Unlock instant, AI-driven research and patent intelligence for your innovation.

Data integrity protection method and system and related equipment

A data integrity and protection system technology, applied in the field of systems and related equipment, and data integrity protection methods, can solve problems such as inability to perform checksum verification, inflexibility, and strong checksum algorithm capabilities, etc., to avoid The effect of flashing wrong data and ensuring integrity

Active Publication Date: 2020-04-03
SANGFOR TECH INC
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In this case, there are several defects. One is that it is slow to find errors. If the data is not read out, it will not be possible to perform checksum verification.
The second is inflexibility, because data will pass through different levels of the storage system during the entire life cycle, including memory, disk and solid state disk, etc.
The failure rate, failure rate, and error rate of different storage components are different. If the same checksum algorithm is used, the checksum algorithm capability on some storage components will be too strong and the performance will be greatly affected.
However, the checksum algorithm capability of some storage components is too weak to meet the requirements of data integrity protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity protection method and system and related equipment
  • Data integrity protection method and system and related equipment
  • Data integrity protection method and system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The embodiment of the present invention provides a data integrity protection method, system and related equipment, which are used to timely find out whether there is an error in the process of flashing and reading target data, effectively avoid flashing wrong data, and ensure data integrity.

[0050] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0051] The terms "first", "secon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data integrity protection method and system and related equipment, which are used for discovering whether errors occur in the flashing and reading processesof target data in time, effectively avoiding flashing error data and ensuring the integrity of the data. The method provided by the embodiment of the invention comprises the following steps: when target data is stored in an internal memory, calculating a first checksum of the target data by adopting a first checksum algorithm; when an instruction of flashing the target data in the internal memoryto the second memory is received, calculating a second checksum of the target data by adopting a second checksum algorithm; checking whether the target data is complete or not by adopting the first checksum, and if the target data is complete, flashing the first checksum, the target data and the second checksum into a second memory; and when an instruction for reading the target data in the secondmemory is received, checking whether the target data is complete or not by adopting the second check sum, and if the target data is incomplete, reporting an error.

Description

technical field [0001] The invention relates to the technical field of data storage, in particular to a data integrity protection method, system and related equipment. Background technique [0002] Maintaining data integrity is the most important responsibility of modern storage systems, so various techniques have been developed and applied to improve data integrity protection. The most commonly used and most popular of these is the checksum method. Traditional checksum methods for storage systems usually use end-to-end checksums. End-to-end verification, generally when the application program transmits data to the back-end system interface, a checksum is calculated using a method, and then the checksum is not used for verification until the data is read. [0003] In this case, there are several defects. One is that it is slow to find errors. If the data is not read out, it has been unable to perform checksum verification. The second is inflexibility, because data will pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/645
Inventor 古亮李诗逸
Owner SANGFOR TECH INC