CN106355099A - Cloud backup method and device - Google Patents
Cloud backup method and device Download PDFInfo
- Publication number
- CN106355099A CN106355099A CN201610775816.0A CN201610775816A CN106355099A CN 106355099 A CN106355099 A CN 106355099A CN 201610775816 A CN201610775816 A CN 201610775816A CN 106355099 A CN106355099 A CN 106355099A
- Authority
- CN
- China
- Prior art keywords
- data
- camouflaged
- backed
- fragment
- data message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a cloud backup method and a cloud backup device. The method comprises the steps of obtaining to-be-backup data information; cutting the to-be-backup data information into a plurality of first data segments; generating multiple pretended data segments according to the to-be-backup data information; assembling a plurality of first data segments and a plurality of pretended data segments to be two data packets according to a preset algorithm, wherein every data packet at least includes one pretended data segment; respectively uploading two data packets to a first server and a second server for backup. The cloud backup method has the beneficial effects of improving data safety.
Description
Technical field
The present invention relates to the communications field, more particularly to a kind of cloud backup method and device.
Background technology
With the increasingly popularization of cloud redundancy technique, problem of data safety becomes a topic that can't steer clear of.Prior art
In, once Cloud Server by hacker black enter, loss of data therein can bring immeasurable loss to user.
Therefore, prior art existing defects, need to improve.
Content of the invention
The embodiment of the present invention provides a kind of cloud backup method and device.
The embodiment of the present invention provides a kind of cloud backup method, comprises the following steps:
Obtain data message to be backed up;
Described data message to be backed up is cut into multiple first data slots;
Multiple Camouflaged data fragments are generated according to the described data message with backup;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its
In, at least there is in each described packet a Camouflaged data fragment;
Described two packets are uploaded to first server respectively and second server is backed up.
In cloud backup method of the present invention, described according to described with backup data message generate multiple camouflage numbers
Step according to fragment includes:
Obtain the species of data message to be backed up;
Species according to described data message to be backed up obtains Camouflaged data information;
Described Camouflaged data information is cut into multiple Camouflaged data fragments.
In cloud backup method of the present invention, the described species according to described data message to be backed up obtains camouflage
The step of data message includes;
Tentation data is downloaded from the Internet as Camouflaged data information according to the species of described data message to be backed up.
In cloud backup method of the present invention, described by the plurality of first data slot and multiple Camouflaged data
Fragment is assembled into two packets according to pre-defined algorithm, wherein, at least has a Camouflaged data piece in each described packet
The step of section includes;
Mark is added to each described Camouflaged data fragment and each described first data slot;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its
In, at least there is in each described packet a Camouflaged data fragment.
A kind of cloud back-up device, comprising:
Acquisition module, for obtaining data message to be backed up;
Cutting module, for cutting into multiple first data slots by described data message to be backed up;
Generation module, for generating multiple Camouflaged data fragments according to the described data message with backup;
Assembling module, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm
Two packets, wherein, at least have a Camouflaged data fragment in each described packet;
Upper transmission module, for being uploaded to first server respectively by described two packets and second server is backed up.
In cloud back-up device of the present invention, described generation module includes:
First acquisition unit, for obtaining the species of data message to be backed up;
Second acquisition unit, obtains Camouflaged data information for the species according to described data message to be backed up;
Cutter unit, for cutting into multiple Camouflaged data fragments by described Camouflaged data information.
In cloud back-up device of the present invention, described second acquisition unit is used for according to described data letter to be backed up
The species of breath downloads tentation data from the Internet as Camouflaged data information.
In cloud back-up device of the present invention, described assembling module includes:
Mark unit, for adding mark to each described Camouflaged data fragment and each described first data slot;
Module unitss, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm
Two packets, wherein, at least have a Camouflaged data fragment in each described packet.
Compared to prior art, the present invention passes through to obtain data message to be backed up;By described data letter to be backed up
Breath cuts into multiple first data slots;Multiple Camouflaged data fragments are generated according to the described data message with backup;Will be described
Multiple first data slots and multiple Camouflaged data fragment are assembled into two packets, wherein, Mei Yisuo according to pre-defined algorithm
State and at least there is in packet a Camouflaged data fragment;Described two packets are uploaded to first server and the second clothes
Business device is backed up, thus realizing backing up data in two servers, being that a server is hacked, also not resulting in number
According to leakage, additionally, due in the present invention, cut into multiple first data slots using by data message to be backed up, and obtain
Type B error fills data slot, so that the difficulty cracking increases further, further increases the safety of data.
Brief description
Fig. 1 is the flow chart of the cloud backup method in first preferred embodiment of the invention.
Fig. 2 is the structure chart of the cloud back-up device in one embodiment of the present invention.
Specific embodiment
Refer to schema, wherein identical element numbers represent identical assembly, and the principle of the present invention is to be implemented in one
To illustrate in suitable computing environment.The following description is based on the illustrated specific embodiment of the invention, and it should be by
It is considered as limiting the present invention other specific embodiments not detailed herein.
In the following description, the specific embodiment of the present invention will be with reference to the operation performed by or multi-section computer
Step and symbol illustrating, unless otherwise stating clearly.Therefore, it will appreciate that these steps and operation, wherein has and carries for several times
To for being executed by computer, including by representing with the computer disposal list of the electronic signal of the data in a structuring pattern
Unit is manipulated.This data of this manipulation transforms or be maintained at this computer memory system in position at, it can be joined again
Put or in addition to change in a manner familiar to those skilled in the art the running of this computer.The data knot that this data is maintained
Structure is the provider location of this internal memory, and it has by particular characteristics defined in this data form.But, the principle of the invention is with above-mentioned
Illustrating, it is not represented as a kind of restriction to word, those skilled in the art will appreciate that described below plurality of step and
Operation also may be implemented in the middle of hardware.
Embodiment one
As shown in figure 1, the embodiment of the present invention provides a kind of cloud backup method, comprise the following steps:
S101, obtains data message to be backed up;This data message can be picture, address list information and chat record information
Deng.
S102, described data message to be backed up is cut into multiple first data slots;
S103, generates multiple Camouflaged data fragments according to the described data message with backup;In this step, mainly standby according to treating
The type of part data message, obtains the Camouflaged data information of same type, then generates multiple Camouflaged data fragments.
S104, the plurality of first data slot and multiple Camouflaged data fragment are assembled into two according to pre-defined algorithm
Packet, wherein, at least has a Camouflaged data fragment in each described packet;Can by random assembling it is also possible to
Using pre-defined algorithm assembling, after downloading data when, then this packet is taken apart using corresponding algorithm.
S105, described two packets is uploaded to first server respectively and second server is backed up.
Wherein, the described step according to the described multiple Camouflaged data fragments of generation of the data message with backup includes:
S1031, obtains the species of data message to be backed up;
S1032, the species according to described data message to be backed up obtains Camouflaged data information;
S1033, described Camouflaged data information is cut into multiple Camouflaged data fragments.
In cloud backup method of the present invention, the described species according to described data message to be backed up obtains camouflage
The step of data message includes;
Tentation data is downloaded from the Internet as Camouflaged data information according to the species of described data message to be backed up.
In cloud backup method of the present invention, described by the plurality of first data slot and multiple Camouflaged data
Fragment is assembled into two packets according to pre-defined algorithm, wherein, at least has a Camouflaged data piece in each described packet
The step of section includes;
Mark is added to each described Camouflaged data fragment and each described first data slot;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its
In, at least there is in each described packet a Camouflaged data fragment.
The present invention is not had to pass through to obtain data message to be backed up as from the foregoing;Described data message to be backed up is cut into
Multiple first data slots;Multiple Camouflaged data fragments are generated according to the described data message with backup;By the plurality of first
Data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, wherein, each described packet
In at least there is a Camouflaged data fragment;Described two packets are uploaded to first server and second server is carried out
Backup, thus realizing backing up data in two servers, being that a server is hacked, also not resulting in leaking data,
Additionally, due in the present invention, cut into multiple first data slots using by data message to be backed up, and obtain camouflage
Data slot, so that the difficulty cracking increases further, further increases the safety of data.
Embodiment two
As shown in Fig. 2 present invention also offers a kind of cloud back-up device, comprising:
Acquisition module 201, for obtaining data message to be backed up;
Cutting module 202, for cutting into multiple first data slots by described data message to be backed up;
Generation module 203, for generating multiple Camouflaged data fragments according to the described data message with backup;
Assembling module 204, for by the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm group
Dress up two packets, wherein, at least there is in each described packet a Camouflaged data fragment;
Upper transmission module 205, for described two packets are uploaded to first server respectively and second server carry out standby
Part.
