Method and device for achieving data protection
A data protection and data technology, which is applied in the direction of data error detection, response error generation, input/output to record carrier, etc., which can solve the problems of incorrect backup data, inability to monitor changes, and repeated copying. And other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0057] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.
[0058] figure 1 A flow chart of the method for realizing data protection in the present invention, such as figure 1 shown, including:
[0059] Step 101: When an IO request is intercepted, extract the information of the IO request, and judge whether the data of the IO request is valid data according to the extracted information of the IO request; wherein, the IO request includes the information of the IO request and the data of the IO request.
[0060] Wherein, the information of the IO request includes: write disk device object, disk sector offset, write data length, data b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com