1317476 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種檔案使用情形之記錄方法與電腦可讀 取之記錄媒體,特別關於一種應用於一伺服端與一用戶端之 間’以記錄用戶端電腦資料根目錄(DIR, directory)變動之方法 與電腦可讀取之記錄媒體。 【先前技術】 於資訊科技高度發展的今日,企業與個人對資訊設備的倚 賴曰深’資訊安全順理成章地成為發展與運用電腦軟硬體的同 時最為重要的課題。缺乏資訊安全,將造成種種嚴重的後果, 舉凡資料被增刪竄改、因電腦病毒而造成與資料異常$彳。、 因電力問題錢資料錯亂,將致使電腦相關的服務:貝、或 與個人日常卫作無法進行等,無不造成企業或個企業 與不便。 重大的損失 杳处上述各種問題,大多經蚊期資料備份而得以换你 身枓備份係指於—次寫人式或多次覆,,所謂 :存裝置上所寫入之一特定資料,以供保護資既存之 =之用。資料備份的出現可滿足使用 二他特殊目 未,以便於其後對之進行各 ’、濩特疋-貝料上的愛 於實際運用上堪稱相t便利1於貝最安全防護方面的應用, :硬=若毁損的部分所儲存者為-般=所使用的储存巢 =將因驅動程式無法讀取根目錄㈣法2碟之根目錄, 的全部資料均無法讀取。由多個槽案組成载,,造成硬碟中 硬碟之情形更是如 •1317476 此’若根目錄損毁,則將造成整個磁碟無法掛載,當 讀取硬碟中的任何資料。針對上述情形,若使用者欲禮^法 所儲存之資料的完整性,一般習知的方式為於硬:處: 其他儲存裝置中另行將硬射之㈣加_期備份,以便$ 碟中所儲存之貪_硬碟毁損或其他原因遺失時, 料供使用者使用。 貝 然而定期資料備份方法仍有許多不足之處,如下所述: 1·因定期資料備份需耗費大量時間’尤其對於大型企 中型企業内含資料量魔大,則備份的動作將消耗大量的儲存空 間,造成儲存空間的浪費,同時備份的動作亦將耗費可能更長 達數十小時甚至數天的時間,衡諸成本效益實不成比例。 2.由於資料備份將佔用龐大的電腦運算資源,因此使用者 將無法同時進行其它電腦運作,造成在一般工作時間中無法進 行資料備份。 、〜3.在上一筆資料備份至下一筆資料備份之間’無法確保資 料女全’且因資料備份耗時極長而造成間隔數日才得以進行傷 ,資料’產生備份資料之數日「空窗期」。而此空窗期對於許 夕大型組織、企業、政府機關而言將成為極大的安全漏洞。5 4. 對於金融工作或研發工作而Ί*,若因檔案資料被増冊】竄 改或毀損’僅用備份資料之方法將難以作比較或評估的動作', 因而對金融工作或研發工作的進行將有許多不便之處。 5. 對於企業而言,短時間内的資料記錄影響極大, 。句止業僅—小時内其交易流量町能極大,若資料記錄完全妒 才貝將造成無法彌補的金錢及信用損失;而對從事研發創作相^ 7 017476 行業更是如此,改變全世界的研發創作可能僅 若此時資料毁财減全世界難㈣_義在_出現 %知技術中相關於資訊記錄方法係採用定期資料備份之 方式,對於現今資料備份之「空窗期」卻可能無法提供全面而 完整解決方案。因此,提供_種完善的資訊記錄方法已具有極 為迫切需求。 【發明内容】 本發月之主要目的係在於提供一種於一般工作時間即可 進行記錄電腦檔案資料使用情形之方法,避免因記錄動作佔用 大里電腦資源而造成工作上的不便。 本發月之另一目的係在於提供資料記錄之空窗期極短且 記錄耗費時間極少之電腦檔案資料使用情形記錄方法。 、本發明之又-目的係在於提供使用者檔案資料增刪鼠改 或毀:損時評估損失之方法。 本發月係關於-種檔案使用情形之記錄方法,係應用於伺 服端(Server)與用戶端(Client)之間,記錄對於用戶端電腦根目 =Ctory)之變動情形。其中飼服端係與用戶端具有訊 與用戶端往返傳輸資料。該用戶端電腦内設 案系統(FileSystem),且該用戶端電腦根目錄之變 Γ由=用戶端電腦所產生,而儲存資料根目錄之變動記錄 比對。上述方法首先自好與舊有之根目錄資料予以 ㈣_ 首先自好%傳送原始儲存資料之原始根目錄 將原始根目錄儲存於词服端,然後於用戶端定期 將先讀存資料之根目錄與目麵存料之根目錄進行資料 1317476 相 作’且將先前儲存資料根目錄與目前儲存資料根目錄之 、處進行記錄動作並產生儲存資料根目錄之變動記錄,接著 將變動記錄傳送到伺服端,最後伺服端再將變動記錄儲存。 . 此外,本發明更提供一種電腦可讀取之記錄媒體,係記錄 一具檔案使用情形之記錄方法。此檔案使用情形之記錄方法係 應用於伺服端與用戶端之間,以記錄對於用戶端電腦根目錄之 變動情形。其中伺服端係與用戶端具有訊號連接關系,並可與 用戶端往返傳輸資料。該用戶端電腦内設有一磁碟檔案系统, 鲁 且該用戶端電腦根目錄之變動記錄係由用戶端電腦所產生,而 儲存資料根目錄之變動記錄係由用戶端比對目前之根目錄資 料與舊有之根目錄資料予以比對。上述方法首先自用戶端傳送 原始儲存資料之原始根目錄至伺服端,且將原始根目錄儲存於 ' 伺服端,然後於用戶端定期將先前儲存資料之根目錄與目前儲 : 存資料之根目錄進行資料比對動作,且將先前儲存資料根目錄 . 與目前儲存資料根目錄之相異處進行記錄動作並產生儲存資 料根目錄之變動記錄,接著將變動圮錄傳送到伺服端,最後伺 服端再將變動記錄儲存。 • 由於本發明之檔案使用情形之記錄方法係記錄用戶端電 腦磁碟内儲存檔案之根目錄變動情形,故於用戶端電腦儲存檔 案資料受到異常增刪竄改或毀損時’可藉由伺服端内儲之根^ 錄異動資料用以評估損失。且無論用戶端電腦儲存磁碟之資料 檔案數目為何,均可運用此方式加以評估。而相較於備份磁碟 中所實際儲存動辄數百萬位元組以上的資料量,本發明之檀案 使用情形之記錄方法所花費的時間與所佔用之儲存空間均微 乎其微。雖若受到異常增刪竄改或毁損的部分為儲存之一般資 料,用以記錄之根目錄並無法回復該—般資料,然衡量所付出 9 Ί317476 之時間與儲存空間以及 效益。故本發明不僅可救援用戶端發^具高度成本 磁碟於工作時得,運作,並可於=確保用戶端電腦 錄磁碟之評估損失間取得平衡。 工3之使用效率與記 【實施方式】 請參閱第1圖及第2圖,第㈤ 流程圖,第2圖係為本發明—較較佳實施例 係關於-種檔案使用情形。本發明 端之間,記錄對於儲存資料係應用於伺服端與用戶 腦内設有-磁碟檔㈣、統,且制戶端電 =貝=_戶= 系統,而儲存資料之變動記錄係由用戶端比對:前之資 =二ΓΓ錄資料所產生。上述方法首先自-用;端電腦 (_内之ϋ碟⑽)將該用戶端電腦原始儲存資料之一 原始根目雜存於該第—硬碟⑽),並傳送該原純目錄至 -伺服端電腦(綱)且將該原始根目錄㈣並儲存於該飼服端 電腦(200)之一第二硬碟(220)成為一備份原始根目錄⑻〇),接 著該用戶端電腦(10 〇)將該原始根目錄與該第—硬碟(丨2 〇)内目 前儲存資料之一目前根目錄進行資料比對動作,且將該原始根 目錄與該目前根目錄之相異處進行記錄動作,進而產生該用戶 端電腦根目錄之一變動記錄(S12),且將上述變動記錄傳送到 該第二硬碟(22〇),並儲存上述變動記錄於該第二硬碟(22〇) (S14) ’接著以該目前根目錄取代於該第一硬碟(12〇)之該原始 根目錄(S16) ’而完成流程。 其中’用戶端電腦(1〇〇)傳送原始根目錄或變動記錄至伺 1317476 服端電腦(200)的具體實施方式就是通過如TCp/Ip等各種習知的網 路傳輸協定來達成資料傳輸功能。而比對於用戶端電腦内目前根 目錄與原始根目錄在習知中最簡單的具體實施方式就是比較原始根 目錄及目前根目錄兩資料位元大小,如果兩資料大小不相同,則原始 根目錄及目前根目錄通常不相同;或者,將原始根目錄及目前根目錄 兩資料分別經過同一雜湊函數(hash fUncti〇n)以產生各自的雜湊值 (hash values)再比較兩雜湊值’如果兩雜湊值不相同’則兩雜湊值的原 始輸入資料(即原始根目錄及目前根目錄)是不相同的。另外,比較原 始根目錄與目前根目錄後產生變動記錄的具體實施方式可應用 美國專利第6,377,957號說明書第8〜14頁及圖6A〜6K所揭露的記載 方式,由於原始根目錄或目前根目錄均為階層式資料,使變動記錄僅 而δ己載階層式資料節點的操作(〇perati〇n)集合,所述的操作如說明書第 8〜9 頁所列之MOV、SWP、CPY、INS、DEL、SPT、CLP、UPD。 需注意者’上述儲存裝置係以該伺服端電腦(2〇〇)之該第 一硬碟(220)為例,然實作上該第二硬碟(22〇)可以以現有之任 何儲存襞置取代之,如外接式硬碟、隨身碟等均無不可。