In cloud back-up device of the present invention, described generation module 203 includes:
First acquisition unit, for obtaining the species of data message to be backed up;
Second acquisition unit, obtains Camouflaged data information for the species according to described data message to be backed up;
Cutter unit, for cutting into multiple Camouflaged data fragments by described Camouflaged data information.
In cloud back-up device of the present invention, described second acquisition unit is used for according to described data letter to be backed up
The species of breath downloads tentation data from the Internet as Camouflaged data information.
In cloud back-up device of the present invention, described assembling module 204 includes:
Mark unit, for adding mark to each described Camouflaged data fragment and each described first data slot;
Module unitss, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm
Two packets, wherein, at least have a Camouflaged data fragment in each described packet.
The present invention is not had to pass through to obtain data message to be backed up as from the foregoing;Described data message to be backed up is cut into
Multiple first data slots;Multiple Camouflaged data fragments are generated according to the described data message with backup;By the plurality of first
Data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, wherein, each described packet
In at least there is a Camouflaged data fragment;Described two packets are uploaded to first server and second server is carried out
Backup, thus realizing backing up data in two servers, being that a server is hacked, also not resulting in leaking data,
Additionally, due in the present invention, cut into multiple first data slots using by data message to be backed up, and obtain camouflage
Data slot, so that the difficulty cracking increases further, further increases the safety of data.
There is provided herein the various operations of embodiment.In one embodiment, described one or more operations can be with structure
Become the computer-readable instruction of storage on one or more computer-readable mediums, it will make when being executed by electronic equipment to succeed in one's scheme
Calculation equipment executes described operation.Describing the order of some or all of operations, to should not be construed as to imply that these operations necessarily suitable
Sequence correlation.It will be appreciated by those skilled in the art that having the alternative sequence of the benefit of this specification.Furthermore, it is to be understood that
Not all operation must exist in each embodiment provided in this article.
And, word " preferred " used herein means serving as example, example or illustration.Feng Wen is described as " preferably
" any aspect or design be not necessarily to be construed as than other aspects or design more favourable.On the contrary, the use purport of word " preferred "
Concept is being proposed in a concrete fashion.As used in this application term "or" is intended to mean the "or" comprising and non-excluded
"or".That is, unless otherwise or clear from the context, " x is using a or b " means that nature includes any one of arrangement.
That is, if x uses a;X uses b;Or x uses both a and b, then " x is using a or b " is met in aforementioned any example.
And, although illustrate and describing the disclosure, this area skill with respect to one or more implementations
Art personnel will be appreciated that equivalent variations and modification based on to the reading of the specification and drawings and understanding.The disclosure include all this
The modification of sample and modification, and be limited only by the scope of the following claims.Particularly with by said modules (such as element,
Resource etc.) various functions that execute, the term for describing such assembly is intended to corresponding to the specified work(executing described assembly
The random component (unless otherwise instructed) of energy (for example it is functionally of equal value), even if illustrated herein with execution in structure
The exemplary implementations of the disclosure in the open structure of function be not equal to.Although additionally, the special characteristic of the disclosure is
Through being disclosed with respect to the only one in some implementations, but this feature can be to giving or application-specific with such as
For be expectation and favourable other implementations other combinations of features one or more.And, with regard to term " inclusion ", " tool
Have ", " containing " or its deformation be used in specific embodiment or claim for, such term be intended to with term
The similar mode of "comprising" includes.
Each functional unit in the embodiment of the present invention can be integrated in a processing module or unit list
Solely it is physically present it is also possible to two or more units are integrated in a module.Above-mentioned integrated module both can adopt
The form of hardware is realized, it would however also be possible to employ the form of software function module is realized.If described integrated module is with software function
The form of module is realized and is situated between it is also possible to be stored in an embodied on computer readable storage as independent production marketing or when using
In matter.Storage medium mentioned above can be read only memory, disk or CD etc..Above-mentioned each device or system are permissible
Method in execution correlation method embodiment.
