CN106355099A - Cloud backup method and device - Google Patents

Cloud backup method and device Download PDF

Info

Publication number
CN106355099A
CN106355099A CN201610775816.0A CN201610775816A CN106355099A CN 106355099 A CN106355099 A CN 106355099A CN 201610775816 A CN201610775816 A CN 201610775816A CN 106355099 A CN106355099 A CN 106355099A
Authority
CN
China
Prior art keywords
data
camouflaged
backed
fragment
data message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610775816.0A
Other languages
Chinese (zh)
Other versions
CN106355099B (en
Inventor
蔡昭权
胡辉
陈伽
胡松
蔡映雪
陈军
黄翰
黄思博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou University
Original Assignee
Huizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou University filed Critical Huizhou University
Priority to CN201610775816.0A priority Critical patent/CN106355099B/en
Publication of CN106355099A publication Critical patent/CN106355099A/en
Application granted granted Critical
Publication of CN106355099B publication Critical patent/CN106355099B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a cloud backup method and a cloud backup device. The method comprises the steps of obtaining to-be-backup data information; cutting the to-be-backup data information into a plurality of first data segments; generating multiple pretended data segments according to the to-be-backup data information; assembling a plurality of first data segments and a plurality of pretended data segments to be two data packets according to a preset algorithm, wherein every data packet at least includes one pretended data segment; respectively uploading two data packets to a first server and a second server for backup. The cloud backup method has the beneficial effects of improving data safety.

Description

Cloud backup method and device
Technical field
The present invention relates to the communications field, more particularly to a kind of cloud backup method and device.
Background technology
With the increasingly popularization of cloud redundancy technique, problem of data safety becomes a topic that can't steer clear of.Prior art In, once Cloud Server by hacker black enter, loss of data therein can bring immeasurable loss to user.
Therefore, prior art existing defects, need to improve.
Content of the invention
The embodiment of the present invention provides a kind of cloud backup method and device.
The embodiment of the present invention provides a kind of cloud backup method, comprises the following steps:
Obtain data message to be backed up;
Described data message to be backed up is cut into multiple first data slots;
Multiple Camouflaged data fragments are generated according to the described data message with backup;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its In, at least there is in each described packet a Camouflaged data fragment;
Described two packets are uploaded to first server respectively and second server is backed up.
In cloud backup method of the present invention, described according to described with backup data message generate multiple camouflage numbers Step according to fragment includes:
Obtain the species of data message to be backed up;
Species according to described data message to be backed up obtains Camouflaged data information;
Described Camouflaged data information is cut into multiple Camouflaged data fragments.
In cloud backup method of the present invention, the described species according to described data message to be backed up obtains camouflage The step of data message includes;
Tentation data is downloaded from the Internet as Camouflaged data information according to the species of described data message to be backed up.
In cloud backup method of the present invention, described by the plurality of first data slot and multiple Camouflaged data Fragment is assembled into two packets according to pre-defined algorithm, wherein, at least has a Camouflaged data piece in each described packet The step of section includes;
Mark is added to each described Camouflaged data fragment and each described first data slot;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its In, at least there is in each described packet a Camouflaged data fragment.
A kind of cloud back-up device, comprising:
Acquisition module, for obtaining data message to be backed up;
Cutting module, for cutting into multiple first data slots by described data message to be backed up;
Generation module, for generating multiple Camouflaged data fragments according to the described data message with backup;
Assembling module, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm Two packets, wherein, at least have a Camouflaged data fragment in each described packet;
Upper transmission module, for being uploaded to first server respectively by described two packets and second server is backed up.
In cloud back-up device of the present invention, described generation module includes:
First acquisition unit, for obtaining the species of data message to be backed up;
Second acquisition unit, obtains Camouflaged data information for the species according to described data message to be backed up;
Cutter unit, for cutting into multiple Camouflaged data fragments by described Camouflaged data information.
In cloud back-up device of the present invention, described second acquisition unit is used for according to described data letter to be backed up The species of breath downloads tentation data from the Internet as Camouflaged data information.
In cloud back-up device of the present invention, described assembling module includes:
Mark unit, for adding mark to each described Camouflaged data fragment and each described first data slot;
Module unitss, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm Two packets, wherein, at least have a Camouflaged data fragment in each described packet.
Compared to prior art, the present invention passes through to obtain data message to be backed up;By described data letter to be backed up Breath cuts into multiple first data slots;Multiple Camouflaged data fragments are generated according to the described data message with backup;Will be described Multiple first data slots and multiple Camouflaged data fragment are assembled into two packets, wherein, Mei Yisuo according to pre-defined algorithm State and at least there is in packet a Camouflaged data fragment;Described two packets are uploaded to first server and the second clothes Business device is backed up, thus realizing backing up data in two servers, being that a server is hacked, also not resulting in number According to leakage, additionally, due in the present invention, cut into multiple first data slots using by data message to be backed up, and obtain Type B error fills data slot, so that the difficulty cracking increases further, further increases the safety of data.
Brief description
Fig. 1 is the flow chart of the cloud backup method in first preferred embodiment of the invention.
Fig. 2 is the structure chart of the cloud back-up device in one embodiment of the present invention.
Specific embodiment
Refer to schema, wherein identical element numbers represent identical assembly, and the principle of the present invention is to be implemented in one To illustrate in suitable computing environment.The following description is based on the illustrated specific embodiment of the invention, and it should be by It is considered as limiting the present invention other specific embodiments not detailed herein.
In the following description, the specific embodiment of the present invention will be with reference to the operation performed by or multi-section computer Step and symbol illustrating, unless otherwise stating clearly.Therefore, it will appreciate that these steps and operation, wherein has and carries for several times To for being executed by computer, including by representing with the computer disposal list of the electronic signal of the data in a structuring pattern Unit is manipulated.This data of this manipulation transforms or be maintained at this computer memory system in position at, it can be joined again Put or in addition to change in a manner familiar to those skilled in the art the running of this computer.The data knot that this data is maintained Structure is the provider location of this internal memory, and it has by particular characteristics defined in this data form.But, the principle of the invention is with above-mentioned Illustrating, it is not represented as a kind of restriction to word, those skilled in the art will appreciate that described below plurality of step and Operation also may be implemented in the middle of hardware.
Embodiment one
As shown in figure 1, the embodiment of the present invention provides a kind of cloud backup method, comprise the following steps:
S101, obtains data message to be backed up;This data message can be picture, address list information and chat record information Deng.
S102, described data message to be backed up is cut into multiple first data slots;
S103, generates multiple Camouflaged data fragments according to the described data message with backup;In this step, mainly standby according to treating The type of part data message, obtains the Camouflaged data information of same type, then generates multiple Camouflaged data fragments.
S104, the plurality of first data slot and multiple Camouflaged data fragment are assembled into two according to pre-defined algorithm Packet, wherein, at least has a Camouflaged data fragment in each described packet;Can by random assembling it is also possible to Using pre-defined algorithm assembling, after downloading data when, then this packet is taken apart using corresponding algorithm.
S105, described two packets is uploaded to first server respectively and second server is backed up.
Wherein, the described step according to the described multiple Camouflaged data fragments of generation of the data message with backup includes:
S1031, obtains the species of data message to be backed up;
S1032, the species according to described data message to be backed up obtains Camouflaged data information;
S1033, described Camouflaged data information is cut into multiple Camouflaged data fragments.
In cloud backup method of the present invention, the described species according to described data message to be backed up obtains camouflage The step of data message includes;
Tentation data is downloaded from the Internet as Camouflaged data information according to the species of described data message to be backed up.
In cloud backup method of the present invention, described by the plurality of first data slot and multiple Camouflaged data Fragment is assembled into two packets according to pre-defined algorithm, wherein, at least has a Camouflaged data piece in each described packet The step of section includes;
