CN104408380A - A method for a mass data secure storage technology - Google Patents
A method for a mass data secure storage technology Download PDFInfo
- Publication number
- CN104408380A CN104408380A CN201410550030.XA CN201410550030A CN104408380A CN 104408380 A CN104408380 A CN 104408380A CN 201410550030 A CN201410550030 A CN 201410550030A CN 104408380 A CN104408380 A CN 104408380A
- Authority
- CN
- China
- Prior art keywords
- data
- code
- encrypted
- mass data
- codes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
Abstract
The invention discloses a method for a mass data secure storage technology, and relates to the technical field of data secure storage. The method comprises steps of: storing separately data automatically by an option; compressing data respectively separated; performing a multi-encryption on compressed data; authenticating an identity; authenticating an authentication code by several cellphones at the same time; authenticating a password; converting an encrypted file into codes; uploading the codes to a server. The codes are highly encrypted by multiple ways, so that security of data is ensured, the disk space is saved by a conversion of data to codes, and the storage capacity is improved.
Description
Technical field:
The present invention relates to data security technical field of memory, be specifically related to a kind of method of mass data secure memory techniques.
Background technology:
Data are most crucial assets, and storage system, as the shelf space of data, is the last line of defense of data protection; Along with storage system is direct-connected towards networking and distributed future development by this locality, and shared by the numerous computing machines on network, storage system is become and is more vulnerable to attack, the storage system of relative quiescent often becomes the preferred object of assailant, reaches the object stealing, distort or destroy data.Storage security becomes most important, and safe storage mainly comprises storage security technology, data de-duplication technology, data backup and disaster recovery techniques etc.
On the memory device of various application system, the mode that information is just storing with data grows at top speed, and constantly advances the process of global IT application.The thing followed is that the demand of ultrahigh-density data storage constantly increases.Although the memory capacity of file server and database server is in continuous expansion, though or space can be encountered be doubled and redoubled, user still can complain the situation of off-capacity, and also user, to the continuous increase of memory space requirements, promotes the continuous change of ultrahigh-density data storage technology just.
Along with improving constantly of surveying instrument precision and actual demand index, the speed goes of data transmission is fast, data volume is also increasing, and most of data acquisition system (DAS), such as radar echo signal data acquisition, the collection etc. of digital video signal transacting and high code check satellite information signal, all require to carry out real-time transmission and storage to data, this is just to the acquisition rate of data acquisition and memory system, transmission speed, storage speed, have higher requirement in the aspects such as the reliability that memory capacity and data store, therefore, the research of high speed mass data storage technology is just seemed important all the more.
A supplementary storage for vast capacity, describes the huge of its memory capacity by magnanimity.Disk scheduling should be write as a standalone module in operating system, and disk scheduling should be write as a standalone module in operating system, allows when being necessary to replace with different algorithms.Allow when wanting to replace with different algorithms.Disk unit addresses with the form of the large array of a kind of one dimension of logical block, and disk unit addresses with the form of the large array of a kind of one dimension of logical block, and logical block is here the least unit of transmission.Logical block be transmission least unit.
Along with the development of infotech, mobile memory medium is used widely at message area.Mobile memory medium uses flexible, convenient, it is made to be popularized rapidly in the informationalized process of Government and enterprise, increasing sensitive information, secret data and archives material are stored in mobile memory medium, and this brings sizable potential safety hazard to Government and enterprise information resources.
Summary of the invention:
The object of this invention is to provide a kind of method of mass data secure memory techniques, it is encrypted by multiple form height, ensure that the security of data, has saved disk space, improve memory space by the conversion of data and code.
In order to solve the problem existing for background technology, the present invention is by the following technical solutions: it comprises following steps: 1, automatically data separately stored by option;
2, the data of separating separately are compressed;
3, multi-enciphering is carried out to the data after compression;
31, authentication;
32, by several mobile phone simultaneous verification identifying code;
33, password authentification;
4, encrypt file is converted to code;
5, upload code is to server;
When the present invention operates, by the Various types of data input computing machine needing to store, computing machine according to different options by all Data classifications, sorted data automatic pressing shortens compressed package into, first authentication is passed through when being encrypted each compressed package, verify to several different cell-phone number at transmission identifying code, be encrypted confirmation finally by different passwords, the compressed package after encrypted is converted to code (memory space of code is little) by switching software and is uploaded onto the server by code.