此外, 於上述實施例中該第一硬碟(120)之該變動記錄係備份儲存於 «亥第一硬碟(12〇)以外之位置,以方便該第一硬碟(12〇)完全毁 才貝或該第一硬碟(12〇)内之該目前根目錄毁損時,便能使用儲 存於相同實體儲存裝置(即該第二硬碟(220))中之該備份原 始根目錄與該變動記錄以評估該第一硬碟(12〇)之資料損失。 然於實作上該變動記錄亦可儲存於該第二硬碟(22〇)以外之儲 存裝置’雖可能造成需攜帶儲存該變動記錄之儲存裝置的額外 負擔,然可避免該第一硬碟(12〇)及該第二硬碟(22〇)中大量資 料區塊—起毀損以致同時遺失該第一硬碟(120)之該目前根目 錄與β亥第二硬碟(22〇)内之該備份原始根目錄及該變動記錄的 11 1317476 服端再將變動記錄儲存。 综上所述,由於本發明之檔案使用情形之記錄方法係記錄 用戶端電腦磁碟内儲存檔案之根目錄變動情形,故於用戶端電 腦儲存檔案資料受到異常增刪竄改或毁損時,可藉由伺服端内 儲之根目錄異動資料用以評估損失。且無論用戶端電腦儲存磁 . 碟之資料檔案數目為何,均可運用此方式加以評估。而相較於 備份磁碟中所實際儲存動辄數百萬位元組以上的資料量,本發 -明之檔案使用情形之記錄方法所花費的時間與所佔用之儲存 Φ 空間均微乎其微。雖若受到異常增刪竄改或毀損的部分為儲存 之一般資料,用以記錄之根目錄並無法回復該一般資料,然衡 量所付出之時間與儲存空間以及所能達成之效果,本發明實具 高度成本效益。故本發明不僅可救援用戶端電腦磁碟,確保用 ' 戶端電腦磁碟於工作時得以順利運作,並可於儲存空間之使用 : 效率與記錄磁碟之評估損失間取得平衡,因此本發明極具進步 . 性及符合申請【發明】專利之要件,爰依法提出申請,祈鈞 局早日賜准專利,實感德便。 以上已將本發明做一詳細說明,惟以上所述者,僅爲本發 * 明之一較佳實施例而已,當不能限定本發明實施之範圍。即凡 依本發明申請範圍所作之均等變化與修飾等,皆應仍屬本發明 之專利涵蓋範圍内。 【圖式簡單說明】 第1圖係本發明一較佳實施例流程圖; 第2圖係本發明一較佳實施例系統架構圖。 【主要元件符號說明】 12 1317476 戶端電腦磁碟於工作時得以順利運作,並可於儲存空間之使用 效率與記錄磁碟之評估損失間取得平衡,因此本發明極具進步 性及符合申請【發明】專利之要件,爰依法提出申請,祈鈞 局早曰賜准專利,實感德便。 以上已將本發明做一詳細說明,惟以上所述者,僅爲本發 • 明之一較佳實施例而已,當不能限定本發明實施之範圍。即凡 依本發明申請範圍所作之均等變化與修飾等,皆應仍屬本發明 之專利涵蓋範圍内。 * 【圖式簡單說明】 第1圖係本發明一較佳實施例流程圖; 第2圖係本發明一較佳實施例系統架構圖。 - 【主要元件符號說明】 . S10 分別於用戶端電腦之第一硬碟與伺服端之第二硬碟儲 存用戶端電腦原始儲存資料之原始根目錄 S12 比對用戶端儲存資料之目前根目錄與原始根目錄,以 — 產生根目錄變動記錄 S14 將比對後產生之變動記錄儲存於第二硬碟 S16 以該目前根目錄取代於該第一硬碟之該原始根目錄 100 用戶端電腦 120 第一硬碟 200 伺服端電腦 220 第二硬碟 131317476 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a recording method for a file use case and a computer readable recording medium, and more particularly to a method for recording between a server and a client The method of changing the DIR (directory) of the client computer data and the recording medium readable by the computer. [Prior Art] Today, with the rapid development of information technology, enterprises and individuals rely heavily on information equipment. Information security has become the most important issue for the development and use of computer hardware and software. The lack of information security will have serious consequences, such as the addition, deletion and alteration of data, and the abnormality of data due to computer viruses. The misunderstanding of money due to power problems will result in computer-related services: Bei, or the inability to carry out personal daily work, etc., all of which cause enterprises or enterprises and inconvenience. Significant losses 杳 上述 上述 上述 上述 , , , , , , , , , 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多 大多For the protection of existing resources = use. The appearance of the data backup can satisfy the use of his special purpose, so that it can be used for the subsequent use of the ', 濩 疋 疋 贝 贝 贝 贝 贝 贝 实际 实际 实际 实际 实际 实际 实际 实际 最 最 最 最 最 最 最 最 最 最 最 最, : Hard = If the damaged part is stored as - General = The storage nest used = All the data of the root directory of the root directory (4) and 2 discs cannot be read because the driver cannot read. It consists of multiple slots, which causes the hard disk in the hard disk to be more like • 1317476. If the root directory is damaged, it will cause the entire disk to be unmountable when reading any data on the hard disk. In view of the above situation, if the user wants to complete the integrity of the data stored in the law, the conventional method is generally hard: at: other storage devices, the hard shot (4) plus _ period backup, so that the disc The greed of storage _ hard disk damage or other reasons are lost, for the user to use. However, there are still many shortcomings in the regular data backup method, as follows: 1. It takes a lot of time to back up the regular data. Especially for large enterprises, medium-sized enterprises contain huge amounts of data, the backup action will consume a lot of storage. Space, resulting in wasted storage space, while backup operations will take up to tens of hours or even days, which is disproportionately cost-effective. 