Safety storage method for data

A technology for safe storage and data, applied in the redundancy of computing for data error detection, electrical digital data processing, special data processing applications, etc. Safe storage and other issues to achieve the effect of improving data recovery efficiency, high data reading efficiency, and high data recovery efficiency

Active Publication Date: 2008-02-06
CHENGDU SOBEY DIGITAL TECH CO LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, RAID technology also has obvious deficiencies: first, it needs to add expensive hardware RAID and use the same hard disk, so that its controllability can basically meet the requirements of reading and writing, and additional costs need to be added; second, RAID storage has poor scalability, The hard disk bundled usage mode of RAID makes it very difficult to increase or decrease the hard disk capacity; third, if the hard disk in the hard disk array is damaged and the new disk is not replaced in time, the security of data storage cannot be guaranteed at this time; fourth, only use for multiple hard drives, not multiple servers
[0012] Although RAID1 technology adopts hard disk mirroring, which can ensure the instant recovery of data, but because it is mirroring, the storage locations of the same data on the two disks are completely corresponding. If the track of the disk is damaged, the mirroring will lose its meaning and the data cannot be stored safely; It is a mirroring technology, which requires an even number of disks to realize, and if the damaged hard disk cannot be replaced in time, the security of the data will be affected; when reading data, the mirrored disk is often idle, and only one disk provides data. Read and write efficiency is low
[0013] For RAID3 to 6 technologies, the data needs to be distributed and stored and the verification data to be calculated. The calculation of the verification is huge. After the disk is damaged, the rebuild of the RAID usually takes more than ten to twenty hours to complete, which affects the normal operation of the system. During this period, if another disk failure occurs, it will completely cause data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety storage method for data
  • Safety storage method for data
  • Safety storage method for data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The basic idea of ​​the present invention is to adopt distributed real-time backup storage, and trade space for safety. Access multiple storage devices in any known way in the computer system, and store any data in two different storage devices at the same time. When the data in a certain storage device is damaged, or the storage device is damaged, the corresponding Other storage devices for data take out data and store them in other storage devices, so as to ensure that any data has available data in the two storage devices at the same time. When reading data, read from one of the two storage devices. If a storage device storing data is damaged, read data directly from the other storage device.

[0052] In order to facilitate the understanding of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0053] The hardware structure provided in Fig. 1 and Fig. 2 is the same a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a safe data storing method. By connecting with a plurality of storage device, the computer system can store any one data into two separate storage devices simultaneously to form a relationship; when the data in one of the storage device is damaged, or the storage device is damaged, the present invention can take out the data from the other storage device which stores the corresponding data and stores the data into other storage device, to guarantee that any one of the data has usable data in two storage devices simultaneously. When reading data from the two storage devices, the present method can select one, and when one storage device storing the data is damaged, the method can read data from the other storage device. The present invention has low cost, strong data safety and strong expansibility, can increase or decrease the capacity of the storage device at will, and is applicable to the storage system formed by multi hard disks and multiserver, and has high data read rate. No recreating time is needed, when finding data damaged during the course of data reading, the present method can retrieve on line, without influence for the data reading and running.

Description

technical field [0001] The invention relates to a data safe storage method, in particular to a data safe storage method based on multiple storage devices, which can realize real-time backup and online recovery of data, and ensure the safety of stored data. [0002] In particular, it provides a data security storage method used in a storage system on a TV station video server. Background technique [0003] The safe storage of data is a very important task, especially for some special industries, the safety, reliability, and stability of data storage even exceed the requirements for functionality, and even require that damaged data can be recovered in the shortest possible time. Recovery, in order to realize the timely reading of data and ensure that the work performed by the computer system is not interrupted. For example, the storage device used for the video server of a TV station is required to ensure that the stored program data is safe and reliable, and even if the data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F17/30
Inventor 欧阳睿章余军王炜刘盾谭肇吕袤
Owner CHENGDU SOBEY DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products