The present invention ensure that security by multiple-enciphered protection, then data and code is changed by software, has so greatly saved storage space.
The present invention has following beneficial effect: it is encrypted by multiple form height, ensure that the security of data, has saved disk space, improve memory space by the conversion of data and code.
Embodiment:
This embodiment is by the following technical solutions: it comprises following steps: 1, automatically data separately stored by option;
2, the data of separating separately are compressed;
3, multi-enciphering is carried out to the data after compression;
31, authentication;
32, by several mobile phone simultaneous verification identifying code;
33, password authentification;
4, encrypt file is converted to code;
5, upload code is to server;
During the operation of this embodiment, by the Various types of data input computing machine needing to store, computing machine according to different options by all Data classifications, sorted data automatic pressing shortens compressed package into, first authentication is passed through when being encrypted each compressed package, verify to several different cell-phone number at transmission identifying code, be encrypted confirmation finally by different passwords, the compressed package after encrypted is converted to code (memory space of code is little) by switching software and is uploaded onto the server by code.
This embodiment ensure that security by multiple-enciphered protection, then data and code is changed by software, has so greatly saved storage space.
This embodiment has following beneficial effect: it is encrypted by multiple form height, ensure that the security of data, has saved disk space, improve memory space by the conversion of data and code.
Claims (3)
1. a method for mass data secure memory techniques, is characterized in that it comprises following steps:
(1), automatically data are separately stored by option;
(2), the data of separating separately are compressed;
(3), multi-enciphering is carried out to the data after compression;
(31), authentication;
(32), by several mobile phone simultaneous verification identifying code;
(33), password authentification;
(4), encrypt file is converted to code;
(5), upload code is to server.
2. the method for a kind of mass data secure memory techniques according to claim 1, when it is characterized in that operation, by the Various types of data input computing machine needing to store, computing machine according to different options by all Data classifications, sorted data automatic pressing shortens compressed package into, first authentication is passed through when being encrypted each compressed package, verify to several different cell-phone number at transmission identifying code, confirmation is encrypted finally by different passwords, compressed package after encrypted is converted to code (memory space of code is little) by switching software and is uploaded onto the server by code.
3. the method for a kind of mass data secure memory techniques according to claim 1, be is characterized in that the present invention ensure that security by multiple-enciphered protection, then data and code is changed by software, so greatly saved storage space.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410550030.XA CN104408380A (en) | 2014-10-16 | 2014-10-16 | A method for a mass data secure storage technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410550030.XA CN104408380A (en) | 2014-10-16 | 2014-10-16 | A method for a mass data secure storage technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104408380A true CN104408380A (en) | 2015-03-11 |
Family
ID=52646011
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410550030.XA Pending CN104408380A (en) | 2014-10-16 | 2014-10-16 | A method for a mass data secure storage technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104408380A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991332A (en) * | 2017-04-01 | 2017-07-28 | 广东浪潮大数据研究有限公司 | The method and device that a kind of mass data is stored safely |
CN108710805A (en) * | 2018-05-25 | 2018-10-26 | 四川斐讯信息技术有限公司 | Encryption method, decryption method and the storage device of storage device |
CN110619220A (en) * | 2019-08-09 | 2019-12-27 | 北京小米移动软件有限公司 | Method and device for encrypting neural network model and storage medium |
CN114697130A (en) * | 2022-04-22 | 2022-07-01 | 国网安徽省电力有限公司信息通信分公司 | Intelligent mobile terminal information security encryption method for power system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101146261A (en) * | 2007-10-19 | 2008-03-19 | 吕利勇 | A realization method for digital protection of electronic media |
