CN105426767B - Date storage method - Google Patents

Date storage method Download PDF

Info

Publication number
CN105426767B
CN105426767B CN201510731692.1A CN201510731692A CN105426767B CN 105426767 B CN105426767 B CN 105426767B CN 201510731692 A CN201510731692 A CN 201510731692A CN 105426767 B CN105426767 B CN 105426767B
Authority
CN
China
Prior art keywords
data
encryption
storage
user
local cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510731692.1A
Other languages
Chinese (zh)
Other versions
CN105426767A (en
Inventor
陈建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan starry Star Technology Co., Ltd.
Original Assignee
Sichuan Starry Star Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Starry Star Technology Co Ltd filed Critical Sichuan Starry Star Technology Co Ltd
Priority to CN201510731692.1A priority Critical patent/CN105426767B/en
Publication of CN105426767A publication Critical patent/CN105426767A/en
Application granted granted Critical
Publication of CN105426767B publication Critical patent/CN105426767B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention discloses a kind of date storage method, applied to data-storage system, the system comprises servers and at least one computer, which comprises the first computer divides local cipher disk according to user setting, and the local cipher disk is independent data space;By user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data;First encryption data is issued into server;The encryption disc of the encryption disc of the data sync storage to other at least one computers, other at least one computers is divided in advance;When first computer receives the instruction for deleting data, first computer stores the information of the computer of the data to server inquiry;When storing the quantity of computer of the data and being less than preset quantity, first computer is by the data sync storage to other at least one computers.

