CN1975683A - Computer network datarecovering method - Google Patents

Computer network datarecovering method Download PDF

Info

Publication number
CN1975683A
CN1975683A CN 200610116305 CN200610116305A CN1975683A CN 1975683 A CN1975683 A CN 1975683A CN 200610116305 CN200610116305 CN 200610116305 CN 200610116305 A CN200610116305 A CN 200610116305A CN 1975683 A CN1975683 A CN 1975683A
Authority
CN
China
Prior art keywords
data
backup
file
recovery
out step
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200610116305
Other languages
Chinese (zh)
Other versions
CN100449501C (en
Inventor
邹恒明
侯丽珍
李明
沈莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CNB2006101163054A priority Critical patent/CN100449501C/en
Publication of CN1975683A publication Critical patent/CN1975683A/en
Application granted granted Critical
Publication of CN100449501C publication Critical patent/CN100449501C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention is a data backup method in computer networks, which belongs to the area of network information technology. The steps are: (1) maintain a backup files list which is dynamically updated; (2) Incremental backup information as well as related system parameters when files in the backup file list are changed, and obtain the difference information with the incremental information and original backup information; (3) bottom hide critical data selected by users; (4) encrypt data when they are remotely backup through network; (5) conduct consistency validation after the data transmission; (6) Get user's configuration for recovery; (7) judge whether system can start the data recovery; (8) conduct data recovery. Get the needed data from the original backup and incremental backup information and recover them to the corresponding paths.

Description

The method of computer network datarecovering
Technical field
What the present invention relates to is a kind of method that is used for network information technology field, specifically a kind of method of computer network datarecovering.
Background technology
In the society of current such information and networking, computing machine just we work and life in playing the part of the role who becomes more and more important.More and more enterprises, businessman, government bodies and individual obtain information, process information by computing machine, simultaneously the form of own most important information with data file are kept in the computing machine.In case the data generation disaster that these are important will cause an enterprise to shut down, if loss of data also might make an enterprise face bankruptcy.Thus, people begin to pay close attention to how to guarantee that the intact of data, data backup then are unique solutions.
Find through literature search prior art, Chinese patent (application) number is 200610001299.8, the patent of " data reconstruction method " by name, it utilizes the many places Backup Data to reach the purpose of fast quick-recovery, but Backup Data is not taked any storage security measure, have the data storage potential safety hazard; Simultaneously, it needs alternately frequent between local and long-range in the method that data are recovered, thereby has produced a large amount of Network Transmission, has also brought transmission security hidden danger when having prolonged data release times.Find also in the retrieval that Chinese patent (application) number is 01140074.9, is called the patent of " a kind of recovery method for computer system ", its advantage is and can rely on partition table and the reading of data of physics.Backup data package is the full backup to former data, does not consider memory space problem, and is just inapplicable when Backup Data is huge.
Summary of the invention
The objective of the invention is to overcome deficiency of the prior art, a kind of method of computer network datarecovering is provided, makes it solve prior art and can not satisfy simultaneously storage space requirement, the requirement of data storage transmission security and correct restore data are made it to carry out the technical matters that data are recovered under many requirements such as available.
The present invention is achieved by the following technical solutions, the present invention includes: data back up method and data reconstruction method, wherein:
Described method of data backup is specially:
(1) safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with corresponding document and associated system parameter message and is kept at least one the backup computer;
(2) when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
(3) can select that crucial Backup Data is carried out bottom by the user and hide, to reach data storage safety;
(4) long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
(5) after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
The method that described data are recovered is specially:
(6) obtain user's recovery setting;
(7) judge whether system can begin to carry out data and recover;
(8) carry out data and recover,, return under the respective paths by original backup and the synthetic required backup of difference backup.
Described step (6) is specially:
1. obtain the relevant setting of backup file, comprise backup policy, backup place (local, long-range), backup file tabulation information such as (comprising path, parameter information);
2. the potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
3. set all correlation parameters that recover about data, comprise backup file the position (acquiescence: this locality), release time the last recoverable time point), select to treat recovery file item (acquiescence: the last recoverable all files point (acquiescence:, also can be from tabulation the selected file/file that will recover, or use the selected file type that will recover of asterisk wildcard (*)), the path during backup), whether carry out non-accurate recovery (if backup file goes wrong) position of recovery file (acquiescence:;
4. generate correct, available " data are recovered parameter configuration files (DRPF) ", and be kept at fixing position.
Described step (7) is specially:
1. receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files (DRPF);
2. be defined as local recovery or remote recovery: 3. remote recovery then carries out step, and local recovery is then skipped next step and directly carried out step 4.;
3. earlier this program is transferred to far-end so that operation afterwards; Then call encrypting module with this program encryption; This program of calling then after transport module will be encrypted is transferred to far-end; At far-end this program is deciphered, this is an option again; Last far-end moves this program, keeps two ends communication;
4. check the two ends file system type: file system is identical, then directly carries out step 5., and file system is inequality, and then this routine change bak makes it to be identified, and carries out step 5. again;
5. check and treat the backup file of recovery file and integrality, the availability of daily record: judge that backup file and daily record are imperfect, then carry out step 6., but 7. the complete time spent then carries out step;
6. this program reports an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step 5.;
7. check whether the required relevant system parameters of current systematic parameter and recovery file is consistent: inconsistent, then carry out step 8., 9. unanimity then carries out step;
8. eject dialog box, select whether to change the far-end setting, get back to step 7. by recovering requirement by the user;
9. log-on data is recovered.
Described step (8) is specially:
1. receive the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
2. call the interface of hiding module corresponding document is shown, show failure, then carry out step 3., show successfully, then carry out step 4.;
3. 2. retry if the retry failure then reports an error, gets back to step, and 4. the retry success then carries out step;
4. with backup file and the synthetic a backup file fully of differential file;
5. check and recover to be provided with that corresponding document is recovered in the chkdsk space by path, disk space is not enough or do not have respective paths, then carries out step 6., and disk space is enough and find respective paths, then carries out step 7.;
When 6. recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step 7.;
7. call the integrality of the horizontal piece authenticating documents of data consistency checking, then do not carry out step 8., then carry out step 9. by data consistency checking by data consistency checking;
8. not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step 7. for the user;
9. after finishing the recovery and checking of All Files, generate Log Report.
Compared with prior art, the present invention has the following advantages:
Data backup amount required for the present invention is little, and is not high to storage space and network bandwidth requirement.Data backup restoration has all been strengthened the security of data storage, data transmission.
The invention provides data consistency checking and thereby the correlation parameter comparison has guaranteed data integrity, availability.Increased the recovery bootup process, it is little to recover expense.Backup and recovery all can be set at automatically to be finished, and need not manual intervention.
Description of drawings
Fig. 1 is that the present invention realizes the principle schematic that data are recovered
Fig. 2 is the process flow diagram of data reconstruction method of the present invention
Fig. 3 is the data consistency checking process flow diagram
Fig. 4 is the data consistency checking process flow diagram under the another kind of situation
Embodiment
Below in conjunction with accompanying drawing, specify the present invention.
Can recover after losing in order to ensure critical data, local backup recovery policy and the remote backup recovery policy that is connected by network are provided in the computer system of the present invention simultaneously.As shown in Figure 1, it is for realizing the theory structure synoptic diagram of the computer system of the present invention that data are recovered.It comprises local data, local backup and some remote backups.Local data and local backup are positioned at same place, can be positioned between them on the same station server, also can be by private line access.Local data and remote backup are positioned at the strange land, link to each other by network between them, when the transmission of data takes place, can be automatically to data encrypt, transmission security, data integrity checking such as consistency checking.It is hiding invisible that local backup and remote backup all can be elected bottom as, and wherein remote backup also can be used as to use and uses.
As shown in Figure 2, it is a process flow diagram of the present invention.It comprises: the method that the method for data backup before breaking down and the data afterwards that break down are recovered.
(1) method of data backup
S1: safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with corresponding document and associated system parameter message and is kept at least one the backup computer;
S2: when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
S3: can select that crucial Backup Data is carried out bottom by the user and hide, to reach data storage safety;
S4: long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
S5: after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
(2) method of data recovery
S6: the recovery setting of obtaining the user;
S7: judge whether system can begin to carry out data and recover;
S8: carry out data and recover,, return under the respective paths by original backup and the synthetic required backup of difference backup.
Below specifically introduce each step.
One, step S1
Safeguard a backup file tabulation that dynamically updates.It is such that what is called dynamically updates: to the unique top of file of each file allocation in the backup file tabulation, what be shown to the user is routine informations such as filename, file attribute, file size, date created.When the user dynamically increases backup file,, its filename is increased in the backup file tabulation newly-increased file allocation top of file.Deleted certain file in local data, and this file is in backup file tabulation the time, the user is provided following option: 1, mistake deletion, recovery file is to assigned address.2, keep backup file.3, deletion backup file, and from listed files, leave out this.In local data, certain file has been carried out the rename operation, and this file with corresponding document rename in the backup file tabulation, and keeps its raw filename information in backup file tabulation the time.
Regularly, be kept at least one the backup computer the renewal that backups of backup file tabulation, Backup Data (be chosen as local backup or remote backup or both) situation, relevant system parameters information.
Two, step S2
Regularly the file in the backup file tabulation is checked item by item, whether the respective file of checking in the local data that is assigned top of file has change, carry out the backup of increment difference as if the data and the system parameter message of this moment that have change to its change, then do not skip if there is change.If checking out All Files does not all have change and then generates corresponding journal file and write down this situation.
The availability of check data not only when one of important feature of the present invention just is restore data has also been checked the consistance of pertinent system information.Can improve greatly like this that data are successfully recovered, correct available possibility.The correlation parameter information that these need write down is as shown in the table:
The correlation parameter information that needs record
Drive
Current system state
File path information
Top of file
File attribute
File size
File user authority information
Adopt increase difference backup mode to solve volume of transmitted data and data keeping within bounds mutually between release time greatly, reach very short data requirement release time relatively with minimum volume of transmitted data.
Three, step S3
Can select that crucial Backup Data is carried out bottom by the user hides, this is in order to reach higher data storage security consideration, also avoided virus, trojan horse program or hacker's infringement, like this from having guaranteed that to a great extent critical data is not leaked from another angle.
The bottom concealing technology that the present invention adopts can be realized thoroughly hiding of data.
Four, step S4
Long-range when the network backup, data are carried out cryptographic operation to reach data transmission security.The encrypted transmission sixty-four dollar question is the privacy of key.
The key rotation maker that the present invention utilizes the network two ends to install simultaneously makes key needn't pass through Network Transmission, has therefore well solved this problem.
Five, step S5
After transmission is finished data are carried out consistency checking to guarantee data integrity and consistance.Because can being chosen in, the user whether data are decrypted after transmission is finished, or non-decrypting direct preservation, so consistency checking also has different processing policies at different situations.
If what the user selected is that next step operation was carried out in deciphering again after transmission was finished, then consistency checking can be before file data encrypt to take place to its generate consistency desired result and, as shown in Figure 3, if what the user selected is non-decrypting after transmission is finished, then consistency checking can be after file data be encrypted to its generate consistency desired result with, as shown in Figure 4.
Six, step S6
Can detect or manually start data automatically by system recovers.
When needs carried out the data recovery, the recovery setting that at first should obtain the user, the recovery before this just comprises were set and how to be used these to recover setting afterwards.
Step S6 can be by following substep specific implementation:
(1) obtains the relevant setting of backup file, comprise backup policy, backup place (local, long-range), backup file tabulation information such as (comprising path, parameter information);
(2) potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
(3) set all correlation parameters that recover about data, comprise backup file the position (acquiescence: this locality), release time the last recoverable time point), select to treat recovery file item (acquiescence: the last recoverable all files point (acquiescence:, also can be from tabulation the selected file/file that will recover, or use the selected file type that will recover of asterisk wildcard (*)), the path during backup), whether carry out non-accurate recovery (if backup file goes wrong) position of recovery file (acquiescence:;
(4) generate correct, available " data are recovered parameter configuration files (DRPF) ", and be kept at fixing position.
Seven, step S7
Recover boot by one and judge whether system can begin data and recover, and sees also Fig. 6.
Step S7 can be by following substep specific implementation:
(1) receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files (DRPF);
(2) be defined as local recovery or remote recovery: remote recovery then carries out step (3), and local recovery is then skipped next step and directly carried out step (4);
(3) this program is transferred to far-end so that operation afterwards; Call encrypting module with this program encryption; This program of calling after transport module will be encrypted is transferred to far-end; Far-end is with this program deciphering (optional); Far-end moves this program, keeps two ends communication;
(4) check the two ends file system type: file system is identical, then directly carries out step (5), and file system is inequality, and then this routine change bak makes it to be identified, and carries out step (5) again;
(5) backup file of recovery file and integrality, the availability of daily record are treated in inspection: judge that backup file and daily record are imperfect, then carry out step (6), but the complete time spent is then carried out step (7);
(6) this program reports an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step (5);
(7) check whether current systematic parameter is consistent with the required relevant system parameters of recovery file: inconsistent, then carry out step (8), unanimity is then carried out step (9);
(8) eject dialog box, select whether to change the far-end setting, get back to step (7) by recovering requirement by the user;
(9) log-on data is recovered.
Eight, step S8
The execution data are recovered, and by original backup and the synthetic required backup of difference backup, return under the respective paths.
Step S8 can be by step specific implementation quickly:
(1) receives the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
(2) call the interface of hiding module corresponding document is shown, show failure, then carry out step (3), show successfully, then carry out step (4);
(3) retry if the retry failure then reports an error, is got back to step (2), and step (4) is then carried out in the retry success;
(4) with backup file and the synthetic a backup file fully of differential file;
(5) check recovery setting, corresponding document is recovered in the chkdsk space by path, and disk space is not enough or do not have respective paths, then carries out step (6), and disk space is enough and find respective paths, then carries out step (7);
When (6) recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step (7);
(7) call the integrality of data consistency checking module verification file, then do not carry out step (8), then carry out step (9) by data consistency checking by data consistency checking;
(8) not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step (7) for the user;
(9) finish the recovery and checking of All Files after, generate Log Report.

Claims (5)

1, a kind of method of computer network datarecovering is characterized in that, comprising: the method that method of data backup and data are recovered,
Described method of data backup is specially:
(1) safeguard a backup file tabulation that dynamically updates, principal computer is made daily record according to this backup file tabulation with corresponding document and associated system parameter message and is kept at least one the backup computer;
(2) when the file in the backup file tabulation takes place to change, back up its increment information and associated system parameter message, and draw difference information by increment information and original backup;
(3) select that by the user crucial Backup Data is carried out bottom and hide, to reach data storage safety;
(4) long-range when the network backup, data are carried out cryptographic operation to reach data transmission security;
(5) after transmission is finished data are carried out consistency checking to guarantee data integrity and consistance;
The method that described data are recovered is specially:
(6) obtain user's recovery setting;
(7) judge whether system can begin to carry out data and recover;
(8) carry out data and recover,, return under the respective paths by original backup and the synthetic required backup of difference backup.
2, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (6) is specially:
1. obtain the relevant setting of backup file, comprise backup policy, backup place, backup file list information;
2. the potentially conflicting of detected parameters option in the parameter setting up procedure generates " data recovery parameter " option list;
3. set all correlation parameters that recover about data, comprise backup file position, release time point, select to treat recovery file item, recovery file the position, whether carry out non-accurate recovery;
4. generate correct, available " data recovery parameter configuration files ", and be kept at fixing position.
3, the method for computer network datarecovering as claimed in claim 2 is characterized in that, 3., the position of acquiescence backup file is local in the step (6); Acquiescence point release time is the last recoverable time point; The acquiescence selection treats that the recovery file item is recoverable all for the last time, can select the file/file that will recover from tabulation, or use asterisk wildcard * to select the file type that will recover; Path when the position of acquiescence recovery file is backup.
4, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (7) is specially:
1. receive the data recovery request, the relevant setting, the reading of data that obtain backup file are recovered parameter configuration files;
2. be defined as local recovery or remote recovery: 3. remote recovery then carries out step, and local recovery is then skipped next step and directly carried out step 4.;
3. earlier this program is transferred to far-end so that operation afterwards; Then call encrypting module with this program encryption; This program of calling then after transport module will be encrypted is transferred to far-end; At far-end this program is deciphered, this is an option again; Last far-end moves this program, keeps two ends communication;
4. check the two ends file system type: file system is identical, then directly carries out step 5., and file system is inequality, and then this routine change bak makes it to be identified, and carries out step 5. again;
5. check and treat the backup file of recovery file and integrality, the availability of daily record: judge that backup file and daily record are imperfect, then carry out step 6., but 7. the complete time spent then carries out step;
6. this program reports an error, and information that will " information deficiency can't restore data " is shown to the user, and provides the date and the state that can return to select for the user, gets back to step 5.;
7. check whether the required relevant system parameters of current systematic parameter and recovery file is consistent: inconsistent, then carry out step 8., 9. unanimity then carries out step;
8. eject dialog box, select whether to change the far-end setting, get back to step 7. by recovering requirement by the user;
9. log-on data is recovered.
5, the method for computer network datarecovering as claimed in claim 1 is characterized in that, described step (8) is specially:
1. receive the log-on data recovering information, determine the integrality of backup file, differential file and journal file that recovery is required;
2. call the interface of hiding module corresponding document is shown, show failure, then carry out step 3., show successfully, then carry out step 4.;
3. 2. retry if the retry failure then reports an error, gets back to step, and 4. the retry success then carries out step;
4. with backup file and the synthetic a backup file fully of differential file;
5. check and recover to be provided with that corresponding document is recovered in the chkdsk space by path, disk space is not enough or do not have respective paths, then carries out step 6., and disk space is enough and find respective paths, then carries out step 7.;
When 6. recovering corresponding document by path, do not use for recovery file if find corresponding path then Make Path, also to check whether this place, path has enough disk spaces this moment, if disk space inadequately then eject dialog box and allow the user select to change path or release disk space, check once more, if disk space enough then carry out step 7.;
7. call the integrality of data consistency checking module verification file, then do not carry out step 8., then carry out step 9. by data consistency checking by data consistency checking;
8. not by data consistency checking, think that then two end datas are inconsistent, report an error and select to ignore or retransmit corresponding document, get back to step 7. for the user;
9. after finishing the recovery and checking of All Files, generate Log Report.
CNB2006101163054A 2006-09-21 2006-09-21 Computer network datarecovering method Expired - Fee Related CN100449501C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2006101163054A CN100449501C (en) 2006-09-21 2006-09-21 Computer network datarecovering method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006101163054A CN100449501C (en) 2006-09-21 2006-09-21 Computer network datarecovering method

Publications (2)

Publication Number Publication Date
CN1975683A true CN1975683A (en) 2007-06-06
CN100449501C CN100449501C (en) 2009-01-07

Family

ID=38125766

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006101163054A Expired - Fee Related CN100449501C (en) 2006-09-21 2006-09-21 Computer network datarecovering method

Country Status (1)

Country Link
CN (1) CN100449501C (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164164A (en) * 2010-02-15 2011-08-24 埃森哲环球服务有限公司 Remote technical support employing a configurable executable application
CN102724174A (en) * 2011-08-08 2012-10-10 北京北信源软件股份有限公司 Method for network derivation of operation log of hardware storage medium information elimination tool
WO2013091558A1 (en) * 2011-12-22 2013-06-27 ***股份有限公司 Parameter batch synchronization method and system
CN103713964A (en) * 2012-09-29 2014-04-09 联想(北京)有限公司 Data backup and recovery method and electronic equipment
CN104182294A (en) * 2013-05-23 2014-12-03 华为技术有限公司 Method and device for backing up and recovering file
CN104965771A (en) * 2015-07-29 2015-10-07 浪潮(北京)电子信息产业有限公司 Method and system for verifying remote disaster recovery data consistency
CN104978239A (en) * 2014-04-08 2015-10-14 重庆邮电大学 Method, device and system for realizing multi-backup-data dynamic updating
CN105955844A (en) * 2016-04-27 2016-09-21 成都爱可信科技有限公司 Secret-related file backup method of data center
CN109829318A (en) * 2018-12-17 2019-05-31 北京奇安信科技有限公司 A kind of encrypted backup processing method and processing device of file
CN110399249A (en) * 2019-06-04 2019-11-01 腾讯科技(北京)有限公司 A kind of data disaster tolerance method and relevant apparatus
CN111090543A (en) * 2018-10-23 2020-05-01 广东亿迅科技有限公司 Backup recovery method of Zookeeper, terminal and computer readable storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100390853B1 (en) * 2000-06-07 2003-07-10 차상균 A Logging Method and System for Highly Parallel Recovery Operation in Main-Memory Transaction Processing Systems
US7305577B2 (en) * 2003-04-11 2007-12-04 Star Softcomm Pte Ltd Data isolation system and method
US7756833B2 (en) * 2004-09-22 2010-07-13 Microsoft Corporation Method and system for synthetic backup and restore
CN100426247C (en) * 2006-01-12 2008-10-15 上海洲信信息技术有限公司 Data recovery method

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102164164A (en) * 2010-02-15 2011-08-24 埃森哲环球服务有限公司 Remote technical support employing a configurable executable application
CN102724174B (en) * 2011-08-08 2016-04-06 北京北信源软件股份有限公司 A kind of Operation Log for hardware store medium information elimination instrument carries out network deriving method
CN102724174A (en) * 2011-08-08 2012-10-10 北京北信源软件股份有限公司 Method for network derivation of operation log of hardware storage medium information elimination tool
WO2013091558A1 (en) * 2011-12-22 2013-06-27 ***股份有限公司 Parameter batch synchronization method and system
CN103713964B (en) * 2012-09-29 2017-06-27 联想(北京)有限公司 A kind of data backup, the method recovered and electronic equipment
CN103713964A (en) * 2012-09-29 2014-04-09 联想(北京)有限公司 Data backup and recovery method and electronic equipment
CN104182294A (en) * 2013-05-23 2014-12-03 华为技术有限公司 Method and device for backing up and recovering file
CN104978239A (en) * 2014-04-08 2015-10-14 重庆邮电大学 Method, device and system for realizing multi-backup-data dynamic updating
CN104978239B (en) * 2014-04-08 2019-02-19 重庆邮电大学 A kind of method, apparatus and system realizing more Backup Data dynamics and updating
CN104965771A (en) * 2015-07-29 2015-10-07 浪潮(北京)电子信息产业有限公司 Method and system for verifying remote disaster recovery data consistency
CN105955844A (en) * 2016-04-27 2016-09-21 成都爱可信科技有限公司 Secret-related file backup method of data center
CN111090543A (en) * 2018-10-23 2020-05-01 广东亿迅科技有限公司 Backup recovery method of Zookeeper, terminal and computer readable storage medium
CN111090543B (en) * 2018-10-23 2023-04-11 广东亿迅科技有限公司 Backup recovery method of Zookeeper, terminal and computer readable storage medium
CN109829318A (en) * 2018-12-17 2019-05-31 北京奇安信科技有限公司 A kind of encrypted backup processing method and processing device of file
CN110399249A (en) * 2019-06-04 2019-11-01 腾讯科技(北京)有限公司 A kind of data disaster tolerance method and relevant apparatus

Also Published As

Publication number Publication date
CN100449501C (en) 2009-01-07

Similar Documents

Publication Publication Date Title
CN1975683A (en) Computer network datarecovering method
CN101854392B (en) Personal data management method based on cloud computing environment
CN1291293C (en) Hidden link dynamic key manager for use in computers systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
CN1288527C (en) Computer security control module and safeguard control method thereof
US9189642B2 (en) Safe processing of on-demand delete requests
CN1174302C (en) Verification of software agents and agent activities
CN1826000A (en) Portable information terminal and data protecting method
CN1926493A (en) Method and system for linking certificates to signed files
CN1874218A (en) Method, system and equipment for license management
CN1924807A (en) Os starting method and apparatus using the same
CN1860471A (en) Digital rights management structure, portable storage device, and contents management method using the portable storage device
CN1230752C (en) Information process system, medium, equipment method, and relative storage medium
CN1553349A (en) Safety chip and information safety processor and processing method
CN1681240A (en) Credential roaming
CN1647443A (en) Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
CN101064604A (en) Remote access process, system and equipment
US8429364B1 (en) Systems and methods for identifying the presence of sensitive data in backups
CN1787431A (en) Apparatus, system, and method for transparent end-to-end security of storage data
CN1716220A (en) Multitask execution system
CN1879072A (en) System and method providing disconnected authentication
CN1801091A (en) Systems and methods for securely booting a computer with a trusted processing module
CN1818920A (en) Systems and methods for managing multiple keys for file encryption and decryption
US9053343B1 (en) Token-based debugging of access control policies
CN1716851A (en) Information processing apparatus, information processing method, and storage medium
CN101075866A (en) Method and system for loading message on Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090107

Termination date: 20110921