Continuous data protection method

A data protection and data technology, applied in the field of data protection in the field of information security, can solve problems such as data change and loss, and achieve the effect of rapid verification

Active Publication Date: 2015-08-26
成都云祺科技有限公司
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During data recovery, the snapshot can only restore the data at the snapshot time point, and the data changes between the two snapshot time points are lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Continuous data protection method
  • Continuous data protection method
  • Continuous data protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0118] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0119] The data structure diagram of the data change record and continuous data protection metadata file of the present invention is as follows figure 1 shown.

[0120] The data change record D is used to describe the data change of a certain block device. Among them, the production host name Dh is used to describe the host name that needs continuous data protection, which can uniquely identify a host, which can be UUID, host identifier or any other identifier that can confirm the uniqueness in the system; the device name Dn is used to describe The name of a block device to be protected on the host; the timestamp Dt is used to describe the time point when the data change occurs; the offset Ds is used to describe the initial address of the data change, which is relative to the starting point of the block device The starting address is 0; the length De is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a continuous data protection method. Data can be recovered to any time point; data mounting in a short time can be realized; and the fast verification, write-in and immediate use of the data are realized. The method comprises the following steps that: initialization synchronization is executed at first; the initial state of production host block equipment is synchronized to a backup host; meanwhile, a data variation capturing module is started for capturing the data variation and transmitting the data variation to the backup host; the data variation is written into a mirrored volume; original data of a data variation address is written into a journal volume; the timestamp, the offset, the length and the storage address are recorded; and the recording of any data variation is realized. The reconfiguration of a virtual volume is used; the actual data access is redirected to the mirrored volume, the journal volume and a write time volume through a virtual volume index block; and the data read-out and the data write-in are realized. The data recovery is realized by using data read-out. Obsolete data can be deleted only through finding and deleting all of the journal volume and journal volume metadata files with the ending timestamp before the time point.

Description

technical field [0001] The invention relates to the field of data protection in the field of information security, in particular to a continuous data protection method. Background technique [0002] Data protection is divided into scheduled backup and real-time backup according to the different importance of data. Scheduled backup is mainly for data with low importance, such as files, programs, etc. Scheduled backup is to copy data at a fixed time interval. Real-time backup is mainly aimed at high-importance data, such as databases, logical volumes, etc. Real-time backup means that when data changes, the data changes are transmitted synchronously or asynchronously to local or remote storage media for storage, and data backup is completed . [0003] The main method for backing up block devices, that is, disks, partitions, logical volumes, etc., is block copying. The usual method is to obtain data changes of block devices, and then transfer the data changes to backup devices...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/08G06F21/62
Inventor 胡晓勤黄传波谢俊峰
Owner 成都云祺科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products