Description

Date storage method
Technical field
The present invention relates to computer field more particularly to a kind of date storage methods.
Background technique
Dropbox can be regarded as being stored in hard disk or USB flash disk on network, therefore Dropbox is also known as Network U plate or network hard disc, For providing a user the file management facilities such as online file storage, access, backup, shared.By Dropbox, no matter user exists Anywhere, as long as can connect to internet, so that it may pass through the file of on-line storage in mobile terminal administration Dropbox.
There are many existing Dropbox storage modes, for example, provided application No. is 201210362185.1 application documents The file uploading method of network hard disc stores file according to document;For another example application No. is The network disk file storage method that the application documents of 201280000563.X provide carries out file storage according to file name.
A kind of method of the Dropbox as effective backup local file, is widely used, but Dropbox will increase one A administrator role produces new security risk.
User obtains the data saved by password after data are stored to Dropbox;Then user cannot obtain storage to no password Data can ensure data safety to a certain degree.But in the method for Dropbox storing data, there is Dropbox administrator management to use The permission of family storing data, the data that Dropbox administrator can inquire user's storage even delete storage content or freeze Dropbox account Number, influence data storage security.
Summary of the invention
The present invention proposes a kind of date storage method, can enhance the safety of local datastore.
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, the system comprises services Device and at least one computer, which comprises the first computer divides local cipher disk, the local according to user setting Encryption disc is independent data space;By user, this stores to the data of local cipher disk and encrypts, and obtains first Encryption data;First encryption data is issued into server;By the data sync storage to other at least one computers Encryption disc, the encryption disc of other at least one computers divides in advance;When first computer receives deletion data Instruction when, first computer stores the information of the computer of the data to server inquiry;When the storage data Computer quantity be less than preset quantity when, first computer by the data sync storage to other at least one Computer.
Date storage method proposed by the present invention, according to user setting divide local cipher disk, by user this store to The data of local cipher disk are encrypted, and encryption data is obtained, and by the synchronous storage of encryption data, to other, at least one storage is set Standby encryption disc, so that the data encryption for being stored in local cipher disk is stored in other storage equipment, to enhance local number According to the safety of storage.In addition, when deleting data, once the quantity of the computer of the data is stored less than preset quantity When, it controls the data and backups to other computers, to ensure data safety.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of date storage method embodiment of the present invention;
Fig. 2 is a kind of Computer Systems Organization schematic diagram of date storage method embodiment of the present invention;
Fig. 3 is that the encryption disc storage space of date storage method embodiment of the present invention uses schematic diagram;
Fig. 4 is another flow chart of date storage method embodiment of the present invention;
Wherein,
S1 core memory equipment
S2 storage server
S3 computer
S4 mobile device.
Specific embodiment
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, the system comprises services Device and at least one computer, which comprises
Step 101, the first computer divide local cipher disk according to user setting, and the local cipher disk is independent number According to memory space;
Step 102, by user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data;
First encryption data is issued server by step 103;
Step 104, by the encryption disc of the data sync storage to other at least one computers, it is described other at least one The encryption disc of a computer divides in advance;
Step 105, when first computer receive delete data instruction when, first computer is looked into server Ask the information for storing the computer of the data;
Step 106, when storing the quantity of computer of the data and being less than preset quantity, first computer will The data sync storage is to other at least one computers.
Local cipher disk is divided according to user setting in the present embodiment, this is stored to the data of local cipher disk by user It is encrypted, obtains encryption data, by the encryption disc of the synchronous storage of encryption data to other at least one storage equipment, thus will The data encryption for being stored in local cipher disk is stored in other storage equipment, to enhance the safety of local datastore.And And in the present embodiment when deleting data, when storing the quantity of computer of the data less than preset quantity, control The data backup to other computers, to ensure data safety.
To keep the purposes, technical schemes and advantages of the present embodiment clearer, below in conjunction with the attached drawing in the present embodiment, Technical solution in the present embodiment is clearly and completely described, it is clear that described embodiment is that a part of the invention is real Example is applied, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creativeness Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of labour.
Memory in the present embodiment can be the equipment with data storage function, specifically, there are data to store function for this The equipment of energy can be the equipment comprising storage chip, storage hard disk, such as computer etc., the present embodiment does not limit.
Embodiment 1
The date storage method of the present embodiment is realized by the equipment with store function such as computer.The present embodiment with Computer is illustrated for realizing the date storage method, but the date storage method of the present embodiment is not limited to computer.
As shown in Figure 1, the date storage method includes:
Step 11: local cipher disk being divided according to user setting, local cipher disk is independent data space.
In the present embodiment, part memory space is marked off in the storage device of computer according to user setting as local Encryption disc, for storing local encryption data.
To realize that the encryption disc on computer can actively guarantee the safety of storage content, settable encryption disc in the present embodiment Access password, while secure logon facility also can be used, user, which needs to log in, could access local cipher disk.
For example, limiting the errors number that user inputs password when user accesses local cipher disk.After number exceeds, Refusal accesses again in a period of time, for example, can just again attempt to access after several hours or after one day.
When networking, short message can be sent to reserved phone number, remind user password input error.
When offline, then lock that the encryption disc is current and within a period of time it is inaccessible.
In order to avoid the content of local cipher disk can not be opened in the absence of a network, local account encryption is allowed Code check.If continuous cipher authentication failed reaches setting number, the verifying it is required that user networks.
After user's networking, it can control the verifying frequency of user in server end, avoided Brute Force user name close The case where code, occurs, to guarantee data security.
Step 12: by user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data.
A variety of cipher modes can be used in the present embodiment, the present embodiment does not limit specific cipher mode.
This is stored to the data of local cipher disk user, after encryption, obtains the first encryption data.Data encryption can Actively enhance safety when data are propagated on the internet.
Step 13: by the synchronous storage of the first encryption data, to other, at least one stores the encryption disc of equipment, at least one The encryption disc of storage equipment divides in advance.
It should be appreciated that the present available capacity for the encryption disc that any storage equipment divides in advance is greater than encrypted data institute The memory capacity needed.
In the present embodiment, whether the present available capacity that can prejudge storage equipment encryption disc is greater than encrypted data Required memory capacity when the present available capacity of confirmation storage equipment encryption disc is enough, then starts to the storage equipment Synchronize storage.
In this way, when a encryption data is written to encryption disc, by the encryption data on internet at least one Storage equipment synchronizes storage.
In the present embodiment, stores and set required for the first encryption data of synchronous storage can be preset according to different scenes Standby quantity, usually the storage equipment of the first encryption data of synchronous storage should more than two, it is preferable that are at least ten.In this way, Backup quantity of data by increasing redundancy guarantees that user can obtain the first encryption data in time, guarantees the storage of the first encryption data Safety, prevent loss of data.
In the present embodiment, preservation current crypto data can be detected automatically and active storage number of devices, current quantity are small It when preset quantity, is dominated by server, from encryption data in the memory space backup of trend any active ues.
In the present embodiment, when the synchronous storage of the first encryption data is to other at least one storage equipment, using P2P technology into The transmission of row data.Settable system server assists establishing P2P link in the present embodiment.First it is detected that living in current ink Equipment is stored near jump, and attempts to carry out P2P connection.If link establishment fails, it is active to reselect another Data storage device establishes P2P link.
In order to avoid currently available synchronous memory device is very little, sufficient amount of common storage is can also be provided in the present embodiment Equipment, e.g., at least ten, P2P link when ensuring any moment between local memory device and public server can succeed It establishes.
In the present embodiment, by user, this stores to the data of local cipher disk and encrypts in step 12, obtains first When encryption data, code key can be generated at random, by the code key, by user, this stores to the data of local cipher disk and encrypts, Obtain the first encryption data.
In the present embodiment, when encrypting to the data that this is stored to local cipher disk, computer can generate one at random A code key, the key are uniquely determined by the data, can only can be decrypted the encryption data by the code key, be obtained the data, To improve data storage safety.
Preferably, which can be reserved in local side and server end.
In the present embodiment, in step 13, by encrypted data sync storage, to other, at least one stores the encryption of equipment It further include that the first encryption data is read from least one processor according to code key after user identity is by verifying after disk.
In the present embodiment, first encryption data storage and other at least one storage equipment in local cipher disk Middle synchronous storage.After verifying user identity, by the key uniquely mapped with first encryption data, opening is stored in some First encryption data in current addressable storage equipment encryption disc.
Various ways verifying user identity, such as account number cipher mode, dynamic password mode etc. can be used, the present embodiment is not It limits.
In the present embodiment, a user can be provided with encryption disc in more storage equipment;Different user can be at same Respective encryption disc is provided in equipment.In the present embodiment, settable cipher server is saved using the date storage method Whole user informations, the user information may include user name, password and other verification informations etc..First each user is believed Breath is encrypted, it is preferable that obtains the encryption subscriber information string for capableing of the unique identification user.Then the encryption is used again Family information character string is uploaded to cipher server.Therefore, at cipher server end, user information is not stored in clear, Yong Huxin Breath is transparent for cipher server.The information such as the password of user only have user, use the username and password of oneself Etc. information, which could be decrypted, and the decryption be only limitted to for user login information verify.Therefore, it both ensure that close Code server end can not inquire the personal information of user, and plaintext user information is avoided to be leaked accidentally, deposit to enhance data The privacy of storage.
In the present embodiment, settable file server is saved to be arranged using the file of whole users of the date storage method Table.User synchronizes more when modifying in its any storage equipment for being preset with local cipher disk to the data of its encryption disc New this document list, then other storage equipment for being preset with local cipher disk can be after its login next time and when coupling internet certainly It is dynamic to be synchronized.User may be selected automatic when logging in the account of oneself in any storage equipment for being preset with local cipher disk It is fetched from internet and belongs to the data of himself to his new encryption disc.
It is further comprising the steps of after dividing local cipher disk according to user setting in step 11 in the present embodiment:
The second encryption data is received, which is that the first synchronous encryption number of equipment is stored from other According to;
Second encryption data is stored to local cipher disk;
When deleting the second encryption data of local cipher disk storage, which is transferred to other at least one The encryption disc of equipment is stored, the encryption disc of other storage equipment divides in advance.
The present embodiment carries out dynamic itemset counting to the current active backup of each data file encryption, according to each encryption data The current active backup counting of file decides whether to continue to synchronize storage to other available storage equipment.
In the present embodiment, when deleting the second encryption data of local cipher disk storage, the second encryption data is transferred to it The encryption disc of his at least one storage equipment.Therefore, if the encryption data of one of storage equipment storage is deleted or lost, By the way that encryption data is stored equipment unloading to others, to will not disappear and lead because of the storage equipment of storage encryption data Encryption data is caused to lose, to improve data storage security.
It should be noted that in the present embodiment, when local cipher disk deletes its storing data, can simultaneously or it is default when Between, for example, deleting corresponding data in all synchronous memory devices after 24 hours.To prevent user misoperation from deleting accidentally Data, in order to data recovery.
In the present embodiment, by user, this stores to the data of local cipher disk and encrypts step 12, obtain first plus Further include following steps before ciphertext data:
Stored according to this to the data of local cipher disk, generate corresponding cryptographic Hash, the cryptographic Hash unique identification this It stores to the data of local cipher disk;
Other any users are requested to generate when being stored in data file identical with the cryptographic Hash in its local cipher disk Key;
Receive the key;
Correspondingly, by user, this stores to the data of local cipher disk and encrypts, and obtaining the first encryption data includes:
According to the key, to user, this stores to the data of local cipher disk and encrypts.
In the present embodiment, at encryption disc end when Initiative Inventory Management data, according to user, this is stored to the number of local cipher disk According to file content, filename weigh its cryptographic Hash.Cryptographic Hash can be used as the unique identification information of file, according to two files Cryptographic Hash both can judge whether be same substantive content file.
In the present embodiment, by user, this stores to the cryptographic Hash of the data of local cipher disk and is reported to file-management services Device;Inquiry cryptographic Hash whether there is in the listed files that document management server is safeguarded;If the cryptographic Hash has existed, The key for requesting other any users to generate when being stored in data file identical with the cryptographic Hash in its local cipher disk;It receives User this store the key of the data to local cipher disk;Key based on the received, to user, this is stored to local cipher The data of disk are encrypted, and no longer active synchronization stores the data to other storage equipment.
It gets in touch if user fails with other users, a new code key is automatically generated, to this document It is encrypted locally, and active synchronization stores the storage equipment of data to other at least two or more.
In the present embodiment, after generation key, further includes:
The request that other storage equipment takes the code key is received, code key request is taken to be intended to deposit by other storage equipment The data of storage stored with this this data to local cipher disk it is identical when transmission;
According to the request for obtaining the code key, the code key is sent to other the storage equipment.
Such case is possessed by multiple and different network users for the file of same substantive content, the present embodiment passes through Kazakhstan Uncommon value judge certain two file whether be same substantive content file.For substantially identical file, the present embodiment no longer exists It is local to generate random key for this document, but by requesting the close of this document to the other users for having possessed this document Key.After receiving and taking the request of this document code key from other storage equipment, sent to other the storage equipment The code key.
It should be noted that " first ", " second " are only thought to divide for convenience of description in the present embodiment, do not constitute to this The restriction of square embodiment.
The date storage method of the present embodiment, divides local cipher disk according to user setting, and by user, this is stored to this The data of ground encryption disc are encrypted, and encryption data is obtained, by the synchronous storage of encryption data to other at least one storage equipment Encryption disc, thus by the data encryption for being stored in local cipher disk be stored in other storage equipment, to enhance local data The safety of storage.
Embodiment 2
As shown in Fig. 2, the present embodiment proposes a kind of computer system, the date storage method that the present embodiment proposes can be applied In the computer system.
The computer system includes the 4 class equipment interconnected by internet, respectively core memory equipment S1, storage service Device S2, computer S3, mobile device S4.Wherein, core memory equipment S1 is used to store the index letter of user information, user file Breath etc., while can also assist establishing P2P link.Multiple cores server S 1 is set within the system, on the one hand can provide more Powerful dispatching, another party is also for load balancing and disaster recovery.
When storage server S2 is then storing data synchronous in order to avoid user, do not have on current ink it is sufficient amount of its His any active ues establish P2P connection and synchrodata such case and reserved setting therewith, and effect and function are equal to one A ordinary user's account.
Computer S3, mobile device S4 are terminal devices workable for computer system ordinary user.
In the local cipher disk of computer S3, local data is both stored, also storage is from other users in the network link Backup Data.The Backup Data of these other users is transparent to local user.Local user's account can inquire local add Currently practical available memory capacity size in close disk, but the Backup Data for belonging to other users cannot be accessed.
Encryption disc is not preset on mobile device S4.User can be visited by the application program installed on mobile device S4 It asks data and management data, and the data for backing up storage on network is downloaded into mobile terminal S4, but do not undertake mobile end data Backup to the task of network and backup other users data.
It should be understood that Fig. 2 is only Application Scenarios-Example, the restriction to the present embodiment is not constituted.
Embodiment 3
In the present embodiment date storage method, the actual use situation of any local cipher disk capacity is as shown in Figure 3. The memory space that local user divides is defined as local cipher disk.In the local cipher disk, refer to that user cannot with space The space of data is written again, local user's available space refers to local user in the maximum capacity that data are written into encryption disc. It has used in space, that is, has included the encryption data of local user, also included the encryption data of the synchronous storage of network other users.It is synchronous Store other users encryption data be backstage automatic running, local user can be it is transparent, also can be set to this The prompting of ground user.
Therefore, local cipher disk had both stored local cipher data, also store from the network link other users it is standby Part data.Preferably, the Backup Data of these other users is transparent to local user, and local user's account can inquire local Currently practical available memory capacity size in encryption disc, but the synchronization storing data for belonging to other users cannot be accessed.
For example, user is assigned with the memory space of 1G, as local cipher disk, but user has only used the number of 500M at present According to then the remaining space 500M, can store the encryption data from other synchronous storages of storage equipment.
Embodiment 4
This reality is discussed in detail so that executing subject is with the computer of store function as an example in the present embodiment combination concrete scene Apply the date storage method of example.
It should be noted that file is identical as the meaning of data in the present embodiment.As shown in figure 4, the present embodiment provides one Kind date storage method, comprising:
41 computers divide encryption disc according to user's operation;
42 computers prepare that unencrypted file is written to local cipher disk;
43 computers determine the cryptographic Hash of the unencrypted file, and by the cryptographic Hash reporting file management server;
Whether 44 document management servers judge this document synchronized storage according to the cryptographic Hash;If synchronized deposit Storage, then execute 45;If synchronous storage not yet, executes 48;
45 request the key of this document to the user for being stored with this document is synchronized;
46 judge whether the key for requesting this document succeeds;
If it succeeds, executing 47;48 are executed if failure;
47 are identified using the key pair local unencrypted file;
The 48 random key values for generating this document.
49 utilize the code key value, encryption disc of the synchronous storage to other storage equipment after this document is encrypted
This gives the methods of the shared key between the file of identical cryptographic Hash.The present embodiment also gives to work as and ask When asking key is shared to fail, the method that a new key carrys out encryption data is in addition generated.The present embodiment is by cryptographic Hash to phase It is screened with file, and by being deposited to be substantially reduced prepare more part file to same file shared key and encryption data The potential same file of method for storing, which is repeated as many times, stores bring storage pressure, so that the idle storage on internet both be utilized Resource, and data storage security can be enhanced.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes are obvious for the those of ordinary skill in art field.The selection of term used herein, purport In the principle, practical application or improvement to the technology in market for best explaining each embodiment, or make the art Other those of ordinary skill can understand each embodiment disclosed herein.
Those skilled in the art will readily occur to its of the disclosure after considering specification and practicing disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.

Claims (5)

1. a kind of date storage method, which is characterized in that be applied to data-storage system, the system comprises server and at least One computer, which comprises
First computer divides local cipher disk according to user setting, and the local cipher disk is independent data space;
By user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption data;
First encryption data is issued into server;
The synchronous storage of first encryption data is arrived to the encryption disc of other at least one computers, other described at least one meters The encryption disc of calculation machine divides in advance;
When first computer receives the instruction for deleting the first encryption data, first computer is deposited to server inquiry Store up the information of the computer of first encryption data;
When storing the quantity of computer of first encryption data less than preset quantity, first computer will be described Data sync storage is to other at least one computers;
Wherein, described by user, this stores to the data of local cipher disk and encrypts, before obtaining the first encryption data, also The following steps are included:
Stored according to this to the data of local cipher disk, generate corresponding cryptographic Hash, the cryptographic Hash unique identification this deposit It stores up to the data of local cipher disk;
Other any users are requested to generate when being stored in data file identical with the cryptographic Hash in its local cipher disk close Key;
Receive the key;
Correspondingly, by user, this stores to the data of local cipher disk and encrypts, and obtaining the first encryption data includes:
According to the key, to user, this stores to the data of local cipher disk and encrypts;
User synchronizes more when modifying in its any storage equipment for being preset with local cipher disk to the data of its encryption disc New listed files, then other storage equipment for being preset with local cipher disk can be after its login next time and automatic when coupling internet It is synchronized;
The method also includes: automatic detection saves current crypto data and active storage number of devices, current active are deposited When storing up number of devices less than preset quantity, dominated by server, from the storage device backup encryption data of trend any active ues.
2. date storage method according to claim 1, which is characterized in that described by user, this is stored to local cipher The data of disk are encrypted, and obtaining the first encryption data includes following steps:
It is random to generate key;
According to the key, by user, this stores to the data of local cipher disk and encrypts, and obtains the first encryption number According to.
3. date storage method according to claim 1, which is characterized in that described to divide local cipher according to user setting It is further comprising the steps of after disk:
The second encryption data is received, second encryption data stores synchronous first encryption of equipment from other Data;
Second encryption data is stored to local cipher disk;
Delete local cipher disk storage second encryption data when, by second encryption data be transferred to other at least one The encryption disc of the encryption disc of a storage equipment, other at least one storage equipment divides in advance.
4. date storage method according to claim 3, which is characterized in that further comprising the steps of:
The request that other storage equipment takes the key is received, it is described that the key request is taken to be stored by described other The equipment data to be stored and described this store the data to local cipher disk it is identical when transmission;
According to the request for taking the key, the key is sent to other the storage equipment.
5. date storage method according to claim 3, which is characterized in that described synchronize first encryption data is deposited It is further comprising the steps of after the encryption disc for storing up other at least one storage equipment:
After user identity is by verifying, first encryption data is read from at least one processor according to the key.
CN201510731692.1A 2015-10-30 2015-10-30 Date storage method Active CN105426767B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510731692.1A CN105426767B (en) 2015-10-30 2015-10-30 Date storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510731692.1A CN105426767B (en) 2015-10-30 2015-10-30 Date storage method

Publications (2)

Publication Number Publication Date
CN105426767A CN105426767A (en) 2016-03-23
CN105426767B true CN105426767B (en) 2019-04-05

Family

ID=55504970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510731692.1A Active CN105426767B (en) 2015-10-30 2015-10-30 Date storage method

Country Status (1)

Country Link
CN (1) CN105426767B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883103A (en) * 2009-04-15 2010-11-10 埃森哲环球服务有限公司 The method and system of the client-side extensions of Web server gang fight structure in the cloud data center
CN103731439A (en) * 2011-12-31 2014-04-16 华茂云天科技(北京)有限公司 Elastic storage service system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN104156377A (en) * 2013-05-13 2014-11-19 孙良茵 Virtual file system achieving reliability through multi-network-disk redundant storage

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8849971B2 (en) * 2008-05-28 2014-09-30 Red Hat, Inc. Load balancing in cloud-based networks
CN104331346B (en) * 2014-11-21 2017-08-25 四川神琥科技有限公司 A kind of data guard method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101883103A (en) * 2009-04-15 2010-11-10 埃森哲环球服务有限公司 The method and system of the client-side extensions of Web server gang fight structure in the cloud data center
CN103731439A (en) * 2011-12-31 2014-04-16 华茂云天科技(北京)有限公司 Elastic storage service system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN104156377A (en) * 2013-05-13 2014-11-19 孙良茵 Virtual file system achieving reliability through multi-network-disk redundant storage

Also Published As

Publication number Publication date
CN105426767A (en) 2016-03-23

Similar Documents

Publication Publication Date Title
US20220131696A1 (en) Secure file sharing method and system
AU2013101722A4 (en) Data security management system
Zhang et al. Ensure data security in cloud storage
US9098718B2 (en) Systems and methods for securing data using multi-factor or keyed dispersal
CN105183402B (en) Date storage method
US20150249687A1 (en) Systems and methods for securing data in the cloud
US20110246817A1 (en) Systems and methods for securing data in motion
CN104023085A (en) Security cloud storage system based on increment synchronization
CN104035891B (en) Android mobile terminal data security protection system
KR20130084604A (en) Method to control and limit readability of electronic documents
EP2692107B1 (en) Managed authentication on a distributed network
CN110362984B (en) Method and device for operating service system by multiple devices
JP4875781B1 (en) Distributed data storage system
CN105224262A (en) Data processing method
CN105426783B (en) More Backup Data storage methods
CN105302490B (en) Date storage method
Hwang et al. A mutual nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices
JP5485452B1 (en) Key management system, key management method, user terminal, key generation management device, and program
CN105426767B (en) Date storage method
CN205430310U (en) Data storage device
CN105407091A (en) Data processing method
Hwang et al. Fulfilling mutual nonrepudiation for cloud storage
CN105426768B (en) Ciphertext date storage method
CN205080542U (en) Data storage device
CN205230060U (en) Data storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170930

Address after: 610000 Building 8, B District, 6, Jing Rong International Plaza, 200 Tianfu five street, Chengdu hi tech Zone, Sichuan

Applicant after: Sichuan starry Star Technology Co., Ltd.

Address before: 210000 Qinhuai City, Nanjing Province, the main street in the morning of the day on the morning of the 1865 Creative Park E-8 building, room 388, building, Room 202

Applicant before: NANJING QINSHE MINGSHI INFORMATION TECHNOLOGY CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant