CN105426767B - Date storage method - Google Patents
Date storage method Download PDFInfo
- Publication number
- CN105426767B CN105426767B CN201510731692.1A CN201510731692A CN105426767B CN 105426767 B CN105426767 B CN 105426767B CN 201510731692 A CN201510731692 A CN 201510731692A CN 105426767 B CN105426767 B CN 105426767B
- Authority
- CN
- China
- Prior art keywords
- data
- encryption
- storage
- user
- local cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The present invention discloses a kind of date storage method, applied to data-storage system, the system comprises servers and at least one computer, which comprises the first computer divides local cipher disk according to user setting, and the local cipher disk is independent data space;By user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data;First encryption data is issued into server;The encryption disc of the encryption disc of the data sync storage to other at least one computers, other at least one computers is divided in advance;When first computer receives the instruction for deleting data, first computer stores the information of the computer of the data to server inquiry;When storing the quantity of computer of the data and being less than preset quantity, first computer is by the data sync storage to other at least one computers.
Description
Technical field
The present invention relates to computer field more particularly to a kind of date storage methods.
Background technique
Dropbox can be regarded as being stored in hard disk or USB flash disk on network, therefore Dropbox is also known as Network U plate or network hard disc,
For providing a user the file management facilities such as online file storage, access, backup, shared.By Dropbox, no matter user exists
Anywhere, as long as can connect to internet, so that it may pass through the file of on-line storage in mobile terminal administration Dropbox.
There are many existing Dropbox storage modes, for example, provided application No. is 201210362185.1 application documents
The file uploading method of network hard disc stores file according to document;For another example application No. is
The network disk file storage method that the application documents of 201280000563.X provide carries out file storage according to file name.
A kind of method of the Dropbox as effective backup local file, is widely used, but Dropbox will increase one
A administrator role produces new security risk.
User obtains the data saved by password after data are stored to Dropbox;Then user cannot obtain storage to no password
Data can ensure data safety to a certain degree.But in the method for Dropbox storing data, there is Dropbox administrator management to use
The permission of family storing data, the data that Dropbox administrator can inquire user's storage even delete storage content or freeze Dropbox account
Number, influence data storage security.
Summary of the invention
The present invention proposes a kind of date storage method, can enhance the safety of local datastore.
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, the system comprises services
Device and at least one computer, which comprises the first computer divides local cipher disk, the local according to user setting
Encryption disc is independent data space;By user, this stores to the data of local cipher disk and encrypts, and obtains first
Encryption data;First encryption data is issued into server;By the data sync storage to other at least one computers
Encryption disc, the encryption disc of other at least one computers divides in advance;When first computer receives deletion data
Instruction when, first computer stores the information of the computer of the data to server inquiry;When the storage data
Computer quantity be less than preset quantity when, first computer by the data sync storage to other at least one
Computer.
Date storage method proposed by the present invention, according to user setting divide local cipher disk, by user this store to
The data of local cipher disk are encrypted, and encryption data is obtained, and by the synchronous storage of encryption data, to other, at least one storage is set
Standby encryption disc, so that the data encryption for being stored in local cipher disk is stored in other storage equipment, to enhance local number
According to the safety of storage.In addition, when deleting data, once the quantity of the computer of the data is stored less than preset quantity
When, it controls the data and backups to other computers, to ensure data safety.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of date storage method embodiment of the present invention;
Fig. 2 is a kind of Computer Systems Organization schematic diagram of date storage method embodiment of the present invention;
Fig. 3 is that the encryption disc storage space of date storage method embodiment of the present invention uses schematic diagram;
Fig. 4 is another flow chart of date storage method embodiment of the present invention;
Wherein,
S1 core memory equipment
S2 storage server
S3 computer
S4 mobile device.
Specific embodiment
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, the system comprises services
Device and at least one computer, which comprises
Step 101, the first computer divide local cipher disk according to user setting, and the local cipher disk is independent number
According to memory space;
Step 102, by user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data;
First encryption data is issued server by step 103;
Step 104, by the encryption disc of the data sync storage to other at least one computers, it is described other at least one
The encryption disc of a computer divides in advance;
Step 105, when first computer receive delete data instruction when, first computer is looked into server
Ask the information for storing the computer of the data;
Step 106, when storing the quantity of computer of the data and being less than preset quantity, first computer will
The data sync storage is to other at least one computers.