US20090205054A1 (en) * | 2008-02-07 | 2009-08-13 | Wilfried Blotenberg | Process for protecting stored operating data of machinery or similar equipment |
CN101558405A (en) * | 2006-10-17 | 2009-10-14 | 三星Sds株式会社 | Migration apparatus which convert database of mainframe system into database of open system and method for thereof |
CN103118089A (en) * | 2013-01-22 | 2013-05-22 | 华中科技大学 | Safe storage method based on a plurality of cloud storage systems and system thereof |
CN103870583A (en) * | 2014-03-25 | 2014-06-18 | 东方电气集团东方汽轮机有限公司 | Relational-database-based online and controllable browsing method for PDF document |
-
2014
- 2014-10-16 CN CN201410550030.XA patent/CN104408380A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101558405A (en) * | 2006-10-17 | 2009-10-14 | 三星Sds株式会社 | Migration apparatus which convert database of mainframe system into database of open system and method for thereof |
CN101146261A (en) * | 2007-10-19 | 2008-03-19 | 吕利勇 | A realization method for digital protection of electronic media |
US20090205054A1 (en) * | 2008-02-07 | 2009-08-13 | Wilfried Blotenberg | Process for protecting stored operating data of machinery or similar equipment |
CN103118089A (en) * | 2013-01-22 | 2013-05-22 | 华中科技大学 | Safe storage method based on a plurality of cloud storage systems and system thereof |
CN103870583A (en) * | 2014-03-25 | 2014-06-18 | 东方电气集团东方汽轮机有限公司 | Relational-database-based online and controllable browsing method for PDF document |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991332A (en) * | 2017-04-01 | 2017-07-28 | 广东浪潮大数据研究有限公司 | The method and device that a kind of mass data is stored safely |
CN108710805A (en) * | 2018-05-25 | 2018-10-26 | 四川斐讯信息技术有限公司 | Encryption method, decryption method and the storage device of storage device |
CN110619220A (en) * | 2019-08-09 | 2019-12-27 | 北京小米移动软件有限公司 | Method and device for encrypting neural network model and storage medium |
CN114697130A (en) * | 2022-04-22 | 2022-07-01 | 国网安徽省电力有限公司信息通信分公司 | Intelligent mobile terminal information security encryption method for power system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109522328B (en) | Data processing method and device, medium and terminal thereof | |
US20120136960A1 (en) | Cloud Storage Data Access Method, Apparatus and System | |
US8839446B2 (en) | Protecting archive structure with directory verifiers | |
CN107436725A (en) | A kind of data are write, read method, apparatus and distributed objects storage cluster | |
CN104852925A (en) | Method for leakproof, secure storage and backup of data of mobile smart terminal | |
CN104408380A (en) | A method for a mass data secure storage technology | |
CN105100146A (en) | Data storage method, device and system | |
CN101499027A (en) | Intelligent memory system based on independent kernel and distributed architecture | |
CN107124271A (en) | A kind of data encryption, decryption method and equipment | |
CN109656882A (en) | Data record method, extracting method and device, storage medium, terminal | |
CN104615929A (en) | Security key device for secure cloud services, and system and method of providing security cloud services | |
CN102469142A (en) | Data transmission method for data deduplication program | |
CN104468842A (en) | Power grid equipment state information cloud storage system and data uploading and downloading methods thereof | |
CN104967591A (en) | Cloud storage data read-write method and device, and read-write control method and device | |
CN107395359A (en) | A kind of electronic data demonstrate,proves method, terminal and system admittedly | |
CN106815528A (en) | A kind of file management method and device, storage device | |
US9450761B2 (en) | Memory system and method of generating management information | |
CN113495903A (en) | Electric power time sequence database caching method, system, equipment and readable storage medium | |
CN102523410B (en) | Method for writing video data and video data storage equipment | |
CN104168435A (en) | Method and system for batched mergence and playing of audio files | |
CN106991332A (en) | The method and device that a kind of mass data is stored safely | |
US20180225179A1 (en) | Encrypted data chunks | |
KR101428649B1 (en) | Encryption system for mass private information based on map reduce and operating method for the same | |
CN105205416A (en) | Mobile hard disk password module | |
JP2012507767A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20150311 |
|
WD01 | Invention patent application deemed withdrawn after publication |