Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting data of memory mechanism

A storage device and data protection technology, which is applied in the direction of data error detection and response error generation, can solve the problems of memory waste, money and memory waste, and occupation, so as to improve reliability and improve The effect of using capacity

Inactive Publication Date: 2008-06-25
INVENTEC CORP
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the prosperity of the economy and the progress of science and technology, the use of various computers and servers is becoming more and more common. However, memory plays an important role in computers and servers, and its impact on system performance is playing a more critical role than before. As long as the memory An error of more than 1 bit will cause data error or loss, causing great trouble to consumers
[0003] The existing technology uses three modes of standard mode (Standard), spare mode (Spare) and mirror mode (Mirror) to cooperate with the hardware control device to operate DIMM (Dual In-line Memory Module) and perform data backup actions. The above three technologies are The technology commonly used in the industry is a well-known technology for those who are familiar with this technical field, so it will not be described in detail. However, although the backup mode and the mirror mode have high reliability, they need to occupy a set of memory with the same size for Backup, so the design can only use half of the storage capacity, resulting in a waste of money and storage
[0004] Therefore, how to avoid retaining a group of memory with the same size for the purpose of backing up the data of the memory, resulting in the usage capacity of the memory being only half of the original, causing the memory to be wasted, is an urgent problem to be solved at present.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting data of memory mechanism
  • Method for protecting data of memory mechanism
  • Method for protecting data of memory mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The implementation of the present invention is described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification.

[0026] see figure 1 , which is a schematic block diagram of the corresponding basic structure of the data protection method of the storage device of the present invention. As shown in the figure, the computer equipment 1 is composed of a first storage device 11, a second storage device 12, a driver service program 14, and a hardware control device. 13. A system management interrupt program 15 (System Manage Interrupt; SMI) and an operating system 16 are used to provide the basic framework corresponding to the data protection method of the storage device of the present invention. What needs to be explained here is that the computer equipment 1 applying the data protection method of the storage device of the present invention has...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data protection method of a storage device, which is applied to a computer unit. The data protection method includes the following steps: an interrupt management program of the system acquires information of error pattern and address of an error chunk in a first storage device by a hardware control device, and the information is stored into a second storage device; the information of the error pattern and the error chunk of the first storage device is read by a drive service program from the second storage device; the drive service program informs an operating system to search a chunk which can be accessed normally and not destroyed in the first storage device, and the chunk is set as a default chunk; the drive service program transmits the information of the address of the error chunk in the first storage device to the operating system, thereby the operating system copies the data of the error chunk in the first storage device to the default chunk, so that the using capacity of the storage device can be increased, and the reliability of the computer unit can be improved.

Description

technical field [0001] The invention relates to a data protection method of a storage device, and in more detail, relates to a data backup method applied to a memory in a computer device with a memory. Background technique [0002] With the prosperity of the economy and the progress of science and technology, the use of various computers and servers is becoming more and more common. However, memory plays an important role in computers and servers, and its impact on system performance is playing a more critical role than before. As long as the memory An error of more than 1 bit will cause data error or loss, which will cause great trouble to consumers. [0003] The existing technology uses three modes of standard mode (Standard), spare mode (Spare) and mirror mode (Mirror) to cooperate with the hardware control device to operate DIMM (Dual In-line Memory Module) and perform data backup actions. The above three technologies are The technology commonly used in the industry is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14
Inventor 卢盈志
Owner INVENTEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products