Movatterモバイル変換


[0]ホーム

URL:


CN107066345A - A kind of data recovery and backup method based on hard disk gap - Google Patents

A kind of data recovery and backup method based on hard disk gap
Download PDF

Info

Publication number
CN107066345A
CN107066345ACN201510969188.5ACN201510969188ACN107066345ACN 107066345 ACN107066345 ACN 107066345ACN 201510969188 ACN201510969188 ACN 201510969188ACN 107066345 ACN107066345 ACN 107066345A
Authority
CN
China
Prior art keywords
hard disk
computer
program
thread
disk gap
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510969188.5A
Other languages
Chinese (zh)
Inventor
陈小春
张超
朱立森
孙亮
郑树剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC Beijing Co
Original Assignee
CETC Beijing Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC Beijing CofiledCriticalCETC Beijing Co
Priority to CN201510969188.5ApriorityCriticalpatent/CN107066345A/en
Publication of CN107066345ApublicationCriticalpatent/CN107066345A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of data recovery based on hard disk gap and backup method, it is specially:Client Agent program is written in the hard disk gap of computer, is stored with the local hard drive of computer by defence program;Computer starting;Self-starting strategy is used in computer, for setting Client Agent program to start with the startup of the operating system in computer, and the self-starting strategy is not by computer user and other software intervention;Client Agent program is run, hard disk data protection and recovery is performed;Using backup server storage by defence program;Agent runs and checks connection status, Agent starts first thread and the second thread, first thread real time scan hard disk gap, and the second thread reads Preservation tactics, and real-time guard file integrality.

