CN107145407A - A kind of method that data are carried out with local backup - Google Patents

A kind of method that data are carried out with local backup Download PDF

Info

Publication number
CN107145407A
CN107145407A CN201710342185.8A CN201710342185A CN107145407A CN 107145407 A CN107145407 A CN 107145407A CN 201710342185 A CN201710342185 A CN 201710342185A CN 107145407 A CN107145407 A CN 107145407A
Authority
CN
China
Prior art keywords
data
local backup
backup
entity
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710342185.8A
Other languages
Chinese (zh)
Other versions
CN107145407B (en
Inventor
刘颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhonglin Yunxin (Shanghai) Network Technology Co., Ltd
Original Assignee
Chengdu Hui Zhi Distant View Science And Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Hui Zhi Distant View Science And Technology Ltd filed Critical Chengdu Hui Zhi Distant View Science And Technology Ltd
Priority to CN201710342185.8A priority Critical patent/CN107145407B/en
Publication of CN107145407A publication Critical patent/CN107145407A/en
Application granted granted Critical
Publication of CN107145407B publication Critical patent/CN107145407B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • G06F11/1453Management of the data involved in backup or backup restore using de-duplication of the data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

It is a kind of that the method that data carry out local backup is included:Terminal sends backup request to local backup entity;Local backup object authentication terminal identity simultaneously returns to response;Terminal is to local backup entity transmitting data;Local backup entity is converged to data;Local backup entity carries out duplicate checking to data;Local backup entity is classified to data;According to classification results, local backup entity is by the data backup of different stage in memory module;Local backup entity builds and preserves mapping relations;Data to backup carry out redundant operation;Verify the integrality and reliability of the higher data of rank.This method ensure that the safety and reliability of data, save cost, improve the utilization rate of data storage resource and process resource, it is to avoid the data of duplicate contents carry out repeating backup, reduce physical space and power consumption, improve integrated level, improve read-write erasing speed.