Local cipher disk is divided according to user setting in the present embodiment, this is stored to the data of local cipher disk by user
It is encrypted, obtains encryption data, by the encryption disc of the synchronous storage of encryption data to other at least one storage equipment, thus will
The data encryption for being stored in local cipher disk is stored in other storage equipment, to enhance the safety of local datastore.And
And in the present embodiment when deleting data, when storing the quantity of computer of the data less than preset quantity, control
The data backup to other computers, to ensure data safety.
To keep the purposes, technical schemes and advantages of the present embodiment clearer, below in conjunction with the attached drawing in the present embodiment,
Technical solution in the present embodiment is clearly and completely described, it is clear that described embodiment is that a part of the invention is real
Example is applied, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creativeness
Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of labour.
Memory in the present embodiment can be the equipment with data storage function, specifically, there are data to store function for this
The equipment of energy can be the equipment comprising storage chip, storage hard disk, such as computer etc., the present embodiment does not limit.
Embodiment 1
The date storage method of the present embodiment is realized by the equipment with store function such as computer.The present embodiment with
Computer is illustrated for realizing the date storage method, but the date storage method of the present embodiment is not limited to computer.
As shown in Figure 1, the date storage method includes:
Step 11: local cipher disk being divided according to user setting, local cipher disk is independent data space.
In the present embodiment, part memory space is marked off in the storage device of computer according to user setting as local
Encryption disc, for storing local encryption data.
To realize that the encryption disc on computer can actively guarantee the safety of storage content, settable encryption disc in the present embodiment
Access password, while secure logon facility also can be used, user, which needs to log in, could access local cipher disk.
For example, limiting the errors number that user inputs password when user accesses local cipher disk.After number exceeds,
Refusal accesses again in a period of time, for example, can just again attempt to access after several hours or after one day.
When networking, short message can be sent to reserved phone number, remind user password input error.
When offline, then lock that the encryption disc is current and within a period of time it is inaccessible.
In order to avoid the content of local cipher disk can not be opened in the absence of a network, local account encryption is allowed
Code check.If continuous cipher authentication failed reaches setting number, the verifying it is required that user networks.
After user's networking, it can control the verifying frequency of user in server end, avoided Brute Force user name close
The case where code, occurs, to guarantee data security.
Step 12: by user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data.
A variety of cipher modes can be used in the present embodiment, the present embodiment does not limit specific cipher mode.
This is stored to the data of local cipher disk user, after encryption, obtains the first encryption data.Data encryption can
Actively enhance safety when data are propagated on the internet.
Step 13: by the synchronous storage of the first encryption data, to other, at least one stores the encryption disc of equipment, at least one
The encryption disc of storage equipment divides in advance.
It should be appreciated that the present available capacity for the encryption disc that any storage equipment divides in advance is greater than encrypted data institute
The memory capacity needed.
In the present embodiment, whether the present available capacity that can prejudge storage equipment encryption disc is greater than encrypted data
Required memory capacity when the present available capacity of confirmation storage equipment encryption disc is enough, then starts to the storage equipment
Synchronize storage.
In this way, when a encryption data is written to encryption disc, by the encryption data on internet at least one
Storage equipment synchronizes storage.
In the present embodiment, stores and set required for the first encryption data of synchronous storage can be preset according to different scenes
Standby quantity, usually the storage equipment of the first encryption data of synchronous storage should more than two, it is preferable that are at least ten.In this way,
Backup quantity of data by increasing redundancy guarantees that user can obtain the first encryption data in time, guarantees the storage of the first encryption data
Safety, prevent loss of data.
In the present embodiment, preservation current crypto data can be detected automatically and active storage number of devices, current quantity are small
It when preset quantity, is dominated by server, from encryption data in the memory space backup of trend any active ues.
In the present embodiment, when the synchronous storage of the first encryption data is to other at least one storage equipment, using P2P technology into
The transmission of row data.Settable system server assists establishing P2P link in the present embodiment.First it is detected that living in current ink
Equipment is stored near jump, and attempts to carry out P2P connection.If link establishment fails, it is active to reselect another
Data storage device establishes P2P link.
In order to avoid currently available synchronous memory device is very little, sufficient amount of common storage is can also be provided in the present embodiment
Equipment, e.g., at least ten, P2P link when ensuring any moment between local memory device and public server can succeed
It establishes.
In the present embodiment, by user, this stores to the data of local cipher disk and encrypts in step 12, obtains first
When encryption data, code key can be generated at random, by the code key, by user, this stores to the data of local cipher disk and encrypts,
Obtain the first encryption data.
In the present embodiment, when encrypting to the data that this is stored to local cipher disk, computer can generate one at random
A code key, the key are uniquely determined by the data, can only can be decrypted the encryption data by the code key, be obtained the data,
To improve data storage safety.
Preferably, which can be reserved in local side and server end.
In the present embodiment, in step 13, by encrypted data sync storage, to other, at least one stores the encryption of equipment
It further include that the first encryption data is read from least one processor according to code key after user identity is by verifying after disk.
In the present embodiment, first encryption data storage and other at least one storage equipment in local cipher disk
Middle synchronous storage.After verifying user identity, by the key uniquely mapped with first encryption data, opening is stored in some
First encryption data in current addressable storage equipment encryption disc.
Various ways verifying user identity, such as account number cipher mode, dynamic password mode etc. can be used, the present embodiment is not
It limits.
In the present embodiment, a user can be provided with encryption disc in more storage equipment;Different user can be at same
Respective encryption disc is provided in equipment.In the present embodiment, settable cipher server is saved using the date storage method
Whole user informations, the user information may include user name, password and other verification informations etc..First each user is believed
Breath is encrypted, it is preferable that obtains the encryption subscriber information string for capableing of the unique identification user.Then the encryption is used again
Family information character string is uploaded to cipher server.Therefore, at cipher server end, user information is not stored in clear, Yong Huxin
Breath is transparent for cipher server.The information such as the password of user only have user, use the username and password of oneself
Etc. information, which could be decrypted, and the decryption be only limitted to for user login information verify.Therefore, it both ensure that close
Code server end can not inquire the personal information of user, and plaintext user information is avoided to be leaked accidentally, deposit to enhance data
The privacy of storage.
In the present embodiment, settable file server is saved to be arranged using the file of whole users of the date storage method
Table.User synchronizes more when modifying in its any storage equipment for being preset with local cipher disk to the data of its encryption disc
New this document list, then other storage equipment for being preset with local cipher disk can be after its login next time and when coupling internet certainly
It is dynamic to be synchronized.User may be selected automatic when logging in the account of oneself in any storage equipment for being preset with local cipher disk
It is fetched from internet and belongs to the data of himself to his new encryption disc.
It is further comprising the steps of after dividing local cipher disk according to user setting in step 11 in the present embodiment:
The second encryption data is received, which is that the first synchronous encryption number of equipment is stored from other
According to;
Second encryption data is stored to local cipher disk;
When deleting the second encryption data of local cipher disk storage, which is transferred to other at least one
The encryption disc of equipment is stored, the encryption disc of other storage equipment divides in advance.
The present embodiment carries out dynamic itemset counting to the current active backup of each data file encryption, according to each encryption data
The current active backup counting of file decides whether to continue to synchronize storage to other available storage equipment.
In the present embodiment, when deleting the second encryption data of local cipher disk storage, the second encryption data is transferred to it
The encryption disc of his at least one storage equipment.Therefore, if the encryption data of one of storage equipment storage is deleted or lost,
By the way that encryption data is stored equipment unloading to others, to will not disappear and lead because of the storage equipment of storage encryption data
Encryption data is caused to lose, to improve data storage security.
It should be noted that in the present embodiment, when local cipher disk deletes its storing data, can simultaneously or it is default when
Between, for example, deleting corresponding data in all synchronous memory devices after 24 hours.To prevent user misoperation from deleting accidentally
Data, in order to data recovery.
In the present embodiment, by user, this stores to the data of local cipher disk and encrypts step 12, obtain first plus
Further include following steps before ciphertext data:
Stored according to this to the data of local cipher disk, generate corresponding cryptographic Hash, the cryptographic Hash unique identification this
It stores to the data of local cipher disk;
Other any users are requested to generate when being stored in data file identical with the cryptographic Hash in its local cipher disk
Key;
Receive the key;
Correspondingly, by user, this stores to the data of local cipher disk and encrypts, and obtaining the first encryption data includes:
According to the key, to user, this stores to the data of local cipher disk and encrypts.
In the present embodiment, at encryption disc end when Initiative Inventory Management data, according to user, this is stored to the number of local cipher disk
According to file content, filename weigh its cryptographic Hash.Cryptographic Hash can be used as the unique identification information of file, according to two files
Cryptographic Hash both can judge whether be same substantive content file.
