Unlock instant, AI-driven research and patent intelligence for your innovation.
A shared storage management method and system
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of shared storage and management methods, applied in the field of virtualized storage sharing, can solve the problems of data security risks and shared storage security cannot be well guaranteed
Active Publication Date: 2020-02-07
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
In actual operation, there is a mismatch between the mount status of the shared storage and the shared process of the shared storage. For example, the mount status is displayed as mounted while the shared process is running. At this time, the data in the shared storage has potential security risks.
In the existing technology, this security risk is dealt with by adding distributed locks, such as using distributed locks to ensure the uniqueness of the leader node of the cluster. In this scenario, distributed locks will not be acquired and released frequently. Once the lock is obtained, it will be held for a long time, but the mount state of the shared storage and the state of the distributed lock are displayed separately, and there are situations such as data synchronization inconsistencies between the mounted state of the shared storage and the state of the distributed lock. In the case of inconsistent state, the security of shared storage cannot be well guaranteed
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0048] Embodiment 1: see figure 2As shown, obtain the running status 11 of the shared process corresponding to the shared storage and obtain the mounting status 12 of the shared storage. According to the above running status and the above mounting status, outputting the security status of the above shared storage includes:
[0049] Outputting a corresponding control signal according to the above-mentioned operating state, wherein, if the above-mentioned operating state is normal operation, outputting a control signal with a logic of 1, and if the above-mentioned operating state is abnormal operation, outputting a control signal with a logic of 0;
[0050] Output the corresponding mount signal according to the above mount state, wherein, if the above mount state is normal mount, the output logic is 1 mount signal, if the above mount state is abnormal mount, the output logic is 0 the mount signal;
[0051] Perform "AND" logic operation 13 on the above control signal and the ab...
Embodiment 2
[0054] Example 2: see image 3 As shown, obtain the running state 21 of the shared process corresponding to the shared storage and obtain the mounting state 22 of the shared storage, and output the security state of the above-mentioned shared storage according to the above-mentioned running state and the above-mentioned mounting state, including:
[0055] Outputting a corresponding control signal according to the above-mentioned operation state, wherein, if the above-mentioned operation state is normal operation, outputting a control signal with a logic of 0, and if the above-mentioned operation state is abnormal operation, outputting a control signal with a logic of 1;
[0056] Output the corresponding mount signal according to the above mount state, wherein, if the above mount state is normal mount, the output logic is 0 mount signal, if the above mount state is abnormal mount, the output logic is 1 the mount signal;
[0057] Perform "OR" logic operation 23 on the above con...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a management method for a shared storage, which comprises the steps of: acquiring a running state of a shared process corresponding to the shared storage; acquiring a mounting state of the shared storage; and according to the running state and the mounting state, outputting a safety state of the shared storage, wherein only when both the running state and the mounting state are normal, a storage state of the shared storage is output as a safe signal. Therefore, in the invention, the shared process corresponding to the shared storage is tracked, a safety state of the storage state of the shared storage is output by judging the running state and the mounting stat of the shared process, and only when both the running state and the mounting state of the shared process are simultaneously normal, a shared state of the shared storage is displayed as a safe state, so that safety of data sharing of the shared storage can be obviously improved. The invention further discloses a management system for the shared storage. The management system has the same technical effects with the method, which are not repeated herein.
Description
technical field [0001] The invention relates to the technical field of virtualized storage sharing, in particular to a management method and system for shared storage. Background technique [0002] With the advancement of Internet technology and the development of big data, the data that people come into contact with in life and work is increasing exponentially, and it is difficult for users' personal storage media to meet people's needs. For example, movie lovers have collected thousands of It is difficult to store Blu-ray digital movies in one or several hard drives, and at the same time, it is quite inconvenient to share, so shared storage has become a trend. [0003] In the process of shared storage and sharing, data security is an extremely important aspect. In actual operation, there is a mismatch between the mount state of the shared storage and the shared process of the shared storage. For example, the mount state is displayed as mounted while the shared process is ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.