CN104408380A - A method for a mass data secure storage technology - Google Patents

A method for a mass data secure storage technology Download PDF

Info

Publication number
CN104408380A
CN104408380A CN201410550030.XA CN201410550030A CN104408380A CN 104408380 A CN104408380 A CN 104408380A CN 201410550030 A CN201410550030 A CN 201410550030A CN 104408380 A CN104408380 A CN 104408380A
Authority
CN
China
Prior art keywords
data
code
encrypted
mass data
codes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410550030.XA
Other languages
Chinese (zh)
Inventor
傅涛
傅德胜
经正俊
孙文静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd filed Critical JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority to CN201410550030.XA priority Critical patent/CN104408380A/en
Publication of CN104408380A publication Critical patent/CN104408380A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

The invention discloses a method for a mass data secure storage technology, and relates to the technical field of data secure storage. The method comprises steps of: storing separately data automatically by an option; compressing data respectively separated; performing a multi-encryption on compressed data; authenticating an identity; authenticating an authentication code by several cellphones at the same time; authenticating a password; converting an encrypted file into codes; uploading the codes to a server. The codes are highly encrypted by multiple ways, so that security of data is ensured, the disk space is saved by a conversion of data to codes, and the storage capacity is improved.

Description

A kind of method of mass data secure memory techniques
Technical field:
The present invention relates to data security technical field of memory, be specifically related to a kind of method of mass data secure memory techniques.
Background technology:
Data are most crucial assets, and storage system, as the shelf space of data, is the last line of defense of data protection; Along with storage system is direct-connected towards networking and distributed future development by this locality, and shared by the numerous computing machines on network, storage system is become and is more vulnerable to attack, the storage system of relative quiescent often becomes the preferred object of assailant, reaches the object stealing, distort or destroy data.Storage security becomes most important, and safe storage mainly comprises storage security technology, data de-duplication technology, data backup and disaster recovery techniques etc.
On the memory device of various application system, the mode that information is just storing with data grows at top speed, and constantly advances the process of global IT application.The thing followed is that the demand of ultrahigh-density data storage constantly increases.Although the memory capacity of file server and database server is in continuous expansion, though or space can be encountered be doubled and redoubled, user still can complain the situation of off-capacity, and also user, to the continuous increase of memory space requirements, promotes the continuous change of ultrahigh-density data storage technology just.
Along with improving constantly of surveying instrument precision and actual demand index, the speed goes of data transmission is fast, data volume is also increasing, and most of data acquisition system (DAS), such as radar echo signal data acquisition, the collection etc. of digital video signal transacting and high code check satellite information signal, all require to carry out real-time transmission and storage to data, this is just to the acquisition rate of data acquisition and memory system, transmission speed, storage speed, have higher requirement in the aspects such as the reliability that memory capacity and data store, therefore, the research of high speed mass data storage technology is just seemed important all the more.
A supplementary storage for vast capacity, describes the huge of its memory capacity by magnanimity.Disk scheduling should be write as a standalone module in operating system, and disk scheduling should be write as a standalone module in operating system, allows when being necessary to replace with different algorithms.Allow when wanting to replace with different algorithms.Disk unit addresses with the form of the large array of a kind of one dimension of logical block, and disk unit addresses with the form of the large array of a kind of one dimension of logical block, and logical block is here the least unit of transmission.Logical block be transmission least unit.
Along with the development of infotech, mobile memory medium is used widely at message area.Mobile memory medium uses flexible, convenient, it is made to be popularized rapidly in the informationalized process of Government and enterprise, increasing sensitive information, secret data and archives material are stored in mobile memory medium, and this brings sizable potential safety hazard to Government and enterprise information resources.
Summary of the invention:
The object of this invention is to provide a kind of method of mass data secure memory techniques, it is encrypted by multiple form height, ensure that the security of data, has saved disk space, improve memory space by the conversion of data and code.
In order to solve the problem existing for background technology, the present invention is by the following technical solutions: it comprises following steps: 1, automatically data separately stored by option;
2, the data of separating separately are compressed;
3, multi-enciphering is carried out to the data after compression;
31, authentication;
32, by several mobile phone simultaneous verification identifying code;
33, password authentification;
4, encrypt file is converted to code;
5, upload code is to server;
When the present invention operates, by the Various types of data input computing machine needing to store, computing machine according to different options by all Data classifications, sorted data automatic pressing shortens compressed package into, first authentication is passed through when being encrypted each compressed package, verify to several different cell-phone number at transmission identifying code, be encrypted confirmation finally by different passwords, the compressed package after encrypted is converted to code (memory space of code is little) by switching software and is uploaded onto the server by code.
The present invention ensure that security by multiple-enciphered protection, then data and code is changed by software, has so greatly saved storage space.
The present invention has following beneficial effect: it is encrypted by multiple form height, ensure that the security of data, has saved disk space, improve memory space by the conversion of data and code.
Embodiment:
This embodiment is by the following technical solutions: it comprises following steps: 1, automatically data separately stored by option;
2, the data of separating separately are compressed;
3, multi-enciphering is carried out to the data after compression;
31, authentication;
32, by several mobile phone simultaneous verification identifying code;
33, password authentification;
4, encrypt file is converted to code;
5, upload code is to server;
During the operation of this embodiment, by the Various types of data input computing machine needing to store, computing machine according to different options by all Data classifications, sorted data automatic pressing shortens compressed package into, first authentication is passed through when being encrypted each compressed package, verify to several different cell-phone number at transmission identifying code, be encrypted confirmation finally by different passwords, the compressed package after encrypted is converted to code (memory space of code is little) by switching software and is uploaded onto the server by code.
This embodiment ensure that security by multiple-enciphered protection, then data and code is changed by software, has so greatly saved storage space.
This embodiment has following beneficial effect: it is encrypted by multiple form height, ensure that the security of data, has saved disk space, improve memory space by the conversion of data and code.

Claims (3)

1. a method for mass data secure memory techniques, is characterized in that it comprises following steps:
(1), automatically data are separately stored by option;
(2), the data of separating separately are compressed;
(3), multi-enciphering is carried out to the data after compression;
(31), authentication;
(32), by several mobile phone simultaneous verification identifying code;
(33), password authentification;
(4), encrypt file is converted to code;
(5), upload code is to server.
2. the method for a kind of mass data secure memory techniques according to claim 1, when it is characterized in that operation, by the Various types of data input computing machine needing to store, computing machine according to different options by all Data classifications, sorted data automatic pressing shortens compressed package into, first authentication is passed through when being encrypted each compressed package, verify to several different cell-phone number at transmission identifying code, confirmation is encrypted finally by different passwords, compressed package after encrypted is converted to code (memory space of code is little) by switching software and is uploaded onto the server by code.
3. the method for a kind of mass data secure memory techniques according to claim 1, be is characterized in that the present invention ensure that security by multiple-enciphered protection, then data and code is changed by software, so greatly saved storage space.
CN201410550030.XA 2014-10-16 2014-10-16 A method for a mass data secure storage technology Pending CN104408380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410550030.XA CN104408380A (en) 2014-10-16 2014-10-16 A method for a mass data secure storage technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410550030.XA CN104408380A (en) 2014-10-16 2014-10-16 A method for a mass data secure storage technology

Publications (1)

Publication Number Publication Date
CN104408380A true CN104408380A (en) 2015-03-11

Family

ID=52646011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410550030.XA Pending CN104408380A (en) 2014-10-16 2014-10-16 A method for a mass data secure storage technology

Country Status (1)

Country Link
CN (1) CN104408380A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991332A (en) * 2017-04-01 2017-07-28 广东浪潮大数据研究有限公司 The method and device that a kind of mass data is stored safely
CN108710805A (en) * 2018-05-25 2018-10-26 四川斐讯信息技术有限公司 Encryption method, decryption method and the storage device of storage device
CN110619220A (en) * 2019-08-09 2019-12-27 北京小米移动软件有限公司 Method and device for encrypting neural network model and storage medium
CN114697130A (en) * 2022-04-22 2022-07-01 国网安徽省电力有限公司信息通信分公司 Intelligent mobile terminal information security encryption method for power system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101146261A (en) * 2007-10-19 2008-03-19 吕利勇 A realization method for digital protection of electronic media
US20090205054A1 (en) * 2008-02-07 2009-08-13 Wilfried Blotenberg Process for protecting stored operating data of machinery or similar equipment
CN101558405A (en) * 2006-10-17 2009-10-14 三星Sds株式会社 Migration apparatus which convert database of mainframe system into database of open system and method for thereof
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN103870583A (en) * 2014-03-25 2014-06-18 东方电气集团东方汽轮机有限公司 Relational-database-based online and controllable browsing method for PDF document

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101558405A (en) * 2006-10-17 2009-10-14 三星Sds株式会社 Migration apparatus which convert database of mainframe system into database of open system and method for thereof
CN101146261A (en) * 2007-10-19 2008-03-19 吕利勇 A realization method for digital protection of electronic media
US20090205054A1 (en) * 2008-02-07 2009-08-13 Wilfried Blotenberg Process for protecting stored operating data of machinery or similar equipment
CN103118089A (en) * 2013-01-22 2013-05-22 华中科技大学 Safe storage method based on a plurality of cloud storage systems and system thereof
CN103870583A (en) * 2014-03-25 2014-06-18 东方电气集团东方汽轮机有限公司 Relational-database-based online and controllable browsing method for PDF document

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991332A (en) * 2017-04-01 2017-07-28 广东浪潮大数据研究有限公司 The method and device that a kind of mass data is stored safely
CN108710805A (en) * 2018-05-25 2018-10-26 四川斐讯信息技术有限公司 Encryption method, decryption method and the storage device of storage device
CN110619220A (en) * 2019-08-09 2019-12-27 北京小米移动软件有限公司 Method and device for encrypting neural network model and storage medium
CN114697130A (en) * 2022-04-22 2022-07-01 国网安徽省电力有限公司信息通信分公司 Intelligent mobile terminal information security encryption method for power system

Similar Documents

Publication Publication Date Title
CN109522328B (en) Data processing method and device, medium and terminal thereof
US20120136960A1 (en) Cloud Storage Data Access Method, Apparatus and System
US8839446B2 (en) Protecting archive structure with directory verifiers
CN107436725A (en) A kind of data are write, read method, apparatus and distributed objects storage cluster
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN104408380A (en) A method for a mass data secure storage technology
CN105100146A (en) Data storage method, device and system
CN101499027A (en) Intelligent memory system based on independent kernel and distributed architecture
CN107124271A (en) A kind of data encryption, decryption method and equipment
CN109656882A (en) Data record method, extracting method and device, storage medium, terminal
CN104615929A (en) Security key device for secure cloud services, and system and method of providing security cloud services
CN102469142A (en) Data transmission method for data deduplication program
CN104468842A (en) Power grid equipment state information cloud storage system and data uploading and downloading methods thereof
CN104967591A (en) Cloud storage data read-write method and device, and read-write control method and device
CN107395359A (en) A kind of electronic data demonstrate,proves method, terminal and system admittedly
CN106815528A (en) A kind of file management method and device, storage device
US9450761B2 (en) Memory system and method of generating management information
CN113495903A (en) Electric power time sequence database caching method, system, equipment and readable storage medium
CN102523410B (en) Method for writing video data and video data storage equipment
CN104168435A (en) Method and system for batched mergence and playing of audio files
CN106991332A (en) The method and device that a kind of mass data is stored safely
US20180225179A1 (en) Encrypted data chunks
KR101428649B1 (en) Encryption system for mass private information based on map reduce and operating method for the same
CN105205416A (en) Mobile hard disk password module
JP2012507767A5 (en)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150311

WD01 Invention patent application deemed withdrawn after publication