2. Since data backup will occupy a large amount of computer computing resources, users will not be able to perform other computer operations at the same time, resulting in the inability to back up data during normal working hours. ~3. Between the last backup of the data and the backup of the next data, 'there is no way to ensure the data is full" and the data backup takes a very long time and the interval can be injured for several days. The data 'the number of days after the backup data is generated" Empty window period." This empty window period will become a huge security hole for large organizations, enterprises and government agencies in Xuxi. 5 4. For financial work or research and development work, if the file data is registered] tampering or damaging the 'operations that only make it difficult to compare or evaluate with the method of backing up data', the financial work or research and development work is carried out. There will be many inconveniences. 5. For companies, the short-term data record has a great impact. The sentence can only be used in the hour-hours, and if the data is completely recorded, it will cause irreparable money and credit losses. This is especially true for the R&D and creation industry. Creation may only be difficult if the data is destroyed at this time. (4) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ A comprehensive and complete solution. Therefore, there is an urgent need to provide a comprehensive information recording method. SUMMARY OF THE INVENTION The main purpose of this month is to provide a method for recording the use of computer file data during normal working hours, thereby avoiding the inconvenience of working due to the occupation of computer resources by the recording operation. Another purpose of this month is to provide a method for recording the usage of computer files using extremely short data windows with minimal data recording time. The purpose of the present invention is to provide a method for adding or deleting a user's file data to change or destroy the damage: This month is a recording method for the use case of the file, which is applied between the server (Server) and the client (Client), and records the change of the root of the client computer = Ctory). Among them, the feeding end system and the user end have the communication data transmitted by the user and the user. The client computer has a file system (FileSystem), and the root directory of the client computer is generated by the user computer, and the change record of the stored data root directory is compared. The above method firstly gives the old root directory information (4) _ first, the original root directory of the original stored data is stored in the vocabulary end, and then the root directory of the first read data is periodically The root directory of the target storage data is recorded as '1317476' and the record of the root directory of the previously stored data and the root directory of the currently stored data is recorded and the change record of the root directory of the stored data is generated, and then the change record is transmitted to the server. Finally, the server will store the change record. In addition, the present invention further provides a computer readable recording medium, which records a recording method of a file use situation. This file usage record method is applied between the server and the client to record changes to the root directory of the client computer. The servo end system has a signal connection relationship with the user end, and can transmit data to and from the user end. The client computer has a disk file system, and the change record of the root directory of the client computer is generated by the client computer, and the record of the root directory of the stored data is compared by the user to the current root directory data. Compare with the old root directory information. The above method firstly transmits the original root directory of the original stored data to the server from the client side, and stores the original root directory on the 'server side, and then periodically stores the root directory of the previously stored data with the current storage: the root directory of the stored data at the user end. Perform a data comparison operation, and record the difference between the root directory of the previously stored data and the root directory of the currently stored data and generate a change record of the root directory of the stored data, and then transmit the change record to the server, and finally the server Then store the change record. • Since the recording method of the file usage situation of the present invention records the root directory change of the file stored in the client computer disk, when the file storage data of the client computer is abnormally added, deleted, falsified or damaged, the server can be stored by the server. The root of the record is used to assess the loss. And regardless of the number of files stored on the disk of the client computer, this method can be used for evaluation. Compared with the amount of data stored in the backup disk that is actually stored in the multi-millionth byte, the recording method of the use case of the present invention takes up little time and the storage space occupied. Although the part that is subject to abnormal additions, deletions, alterations or damages is a general condition of storage, the root directory used for recording does not respond to the general information, but measures the time and storage space and benefits of 9 317 476. Therefore, the present invention not only can rescue the user terminal, but also has a high cost. The disk can be operated and operated at work, and can balance the evaluation loss of the user computer recording disk. [Embodiment] Please refer to Fig. 1 and Fig. 2, Fig. 5 (f), and Fig. 2 is a view of the present invention - a preferred embodiment. Between the ends of the present invention, the record is used for the storage data to be applied to the server and the user's brain - the disk file (four), the system, and the household computer = _ household = system, and the change record of the stored data is User-side comparison: the former capital = two records recorded. The above method is first self-use; the end computer (the inner disk (10)) stores the original root of one of the original stored data of the client computer on the first hard disk (10), and transmits the original pure directory to the -servo End the computer (the main) and store the original root directory (4) in the second hard disk (220) of one of the feeding end computer (200) to become a backup original root directory (8), and then the user computer (10 〇) And comparing the original root directory with the current root directory