DYNAMIC DATA RECOVERY

Written by itongtong517

What is Dynamic Disk? 

The Dynamic Disk is a physical disk that manages its volumes through the use of LDM data. And what is LDM database? LDM is short of Logical Disk Manager, and it can be hidden database which dimension is 1MB after the Dynamic Disk. The 1MB space records every piece of information on the volumes on one disk, as well as holds some related info on each dynamic disk. Such as Drive letter, volume label, the begin section of volume, volume size, the file system of volume, along with the current dynamic disk is which is and so on.

REMOTE DISASTER DATA RECOVERY METHOD

Disaster recovery generally refers to a plan or strategy for duplicating computer operations, for instance, of a company, wherein copies of a volume or volumes of computer data and/or software of a primary location are established at a remote location thereby providing a redundant measure of protection in the event of a disruption of operations at the primary location. Disaster recovery thereby allows a company to resume operations in the re- mote location within days as opposed to, in certain instance, a permanent loss in certain aspects of the company’s information infrastructure.

uMacsoft data recovery

Disaster recovery systems appearing in the art provide companies with the ability to create remote backup copies of a volume or volumes of data and/or software. The information necessary to create the backup copies at the remote location is typically communicated to a remote server connected to a client computer over a communications network. Data recovery similarly entails receiving data over the communications network. Systems providing disaster recovery in this fashion, however, have numerous shortcomings with respect to creating backup copies of a volume or volumes having relatively large quantities of data and/or software. For instance, a large data trans- fer may increase network traffic and thereby consume a large portion of the network’s capacity sufficient to slow the company’s operations during the transfer. For example, creating a remote backup copy for a server computer having 100 gigabytes of data stored thereon over a company’s network with multiple TI data transfer capability will tie up the company’s network for months. This is particularly problematic for companies operating around the clock that may not otherwise limit data transfer to off-peak hours and companies having networks with limited bandwidth. There is therefore a need for remote disaster recovery systems and methods having a reduced impact with regard to network traffic over a company’s network.

A disaster recovery volume is generally created at a local archival storage unit including therein at least one storage medium constituting the disaster recovery volume. The medium constituting the disaster recovery volume is associated with the primary volume thereby allowing the storage medium constituting the disaster recovery volume to be re- located to a remote archival storage unit at a re- mote location without compromising the association between the primary volume and the disaster recovery volume.

A disaster recovery computer system comprising at least one computer having programming associated therewith, the at least one computer communicatively connected to at least one lo- cal archival storage unit and at least one remote archival storage unit, wherein the computer programming when executed provides data transfer and control capability to create at the local archival storage unit a disaster recovery volume of a primary volume on at least one storage medium, which storage medium constitutes the disaster recovery volume, the computer programming associates the storage medium constituting the disaster recovery volume with the primary volume thereby allowing the storage medium to be relocated to a remote location without compromising the association between the primary volume and the disaster recovery volume.

The method of creating a disaster recovery volume may include the steps of identifying incremental changes to the primary volume, packaging data representing incremental changes to the primary volume, and communicating the pack-aged data over a communications network to the remote storage unit at a remote location. The step of packaging data representing incremental changes to the primary volume may include compressing the data representing incremental changes to the primary volume. The incremental changes to the primary volume may then be incorporated into the disaster recovery volume re- located to the remote location. The incremental changes to the primary volume may be identified in connection with at least one snapshot image of the primary volume. The disaster recovery volume of a primary volume may be made from at least one copy selected from the group consisting of a backup volume of the primary volume, a quick recovery volume of the primary volume, and a snapshot image of the primary volume.

DATA PROTECTION AND RECOVERY

A protected data file currently in use is duplicated as an authentic backup file, while changing the current file’s data appearance and separating the location of the authentic backup file from the original and current file, to camouflage its identity from an unauthorized intruder intending to modify or destroy the original file. A series of indicate is generated and stored in a recovery address group or file. The indicate represent the original current file and is used to reconstruct the authentic backup file and to write a restored file into the current protected data file. The recovery process may be initiated on a schedule or whenever the original current file is accessed or whenever an unauthorized use of the current file is detected and a comparison of the authentic backup file indicates the original current file has been modified. In this way, the authentic data saved from the original current file may be used to restore the protected data file as originally written and saved in the authentic backup.

In a data processor, a system for making an authentic backup file from an authorized protected data file, with the data in said authentic backup file translated from said authorized protected data file to camouflage the source or identity of said authentic backup file or its relationship with said authorized protected data file and with produced by said translation representing said translation, stored in a recovery address group for comparison with a test identifier produced from the cur- rent protected data file to determine if the current protected data file is the same or different from the authorized protected data file and for access and use of said recovery address group for translation of said authentic backup file to said authorized data file and restoration of said authorized protected file, comprising:

  • for translation of  an authorized protected data file to an authentic backup file; camouflaged to hide its relationship to said authorized protected data file, and for storing authentic backup file;
  • for producing an identifier from aid protected data file, and for storing authentic backup file;

Data processing protection systems have been relying on encryption, personalization such as by passwords, or by scattering of the data through a data store randomly or by strict or intelligent algorithm, the intruder, once having reached all or part of the protected data, may have modified or destroyed the data without leaving an indication of the modification or the original and authorized authentic data. While data security systems or methods may detect the intrusion and deter- mine whether the data modification or destruction was authorized, there is no method or system for safeguarding the authentic data or for verifying the data appearing in a protected file after an unauthorized intrusion is the same as the authorized data, or that an unauthorized modification has been made, or for recovery of the authentic data through an authentic backup file, or for camouflaging an authentic backup data file to hide it from access and destruction, using techniques to hide the data identity such as size change, con- tent masking using encryption, name or location change or for using these data camouflaging techniques to reassemble the original authentic data to automatically recover the data after an intrusion.

Comments are closed.