Description

A kind of data recovery and backup method based on hard disk gap
Technical field
The invention belongs to computer software technical field, it is related to the side of a kind of data recovery based on hard disk gap and backupMethod.
Background technology
With the development and the popularization of computer of information technology, computer is had become indispensable one in people's lifePart, substantial amounts of information is stored in computer.Along with the evolution of computer, computer virus and various spiesSoftware also increasingly spreads unchecked, and this security to computer hard disk data brings acid test.In addition, such as userThe other factors such as maloperation or system crash, also result in the closing of user data loss or antivirus software.Therefore, how to haveThe file and data of effect protection user is also into computer user's focus of attention.
Comprehensive current technology situation, the method for recovery and the backup of conventional hard disc of computer information mainly includes followingIt is several:
(1) recovered and backed up by backup harddisk.Needs are except for storage program area when making in this wayWith outside the hard disk of user data, it is necessary to set backup harddisk again.Although this method can back up user data completely, notWith real-time, while need certain professional knowledge, general user is not allowed easy to operate, not enough facilitated, backup is time-consuming every timeToo much.
(2) backed up using CD.Make general user's reply Default Value in this way, do not have as method 1Have the hard of real-time guard, and CD capacity is limited, typically can only standby system disk, with significant limitation.
(3) backed up and recovered by setting up different subregions in same hard disk.The softwares such as GHOST are to fdiskBacked up.This method does not have the function of real-time guard equally, while BACKUP TIME is oversize, backup file is also easy forIt is destroyed, therefore without very high safety and reliability.
(5) backup is realized based on BIOS and protection subregion and recovered.This method overcomes the shortcoming of method four, realizes extensiveMultiple and backup program code is not fixedly disposed in BIOS chips, and is provided in conventional embedded system, this sideMethod can only realize backup mode of the magnetic track to magnetic track of whole subregion, it is impossible to flexibly back up file, need also exist for restarting system, rightIt is same inconvenient for user.
(6) backup and recovery realized based on protection subregion and hard disk driver.This method ratio method (5) is somewhat simpleEasily, backup and recovery routine are nor put in embedded systems, but by the replacement of hard disk driver, operatingProtection subregion is directly accessed on system.This method first has to open protection subregion, secondly will for different operating systemThe different driver of design, is unduly complex, therefore be also not suitable for most of occasion for domestic consumer.
The content of the invention
In view of this, the invention provides a kind of data recovery based on hard disk gap and backup method, can protect andRecover hard disc data, it is small to customer impact without restarting systems without shutting down computer.
In order to achieve the above object, the technical scheme is that:
Step 1: Client Agent program is written in the hard disk gap of computer, the local hard drive of the computerIn be stored with by defence program.
Step 2: computer starting;Self-starting strategy is used in computer, for setting Client Agent program with calculatingThe startup of operating system in machine and start, and the self-starting strategy is not by computer user and other software intervention.
Step 3: operation Client Agent program, performs hard disk data protection and recovery;Quilt is stored using backup serverDefence program.
Agent runs and checks connection status, Agent starts first thread and the second thread, and first thread is realWhen scanning hard disk gap, the second thread reads Preservation tactics, and real-time guard file integrality.
Whether what is stored in the first thread scanning hard disk gap, detection hard disk gap is wiped free of and is usurped by defence programIt is consistent when changing, and whether detecting by the signature value of the verification file of defence program with write-in, if finding to there is hard disk gap to be tampered,The hard disk gap being tampered then is write back by defence program using not distorting of reading out again, it is ensured that the integrality in hard disk gapAnd correctness;If do not read out do not distort by defence program, download and write back to by defence program from the backup serverHard disk gap.
Second thread is read according to Preservation tactics, to carrying out integrity measurement by defence program, is detected by protection journeyWhether sequence is complete, if imperfect, is downloaded from the backup server described by defence program, or carries out from local hard drive quiltDefence program recovers.
By the integrity information of defence program described in the Preservation tactics.
Step 3 is repeated, until computer shutdown.
Beneficial effect:
(1) the method is real-time guard and recovers hard disc data, right without restarting systems without shutting down computerCustomer impact is small.
(2) the method user can customize the data and file of protection, due to client process real-time online, without timingGo to back up and recover hard disk, reduce the plenty of time shared by backup DISK to Image subregion.
(3) the method deployment is simple, it is only necessary to install once, while user's threshold is than relatively low, without setting protection subregionIt is convenient, flexible Deng complicated setting.
Brief description of the drawings
Fig. 1 is fdisk gap Backup and Restore overall construction drawing.
Embodiment
The present invention will now be described in detail with reference to the accompanying drawings and examples.
This method comprises the following steps:
Step 1: Client Agent program is written in the hard disk gap of computer, deposited in the local hard drive of computerContain by defence program.
Step 2: computer starting;Self-starting strategy is used in computer, for setting Client Agent program with calculatingThe startup of operating system in machine and start, and the self-starting strategy is not by computer user and other software intervention.
Step 3: operation Client Agent program, performs hard disk data protection and recovery;Quilt is stored using backup serverDefence program.
Agent runs and checks connection status, Agent starts first thread and the second thread, and first thread is realWhen scanning hard disk gap, the second thread reads Preservation tactics, and real-time guard file integrality.
Whether what is stored in first thread scanning hard disk gap, detection hard disk gap is wiped free of and is distorted by defence program,And it is consistent when whether detecting by the signature value of the verification file of defence program with write-in, if finding to there is hard disk gap to be tampered,The hard disk gap that is tampered is write back by defence program using not distorting of reading out again, it is ensured that the integrality in hard disk gap andCorrectness;If do not read out do not distort by defence program, download and write back to by defence program between hard disk from backup serverGap.
Second thread is read according to Preservation tactics, and to carrying out integrity measurement by defence program, detection is by defence programIt is no complete, if imperfect, downloaded from backup server by defence program, or carry out from local hard drive extensive by defence programIt is multiple.
By the integrity information of defence program described in Preservation tactics.
Step 3 is repeated, until computer shutdown.
To sum up, presently preferred embodiments of the present invention is these are only, is not intended to limit the scope of the present invention.It is allWithin the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc. should be included in the protection of the present inventionWithin the scope of.

Claims (1)

CN201510969188.5A2015-12-222015-12-22A kind of data recovery and backup method based on hard disk gapPendingCN107066345A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201510969188.5ACN107066345A (en)2015-12-222015-12-22A kind of data recovery and backup method based on hard disk gap

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201510969188.5ACN107066345A (en)2015-12-222015-12-22A kind of data recovery and backup method based on hard disk gap

Publications (1)

Publication NumberPublication Date
CN107066345Atrue CN107066345A (en)2017-08-18

Family

ID=59599388

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201510969188.5APendingCN107066345A (en)2015-12-222015-12-22A kind of data recovery and backup method based on hard disk gap

Country Status (1)

CountryLink
CN (1)CN107066345A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113178212A (en)*2021-04-292021-07-27枣庄市晓光科技咨询服务有限公司Hard disk data storage management system and special data storage equipment thereof

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20020037610A (en)*2000-11-152002-05-22조영수A process for Backup and recovery of Computer Marddisk
US20020194535A1 (en)*2000-05-192002-12-19Kenneth LargmanBackup of a computer
CN1952885A (en)*2005-10-192007-04-25联想(北京)有限公司A computer system and method to check completely
CN102024114A (en)*2011-01-142011-04-20上海交通大学Malicious code prevention method based on unified extensible fixed interface
CN102262574A (en)*2011-06-202011-11-30奇智软件(北京)有限公司 Operating system startup protection method and device
CN104573417A (en)*2014-09-102015-04-29中电科技(北京)有限公司UEFI (Unified Extensible Firmware Interface)-based software whole-process protection system and UEFI-based software whole-process protection method
CN104573500A (en)*2014-09-102015-04-29中电科技(北京)有限公司UEFI (Unified Extensible Firmware Interface)-based software real-time protection system and UEFI-based software real-time protection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020194535A1 (en)*2000-05-192002-12-19Kenneth LargmanBackup of a computer
KR20020037610A (en)*2000-11-152002-05-22조영수A process for Backup and recovery of Computer Marddisk
CN1952885A (en)*2005-10-192007-04-25联想(北京)有限公司A computer system and method to check completely
CN102024114A (en)*2011-01-142011-04-20上海交通大学Malicious code prevention method based on unified extensible fixed interface
CN102262574A (en)*2011-06-202011-11-30奇智软件(北京)有限公司 Operating system startup protection method and device
CN104573417A (en)*2014-09-102015-04-29中电科技(北京)有限公司UEFI (Unified Extensible Firmware Interface)-based software whole-process protection system and UEFI-based software whole-process protection method
CN104573500A (en)*2014-09-102015-04-29中电科技(北京)有限公司UEFI (Unified Extensible Firmware Interface)-based software real-time protection system and UEFI-based software real-time protection method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113178212A (en)*2021-04-292021-07-27枣庄市晓光科技咨询服务有限公司Hard disk data storage management system and special data storage equipment thereof

Similar Documents

PublicationPublication DateTitle
US7540027B2 (en)Method/system to speed up antivirus scans using a journal file system
JP6342339B2 (en) Electronic device, MBR restoration method, and computer-readable recording medium
CN104932965B (en)Object method for real-time monitoring and device
US9983987B2 (en)Method, apparatus, and device for locating a software failure
CN101593083A (en)Device, computing machine and method that computer profile is protected and recovered
US20070240216A1 (en)Hypervisor area for email virus testing
CN113409881B (en)Flash memory erasure interrupt recovery test method and device, electronic equipment and storage medium
SteelWindows forensics: The field guide for conducting corporate computer investigations
CN105549985A (en)Method and system for enhancing reliability of Linux application system
US20070143591A1 (en)Method for non-destructive restoration of a corrupted operating system
CN111813748B (en)File system mounting method and device, electronic equipment and storage medium
TW434478B (en)Method for testing the integrity of software pre-installed in a computer hard disk
US20110179264A1 (en)Clearing Secure System Resources In A Computing Device
CN102142066A (en)Computing equipment and backup recovery method thereof
JP6128388B2 (en) Information processing device
US8776232B2 (en)Controller capable of preventing spread of computer viruses and storage system and method thereof
CN107066345A (en)A kind of data recovery and backup method based on hard disk gap
KR101393034B1 (en)Apparatus and method for restoring system
Tomer et al.Data recovery in Forensics
CN103677875A (en)Method for starting electronic equipment, method for controlling permission and electronic equipment
KR101116053B1 (en)File Backup Method and devices using the same
CN103955412A (en)Computer hard disc data recovering equipment and method
KR100300584B1 (en)Method for recovering environment of computer system
JP2006344113A (en) Security apparatus and security method for information processing apparatus
CN102236748A (en)Computer software protection method

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WD01Invention patent application deemed withdrawn after publication
WD01Invention patent application deemed withdrawn after publication

Application publication date:20170818


[8]ページ先頭

©2009-2025 Movatter.jp