Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for safely accessing specified storage area and medium

A storage area and secure access technology, applied in the field of server data access, can solve the problems of data access lag, consumption of manpower and material resources, time-consuming and laborious, and achieve the effect of ensuring security and reliability.

Active Publication Date: 2021-04-30
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows for secure accessing specific areas within an organization's memory without requiring complex applications or storing unnecessary files on disk space. It also includes various features like checking if certain parts have been deleted from their original locations during backup operations before they were used again by other users. Additionally, this system helps ensure that only authorized clients connect with servers through unique addresses instead of having them directly connected over networks.

Problems solved by technology

The technical problem addressed in this patented solution involves managing and controlling large amounts of material resource while accessing specific types or categories of data quickly without requiring complicated programming codes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for safely accessing specified storage area and medium
  • Method and system for safely accessing specified storage area and medium
  • Method and system for safely accessing specified storage area and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] An embodiment of the present invention provides a method for securely accessing a designated storage area, see figure 1 and figure 2 , including the following steps:

[0037] S11. Firstly, in the first storage cluster, three nodes are selected and deployed as control nodes, and the principle of three copies is adopted, and the contents of the deployment of the three control nodes are consistent.

[0038] S12. The three control nodes are numbered and sorted according to the IP addresses of the nodes, and are divided into No. 1, No. 2 and No. 3. Because No. 1, No. 2 and No. 3 control nodes adopt the principle of three copies, so through No. 1 control node to read Take the / etc / hosts file, because all nodes are connected to each other, and the number of nodes in the first server cluster is set to N, so No. 1 control node reads the IP addresses of the remaining N-3 nodes and calculates them according to the size of the IP addresses Number the remaining nodes as metadata ...

Embodiment 2

[0046] The embodiment of the present invention also provides a system for safely accessing a designated storage area, please refer to image 3 , including: a virtual ring generation device, an IP hash linked list device, and a metadata fragmentation device;

[0047] The virtual ring generation device is deployed on the three nodes of the first storage cluster. These three nodes are named as the first control node, the second control node and the third control node, and the remaining nodes are named as metadata nodes. The three control nodes The content of the nodes is the same, the / etc / hosts of the three storage nodes save the IP information of the remaining metadata nodes, the three control nodes sort and number the IPs of the remaining nodes in the first storage cluster according to their size, and assign the IP information of the control nodes Connected according to the first number to form a logical node ring, when the logical node ring increases or decreases the metadata...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for safely accessing a specified storage area, which comprises the following steps of: configuring a control node and a metadata node in a first storage cluster, extracting metadata of data in a second storage cluster to the first storage cluster, fragmenting the metadata, and generating a metadata fragmentation chain table for the metadata fragmentation, and storing the metadata fragments and the metadata fragment linked list in the metadata node, performing hash operation on IP addresses of a plurality of clients communicated with the second storage cluster, fragmenting hash values, and storing IP hash fragments in the metadata node. In this way, when the clients access data, the metadata can be quickly accessed in parallel. Security of client access data is ensured without establishing a tedious upper application and verifying the IP address of the client, and the metadata fragments and the metadata fragment linked list are stored in the three copies, so that the reliability of data access is ensured.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products