In the present embodiment, by user, this stores to the cryptographic Hash of the data of local cipher disk and is reported to file-management services
Device;Inquiry cryptographic Hash whether there is in the listed files that document management server is safeguarded;If the cryptographic Hash has existed,
The key for requesting other any users to generate when being stored in data file identical with the cryptographic Hash in its local cipher disk;It receives
User this store the key of the data to local cipher disk;Key based on the received, to user, this is stored to local cipher
The data of disk are encrypted, and no longer active synchronization stores the data to other storage equipment.
It gets in touch if user fails with other users, a new code key is automatically generated, to this document
It is encrypted locally, and active synchronization stores the storage equipment of data to other at least two or more.
In the present embodiment, after generation key, further includes:
The request that other storage equipment takes the code key is received, code key request is taken to be intended to deposit by other storage equipment
The data of storage stored with this this data to local cipher disk it is identical when transmission;
According to the request for obtaining the code key, the code key is sent to other the storage equipment.
Such case is possessed by multiple and different network users for the file of same substantive content, the present embodiment passes through Kazakhstan
Uncommon value judge certain two file whether be same substantive content file.For substantially identical file, the present embodiment no longer exists
It is local to generate random key for this document, but by requesting the close of this document to the other users for having possessed this document
Key.After receiving and taking the request of this document code key from other storage equipment, sent to other the storage equipment
The code key.
It should be noted that " first ", " second " are only thought to divide for convenience of description in the present embodiment, do not constitute to this
The restriction of square embodiment.
The date storage method of the present embodiment, divides local cipher disk according to user setting, and by user, this is stored to this
The data of ground encryption disc are encrypted, and encryption data is obtained, by the synchronous storage of encryption data to other at least one storage equipment
Encryption disc, thus by the data encryption for being stored in local cipher disk be stored in other storage equipment, to enhance local data
The safety of storage.
Embodiment 2
As shown in Fig. 2, the present embodiment proposes a kind of computer system, the date storage method that the present embodiment proposes can be applied
In the computer system.
The computer system includes the 4 class equipment interconnected by internet, respectively core memory equipment S1, storage service
Device S2, computer S3, mobile device S4.Wherein, core memory equipment S1 is used to store the index letter of user information, user file
Breath etc., while can also assist establishing P2P link.Multiple cores server S 1 is set within the system, on the one hand can provide more
Powerful dispatching, another party is also for load balancing and disaster recovery.
When storage server S2 is then storing data synchronous in order to avoid user, do not have on current ink it is sufficient amount of its
His any active ues establish P2P connection and synchrodata such case and reserved setting therewith, and effect and function are equal to one
A ordinary user's account.
Computer S3, mobile device S4 are terminal devices workable for computer system ordinary user.
In the local cipher disk of computer S3, local data is both stored, also storage is from other users in the network link
Backup Data.The Backup Data of these other users is transparent to local user.Local user's account can inquire local add
Currently practical available memory capacity size in close disk, but the Backup Data for belonging to other users cannot be accessed.
Encryption disc is not preset on mobile device S4.User can be visited by the application program installed on mobile device S4
It asks data and management data, and the data for backing up storage on network is downloaded into mobile terminal S4, but do not undertake mobile end data
Backup to the task of network and backup other users data.
It should be understood that Fig. 2 is only Application Scenarios-Example, the restriction to the present embodiment is not constituted.
Embodiment 3
In the present embodiment date storage method, the actual use situation of any local cipher disk capacity is as shown in Figure 3.
The memory space that local user divides is defined as local cipher disk.In the local cipher disk, refer to that user cannot with space
The space of data is written again, local user's available space refers to local user in the maximum capacity that data are written into encryption disc.
It has used in space, that is, has included the encryption data of local user, also included the encryption data of the synchronous storage of network other users.It is synchronous
Store other users encryption data be backstage automatic running, local user can be it is transparent, also can be set to this
The prompting of ground user.
Therefore, local cipher disk had both stored local cipher data, also store from the network link other users it is standby
Part data.Preferably, the Backup Data of these other users is transparent to local user, and local user's account can inquire local
Currently practical available memory capacity size in encryption disc, but the synchronization storing data for belonging to other users cannot be accessed.
For example, user is assigned with the memory space of 1G, as local cipher disk, but user has only used the number of 500M at present
According to then the remaining space 500M, can store the encryption data from other synchronous storages of storage equipment.
Embodiment 4
This reality is discussed in detail so that executing subject is with the computer of store function as an example in the present embodiment combination concrete scene
Apply the date storage method of example.
It should be noted that file is identical as the meaning of data in the present embodiment.As shown in figure 4, the present embodiment provides one
Kind date storage method, comprising:
41 computers divide encryption disc according to user's operation;
42 computers prepare that unencrypted file is written to local cipher disk;
43 computers determine the cryptographic Hash of the unencrypted file, and by the cryptographic Hash reporting file management server;
Whether 44 document management servers judge this document synchronized storage according to the cryptographic Hash;If synchronized deposit
Storage, then execute 45;If synchronous storage not yet, executes 48;
45 request the key of this document to the user for being stored with this document is synchronized;
46 judge whether the key for requesting this document succeeds;
If it succeeds, executing 47;48 are executed if failure;
47 are identified using the key pair local unencrypted file;
The 48 random key values for generating this document.
49 utilize the code key value, encryption disc of the synchronous storage to other storage equipment after this document is encrypted
This gives the methods of the shared key between the file of identical cryptographic Hash.The present embodiment also gives to work as and ask
When asking key is shared to fail, the method that a new key carrys out encryption data is in addition generated.The present embodiment is by cryptographic Hash to phase
It is screened with file, and by being deposited to be substantially reduced prepare more part file to same file shared key and encryption data
The potential same file of method for storing, which is repeated as many times, stores bring storage pressure, so that the idle storage on internet both be utilized
Resource, and data storage security can be enhanced.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and
It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill
Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport
In the principle, practical application or improvement to the technology in market for best explaining each embodiment, or make the art
Other those of ordinary skill can understand each embodiment disclosed herein.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.
Claims (5)
1. a kind of date storage method, which is characterized in that be applied to data-storage system, the system comprises server and at least
One computer, which comprises
First computer divides local cipher disk according to user setting, and the local cipher disk is independent data space;
By user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data;
First encryption data is issued into server;
The synchronous storage of first encryption data is arrived to the encryption disc of other at least one computers, other described at least one meters
The encryption disc of calculation machine divides in advance;
When first computer receives the instruction for deleting the first encryption data, first computer is deposited to server inquiry
Store up the information of the computer of first encryption data;
When storing the quantity of computer of first encryption data less than preset quantity, first computer will be described
Data sync storage is to other at least one computers;
Wherein, described by user, this stores to the data of local cipher disk and encrypts, before obtaining the first encryption data, also
The following steps are included:
Stored according to this to the data of local cipher disk, generate corresponding cryptographic Hash, the cryptographic Hash unique identification this deposit
It stores up to the data of local cipher disk;
Other any users are requested to generate when being stored in data file identical with the cryptographic Hash in its local cipher disk close
Key;
Receive the key;
Correspondingly, by user, this stores to the data of local cipher disk and encrypts, and obtaining the first encryption data includes:
According to the key, to user, this stores to the data of local cipher disk and encrypts;
User synchronizes more when modifying in its any storage equipment for being preset with local cipher disk to the data of its encryption disc
New listed files, then other storage equipment for being preset with local cipher disk can be after its login next time and automatic when coupling internet
It is synchronized;
The method also includes: automatic detection saves current crypto data and active storage number of devices, current active are deposited
When storing up number of devices less than preset quantity, dominated by server, from the storage device backup encryption data of trend any active ues.
2. date storage method according to claim 1, which is characterized in that described by user, this is stored to local cipher
The data of disk are encrypted, and obtaining the first encryption data includes following steps:
It is random to generate key;
According to the key, by user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption number
According to.
3. date storage method according to claim 1, which is characterized in that described to divide local cipher according to user setting
It is further comprising the steps of after disk:
The second encryption data is received, second encryption data stores synchronous first encryption of equipment from other
Data;
Second encryption data is stored to local cipher disk;
Delete local cipher disk storage second encryption data when, by second encryption data be transferred to other at least one
The encryption disc of the encryption disc of a storage equipment, other at least one storage equipment divides in advance.
4. date storage method according to claim 3, which is characterized in that further comprising the steps of:
The request that other storage equipment takes the key is received, it is described that the key request is taken to be stored by described other
The equipment data to be stored and described this store the data to local cipher disk it is identical when transmission;
According to the request for taking the key, the key is sent to other the storage equipment.