Description

A kind of method that data are carried out with local backup
Technical field
The present invention relates generally to Computer Data Security field, more specifically, it is related to a kind of local to data progress standby The method of part.
Background technology
With the fast development of information industry, the data of magnanimity are occurred in that, these data both include initial data, also include Intermediate data and result data, initial data therein and result data contain important information.However, from computer system angle Degree considers, on a timeline, due to the external world and the reason for computer system itself, disaster is inevitable.So-called meter The disaster of calculation machine system is meant:Because the factor of artificial or nature causes catastrophe failure or the paralysis of computer system, make meter The business function of calculation machine system pauses or service can make great efforts to drop below the degree of threshold value, or reasonable time persistently Accident.Common disaster includes but is not limited to:Such as system faults itself, software or the caused mistake of application, network and/ Or the man-made disaster of system disaster, such as mistake, damage, malicious attack etc that power supply is interrupted etc, it is and all Such as the disaster of the nature of extreme misery electroshock etc.It can be seen that, the anti-disaster ability of computer system, which turns into information industry, realizes number According to the important dependence of security reliability.
However, through statistics, the data for having nearly 1/3rd do not possess anti-disaster ability, and it is not backed up effectively, this In the presence of potential hidden danger, if data will bring on a disaster once losing or damaging.And backing up both includes local backup, also include Remote backup outside more than tens of kms, the former can realize synchronization, and the latter can only be asynchronous due to factors such as the communication technologys.And The main body of backup also depends on backup software systems mostly, and this anti-disaster system fails effectively to cover complete disaster prevention Project.According to relevant regulations, the data in fields such as bank, electric power, public safeties need to carry out forced backup, but all In these industries such as enumerated, because in each predetermined amount of time, the data volume of generation is quite big, if directly backed up, Or carry out the data of duplicate contents to repeat backup, necessarily cause the module for realizing backup to be difficult to bear important task, otherwise pass through Unrestrictedly dilatation meets needs, but this had both brought drastically riseing for cost, and also to bring the increase of physical space (for example need More rooms) and the power consumption of backup entity in itself increase, and the periphery support of such as temperature humidity adjustment equipment etc is set Standby power increase;Sacrifice synchronous and use remote backup.This is accomplished by a kind of entity for effectively utilizing local backup Memory space, to reduce cost and power consumption.Further, since data magnanimity, enormous pressure, and data are brought to process resource Write-in storage occupy substantial amounts of thread and bring sharply increasing for power consumption, while the increase of electronic equipment brings write-in speed The reduction of degree, forms vicious circle.Therefore need a kind of to lift writing speed and improve method that resource uses and correspondingly Equipment.Further, since including memory element in the equipment of backup, the data of magnanimity need the common semiconductor element of magnanimity, So needing that integration density is higher, physical layout structure more compact memory cell structure and corresponding read-write erasing side Method, can improve integrated level, can also reduce power consumption, improve read-write erasing speed.
The content of the invention
An object of the present invention is to provide a kind of method that data are carried out with local backup, ensure that the safety of data Property and reliability, save cost, improve the utilization rate of data storage resource and process resource, it is to avoid the data of duplicate contents are carried out Repeat to back up, reduce physical space and power consumption, improve integrated level, improve read-write erasing speed.
The present invention is to solve the technical scheme taken of above-mentioned technical problem:A kind of side that data are carried out with local backup Method includes:In step sl, terminal sends backup request to local backup entity;In step s 2, local backup object authentication Terminal identity simultaneously returns to response;In step s3, terminal is to local backup entity transmitting data;In step s 4, local backup Entity is converged to data;In step s 5, local backup entity carries out duplicate checking to data;In step s 6, local backup Entity is classified to data;In the step s 7, according to classification results, local backup entity exists the data backup of different stage In memory module;In step s 8, local backup entity builds and preserves mapping relations;In step s 9, to the data of backup Carry out redundant operation;And in step slo, the integrality and reliability of the higher data of verification rank.
According to another aspect of the present invention, in step sl, terminal sends backup request to local backup entity and included: Terminal sends backup request by wired or wireless chain road direction local backup entity, and the request includes ID, data to be transmitted ProfileType etc.;And in step s 2, local backup object authentication terminal identity simultaneously returns to response and included:Local backup entity Traversal history record list, one by one verify request in information with historical record and network share blacklist information it is consistent Property, refusal respond is returned if matching, is returned if mismatching and receives response.
According to another aspect of the present invention, in step S7, data are backed up in a storage module, and the memory module is by depositing Storage unit array is constituted, and memory cell includes:N-type N-type substrate, the strip formed below by p-type in the upper surface of N-type substrate The upper surface of the Part I and Part II of doping, the wherein upper surface of Part I and Part II and N-type substrate its He part at grade;Conducting channel part is formed between the first and second;In Part I and second Wordline and floating grid that partial surface existence position is closed on, Formation cross-section is hollow the half of " returning " shape above floating grid Insulating layer of conductor, generates control pole, wherein the control pole is in cross section in above-mentioned " time " shape above semi-conductive insulating layer The center of semi-conductive insulating layer, and the semi-conductive insulating layer in addition to control pole of " returning " shape is centered around around control pole, Floating grid, insulating barrier and control pole are sequentially overlapped and isolated by insulating barrier in vertical direction, the heap that this three is formed Folded and wordline is vertical parallel and closes on but insulate;It is pole of erasing in the opposite side relative with wordline of the stacking, the pole of erasing It is vertically T-shaped in technique, and have above Part II and in vertical direction part overlapping with floating grid;It is described Wordline has in the top of Part I and in vertical direction part overlapping with Part I;The stacking is being hung down with Part II Nogata has part overlapping upwards;The stacking and the wordline positioned at its both sides, erase and extremely insulate;Part I connection storage is single The bit line of member, Part II is source line;Said structure is as a memory cell, and its memory cell adjacent with one In symmetrical structure, and shared source line and pole of erasing, i.e., erased extremely center with the source line and T-shaped shared, it is symmetrical, and then Using the two memory cell as subset, the big storage cell of the ratio memory cell of storage device is used as;From the depression angle of technique, The deposition surface of the shape of above-mentioned Part I and Part II is square, and using two memory cell as the storage of subset In unit, the area of the deposition surface of the Part I of two memory cell is more than the shared Part II of two memory cell Deposition surface area;The square length of side is characterized the integral multiple of size, in order to which technique is integrated;Pass through this side The design of formula, particularly Part I overlapping, Part II vertical with word line portion is vertical with pole of erasing overlaps, share Part II and pole of erasing.
According to another aspect of the present invention, data are backed up and in step S8 in the first region in step S7 In, local backup entity builds and preserves mapping relations, and in step s 9, the data of backup are carried out redundant operation and In step S10, the integrality and reliability of the higher data of verification rank include:Bad storage in first Scanning Detction first area Unit, it is whole according to storage configuration strategy if the bad storage unit quantity in a line storage unit is more than or equal to the 3rd threshold value Row is replaced, and by the identification record of the row into status list, is afterwards read the first data file in buffering page by page And backup is performed, the Scanning Detction of next line is at the same time performed in parallel, redundancy is performed afterwards, wherein in local backup entity Redundancy processing module calculated from data file and take redundancy and CRC, and allow to according to redundancy The data file is reproduced with CRC, and stores in the first redundancy sub-district CRC, and close should The access path of check code, and preserve data file profile and the mapping relations of address in the first mapping sub-district;To the secondth area The data backup in domain, directly can store into second area the second storage sub-district by corresponding data file, and in the second mapping Corresponding data file profile and the mapping relations of address are preserved in sub-district;And due to verifying the important of the higher data of rank Property is, it is necessary to verify the integrality and reliability of the higher data of rank.
According to another aspect of the present invention, in step s3, terminal includes to local backup entity transmitting data:Terminal By wired or wireless chain road direction local backup entity transmitting data, the data carry out following processing before transmission:By file Data are divided into multiple blocks, the digit of the data bit in the block and the digit of one page of the memory cell of local backup entity Ratio is 1:2M, wherein M is positive integer, and the digit of last block is the surplus value after file block, and each block includes Check bit;M is 2 or 4.
According to another aspect of the present invention, in step s 4, local backup entity carries out convergence to data includes:Locally Backup entity receives data, and the data of piecemeal are carried out into block one by one is verified, and the data bit of the block passed through is converged, and is formed Block cluster in units of the complete digit by one page, and discretely buffered according to the difference of file.
According to another aspect of the present invention, in step s 5, local backup entity carries out duplicate checking to data;Local backup At least one attribute of the mirror image of entity extraction data file, the profile table of itself and local backup entity is compared, such as Really the attribute meets with the attribute in profile table, then comparison document step by step, proceeds to step S6 if complying fully with, if One-level therein, which does not meet then to release, enters step S6;If attribute is not met, next step is directly entered.
According to another aspect of the present invention, in step s 6, local backup entity carries out classification to data file includes: According to the importance, weighted value, priority of data file, local backup entity is weighted summation to different data files, And data file is ranked up according to summed result, the data file that summed result is more than or equal to first threshold is divided into first Grade, is divided into the second grade, successively by the data file that summed result in remaining data document result is more than or equal to Second Threshold Analogize, be ranked up;If only two grades are divided into, then the data file that summed result is more than or equal to first threshold is divided into The first estate, is divided into the second grade by remaining data file.
According to another aspect of the present invention, in the step s 7, according to classification results, local backup entity is by different stage Data backup include in memory module:For the higher data of rank, data are backed up in the first region;For The relatively low data of rank, are in the second area backed up data;The first area includes the first storage sub-district, first superfluous Minor area, the first mapping sub-district, the wherein ratio of three is 2U:2V:1, wherein U and V are the positive integer more than or equal to 4, and U:V is the positive integer 2 of fixed valueL, wherein L is the positive integer more than or equal to 2;The second area include second storage sub-district, Second mapping sub-district, wherein both ratios are 2P:1, wherein P are the positive integer more than or equal to 4;After a backup in concordance list The profile of middle recording data files and address and the application system environment of backup.
According to another aspect of the present invention, if there is repetition in step S5, only record the data file with case Mapping relations between part address, and identical Data Identification is set, and remove the data file in buffering.
Brief description of the drawings
Embodiments of the invention, wherein phase are shown by way of example rather than by way of limitation in the accompanying drawings Same reference represents identical element, wherein:
According to an exemplary embodiment of the invention, a kind of flow chart for the method that data are carried out with local backup of Fig. 1 diagrams.
Embodiment
In the following description, refer to the attached drawing and several specific embodiments are diagrammatically shown.It will be appreciated that: It is contemplated that and other embodiment can be made without departing from the scope of the present disclosure or spirit.Therefore, it is described in detail below should not be by Think in a limiting sense.
According to an exemplary embodiment of the invention, a kind of flow chart for the method that data are carried out with local backup of Fig. 1 diagrams.
In step sl, terminal sends backup request to local backup entity;
In step s 2, local backup object authentication terminal identity and response is returned to;
In step s3, terminal is to local backup entity transmitting data;
In step s 4, local backup entity is converged to data;
In step s 5, local backup entity carries out duplicate checking to data;
In step s 6, local backup entity is classified to data;
In the step s 7, according to classification results, local backup entity is by the data backup of different stage in memory module;
In step s 8, local backup entity builds and preserves mapping relations;
In step s 9, the data to backup carry out redundant operation;And
In step slo, the integrality and reliability of the higher data of verification rank.
Specifically, in step sl, terminal sends backup request to local backup entity and included:Terminal passes through wired or nothing Wired link sends backup request to local backup entity, and the request includes ID, data to be transmitted ProfileType etc..
Specifically, in step s 2, local backup object authentication terminal identity and return to response and include:Local backup entity Traversal history record list, one by one verify request in information with historical record and network share blacklist information it is consistent Property, refusal respond is returned if matching, is returned if mismatching and receives response.
Specifically, in step s3, terminal includes to local backup entity transmitting data:Terminal passes through wired or wireless chain Road direction local backup entity transmitting data, the data carry out following processing before transmission:The data of file are divided into multiple blocks, The ratio of the digit of one page of the digit of the data bit in the block and the memory cell of local backup entity is 1:2M, wherein M For positive integer, the digit of last block is the surplus value after file block, and each block includes check bit;Preferably, M is 2 or 4.
Specifically, in step s 4, local backup entity carries out convergence to data includes:Local backup entity receives number According to the data of piecemeal being carried out into block one by one and verified, and the data bit of the block passed through are converged, form complete with one page Digit is the block cluster of unit, and discretely buffered according to the difference of file.
Specifically, in step s 5, local backup entity carries out duplicate checking to data;Local backup entity extraction data file Mirror image at least one attribute, the profile table of itself and local backup entity is compared, if the attribute and profile Attribute in lattice meets, then comparison document step by step, proceeds to step S6 if complying fully with, if one-level therein is not met Then release and enter step S6;If attribute is not met, next step is directly entered.
Specifically, in step s 6, local backup entity carries out classification to data file includes:According to the weight of data file The property wanted, weighted value, priority, local backup entity are weighted summation to different data files, and according to summed result pair Data file is ranked up, and the data file that summed result is more than or equal to first threshold is divided into the first estate, by remaining data Summed result is divided into the second grade more than or equal to the data file of Second Threshold in document result, the like, it is ranked up.Such as Fruit is only divided into two grades, then the data file that summed result is more than or equal to first threshold is divided into the first estate, by residue Data file is divided into the second grade.
Specifically, in the step s 7, according to classification results, local backup entity is by the data backup of different stage in storage Include in module:For the higher data of rank, data are backed up in the first region;For the relatively low data of rank, Data are backed up in the second area;The first area includes the first storage sub-district, the first redundancy sub-district, the first mapping The ratio of sub-district, wherein three is 2U:2V:1, wherein U and V are the positive integer more than or equal to 4, and U:V be fixed value just Integer 2L, wherein L is the positive integer more than or equal to 2;The second area includes the second storage sub-district, the second mapping sub-district, its In both ratio be 2P:1, wherein P are the positive integer more than or equal to 4;Recording data files in concordance list after a backup Profile and address and backup application system environment.
If there is repetition in step S5, the data file is only recorded and with the mapping relations between backup address, and Identical Data Identification is set, and removes the data file in buffering.
Specifically, the memory module in step S7 is made up of memory cell array, and memory cell includes:N-type N-type substrate, The Part I and Part II that are adulterated by p-type of strip formed below in the upper surface of N-type substrate, wherein Part I and The other parts of the upper surface of Part II and the upper surface of N-type substrate are at grade;In Part I and Part II Between form conducting channel part;The wordline and floating grid closed in the surface existence position of Part I and Part II, Formation cross-section is the hollow semi-conductive insulating layer of " returning " shape above floating grid, and control is generated above semi-conductive insulating layer Pole, the wherein control pole in cross section above-mentioned " time " shape semi-conductive insulating layer center, and " returning " shape except control Semi-conductive insulating layer outside pole processed is centered around around control pole, and floating grid, insulating barrier and control pole are in vertical direction successively It is superimposed and is isolated by insulating barrier, the stacking and wordline that this three is formed is vertical parallel and close on but insulate;In the heap The folded opposite side relative with wordline is pole of erasing, and the pole of erasing is vertically T-shaped in technique, and on Part II Side and there is part overlapping in vertical direction with floating grid, both can be in order to by the overlapping special construction of this T-shaped and part The process integration of device and alignment, and device power consumption can be reduced, improve the energy utilization rate of unit area;The wordline There is part overlapping in vertical direction in the top of Part I and with Part I;The stacking is with Part II in Vertical Square There is part overlapping upwards;The stacking and the wordline positioned at its both sides, erase and extremely insulate;Part I connection memory cell Bit line, Part II is source line;Said structure as a memory cell, and its memory cell adjacent with one in pair Claim structure, and shared source line and pole of erasing, i.e., erased extremely center with the source line and T-shaped shared, it is symmetrical, and then with this Two memory cell are subset, are used as the big storage cell of the ratio memory cell of storage device.It is above-mentioned from the depression angle of technique The deposition surface of the shape of Part I and Part II is square, and using two memory cell as the storage cell of subset In, the area of the deposition surface of the Part I of two memory cell is more than the shallow lake of the shared Part II of two memory cell The area on product surface.The square length of side is characterized the integral multiple of size, in order to which technique is integrated.In this way Design, particularly Part I overlapping, Part II vertical with word line portion is vertical with pole of erasing overlap, share second Part and pole of erasing, can cause the integrated level of storage device to improve, it is often more important that, can be effective with the diminution of size Ground reduces the power consumption of storage device;Further, since the reduction of the wiring of shared structure, the speed erased subsequently is read and write to it and is all obtained To great raising.
Specifically, in step S7 in the first region by data carry out backup and in step s 8, local backup entity structure Build and preserve mapping relations, and in step s 9, the data of backup are carried out with redundant operation and in step slo, verification level The integrality and reliability of not higher data include:Bad storage unit in first Scanning Detction first area, if a line is deposited Bad storage unit quantity in storage unit is more than or equal to the 3rd threshold value, then is replaced according to storage configuration strategy full line, and will The first data file in buffering is read, performed simultaneously in parallel into status list by the identification record of the row page by page afterwards The Scanning Detction of next line, performs redundancy afterwards, and the wherein redundancy processing module in local backup entity is calculated from data file Redundancy and CRC are taken, and allows to reproduce data text according to redundancy and CRC Part, and CRC is stored in the first redundancy sub-district, and the access path of the check code is closed, and in the first mapping Data file profile and the mapping relations of address are preserved in sub-district;Data backup to second area, can be directly by corresponding number According to file storage into second area second storage sub-district, and second mapping sub-district in preserve corresponding data file profile with The mapping relations of address.And because the importance of the higher data of verification rank is, it is necessary to verify the complete of the higher data of rank Whole property and reliability.By aforesaid operations, the utilization rate of process resource had both been improved, the safe and complete of data backup is in turn ensure that Stably.
To sum up, in the inventive solutions, can by using a kind of method that data are carried out with local backup Ensure the safety and reliability of data, save cost, improve the utilization rate of data storage resource and process resource, it is to avoid repeat The data of content carry out repeating backup, reduce physical space and power consumption, improve integrated level, improve read-write erasing speed.
It will be appreciated that:The example and reality of the present invention can be realized in the form of the combination of hardware, software or hardware and software Apply example.As described above, any main body for performing this method can be stored, in the form of volatility or non-volatile holographic storage, for example No matter storage device, as ROM, can erase or whether rewritable, or in the form of a memory, such as RAM, storage core Piece, equipment or integrated circuit or on the readable medium of light or magnetic, such as CD, DVD, disk or tape.It will be appreciated that: Storage device and storage medium are suitable for storing the example of the machine readable storage of one or more programs, upon being performed, One or more of programs realize the example of the present invention.Via any medium, such as couple what is be loaded with by wired or wireless Signal of communication, can electronically transmit the example of the present invention, and example suitably includes identical content.
It should be noted that:Because the present invention solves the technical problem for the safety and reliability that ensure that data, Employ technical staff in field of computer technology and technological means to understand instructed according to it after reading this description, And saving cost is obtained, improve the utilization rate of data storage resource and process resource, it is to avoid the data of duplicate contents are weighed Multiple backup, reduces physical space and power consumption, improves integrated level, the advantageous effects of read-write erasing speed is improved, so in institute The technical scheme that the scheme being claimed in attached claim belongs on patent law purposes.In addition, because appended claims will The technical scheme of protection is asked to can be made or used in industry, therefore the program possesses practicality.
It is described above, it is only the preferably embodiment of the present invention, but protection scope of the present invention is not limited to This, any one skilled in the art the invention discloses technical scope in, the change that can readily occur in or replace Change, should all be encompassed within protection scope of the present invention.Unless be otherwise expressly recited, otherwise disclosed each feature is only It is equivalent or similar characteristics a example for general series.Therefore, protection scope of the present invention should be with claims Protection domain is defined.

Claims (10)

1. a kind of method that data are carried out with local backup, including:
In step sl, terminal sends backup request to local backup entity;
In step s 2, local backup object authentication terminal identity and response is returned to;
In step s3, terminal is to local backup entity transmitting data;
In step s 4, local backup entity is converged to data;
In step s 5, local backup entity carries out duplicate checking to data;
In step s 6, local backup entity is classified to data;
In the step s 7, according to classification results, local backup entity is by the data backup of different stage in memory module;
In step s 8, local backup entity builds and preserves mapping relations;
In step s 9, the data to backup carry out redundant operation;And
In step slo, the integrality and reliability of the higher data of verification rank.
2. the as claimed in claim 1 method that data are carried out with local backup, wherein in step sl, terminal is to local backup Entity, which sends backup request, to be included:Terminal sends backup request by wired or wireless chain road direction local backup entity, the request Including ID, data to be transmitted ProfileType etc.;And
In step s 2, local backup object authentication terminal identity and return to response and include:Local backup entity traversal history is remembered List is recorded, the uniformity of the information in request and information in historical record and network share blacklist is verified one by one, if matching Refusal respond is then returned, is returned if mismatching and receives response.
3. in the method as claimed in claim 2 that data are carried out with local backup, wherein step S7, data are backed up in storage In module, the memory module is made up of memory cell array, and memory cell includes:N-type N-type substrate, in the upper surface of N-type substrate The upper surface of the Part I and Part II, wherein Part I and Part II that are adulterated by p-type of strip formed below With the other parts of the upper surface of N-type substrate at grade;Conducting channel is formed between the first and second Part;The wordline and floating grid closed in the surface existence position of Part I and Part II, are formed above floating grid Section is the hollow semi-conductive insulating layer of " returning " shape, control pole is generated above semi-conductive insulating layer, wherein the control pole exists In section above-mentioned " time " shape semi-conductive insulating layer center, and the semiconductor in addition to control pole of " returning " shape is exhausted Edge layer is centered around around control pole, and floating grid, insulating barrier and control pole are sequentially overlapped and entered by insulating barrier in vertical direction Row is isolated, and the stacking and wordline that this three is formed are vertical parallel and close on but insulate;In the relative with wordline another of the stacking Side is pole of erasing, and the pole of erasing is vertically T-shaped in technique, and vertical above Part II and with floating grid There is part overlapping on direction;The wordline has in the top of Part I and in vertical direction part overlapping with Part I; The stacking has part overlapping in vertical direction with Part II;It is described stacking and the wordline positioned at its both sides, erase it is extremely equal Insulation;Part I connects the bit line of memory cell, and Part II is source line;Said structure as a memory cell, and And its memory cell adjacent with one is in symmetrical structure, and share source line and pole of erasing, i.e., smeared with shared source line and T-shaped It is symmetrical centered on depolarization, and then using the two memory cell as subset, it is used as ratio memory cell the depositing greatly of storage device Store up unit;From the depression angle of technique, the deposition surface of the shape of above-mentioned Part I and Part II is square, and with Two memory cell is in the storage cell of subset, the area of the deposition surface of the Part I of two memory cell are more than two The area of the deposition surface of the shared Part II of memory cell;The square length of side is characterized the integral multiple of size, In order to which technique is integrated;Design in this way, particularly Part I overlapping, Part II vertical with word line portion Overlapping, shared Part II vertical with pole of erasing and pole of erasing.
4. in the first region by number in the method as claimed in claim 3 that data are carried out with local backup, wherein step S7 According to backup is carried out with step s 8, local backup entity builds and preserves mapping relations, and in step s 9, to backup Data carry out redundant operation and in step slo, verify the integrality and reliability of the higher data of rank and include:First scanning inspection The bad storage unit surveyed in first area, if the bad storage unit quantity in a line storage unit is more than or equal to the 3rd threshold value, Then it is replaced according to storage configuration strategy full line, and by the identification record of the row into status list, afterwards by buffering First data file reads and performs backup page by page, is at the same time performed in parallel the Scanning Detction of next line, performs afterwards superfluous Remaining, the redundancy processing module wherein in local backup entity is calculated from data file takes redundancy and CRC, And allow to reproduce the data file according to redundancy and CRC, and store and follow in the first redundancy sub-district Ring redundancy check code, and the access path of the check code is closed, and preserve data file profile and ground in the first mapping sub-district The mapping relations of location;Data backup to second area, can be directly by the storage of corresponding data file into second area second Sub-district is stored, and corresponding data file profile and the mapping relations of address are preserved in the second mapping sub-district;And due to school The importance of the higher data of rank is tested, it is necessary to verify the integrality and reliability of the higher data of rank.
5. the method that data are carried out with local backup as described in claim 3 or 4, wherein in step s3, terminal is to local Backup entity transmitting data includes:Terminal is being passed by wired or wireless chain road direction local backup entity transmitting data, the data Following handle is carried out before defeated:The data of file are divided into multiple blocks, the digit and local backup of the data bit in the block are real The ratio of the digit of one page of the memory cell of body is 1:2M, wherein M is positive integer, and the digit of last block is file point Surplus value after block, each block includes check bit;M is 2 or 4.
6. the method that data are carried out with local backup as described in claim 3 or 4, wherein in step s 4, local backup is real Body carries out convergence to data to be included:Local backup entity receives data, and the data of piecemeal are carried out into block one by one verifies, and will be logical The data bit convergence for the block crossed, the block cluster in units of forming the complete digit by one page, and according to the difference of file And discretely buffer.
7. the method that data are carried out with local backup as described in claim 3 or 4, wherein in step s 5, local backup is real Body carries out duplicate checking to data;At least one attribute of the mirror image of local backup entity extraction data file, by itself and local backup The profile table of entity is compared, if the attribute meets with the attribute in profile table, step by step comparison document, if complete Meet entirely, proceed to step S6, released if one-level therein is not met and enter step S6;If attribute is not met, directly Tap into next step.
8. the method that data are carried out with local backup as described in claim 3 or 4, wherein in step s 6, local backup is real Body carries out classification to data file to be included:According to the importance, weighted value, priority of data file, local backup entity is not to Same data file is weighted summation, and data file is ranked up according to summed result, and summed result is more than or equal to The data file of first threshold is divided into the first estate, and summed result in remaining data document result is more than or equal into Second Threshold Data file is divided into the second grade, the like, it is ranked up;If only two grades are divided into, then summed result is more than Data file equal to first threshold is divided into the first estate, and remaining data file is divided into the second grade.
9. the method that data are carried out with local backup as described in claim 3 or 4, wherein in the step s 7, being tied according to classification Really, local backup entity includes the data backup of different stage in memory module:For the higher data of rank, first Data are backed up in region;For the relatively low data of rank, data are backed up in the second area;Firstth area Domain includes the first storage sub-district, the first redundancy sub-district, the first mapping sub-district, and the wherein ratio of three is 2U:2V:1, wherein U and V It is the positive integer more than or equal to 4, and U:V is the positive integer 2 of fixed valueL, wherein L is the positive integer more than or equal to 2;It is described Second area includes the second storage sub-district, the second mapping sub-district, and wherein both ratios are 2P:1, wherein P are more than or equal to 4 Positive integer;After a backup in concordance list the profile of recording data files and address and backup application system environment.
10. the method that data are carried out with local backup as described in claim 3 or 4, if wherein have repetition in step S5, Only record the data file and with the mapping relations between backup address, and identical Data Identification is set, and remove buffering In the data file.
CN201710342185.8A 2017-05-16 2017-05-16 Method for carrying out local backup on data Active CN107145407B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710342185.8A CN107145407B (en) 2017-05-16 2017-05-16 Method for carrying out local backup on data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710342185.8A CN107145407B (en) 2017-05-16 2017-05-16 Method for carrying out local backup on data

Publications (2)

Publication Number Publication Date
CN107145407A true CN107145407A (en) 2017-09-08
CN107145407B CN107145407B (en) 2020-10-27

Family

ID=59778659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710342185.8A Active CN107145407B (en) 2017-05-16 2017-05-16 Method for carrying out local backup on data

Country Status (1)

Country Link
CN (1) CN107145407B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664352A (en) * 2018-05-11 2018-10-16 卡斯柯信号有限公司 A kind of hot-backup system educational data verification method based on off-line simulation
CN108733511A (en) * 2018-03-23 2018-11-02 成都安信思远信息技术有限公司 A kind of electronic data processing method based on big data
CN109857590A (en) * 2018-12-24 2019-06-07 深圳供电局有限公司 A kind of data backup system of power-management centre
CN110633169A (en) * 2019-01-07 2019-12-31 张霞 Backup computer storage system
CN110968463A (en) * 2019-12-19 2020-04-07 北京五八信息技术有限公司 Method and device for determining types of data nodes in group
CN113722152A (en) * 2021-08-05 2021-11-30 四川大学 Data incremental backup method, device, equipment and storage medium
CN114244635A (en) * 2022-02-25 2022-03-25 深圳市华方信息产业有限公司 Encryption type data coding method of communication equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6070757A (en) * 1983-09-28 1985-04-22 Hitachi Ltd Semiconductor integrated circuit
US5671350A (en) * 1993-09-30 1997-09-23 Sybase, Inc. Data backup system with methods for stripe affinity backup to multiple archive devices
CA2334009A1 (en) * 1998-06-02 1999-12-09 Alliedsignal Inc. Method and apparatus for managing redundant computer-based systems for fault tolerant computing
US20060218439A1 (en) * 2005-03-23 2006-09-28 Microsoft Corporation Threat event-driven backup
CN103873503A (en) * 2012-12-12 2014-06-18 鸿富锦精密工业(深圳)有限公司 Data block backup system and method
CN105095300A (en) * 2014-05-16 2015-11-25 阿里巴巴集团控股有限公司 Method and system for database backup
CN106601752A (en) * 2015-10-08 2017-04-26 三星电子株式会社 Three-dimensionally integrated circuit devices including oxidation suppression layers

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS6070757A (en) * 1983-09-28 1985-04-22 Hitachi Ltd Semiconductor integrated circuit
US5671350A (en) * 1993-09-30 1997-09-23 Sybase, Inc. Data backup system with methods for stripe affinity backup to multiple archive devices
CA2334009A1 (en) * 1998-06-02 1999-12-09 Alliedsignal Inc. Method and apparatus for managing redundant computer-based systems for fault tolerant computing
US20060218439A1 (en) * 2005-03-23 2006-09-28 Microsoft Corporation Threat event-driven backup
CN103873503A (en) * 2012-12-12 2014-06-18 鸿富锦精密工业(深圳)有限公司 Data block backup system and method
CN105095300A (en) * 2014-05-16 2015-11-25 阿里巴巴集团控股有限公司 Method and system for database backup
CN106601752A (en) * 2015-10-08 2017-04-26 三星电子株式会社 Three-dimensionally integrated circuit devices including oxidation suppression layers

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
殷顺增,: "基于网络的数据备份和恢复***设计", 《中国优秀硕士学位论文全文数据库信息科技辑(月刊 )》 *
韩莹,等;: "一种在去重备份***中的源端去重算法", 《科技通报》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108733511A (en) * 2018-03-23 2018-11-02 成都安信思远信息技术有限公司 A kind of electronic data processing method based on big data
CN108733511B (en) * 2018-03-23 2022-05-24 赵浩茗 Electronic data processing method based on big data
CN108664352A (en) * 2018-05-11 2018-10-16 卡斯柯信号有限公司 A kind of hot-backup system educational data verification method based on off-line simulation
CN109857590A (en) * 2018-12-24 2019-06-07 深圳供电局有限公司 A kind of data backup system of power-management centre
CN109857590B (en) * 2018-12-24 2023-10-31 深圳供电局有限公司 Data backup system of power dispatching center
CN110633169A (en) * 2019-01-07 2019-12-31 张霞 Backup computer storage system
CN110633169B (en) * 2019-01-07 2020-09-22 北京聚通达科技股份有限公司 Backup computer storage system
CN110968463A (en) * 2019-12-19 2020-04-07 北京五八信息技术有限公司 Method and device for determining types of data nodes in group
CN113722152A (en) * 2021-08-05 2021-11-30 四川大学 Data incremental backup method, device, equipment and storage medium
CN113722152B (en) * 2021-08-05 2023-08-01 四川大学 Data incremental backup method, device, equipment and storage medium
CN114244635A (en) * 2022-02-25 2022-03-25 深圳市华方信息产业有限公司 Encryption type data coding method of communication equipment
CN114244635B (en) * 2022-02-25 2022-08-19 深圳市华方信息产业有限公司 Encryption type data coding method of communication equipment

Also Published As

Publication number Publication date
CN107145407B (en) 2020-10-27

Similar Documents

Publication Publication Date Title
CN107145407A (en) A kind of method that data are carried out with local backup
KR102001800B1 (en) Reproduction circuit
CN103019873B (en) The replacement method of a kind of storage failure unit and device, data-storage system
CN103034458B (en) Method and the device of Redundant Array of Independent Disks (RAID) is realized in solid state hard disc
US8418030B2 (en) Storage system with data recovery function and method thereof
US9711234B1 (en) Non-volatile memory read/write disturb monitoring
CN106297895A (en) Error correction circuit, semiconductor memory system and control method thereof
CN102356382A (en) Apparatus and method for managing dram buffer
CN102981927A (en) Distribution type independent redundant disk array storage method and distribution type cluster storage system
TW200921360A (en) Data preserving method and data accessing method for non-volatile memory
CN105988938A (en) Memory system and operation method thereof
CN101622676A (en) Memory system
CN103137214A (en) Storage device, error correction method and storage system
CN105551521A (en) Memory system and operating method thereof
CN106328200A (en) Semiconductor device and operating method thereof
CN108141229A (en) Damage the efficient detection of data
CN107810533A (en) Use bit line defect information decoding data
CN103034567A (en) Device and method for finding and repairing corrupted data
CN104407821A (en) Method and device for achieving RAID reconstitution
CN102893263A (en) Memory detecting method and memory detecting device
US11928338B2 (en) Method of measuring durability of nonvolatile memory device and method of performing wear-leveling in storage device using the same
CN104035886A (en) Magnetic disk remapping method, magnetic disk remapping device and electronic equipment
CN104731526B (en) The method and device that a kind of discontented band is write
CN105405463A (en) Memory array
CN104658601A (en) PUF (physically unclonable function) authentication method based on STT-RAM (spin-torque transfer RAM) storage unit error rate distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200930

Address after: Room 07, 17 / F, building 1, No. 1318, Sichuan North Road, Hongkou District, Shanghai 200080

Applicant after: Zhonglin Yunxin (Shanghai) Network Technology Co., Ltd

Address before: 610000 Sichuan city of Chengdu province high tech Zone Kyrgyzstan Road No. 666 Building 2 floor 13 No. 2

Applicant before: CHENGDU HUIZHI YUANJING TECHNOLOGY Co.,Ltd.