video server. Background technique [0003] The safe storage of data is a very important task, especially for some special industries, the safety, reliability, and stability of data storage even exceed the requirements for functionality, and even require that damaged data can be recovered in the shortest possible time. Recovery, in order to realize the timely reading of data and ensure that the work performed by the computer system is not interrupted. For example, the storage device used for the video server of a TV station is required to ensure that the stored program data is safe and reliable, and even if the data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/14G06F17/30
Inventor 欧阳睿章余军王炜刘盾谭肇吕袤
Owner CHENGDU SOBEY DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products