5. date storage method according to claim 3, which is characterized in that described synchronize first encryption data is deposited
It is further comprising the steps of after the encryption disc for storing up other at least one storage equipment:
After user identity is by verifying, first encryption data is read from at least one processor according to the key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510731692.1A CN105426767B (en) | 2015-10-30 | 2015-10-30 | Date storage method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510731692.1A CN105426767B (en) | 2015-10-30 | 2015-10-30 | Date storage method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105426767A CN105426767A (en) | 2016-03-23 |
CN105426767B true CN105426767B (en) | 2019-04-05 |
Family
ID=55504970
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510731692.1A Active CN105426767B (en) | 2015-10-30 | 2015-10-30 | Date storage method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105426767B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101883103A (en) * | 2009-04-15 | 2010-11-10 | 埃森哲环球服务有限公司 | The method and system of the client-side extensions of Web server gang fight structure in the cloud data center |
CN103731439A (en) * | 2011-12-31 | 2014-04-16 | 华茂云天科技(北京)有限公司 | Elastic storage service system |
CN103812927A (en) * | 2012-11-14 | 2014-05-21 | 书生云服务公司 | Storage method |
CN104156377A (en) * | 2013-05-13 | 2014-11-19 | 孙良茵 | Virtual file system achieving reliability through multi-network-disk redundant storage |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8849971B2 (en) * | 2008-05-28 | 2014-09-30 | Red Hat, Inc. | Load balancing in cloud-based networks |
CN104331346B (en) * | 2014-11-21 | 2017-08-25 | 四川神琥科技有限公司 | A kind of data guard method |
-
2015
- 2015-10-30 CN CN201510731692.1A patent/CN105426767B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101883103A (en) * | 2009-04-15 | 2010-11-10 | 埃森哲环球服务有限公司 | The method and system of the client-side extensions of Web server gang fight structure in the cloud data center |
CN103731439A (en) * | 2011-12-31 | 2014-04-16 | 华茂云天科技(北京)有限公司 | Elastic storage service system |
CN103812927A (en) * | 2012-11-14 | 2014-05-21 | 书生云服务公司 | Storage method |
CN104156377A (en) * | 2013-05-13 | 2014-11-19 | 孙良茵 | Virtual file system achieving reliability through multi-network-disk redundant storage |
Also Published As
Publication number | Publication date |
---|---|
CN105426767A (en) | 2016-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220131696A1 (en) | Secure file sharing method and system | |
AU2013101722A4 (en) | Data security management system | |
Zhang et al. | Ensure data security in cloud storage | |
US9098718B2 (en) | Systems and methods for securing data using multi-factor or keyed dispersal | |
CN105183402B (en) | Date storage method | |
US20150249687A1 (en) | Systems and methods for securing data in the cloud | |
US20110246817A1 (en) | Systems and methods for securing data in motion | |
CN104023085A (en) | Security cloud storage system based on increment synchronization | |
CN104035891B (en) | Android mobile terminal data security protection system | |
KR20130084604A (en) | Method to control and limit readability of electronic documents | |
EP2692107B1 (en) | Managed authentication on a distributed network | |
CN110362984B (en) | Method and device for operating service system by multiple devices | |
JP4875781B1 (en) | Distributed data storage system | |
CN105224262A (en) | Data processing method | |
CN105426783B (en) | More Backup Data storage methods | |
CN105302490B (en) | Date storage method | |
Hwang et al. | A mutual nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices | |
JP5485452B1 (en) | Key management system, key management method, user terminal, key generation management device, and program | |
CN105426767B (en) | Date storage method | |
CN205430310U (en) | Data storage device | |
CN105407091A (en) | Data processing method | |
Hwang et al. | Fulfilling mutual nonrepudiation for cloud storage | |
CN105426768B (en) | Ciphertext date storage method | |
CN205080542U (en) | Data storage device | |
CN205230060U (en) | Data storage device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170930 Address after: 610000 Building 8, B District, 6, Jing Rong International Plaza, 200 Tianfu five street, Chengdu hi tech Zone, Sichuan Applicant after: Sichuan starry Star Technology Co., Ltd. Address before: 210000 Qinhuai City, Nanjing Province, the main street in the morning of the day on the morning of the 1865 Creative Park E-8 building, room 388, building, Room 202 Applicant before: NANJING QINSHE MINGSHI INFORMATION TECHNOLOGY CO., LTD. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |