End-to-end data protection method and system

文档序号:1799013 发布日期:2021-11-05 浏览:22次 中文

阅读说明:本技术 一种端到端数据保护方法和系统 (End-to-end data protection method and system ) 是由 罗会龙 于 2021-07-21 设计创作,主要内容包括:本发明公开了一种端到端数据保护方法和系统。其中,所述方法包括:通过数据写入和读出以及对比方式,扫描随机存取存储器各个存储单元中是否存在数据损坏的存储单元得到数据扫描结果,和根据该数据扫描结果,对存在数据损坏的存储单元进行重新映射,以及对经该存在数据损坏的存储单元进行重新映射后的存储单元执行正常的数据写入和读出的流程。通过上述方式,能够实现提高随机存取存储器的使用寿命和提高随机存取存储器端到端数据的安全。(The invention discloses an end-to-end data protection method and system. Wherein the method comprises the following steps: the method comprises the steps of scanning whether a storage unit with data damage exists in each storage unit of the random access memory or not to obtain a data scanning result through data writing, reading and comparing modes, remapping the storage unit with the data damage according to the data scanning result, and executing normal data writing and reading processes on the storage unit which is remapped through the storage unit with the data damage. By the method, the service life of the random access memory can be prolonged, and the end-to-end data safety of the random access memory can be improved.)

1. An end-to-end data protection method, comprising:

scanning whether a storage unit with data damage exists in each storage unit of the random access memory to obtain a data scanning result in a data writing, reading and comparing mode;

remapping the storage unit with data damage according to the data scanning result;

and executing normal data writing and reading processes on the memory cell after the memory cell with data damage is remapped.

2. The end-to-end data protection method of claim 1, wherein the scanning whether there is a storage unit with data corruption in each storage unit of the random access memory by data writing and reading and comparing to obtain the data scanning result comprises:

and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not to obtain a data scanning result in a mode of writing data into each storage unit and reading the data and comparing the written data with the read data.

3. The end-to-end data protection method of claim 1, wherein the remapping storage locations with data corruption according to the data scan result comprises:

and marking the storage units with data damage according to the data scanning result, generating a data damage storage unit index, and remapping the storage units with data damage according to the data damage storage unit index.

4. The end-to-end data protection method of claim 1, wherein the normal data writing and reading processes performed on the memory cell remapped by the memory cell with data corruption include:

and when the storage unit with data damage is found by executing a normal data writing process on the storage unit with data damage subjected to remapping, writing corresponding data into a reserved storage area according to the mapping table subjected to remapping association after writing, and when the storage unit with data damage is found by executing a normal data reading process, reading the corresponding data from the reserved storage area according to the mapping table subjected to remapping association and replacing the corresponding data according to the mapping table subjected to remapping association after reading.

5. The end-to-end data protection method of claim 1, wherein after the normal data writing and reading process is performed on the memory cell remapped by the memory cell with data damage, the method further comprises:

and managing the storage unit with data damage in the normal data writing and reading process of the storage unit which is remapped and has data damage.

6. An end-to-end data protection system, comprising:

a scanner, a mapper, and an actuator;

the scanner is used for scanning whether the storage units of the random access memory with data damage exist in each storage unit through data writing, reading and comparing modes to obtain a data scanning result;

the mapper is used for remapping the storage unit with data damage according to the data scanning result;

and the executor is used for executing normal data writing and reading processes on the storage unit subjected to remapping by the storage unit with data damage.

7. The end-to-end data protection system of claim 6, wherein the scanner is specifically configured to:

and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not to obtain a data scanning result in a mode of writing data into each storage unit and reading the data and comparing the written data with the read data.

8. The end-to-end data protection system of claim 6, wherein the mapper is specifically configured to:

and marking the storage units with data damage according to the data scanning result, generating a data damage storage unit index, and remapping the storage units with data damage according to the data damage storage unit index.

9. The end-to-end data protection system of claim 6, wherein the enforcer is specifically configured to:

and when the storage unit with data damage is found by executing a normal data writing process on the storage unit with data damage subjected to remapping, writing corresponding data into a reserved storage area according to the mapping table for remapping association after writing, and when the storage unit with data damage is found by executing a normal data reading process, reading the corresponding data from the reserved storage area according to the mapping table for remapping association and replacing the corresponding data according to the mapping table for remapping association after reading.

10. The end-to-end data protection system of claim 6, further comprising:

a manager; and the manager is used for managing the storage unit with data damage in the process of executing normal data writing and reading on the storage unit subjected to remapping by the storage unit with data damage.

Technical Field

The present invention relates to the field of end-to-end data protection technologies, and in particular, to a method and a system for end-to-end data protection.

Background

In the existing end-to-end data protection system, the service life of the random access memory is reduced and the safety of end-to-end data of the random access memory is reduced because the random access memory often has progressive unit defects or partial unit defects.

Disclosure of Invention

In view of the above, the present invention provides an end-to-end data protection method and system, which can improve the service life of a random access memory and improve the end-to-end data security of the random access memory.

According to an aspect of the present invention, there is provided an end-to-end data protection method, including: scanning whether a storage unit with data damage exists in each storage unit of the random access memory to obtain a data scanning result in a data writing, reading and comparing mode; remapping the storage unit with data damage according to the data scanning result; and executing normal data writing and reading processes on the memory cell after the memory cell with data damage is remapped.

Wherein, through data write in and read out and contrast mode, whether there is the memory cell of data corruption in the every memory cell of scanning random access memory obtains the data scanning result, includes: and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not to obtain a data scanning result in a mode of writing data into each storage unit and reading the data and comparing the written data with the read data.

Wherein, the remapping the memory location with data corruption according to the data scanning result comprises: and marking the storage units with data damage according to the data scanning result, generating a data damage storage unit index, and remapping the storage units with data damage according to the data damage storage unit index.

Wherein, the process of executing normal data writing and reading to the memory cell after remapping the memory cell with data damage includes: and when the storage unit with data damage is found by executing a normal data writing process on the storage unit with data damage subjected to remapping, writing corresponding data into a reserved storage area according to the mapping table subjected to remapping association after writing, and when the storage unit with data damage is found by executing a normal data reading process, reading the corresponding data from the reserved storage area according to the mapping table subjected to remapping association and replacing the corresponding data according to the mapping table subjected to remapping association after reading.

After the normal data writing and reading processes are executed on the memory cell remapped by the memory cell with data damage, the method further includes: and managing the storage unit with data damage in the normal data writing and reading process of the storage unit which is remapped and has data damage.

According to another aspect of the present invention, there is provided an end-to-end data protection system comprising: a scanner, a mapper, and an actuator; the scanner is used for scanning whether the storage units of the random access memory with data damage exist in each storage unit through data writing, reading and comparing modes to obtain a data scanning result; the mapper is used for remapping the storage unit with data damage according to the data scanning result; and the executor is used for executing normal data writing and reading processes on the storage unit subjected to remapping by the storage unit with data damage.

Wherein, the scanner is specifically configured to: and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not to obtain a data scanning result in a mode of writing data into each storage unit and reading the data and comparing the written data with the read data.

Wherein the mapper is specifically configured to: and marking the storage units with data damage according to the data scanning result, generating a data damage storage unit index, and remapping the storage units with data damage according to the data damage storage unit index.

Wherein, the executor is specifically used for: and when the storage unit with data damage is found by executing a normal data writing process on the storage unit with data damage subjected to remapping, writing corresponding data into a reserved storage area according to the mapping table for remapping association after writing, and when the storage unit with data damage is found by executing a normal data reading process, reading the corresponding data from the reserved storage area according to the mapping table for remapping association and replacing the corresponding data according to the mapping table for remapping association after reading.

Wherein, the end-to-end data protection system further comprises: a manager; and the manager is used for managing the storage unit with data damage in the process of executing normal data writing and reading on the storage unit subjected to remapping by the storage unit with data damage.

It can be found that, according to the above scheme, whether the storage unit with data damage exists in each storage unit of the random access memory can be scanned through data writing, reading and comparing modes to obtain a data scanning result, the storage unit with data damage can be remapped according to the data scanning result, and the normal data writing and reading processes can be executed on the storage unit which is remapped by the storage unit with data damage, so that the service life of the random access memory can be prolonged, and the end-to-end data security of the random access memory can be improved.

Furthermore, the above scheme can scan the storage unit of the random access memory whether the data is damaged in each storage unit of the random access memory to obtain the data scanning result by writing and reading the data in each storage unit and comparing the written data with the read data, which has the advantage of being able to realize that the storage unit of the random access memory whether the data is damaged in each storage unit of the random access memory is conveniently scanned by fully utilizing each storage unit of the random access memory to write and read the data and comparing the data.

Furthermore, according to the above scheme, the storage units with data corruption can be marked and the data corruption storage unit index can be generated according to the data scanning result, and the storage units with data corruption can be remapped according to the data corruption storage unit index, so that the service life of the random access memory can be prolonged by remapping the storage units with data corruption in the random access memory.

Further, according to the above scheme, when the storage unit with data damage is found by performing a normal data writing process on the storage unit with data damage through the remapping, the corresponding data is written into the reserved storage area according to the mapping table with remapping association after writing, and when the storage unit with data damage is found by performing a normal data reading process, the corresponding data is read out from the reserved storage area and replaced according to the mapping table with remapping association after reading, so that the advantage of improving the security of end-to-end data of the random access memory can be realized.

Furthermore, the above scheme can manage the data-damaged memory cells existing in the normal data writing and reading process of the memory cells remapped by the data-damaged memory cells, which has the advantages of further prolonging the service life of the random access memory and further improving the end-to-end data security of the random access memory.

Drawings

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.

FIG. 1 is a flow diagram illustrating an embodiment of an end-to-end data protection method of the present invention;

FIG. 2 is a flow chart illustrating another embodiment of an end-to-end data protection method of the present invention;

FIG. 3 is a schematic diagram illustrating another embodiment of an end-to-end data protection method according to the present invention;

FIG. 4 is another exemplary diagram of another embodiment of an end-to-end data protection method of the present invention;

FIG. 5 is a block diagram illustrating an embodiment of an end-to-end data protection system according to the present invention;

fig. 6 is a schematic structural diagram of another embodiment of the end-to-end data protection system of the present invention.

Detailed Description

The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be noted that the following examples are only illustrative of the present invention, and do not limit the scope of the present invention. Similarly, the following examples are only some but not all examples of the present invention, and all other examples obtained by those skilled in the art without any inventive work are within the scope of the present invention.

The invention provides an end-to-end data protection method, which can prolong the service life of a random access memory and improve the safety of end-to-end data of the random access memory.

Referring to fig. 1, fig. 1 is a flow chart illustrating an embodiment of an end-to-end data protection method according to the present invention. It should be noted that the method of the present invention is not limited to the flow sequence shown in fig. 1 if the results are substantially the same. As shown in fig. 1, the method comprises the steps of:

s101: and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not by data writing, reading and comparing to obtain a data scanning result.

The scanning, through data writing, reading and comparing, whether there is a storage unit with data corruption in each storage unit of the random access memory to obtain a data scanning result may include:

the method has the advantages that the data can be written into and read out from each storage unit of the random access memory and compared to conveniently scan out the storage unit of the random access memory with data damage.

In this embodiment, through data writing, reading and comparing, the data scanning result may be obtained by scanning in a forward direction whether the storage unit of the random access memory in which the data is damaged exists or not, or the data scanning result may be obtained by scanning in a reverse direction whether the storage unit of the random access memory in which the data is damaged exists or not, and the invention is not limited thereto.

S102: and remapping the storage unit with data damage according to the data scanning result.

The remapping the memory location with data corruption according to the data scanning result may include:

the method has the advantages that the service life of the random access memory can be prolonged by remapping the storage units with data damage in the random access memory.

In this embodiment, the mapping format for remapping the storage unit with data corruption can be expressed as [ bad unit: the replacement unit may also represent a mapping format for remapping a storage unit with data corruption in other manners, and the present invention is not limited thereto.

S103: and executing normal data writing and reading processes on the memory cell subjected to remapping by the memory cell with data damage.

The process of performing normal data writing and reading on the memory cell remapped by the memory cell with data damage may include:

when the storage unit with data damage is found by executing the normal data writing process on the storage unit with data damage subjected to remapping, the corresponding data is written into the reserved storage area according to the mapping table with remapping association after writing, and when the storage unit with data damage is found by executing the normal data reading process, the corresponding data is read from the reserved storage area and replaced according to the mapping table with remapping association after reading.

After the normal data writing and reading processes are performed on the memory cell remapped by the memory cell with data damage, the method may further include:

the management of the data-damaged memory cells in the normal data writing and reading process of the memory cells remapped by the data-damaged memory cells has the advantages of further prolonging the service life of the random access memory and further improving the end-to-end data security of the random access memory.

It can be found that, in this embodiment, whether a storage unit with data damage exists in each storage unit of the random access memory may be scanned by data writing, reading and comparing ways to obtain a data scanning result, and the storage unit with data damage may be remapped according to the data scanning result, and a normal data writing and reading process may be performed on the storage unit with data damage remapped, so that the service life of the random access memory may be prolonged and the security of end-to-end data of the random access memory may be improved.

Furthermore, in this embodiment, the data scanning result can be obtained by scanning the storage unit of the random access memory, which has data corruption in each storage unit, through the way of writing data into each storage unit and reading data out, and comparing the written data with the read data.

Further, in this embodiment, the storage units with data corruption may be marked and generated according to the data scanning result, and the storage units with data corruption may be remapped according to the data corruption storage unit index, which is advantageous in that the service life of the random access memory may be prolonged by remapping the storage units with data corruption in the random access memory.

Further, in this embodiment, when the storage unit remapped by the storage unit with data damage performs a normal data writing process to find the storage unit with data damage, the corresponding data is written into the reserved storage area according to the mapping table remapped in association after writing is completed, and when the storage unit with data damage is found by performing a normal data reading process, the corresponding data is read out from the reserved storage area and replaced according to the mapping table remapped in association after reading is completed.

Referring to fig. 2, fig. 2 is a flow chart illustrating another embodiment of the end-to-end data protection method according to the present invention.

In this embodiment, the method includes the steps of:

s201: and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not by data writing, reading and comparing to obtain a data scanning result.

As described above in S101, further description is omitted here.

S202: and remapping the storage unit with data damage according to the data scanning result.

As described above in S102, further description is omitted here.

S203: and executing normal data writing and reading processes on the memory cell subjected to remapping by the memory cell with data damage.

As described above in S103, which is not described herein.

S204: and managing the data-damaged storage units in the normal data writing and reading process of the storage units subjected to remapping by the data-damaged storage units.

It can be seen that, in this embodiment, the data-corrupted memory cells existing in the normal data writing and reading process performed by the memory cells remapped by the data-corrupted memory cells can be managed, which has the advantages of further prolonging the service life of the random access memory and further improving the end-to-end data security of the random access memory.

The present embodiment is illustrated below:

referring to fig. 3 and fig. 4, fig. 3 is a schematic diagram illustrating another embodiment of an end-to-end data protection method according to the present invention, and fig. 4 is a schematic diagram illustrating another embodiment of an end-to-end data protection method according to the present invention.

As shown in fig. 3, taking an example of writing and reading each memory cell (the size of the memory cell is 33+3 bytes in this example) of the random access memory by using a positive direction of data (0 x5A is used in this example, and other data can be actually written), then comparing the written data with the read data, determining whether there is a memory cell with data corruption, if there is a memory cell with data corruption, marking the memory cell (in this example, writing 0x5A, reading 0x58 error, and adding a mark of 0x0205 occurs), integrating the data corruption memory cell marked after scanning after marking the data corruption memory cell, generating a bad cell index, and then remapping the random access memory by using the data corruption memory cell index, for example, the remapping format may be [ bad cell: alternate cell), the example shown error may generate [ 0x 0205: 0x 000B), the service life of the random access memory can be prolonged, and the end-to-end data security of the random access memory can be improved.

As shown in fig. 4, taking as an example that each cell (for example, cell size 33+3 bytes) of the random access memory is written and read by using the reverse direction of data (for example, 0xA5 is used, actual data is bit-inverted for the example data of fig. 3), then the written data is compared with the read data to determine whether there is a data-corrupted cell, if so, the data-corrupted cell is marked (for example, one of write 0xA5, read 0xAD error, and add a mark of 0x0008), the data-corrupted cell is marked and then the data-corrupted cell marked after scanning is integrated, and a bad cell index is generated, and then the random access memory is remapped by using the data-corrupted cell index, for example, the remap format may be [ bad cell: and (4) replacing a unit), wherein the error shown by example can be generated to be 0x0008:0x010B, so that the service life of the random access memory can be prolonged, and the end-to-end data security of the random access memory can be improved.

As shown in fig. 3 and 4, the ratio of [ 0x 0205: 0x000B ] with [ 0x0008:0x 010B), or may form mapping tables in other manners, and the invention is not limited thereto.

The invention also provides an end-to-end data protection system which can prolong the service life of the random access memory and improve the safety of the end-to-end data of the random access memory.

Referring to fig. 5, fig. 5 is a schematic structural diagram of an embodiment of an end-to-end data protection system according to the present invention. In this embodiment, the end-to-end data protection system 50 includes a scanner 51, a mapper 52, and an executor 53.

The scanner 51 is used for scanning whether the storage unit with data damage exists in each storage unit of the random access memory to obtain a data scanning result through data writing and reading and a comparison mode.

The mapper 52 is used to remap the memory location with data corruption according to the data scanning result.

The executor 53 is configured to perform normal data writing and reading processes on the memory cell remapped by the memory cell with data corruption.

Optionally, the scanner 51 may be specifically configured to:

and scanning whether the storage units with damaged data exist in each storage unit of the random access memory or not to obtain a data scanning result in a mode of writing data into each storage unit and reading the data and comparing the written data with the read data.

Optionally, the mapper 52 may be specifically configured to:

and marking the storage units with data damage according to the data scanning result, generating a data damage storage unit index, and remapping the storage units with data damage according to the data damage storage unit index.

Alternatively, the actuator 53 may be specifically configured to:

and when the storage unit with data damage is found by executing a normal data writing process on the storage unit with data damage subjected to remapping, writing corresponding data into a reserved storage area according to the mapping table for remapping association after writing, and when the storage unit with data damage is found by executing a normal data reading process, reading the corresponding data from the reserved storage area according to the mapping table for remapping association after reading.

Referring to fig. 6, fig. 6 is a schematic structural diagram of another embodiment of the end-to-end data protection system according to the present invention. Unlike the previous embodiment, the end-to-end data protection system 60 of the present embodiment further includes a manager 61.

The manager 61 is configured to manage the data-corrupted memory cells in the normal data writing and reading process performed on the memory cells remapped by the data-corrupted memory cells.

Each unit module of the end-to-end data protection system 50/60 can respectively execute the corresponding steps in the above method embodiments, and therefore, the detailed description of each unit module is omitted here, and please refer to the description of the corresponding steps above.

It can be found that, according to the above scheme, whether the storage unit with data damage exists in each storage unit of the random access memory can be scanned through data writing, reading and comparing modes to obtain a data scanning result, the storage unit with data damage can be remapped according to the data scanning result, and the normal data writing and reading processes can be executed on the storage unit which is remapped by the storage unit with data damage, so that the service life of the random access memory can be prolonged, and the end-to-end data security of the random access memory can be improved.

Furthermore, the above scheme can scan the storage unit of the random access memory whether the data is damaged in each storage unit of the random access memory to obtain the data scanning result by writing and reading the data in each storage unit and comparing the written data with the read data, which has the advantage of being able to realize that the storage unit of the random access memory whether the data is damaged in each storage unit of the random access memory is conveniently scanned by fully utilizing each storage unit of the random access memory to write and read the data and comparing the data.

Furthermore, according to the above scheme, the storage units with data corruption can be marked and the data corruption storage unit index can be generated according to the data scanning result, and the storage units with data corruption can be remapped according to the data corruption storage unit index, so that the service life of the random access memory can be prolonged by remapping the storage units with data corruption in the random access memory.

Further, according to the above scheme, when the storage unit with data damage is found by performing a normal data writing process on the storage unit with data damage through the remapping, the corresponding data is written into the reserved storage area according to the mapping table with remapping association after writing, and when the storage unit with data damage is found by performing a normal data reading process, the corresponding data is read out from the reserved storage area and replaced according to the mapping table with remapping association after reading, so that the advantage of improving the security of end-to-end data of the random access memory can be realized.

Furthermore, the above scheme can manage the data-damaged memory cells existing in the normal data writing and reading process of the memory cells remapped by the data-damaged memory cells, which has the advantages of further prolonging the service life of the random access memory and further improving the end-to-end data security of the random access memory.

In the several embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a module or a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.

Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.

In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.

The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially implemented in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), an end-to-end data protection system (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

The above description is only a part of the embodiments of the present invention, and not intended to limit the scope of the present invention, and all equivalent devices or equivalent processes performed by the present invention through the contents of the specification and the drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

13页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种电子设备的USB接口可信管理方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类