Method and device for achieving data protection

A data protection and data technology, which is applied in the direction of data error detection, response error generation, input/output to record carrier, etc., which can solve the problems of incorrect backup data, inability to monitor changes, and repeated copying. And other issues

Active Publication Date: 2015-05-13
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional disk mirroring often uses data copying directly, which will have the following two problems: First, it is impossible to monitor the changes of each input and output (IO) operation (the general backup method is to copy the disk data at a certain point in time operation, changing data between two points in time will cause omissions), which may lead to omission of data for an IO operation (including write data and read data, especially when the data of the IO operation is write data, because the data was missed, the location where the data was originally stored was not stored and the data could not be correctly backed up to the backup end); the second is that when backing up data, there is still duplication when the host encounters an exception copy problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for achieving data protection
  • Method and device for achieving data protection
  • Method and device for achieving data protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0058] figure 1 A flow chart of the method for realizing data protection in the present invention, such as figure 1 shown, including:

[0059] Step 101: When an IO request is intercepted, extract the information of the IO request, and judge whether the data of the IO request is valid data according to the extracted information of the IO request; wherein, the IO request includes the information of the IO request and the data of the IO request.

[0060] Wherein, the information of the IO request includes: write disk device object, disk sector offset, write data length, data b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for achieving data protection. The method includes the following steps that when an IO request is intercepted, information of the IO request is extracted, and whether data of the IO request are valid or not is judged according to the extracted information of the IO request, wherein the IO request includes the information of the IO request and the data of the IO request; when the data of the IO request are valid, the data of the IO request are stored in a disk corresponding to the information of the IO request; a bitmap identification of a data block where the data of the IO request are stored is set to have been changed; data on the data block with the changed bitmap identification is transmitted to a log volume corresponding to the disk and stored on the log volume corresponding to the disk in a secondary index mode. The problem of repeated copying of data is solved by monitoring changes of each IO and changes of the bitmap identification, and therefore data protection efficiency is improved.

Description

technical field [0001] The invention relates to the field of data disaster recovery, in particular to a method and device for realizing data protection. Background technique [0002] With the Internetization and digitization of the information industry, enterprises have entered the era of office automation. During this period, many important data will be generated. These data are often the core data of enterprises, and their security needs to be guaranteed: on the one hand, data security Security must be guaranteed, but on the other hand, these data are threatened by hardware damage, virus damage, and human error deletion. Therefore, enterprises have to need a method and means to protect these data, and because some business data is continuously generated, they must be able to back up these data in real time. When data is damaged or lost, it must be possible to restore the data, and the speed of restoring the data should be as fast as possible. Traditional disk mirroring o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F3/06
Inventor 穆裕张道伟张延峰
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products