In sum although the present invention is disclosed above with preferred embodiment, but above preferred embodiment and be not used to limit
The present invention processed, those of ordinary skill in the art, without departing from the spirit and scope of the present invention, all can make various change and profit
Decorations, therefore protection scope of the present invention is defined by the scope that claim defines.
Claims (8)
1. a kind of cloud backup method is it is characterised in that comprise the following steps:
Obtain data message to be backed up;
Described data message to be backed up is cut into multiple first data slots;
Multiple Camouflaged data fragments are generated according to the described data message with backup;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its
In, at least there is in each described packet a Camouflaged data fragment;
Described two packets are uploaded to first server respectively and second server is backed up.
2. cloud backup method according to claim 1 is it is characterised in that described give birth to according to the described data message with backup
The step becoming multiple Camouflaged data fragments includes:
Obtain the species of data message to be backed up;
Species according to described data message to be backed up obtains Camouflaged data information;
Described Camouflaged data information is cut into multiple Camouflaged data fragments.
3. cloud backup method according to claim 2 it is characterised in that described according to described data message to be backed up
The step that species obtains Camouflaged data information includes;
Tentation data is downloaded from the Internet as Camouflaged data information according to the species of described data message to be backed up.
4. cloud backup method according to claim 2 it is characterised in that described by the plurality of first data slot and
Multiple Camouflaged data fragments are assembled into two packets according to pre-defined algorithm, wherein, at least have one in each described packet
The step of individual Camouflaged data fragment includes;
Mark is added to each described Camouflaged data fragment and each described first data slot;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its
In, at least there is in each described packet a Camouflaged data fragment.
5. a kind of cloud back-up device is it is characterised in that include:
Acquisition module, for obtaining data message to be backed up;
Cutting module, for cutting into multiple first data slots by described data message to be backed up;
Generation module, for generating multiple Camouflaged data fragments according to the described data message with backup;
Assembling module, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm
Two packets, wherein, at least have a Camouflaged data fragment in each described packet;
Upper transmission module, for being uploaded to first server respectively by described two packets and second server is backed up.
6. cloud back-up device according to claim 5 is it is characterised in that described generation module includes:
First acquisition unit, for obtaining the species of data message to be backed up;
Second acquisition unit, obtains Camouflaged data information for the species according to described data message to be backed up;
Cutter unit, for cutting into multiple Camouflaged data fragments by described Camouflaged data information.
7. cloud back-up device according to claim 6 is it is characterised in that described second acquisition unit is used for being treated according to described
The species of the data message of backup downloads tentation data from the Internet as Camouflaged data information.
8. cloud back-up device according to claim 7 is it is characterised in that described assembling module includes:
Mark unit, for adding mark to each described Camouflaged data fragment and each described first data slot;
Module unitss, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm
Two packets, wherein, at least have a Camouflaged data fragment in each described packet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610775816.0A CN106355099B (en) | 2016-08-31 | 2016-08-31 | Cloud backup method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610775816.0A CN106355099B (en) | 2016-08-31 | 2016-08-31 | Cloud backup method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106355099A true CN106355099A (en) | 2017-01-25 |
CN106355099B CN106355099B (en) | 2021-09-03 |
Family
ID=57857450
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610775816.0A Active CN106355099B (en) | 2016-08-31 | 2016-08-31 | Cloud backup method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106355099B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007133791A2 (en) * | 2006-05-15 | 2007-11-22 | Richard Kane | Data partitioning and distributing system |
CN102262717A (en) * | 2011-07-18 | 2011-11-30 | 百度在线网络技术(北京)有限公司 | Method, device and equipment for changing original installation information and detecting installation information |
CN103065101A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Anti-counterfeiting method for documents |
CN103514198A (en) * | 2012-06-25 | 2014-01-15 | 北京智慧风云科技有限公司 | File management method, cloud storage system and cloud terminal server in cloud storage system |
CN103793666A (en) * | 2014-01-24 | 2014-05-14 | 中经云数据存储科技(北京)有限公司 | Data file protecting method and system |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN104298926A (en) * | 2013-07-19 | 2015-01-21 | 腾讯科技(深圳)有限公司 | Method and device for running encrypted file |
CN104637039A (en) * | 2013-11-07 | 2015-05-20 | 深圳市腾讯计算机系统有限公司 | Picture processing method and picture processing device |
CN105426775A (en) * | 2015-11-09 | 2016-03-23 | 北京联合大学 | Method and system for protecting information security of smartphone |
CN105577893A (en) * | 2014-10-13 | 2016-05-11 | 中兴通讯股份有限公司 | Method, device and terminal for information backup |
US20160226838A1 (en) * | 2012-11-12 | 2016-08-04 | Infinite Io | Systems and methods of transmitting data |
-
2016
- 2016-08-31 CN CN201610775816.0A patent/CN106355099B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007133791A2 (en) * | 2006-05-15 | 2007-11-22 | Richard Kane | Data partitioning and distributing system |
CN102262717A (en) * | 2011-07-18 | 2011-11-30 | 百度在线网络技术(北京)有限公司 | Method, device and equipment for changing original installation information and detecting installation information |
CN103514198A (en) * | 2012-06-25 | 2014-01-15 | 北京智慧风云科技有限公司 | File management method, cloud storage system and cloud terminal server in cloud storage system |
US20160226838A1 (en) * | 2012-11-12 | 2016-08-04 | Infinite Io | Systems and methods of transmitting data |
CN103065101A (en) * | 2012-12-14 | 2013-04-24 | 北京思特奇信息技术股份有限公司 | Anti-counterfeiting method for documents |
CN104298926A (en) * | 2013-07-19 | 2015-01-21 | 腾讯科技(深圳)有限公司 | Method and device for running encrypted file |
CN104637039A (en) * | 2013-11-07 | 2015-05-20 | 深圳市腾讯计算机系统有限公司 | Picture processing method and picture processing device |
CN103793666A (en) * | 2014-01-24 | 2014-05-14 | 中经云数据存储科技(北京)有限公司 | Data file protecting method and system |
CN104134022A (en) * | 2014-07-31 | 2014-11-05 | 北京深境智能科技有限公司 | Information hiding and protecting method based on image |
CN105577893A (en) * | 2014-10-13 | 2016-05-11 | 中兴通讯股份有限公司 | Method, device and terminal for information backup |
CN105426775A (en) * | 2015-11-09 | 2016-03-23 | 北京联合大学 | Method and system for protecting information security of smartphone |
Non-Patent Citations (1)
Title |
---|
叶薇: "支持多级隐私保护的云备份系统的研究与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN106355099B (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10079842B1 (en) | Transparent volume based intrusion detection | |
US10984111B2 (en) | Data driven parser selection for parsing event logs to detect security threats in an enterprise system | |
WO2017019717A1 (en) | Dynamic attachment delivery in emails for advanced malicious content filtering | |
US9256741B2 (en) | Method and device for determining propagation relationship of Trojan horse files | |
Aalst | Challenges in business process analysis | |
CN108282347A (en) | A kind of server data online management method and system | |
CN106355099A (en) | Cloud backup method and device | |
CN115757639A (en) | Data source synchronization method and device, electronic equipment and storage medium | |
US10482279B2 (en) | Pattern-less private data detection on data sets | |
Yuanchao et al. | Ultra-high speed fault phase selection method using morphology-wavelet transform | |
CN109634931B (en) | Log uploading method and device | |
CN109728929B (en) | Test method, test device and storage medium | |
Dongen et al. | Process mining: fuzzy clustering and performance visualization | |
Ghasemabadi et al. | Application of five processes of project management based on PMBOK-2008 standard to run EPM-2010 project management system: A case study of Arya Hamrah Samaneh Co. | |
CN110719260B (en) | Intelligent network security analysis method and device and computer readable storage medium | |
Woropay et al. | Semi-Markov model of the vehicle operation and maintenance processes within an urban transportation system | |
CN104636458A (en) | Updating method and device for address information base | |
Fang et al. | Modeling and Verifying MooseFS in CSP | |
Americas et al. | USENIX Open Access Policy | |
CN114398654A (en) | Product login management method and device, computer equipment and storage medium | |
CN112861093A (en) | Verification method, device and equipment for access data and storage medium | |
CN112988457A (en) | Data backup method, device and system and computer equipment | |
Tchórzewska-Cieślak et al. | Analysis of risk connected with water supply system operating by means of the logical trees method | |
Dobrowolski et al. | Crisis management via agent-based simulation | |
Tao et al. | The payment pattern of Merger and Acquisition: An empirical analysis from China's listed companies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |