CN113821380A - Data backup method and data backup device - Google Patents
Data backup method and data backup device Download PDFInfo
- Publication number
- CN113821380A CN113821380A CN202111118003.1A CN202111118003A CN113821380A CN 113821380 A CN113821380 A CN 113821380A CN 202111118003 A CN202111118003 A CN 202111118003A CN 113821380 A CN113821380 A CN 113821380A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- data information
- storage
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000013500 data storage Methods 0.000 claims abstract description 23
- 230000003139 buffering effect Effects 0.000 claims abstract description 8
- 230000005540 biological transmission Effects 0.000 claims abstract description 7
- 238000004364 calculation method Methods 0.000 claims description 13
- 238000012937 correction Methods 0.000 claims description 10
- 238000004458 analytical method Methods 0.000 claims description 7
- 230000003287 optical effect Effects 0.000 claims description 6
- 239000004065 semiconductor Substances 0.000 claims description 3
- 239000007787 solid Substances 0.000 claims description 3
- 230000002457 bidirectional effect Effects 0.000 claims description 2
- 230000002265 prevention Effects 0.000 claims 1
- 230000003993 interaction Effects 0.000 abstract description 4
- 238000006243 chemical reaction Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 239000003990 capacitor Substances 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000007599 discharging Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1469—Backup restoration techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data backup method and a data backup device, wherein the method comprises the following steps: (S1) data input carrying, carrying or storing different types of data information; the storage of data information is achieved by different storage media. (S2) data storage control for controlling access to the memory according to the set timing rule, data type attribute, or storage method. (S3) data encryption to prevent the data information loss caused by the external data environment interference. (S4) decrypting the data, decrypting the data information on the storage medium, decrypting the data information protected by the character string or the letter or the numeric password for the user to use. (S5) data buffering for temporarily storing the encrypted or decrypted data information. (S6) a data information recognition module for recognizing, transferring or interacting the data information for use by the user. The invention realizes the interaction and transmission of data information and improves the data encryption and data backup capability.
Description
Technical Field
The present invention belongs to the technical field of data management, and more particularly, to a data backup method and a data backup apparatus.
Background
With the rapid development of artificial intelligence technology and modern technology, information systems face more and more challenges, and especially in the face of emergencies, if data backup work is not timely, data information is lost, and faults such as failure of a disk, damage of a file system and the like are caused in severe cases. When a large amount of data information loss occurs, irreparable problems are brought to users.
The data information disaster backup technology in the prior art has the following technical defects:
(1) the writing performance of the storage device is greatly affected, and when data information is stored, a form of hardware backup device is usually adopted, which not only has low efficiency, but also easily causes the storage capacity of the data information to be delayed.
(2) The data encryption capability is lagged behind, data information is easily lost when data is imported or exported, and the data encryption performance is lagged behind.
(3) The data storage control capability is lagged, and the control range is narrower in the storage time of multiple data information, so that the phenomenon of obvious pause and even collapse is easy to occur in the data information transmission process.
Disclosure of Invention
Aiming at the technical defects, the invention discloses a data backup method and a data backup device, which can realize data information interaction and transmission, have stronger data encryption property in the data transmission process, improve the interaction capacity in the data transmission process, have better data storage control capacity and improve the data backup capacity.
In order to achieve the technical purpose, the following technical scheme is adopted in the research:
a method of data backup comprising the steps of:
(S1) data input carrying, carrying or storing different types of data information; the data information is stored through different storage media;
(S2) data storage control of controlling access to the memory according to the set timing rule, data type attribute, or storage mode; the data storage control comprises input data information logic comparison control, input data information counting control, input data information operation control, input data information error correction control, data storage input, output control and power supply control;
(S3) data encryption for protecting the data information on the storage medium by a character string or an alphabetical or numeric password to prevent the data information from being lost due to interference of an external data environment;
(S4) decrypting the data, decrypting the data information on the storage medium, decrypting the data information protected by the character string or the letter or the numeric password for the user to use;
(S5) data buffering, temporarily storing the encrypted or decrypted data information for the encrypted or decrypted data information to be transmitted to the main functional area for further analysis and calculation;
(S6) a data information recognition module for recognizing, transferring or interacting the data information for use by the user.
As a further technical scheme of the invention, the input data information logic comparison control method is a control method based on TTL logic rules.
As a further technical solution of the present invention, the input data information count control method is an and, or, not, or a calculation rule, or a control method of addition, subtraction, multiplication, division, shift, or complementation calculation.
As a further technical scheme of the invention, the control method of combining CRC check and multiple data redundancy is adopted for error correction control of the input data information.
As a further technical scheme of the invention, the data storage input or output control is realized by C language commands or C # language commands.
In order to achieve the technical purpose, the following technical scheme is adopted in the research:
an apparatus for data backup, wherein a hardware component comprises:
a storage medium; the storage medium is used for bearing, carrying or storing different types of data information, and N data storage modules are integrated on the storage medium, wherein N is more than or equal to 4; the storage medium comprises an internal memory and an external memory, the internal memory is formed by a semiconductor storage chip, and the external memory comprises a storage module;
a storage control module; the system is used for controlling the access of the memory according to the set time sequence rule, the data type attribute or the storage mode; the storage control module comprises a microprocessor, and a logic comparison module, a counting module, an arithmetic unit, an ECC circuit, a data storage interface and a power supply module which are connected with the microprocessor;
an encryption module; the storage medium is used for protecting data information on the storage medium through character strings or letters or digital passwords, so that the data information is prevented from being lost due to interference of an external data environment;
the decryption module is used for decrypting the data information on the storage medium and decrypting the data information protected by the character string or the letter or the digital password for the user to use;
the data buffer module is used for temporarily storing the data information for transmitting the encrypted or decrypted data information to the main functional area for further analysis and calculation;
the data information identification module is used for identifying, transmitting or interacting data information; in a specific embodiment, the system comprises a data character string identification module, a data instruction identification module or a data logic identification module;
the data input/output module is used for inputting or outputting the identified or transmitted data information;
the data input/output module is connected with the storage medium in a bidirectional mode, the output end of the encryption module is connected with the input end of the storage medium, the output end of the storage medium is connected with the input end of the data buffering module, and the output end of the data buffering module is connected with the input end of the data information identification module.
As a further technical solution of the present invention, the external Memory at least includes a floppy disk, an optical disk, a DVD, a hard disk, a flash Memory, a U disk, a CF card, an SD card, an MMC card, an SM card, a Memory Stick (Memory Stick), an xD card, a disk array, a near line Memory, an optical disk drive, a tape library, or a solid state disk; the logic comparison module is a logic module of a CMOS logic, a TTL logic or diode logic circuit; the counting module is a computing module based on a chip of a CD74HC series or a TI SN74L series; the ECC circuit at least comprises two multipliers, two adders and two registers.
As a further technical scheme of the invention, the encryption module comprises an encryption algorithm chip, and an anti-attack module, a data transmission interface, an encryption storage module, an input FIFO and an output FIFO which are connected with the encryption algorithm chip.
As a further technical solution of the present invention, the data information identification module at least includes a data character string identification module, a data instruction identification module, or a data logic identification module.
As a further technical solution of the present invention, the data input/output module is a face recognition module or a fingerprint recognition module.
Compared with the prior art, the invention has the beneficial effects that:
according to the invention, through designing the plurality of storage modules, backup of different types of data can be realized, and the storage capacity of the data can be improved.
According to the invention, the storage control module is arranged, so that the storage control of different types of data information can be realized, the control capability of data information storage is improved, and the control and the output can be carried out according to the specific requirements of users.
The invention realizes the correction of data input information through the ECC circuit, can improve the self-correcting capability of data and improves the data calculation capability.
The invention realizes the safety performance of the backup data information by arranging the encryption module and the decryption module, and has important significance in the data interaction process.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic flow chart of a data backup method according to the present invention;
FIG. 2 is a schematic structural diagram of a data backup device according to the present invention;
FIG. 3 is a schematic diagram of a storage control module of a data backup device according to the present invention;
FIG. 4 is a schematic diagram of a logic comparison module in a data backup apparatus according to the present invention;
FIG. 5 is a schematic diagram of an encryption module in a data backup apparatus according to the present invention;
fig. 6 is a schematic diagram of an encryption algorithm chip in the data backup apparatus according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
EXAMPLE 1 Process
As shown in fig. 1, a method of data backup includes the following steps:
(S1) data input carrying, carrying or storing different types of data information; the data information is stored through different storage media;
(S2) data storage control of controlling access to the memory according to the set timing rule, data type attribute, or storage mode; the data storage control comprises input data information logic comparison control, input data information counting control, input data information operation control, input data information error correction control, data storage input, output control and power supply control;
in the invention, the time sequence rule refers to the time sequence, when data storage is carried out, time sequence is firstly set, which data information needs to be stored at the first time, and time sequence characteristics are set according to the technical characteristics of priority. This requires setting the priority and the order of memory access according to different data characteristics in combination with the data type attributes.
(S3) data encryption for protecting the data information on the storage medium by a character string or an alphabetical or numeric password to prevent the data information from being lost due to interference of an external data environment;
(S4) decrypting the data, decrypting the data information on the storage medium, decrypting the data information protected by the character string or the letter or the numeric password for the user to use;
(S5) data buffering, temporarily storing the encrypted or decrypted data information for the encrypted or decrypted data information to be transmitted to the main functional area for further analysis and calculation;
(S6) a data information recognition module for recognizing, transferring or interacting the data information for use by the user.
As a further technical scheme of the invention, the input data information logic comparison control method is a control method based on TTL logic rules.
As a further technical solution of the present invention, the input data information count control method is an and, or, not, or a calculation rule, or a control method of addition, subtraction, multiplication, division, shift, or complementation calculation.
As a further technical scheme of the invention, the control method of combining CRC check and multiple data redundancy is adopted for error correction control of the input data information. How to realize the combination of CRC check and multiple data redundancy, the method adopts the singlechip control system for control, and can realize data error correction and data protection of RAM and EEROM. In a particular embodiment, the basic idea of a CRC check code is to use linear coding theory, a CRC code being a linear, block systematic code. After the K-bit information code, the check code of R bits is spliced, and the whole code length is N bits, so the code is called (N, K) code. The CRC check uses a polynomial coding method, assuming that the n-bit block of data being processed can be viewed as an n-1 order binary polynomial.For example, an 8-bit binary number 10111001 can be expressed as: x is the number of7 +x5 +x4 +x3+1. The polynomial multiplication-division operation process is the same as that of the ordinary algebraic polynomial. The addition and subtraction operation of the polynomial takes 2 as a modulus, and the addition and subtraction are not carried out, borrow and are consistent with the logical XOR operation. When the method is specifically applied, the CRC algorithm analysis and the C + + program of the CRC algorithm are adopted for design.
In the embodiment, data redundancy is realized by repeatedly generating a field in a plurality of tables, the database is normalized, redundancy is prevented, the storage capacity is not wasted, the data redundancy can be set when a user applies the data redundancy, when the CRC reaches a certain data redundancy, the single chip microcomputer control system sends out an alarm to prompt the user to correct errors in time, or a warning lamp is arranged through the single chip microcomputer control system, and the audible and visual alarm is realized.
As a further technical scheme of the invention, the data storage input or output control is realized by C language commands or C # language commands, and the commands can be selected autonomously according to command requirements.
EXAMPLE 2 apparatus
As shown in fig. 2-6, a data backup device includes a storage medium, a storage control module, an encryption module, a data buffer module, a data information identification module, and a data input/output module, where the storage control module is used to control the operations of the encryption module, the data buffer module, the data information identification module, and the data input/output module, the data input/output module is bidirectionally connected with the storage medium, an output end of the encryption module is connected with an input end of the storage medium, an output end of the storage medium is connected with an input end of the data buffer module, and an output end of the data buffer module is connected with an input end of the data information identification module.
In the present invention, the storage medium is used for carrying, carrying or storing different types of data information, and includes an internal memory and an external memory, where the internal memory is formed by a semiconductor memory chip, and the external memory includes a storage module.
In a specific embodiment, the internal memory can be directly connected with the storage control module in an embedded manner, the running speed of the internal memory is matched with the speed of the storage control module or a computer CPU (in other embodiments), and the storage speed of the internal memory is higher. The external Memory includes, but is not limited to, floppy disk, optical disk, DVD, hard disk, flash Memory, usb disk, CF card, SD card, MMC card, SM card, Memory Stick (Memory Stick), xD card, disk array, near line Memory, optical disk drive, magnetic tape library, solid state disk, etc.
The storage control module is used for controlling the access of the memory according to the set time sequence rule, the data type attribute or the storage mode.
In a particular embodiment, the control content includes control of address signals, data signals and various command signals, enabling the master (the device accessing the memory) to use the storage resources on the memory according to its own requirements. The memory controller mainly performs interface conversion, converts commands such as read and write commands issued by the host device into signals that can be recognized by the memory, and also performs address decoding and data format conversion (such as data bit width) between the host device and the memory.
In a specific embodiment, the storage control module comprises a microprocessor, and a logic comparison module, a counting module, an arithmetic unit, an ECC circuit, a data storage interface and a power supply module which are connected with the microprocessor.
The logic comparison module is a logic module of a CMOS logic or a TTL logic OR diode logic circuit, and when the logic comparison circuit of the TTL logic circuit is adopted in the application, when the output voltage v of the phase inverter isOWhen the circuit transits from low to high, the circuit is changed from VCCBy RcTo CLAnd (6) charging. When v isOIn the transition from high to low, CLWill pass through BJTAnd (4) discharging. Thus, CLThe charging and discharging processes of the capacitor are all required to be performed for a certain time, which inevitably increases the output voltage vORise time and fall time of the waveform. In particular C L Time constant R of charging circuitcCLWhen greater, vOThe rise is slower, i.e. the rise time is increased. Results from device internal and load capacitance effectsJTInverter with a capacitor having a capacitor elementIs not high.
The counting module is based on CD74HC series or TIComputation module of a chip of the SN74L series.
The arithmetic unit is composed of an arithmetic logic unit ALU, an accumulator, a status register, a general register set and the like. The method can realize the operations of adding, subtracting, multiplying and dividing four elements, logical operations of AND, OR, NOT, XOR and the like, and operations of shifting, complementing and the like.
The ECC in the ECC circuit is a shorthand of "Error Correcting Code", and the ECC is a circuit capable of performing "Error checking and Correcting", and the ECC circuit is used for generating encoded data from original data, and includes: two multipliers; two adders; two registers for storing result data of respective bytes of the original data subjected to addition and/or multiplication operations.
In particular embodiments, a NAND Flash controller may also be implemented, the controller including protocol and ECC technology. The protocol mainly standardizes an efficient data storage management mechanism so as to meet the requirements of high performance, low cost, stability, easy use and the like. The eMMC protocol is widely applied to mobile devices such as mobile phones due to its unique advantages. The ECC technique guarantees the reliability of NAND Flash data storage, and LDPC (low density parity check code) is a forward error correction coding (FEC) with excellent error correction performance, and has been proposed to be applied to the ECC technique of NAND Flash. In the embodiment, a Nand Flash controller of the LDPC new FEC may be used.
In the invention, the encryption module is used for protecting the data information on the storage medium through character strings or letters or digital passwords, so as to prevent the data information from being lost due to the interference of the external data environment;
the decryption module is used for decrypting the data information on the storage medium through a character string or an alphabetic or digital password for an external user to use;
in a specific embodiment, the encryption module comprises an encryption algorithm chip, and an anti-attack module, a data transfer interface, an encryption storage module, an input FIFO and an output FIFO which are connected with the encryption algorithm chip, wherein in the specific embodiment, the encryption algorithm chip is an FPGA chip EPlC12Q240C8, the operating clock of the encryption core is set to 100 MHz, the local bus controller operates at a 50 MHz clock, and the two are isolated in a clock domain by using an asynchronous FIFO. The development environments of the device Driver and the upper-layer application program are divided into Driver studio 03.2 and Visual C + + 6.0. During encryption, a Rijndael algorithm program is adopted, and encryption and decryption operations of data can be realized.
In the working process, the cryptographic algorithm core adopts the Rijndael algorithm and works in an ECB mode with higher encryption and decryption speeds. In the design, the RAM is used for storing the expanded key, the encryption and decryption first keys are written into the register while the expanded key is written into the RAM, and the current round key is read in a pipeline mode, so that the problem of data delay in reading the RAM is solved. The SubBytes conversion and the ShiftRows conversion are realized in a table look-up mode, and the SubBytes and the ShiftRows are integrated during realization, so that the two parts of delay only depend on the ROM of the SubBytes conversion.
In the above embodiment, in the technology of the present application, an anti-attack module, a data transfer interface, and the like are added, the anti-attack module adopts a two-layer encryption mode, the first layer adopts a Rijndael algorithm, the second layer adopts a unique address encryption to realize the second layer encryption, the Rijndael algorithm is a key block encryption algorithm, and a ciphertext is formed through multiple rounds of operations by performing permutation (statistics) and substitution (substistionions) iterative encryption. The AES algorithm is a special implementation of the Rijndael algorithm, the selected grouping being 128 bits (16 bytes) and the key being able to use three of 128, 192 and 256 bits. The second layer data encryption method generates address information and a two-dimensional code by inputting memory words, and the super-strong encryption is realized by the method.
The data buffer module is used for temporarily storing the data information for transmitting the encrypted or decrypted data information to the main functional area for further analysis and calculation.
The data information identification module is used for identifying, transmitting or interacting data information; in a specific embodiment, the system comprises a data character string identification module, a data instruction identification module or a data logic identification module.
The data input/output module is used for inputting or outputting the data information which is identified or transmitted.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A method of data backup, characterized by: the method comprises the following steps:
(S1) data input carrying, carrying or storing different types of data information; the data information is stored through different storage media;
(S2) data storage control of controlling access to the memory according to the set timing rule, data type attribute, or storage mode; the data storage control comprises input data information logic comparison control, input data information counting control, input data information operation control, input data information error correction control, data storage input, output control and power supply control;
(S3) data encryption for protecting the data information on the storage medium by a character string or an alphabetical or numeric password to prevent the data information from being lost due to interference of an external data environment;
(S4) decrypting the data, decrypting the data information on the storage medium, decrypting the data information protected by the character string or the letter or the numeric password for the user to use;
(S5) data buffering, temporarily storing the encrypted or decrypted data information for the encrypted or decrypted data information to be transmitted to the main functional area for further analysis and calculation;
(S6) a data information recognition module for recognizing, transferring or interacting the data information for use by the user.
2. A method of data backup according to claim 1, characterized by: the input data information logic comparison control method is a control method based on TTL logic rules.
3. A method of data backup according to claim 1, characterized by: the input data information counting control method is an AND, OR, NOT, EXT, OR calculation rule or a control method of addition, subtraction, multiplication, division, shift or complementation calculation.
4. A method of data backup according to claim 1, characterized by: the control method of error correction of input data information adopts a control method combining CRC check and multiple data redundancy.
5. A method of data backup according to claim 1, characterized by: the data storage input or output control is realized by C language command or C # language command.
6. An apparatus for data backup, comprising: the hardware components comprise:
a storage medium; the storage medium is used for bearing, carrying or storing different types of data information, and N data storage modules are integrated on the storage medium, wherein N is more than or equal to 4; the storage medium comprises an internal memory and an external memory, the internal memory is formed by a semiconductor storage chip, and the external memory comprises a storage module;
a storage control module; the system is used for controlling the access of the memory according to the set time sequence rule, the data type attribute or the storage mode; the storage control module comprises a microprocessor, and a logic comparison module, a counting module, an arithmetic unit, an ECC circuit, a data storage interface and a power supply module which are connected with the microprocessor;
an encryption module; the storage medium is used for protecting data information on the storage medium through character strings or letters or digital passwords, so that the data information is prevented from being lost due to interference of an external data environment;
the decryption module is used for decrypting the data information on the storage medium and decrypting the data information protected by the character string or the letter or the digital password for the user to use;
the data buffer module is used for temporarily storing the data information for transmitting the encrypted or decrypted data information to the main functional area for further analysis and calculation;
the data information identification module is used for identifying, transmitting or interacting data information; in a specific embodiment, the system comprises a data character string identification module, a data instruction identification module or a data logic identification module;
the data input/output module is used for inputting or outputting the identified or transmitted data information;
the data input/output module is connected with the storage medium in a bidirectional mode, the output end of the encryption module is connected with the input end of the storage medium, the output end of the storage medium is connected with the input end of the data buffering module, and the output end of the data buffering module is connected with the input end of the data information identification module.
7. The apparatus for data backup according to claim 6, wherein: the external Memory at least comprises a floppy disk, an optical disk, a DVD, a hard disk, a flash Memory, a U disk, a CF card, an SD card, an MMC card, an SM card, a Memory Stick (Memory Stick), an xD card, a disk array, a near-line Memory, an optical disk drive, a magnetic tape library or a solid state disk; the logic comparison module is a logic module of a CMOS logic, a TTL logic or diode logic circuit; the counting module is a computing module based on a chip of a CD74HC series or a TI SN74L series; the ECC circuit at least comprises two multipliers, two adders and two registers.
8. The apparatus for data backup according to claim 6, wherein: the encryption module comprises an encryption algorithm chip, and a breach prevention module, a data transmission interface, an encryption storage module, an input FIFO and an output FIFO which are connected with the encryption algorithm chip.
9. The apparatus for data backup according to claim 6, wherein: the data information identification module at least comprises a data character string identification module, a data instruction identification module or a data logic identification module.
10. The apparatus for data backup according to claim 6, wherein: the data input/output module is a face recognition module or a fingerprint recognition module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111118003.1A CN113821380A (en) | 2021-09-24 | 2021-09-24 | Data backup method and data backup device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111118003.1A CN113821380A (en) | 2021-09-24 | 2021-09-24 | Data backup method and data backup device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113821380A true CN113821380A (en) | 2021-12-21 |
Family
ID=78921106
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111118003.1A Pending CN113821380A (en) | 2021-09-24 | 2021-09-24 | Data backup method and data backup device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113821380A (en) |
-
2021
- 2021-09-24 CN CN202111118003.1A patent/CN113821380A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101306645B1 (en) | Error correction decoding by trial and error | |
US20180323968A1 (en) | Physically Unclonable Function Circuits and Methods of Performing Key Enrollment in Physically Unclonable Function Circuits | |
US9626517B2 (en) | Non-deterministic encryption | |
WO2012122558A2 (en) | Programmable data storage management | |
KR20090028507A (en) | Non-volatile memory error correction system and method | |
US20150103598A1 (en) | Protection against side-channel attacks on non-volatile memory | |
US10944429B1 (en) | Data accessing method using data protection with aid of parity check matrix having partial sequential information, and associated apparatus | |
CN104160407A (en) | Using storage controller bus interfaces to secure data transfer between storage devices and hosts | |
US20130080787A1 (en) | Memory storage apparatus, memory controller and password verification method | |
EP4202685A1 (en) | Algebraic and deterministic memory authentication and correction with coupled cacheline metadata | |
KR102426047B1 (en) | Device and method for decoding polar code | |
WO2023055539A1 (en) | Memory controller for managing data and error information | |
TWI536749B (en) | Decoding method, memory storage device and memory controlling circuit unit | |
CN113821380A (en) | Data backup method and data backup device | |
US20220261363A1 (en) | Controller for managing multiple types of memory | |
CN114401081A (en) | Data encryption transmission method, application and system | |
Soltani et al. | RandShift: An energy-efficient fault-tolerant method in secure nonvolatile main memory | |
CN109471809B (en) | FLASH encryption protection method and device of chip, FLASH controller and chip | |
CN103034594A (en) | Memory storage device and memory controller and password authentication method thereof | |
CN111752747A (en) | Memory security verification method for enhancing error detection capability | |
US20240007265A1 (en) | Data authenticity and integrity check for data security schemes | |
US12032443B2 (en) | Shadow DRAM with CRC+RAID architecture, system and method for high RAS feature in a CXL drive | |
US20230236933A1 (en) | Shadow dram with crc+raid architecture, system and method for high ras feature in a cxl drive | |
US11722152B1 (en) | Capacity-expanding memory control component | |
US20240004759A1 (en) | Cache line data protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20211221 |
|
WD01 | Invention patent application deemed withdrawn after publication |