of one of the currently stored data in the first hard disk (丨2 〇), and recording the difference between the original root directory and the current root directory And generating a change record of the root directory of the client computer (S12), and transmitting the change record to the second hard disk (22〇), and storing the change record on the second hard disk (22〇) ( S14) 'The process is completed by replacing the original root directory (S16) of the first hard disk (12〇) with the current root directory. The specific implementation method of 'the client computer (1〇〇) transmitting the original root directory or the change record to the server 1317476 server (200) is to realize the data transmission function through various conventional network transmission protocols such as TCp/Ip. . Compared with the current root directory and the original root directory in the client computer, the simplest implementation method is to compare the original root directory and the current root directory with two data bit sizes. If the two data sizes are different, the original root directory is used. And the current root directory is usually different; or, the original root directory and the current root directory are respectively passed through the same hash function (hash fUncti〇n) to generate respective hash values and then compare the two hash values 'if two hashes The value is not the same 'the original input data of the two hash values (that is, the original root directory and the current root directory) are not the same. In addition, the specific implementation method for generating the change record after comparing the original root directory with the current root directory may be applied by the manner disclosed in the descriptions of pages 8 to 14 and FIGS. 6A to 6K of the specification of US Pat. No. 6,377,957, due to the original root directory or the current root directory. All are hierarchical data, so that the change record is only the set of operations of the hierarchical data node (〇perati〇n), such as MOV, SWP, CPY, INS listed on pages 8-9 of the manual. DEL, SPT, CLP, UPD. It should be noted that the storage device is based on the first hard disk (220) of the server (2), but the second hard disk (22) can be stored in any existing storage port. Replace it, such as external hard drives, flash drives, etc. are all indispensable. In addition, in the above embodiment, the change record of the first hard disk (120) is stored in a location other than the first hard disk (12 〇), so that the first hard disk (12 〇) is completely destroyed. When the current root directory in the first hard disk (12〇) is damaged, the original root directory of the backup stored in the same physical storage device (ie, the second hard disk (220)) can be used. The change record is used to evaluate the data loss of the first hard disk (12〇). In fact, the change record can also be stored in the storage device other than the second hard disk (22 〇). Although it may cause an additional burden of carrying the storage device storing the change record, the first hard disk can be avoided. (12〇) and the large number of data blocks in the second hard disk (22〇) are damaged, so that the current root directory of the first hard disk (120) and the second hard disk (22〇) of the second hard disk (120) are simultaneously lost. The backup original root directory and the 11 1317476 server of the change record store the change record. In summary, since the recording method of the file usage situation of the present invention records the root directory change of the file stored in the client computer disk, when the file storage data of the client computer is abnormally added, deleted, falsified or damaged, The root directory transaction data stored in the server is used to evaluate the loss. And regardless of the number of data files stored on the client computer, this method can be used to evaluate. Compared with the amount of data stored in the backup disk that is actually stored in the millions of bytes, the time taken by the recording method of the file usage case of the present invention and the occupied storage Φ space are negligible. Although the part that is subject to abnormal additions, deletions, alterations or damages is general information for storage, the root directory for recording cannot be replied to the general information, and the time and storage space and the effect achieved can be measured. Cost-effectiveness. Therefore, the present invention can not only rescue the client computer disk, but also ensure that the 'client computer disk can operate smoothly during work, and can be used in the storage space: the balance between the efficiency and the evaluation loss of the recording disk, so the present invention Great progress. Sex and conformity to the application [invention] the requirements of the patent, 提出 apply in accordance with the law, the prayer bureau will grant the patent as soon as possible, and it is really sensible. The present invention has been described in detail above, but the foregoing is only a preferred embodiment of the present invention, and is not intended to limit the scope of the invention. That is, the equivalent changes and modifications made by the scope of the present application should remain within the scope of the patent of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a flow chart of a preferred embodiment of the present invention; FIG. 2 is a system architecture diagram of a preferred embodiment of the present invention. [Description of main component symbols] 12 1317476 The computer disk of the terminal computer operates smoothly during operation, and balances the efficiency of the storage space with the evaluation loss of the recording disk. Therefore, the present invention is highly progressive and conforms to the application. Invention] The requirements of the patent, 提出 提出 提出 提出 提出 提出 提出 。 。 。 。 。 。 。 。 。 。 。 。 。 。 。 The present invention has been described in detail above, but the foregoing is only a preferred embodiment of the present invention, and is not intended to limit the scope of the invention. That is, the equivalent changes and modifications made by the scope of the present application should remain within the scope of the patent of the present invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a flow chart of a preferred embodiment of the present invention; FIG. 2 is a system architecture diagram of a preferred embodiment of the present invention. - [Main component symbol description] . S10 compares the first root directory of the client computer with the second hard disk of the server to store the original root directory S12 of the original storage data of the client computer, and compares the current root directory of the data stored by the client. The original root directory, the root directory change record S14 is generated, and the change record generated after the comparison is stored in the second hard disk S16, and the current root directory is replaced by the original root directory of the first hard disk. One hard disk 200 server computer 220 second hard disk 13