Mark is added to each described Camouflaged data fragment and each described first data slot;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its In, at least there is in each described packet a Camouflaged data fragment.
The present invention is not had to pass through to obtain data message to be backed up as from the foregoing;Described data message to be backed up is cut into Multiple first data slots;Multiple Camouflaged data fragments are generated according to the described data message with backup;By the plurality of first Data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, wherein, each described packet In at least there is a Camouflaged data fragment;Described two packets are uploaded to first server and second server is carried out Backup, thus realizing backing up data in two servers, being that a server is hacked, also not resulting in leaking data, Additionally, due in the present invention, cut into multiple first data slots using by data message to be backed up, and obtain camouflage Data slot, so that the difficulty cracking increases further, further increases the safety of data.
Embodiment two
As shown in Fig. 2 present invention also offers a kind of cloud back-up device, comprising:
Acquisition module 201, for obtaining data message to be backed up;
Cutting module 202, for cutting into multiple first data slots by described data message to be backed up;
Generation module 203, for generating multiple Camouflaged data fragments according to the described data message with backup;
Assembling module 204, for by the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm group Dress up two packets, wherein, at least there is in each described packet a Camouflaged data fragment;
Upper transmission module 205, for described two packets are uploaded to first server respectively and second server carry out standby Part.
In cloud back-up device of the present invention, described generation module 203 includes:
First acquisition unit, for obtaining the species of data message to be backed up;
Second acquisition unit, obtains Camouflaged data information for the species according to described data message to be backed up;
Cutter unit, for cutting into multiple Camouflaged data fragments by described Camouflaged data information.
In cloud back-up device of the present invention, described second acquisition unit is used for according to described data letter to be backed up The species of breath downloads tentation data from the Internet as Camouflaged data information.
In cloud back-up device of the present invention, described assembling module 204 includes:
Mark unit, for adding mark to each described Camouflaged data fragment and each described first data slot;
Module unitss, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm Two packets, wherein, at least have a Camouflaged data fragment in each described packet.
The present invention is not had to pass through to obtain data message to be backed up as from the foregoing;Described data message to be backed up is cut into Multiple first data slots;Multiple Camouflaged data fragments are generated according to the described data message with backup;By the plurality of first Data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, wherein, each described packet In at least there is a Camouflaged data fragment;Described two packets are uploaded to first server and second server is carried out Backup, thus realizing backing up data in two servers, being that a server is hacked, also not resulting in leaking data, Additionally, due in the present invention, cut into multiple first data slots using by data message to be backed up, and obtain camouflage Data slot, so that the difficulty cracking increases further, further increases the safety of data.
There is provided herein the various operations of embodiment.In one embodiment, described one or more operations can be with structure Become the computer-readable instruction of storage on one or more computer-readable mediums, it will make when being executed by electronic equipment to succeed in one's scheme Calculation equipment executes described operation.Describing the order of some or all of operations, to should not be construed as to imply that these operations necessarily suitable Sequence correlation.It will be appreciated by those skilled in the art that having the alternative sequence of the benefit of this specification.Furthermore, it is to be understood that Not all operation must exist in each embodiment provided in this article.
And, word " preferred " used herein means serving as example, example or illustration.Feng Wen is described as " preferably " any aspect or design be not necessarily to be construed as than other aspects or design more favourable.On the contrary, the use purport of word " preferred " Concept is being proposed in a concrete fashion.As used in this application term "or" is intended to mean the "or" comprising and non-excluded "or".That is, unless otherwise or clear from the context, " x is using a or b " means that nature includes any one of arrangement. That is, if x uses a;X uses b;Or x uses both a and b, then " x is using a or b " is met in aforementioned any example.
And, although illustrate and describing the disclosure, this area skill with respect to one or more implementations Art personnel will be appreciated that equivalent variations and modification based on to the reading of the specification and drawings and understanding.The disclosure include all this The modification of sample and modification, and be limited only by the scope of the following claims.Particularly with by said modules (such as element, Resource etc.) various functions that execute, the term for describing such assembly is intended to corresponding to the specified work(executing described assembly The random component (unless otherwise instructed) of energy (for example it is functionally of equal value), even if illustrated herein with execution in structure The exemplary implementations of the disclosure in the open structure of function be not equal to.Although additionally, the special characteristic of the disclosure is Through being disclosed with respect to the only one in some implementations, but this feature can be to giving or application-specific with such as For be expectation and favourable other implementations other combinations of features one or more.And, with regard to term " inclusion ", " tool Have ", " containing " or its deformation be used in specific embodiment or claim for, such term be intended to with term The similar mode of "comprising" includes.
Each functional unit in the embodiment of the present invention can be integrated in a processing module or unit list Solely it is physically present it is also possible to two or more units are integrated in a module.Above-mentioned integrated module both can adopt The form of hardware is realized, it would however also be possible to employ the form of software function module is realized.If described integrated module is with software function The form of module is realized and is situated between it is also possible to be stored in an embodied on computer readable storage as independent production marketing or when using In matter.Storage medium mentioned above can be read only memory, disk or CD etc..Above-mentioned each device or system are permissible Method in execution correlation method embodiment.
In sum although the present invention is disclosed above with preferred embodiment, but above preferred embodiment and be not used to limit The present invention processed, those of ordinary skill in the art, without departing from the spirit and scope of the present invention, all can make various change and profit Decorations, therefore protection scope of the present invention is defined by the scope that claim defines.

Claims (8)

1. a kind of cloud backup method is it is characterised in that comprise the following steps:
Obtain data message to be backed up;
Described data message to be backed up is cut into multiple first data slots;
Multiple Camouflaged data fragments are generated according to the described data message with backup;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its In, at least there is in each described packet a Camouflaged data fragment;
Described two packets are uploaded to first server respectively and second server is backed up.
2. cloud backup method according to claim 1 is it is characterised in that described give birth to according to the described data message with backup The step becoming multiple Camouflaged data fragments includes:
Obtain the species of data message to be backed up;
Species according to described data message to be backed up obtains Camouflaged data information;
Described Camouflaged data information is cut into multiple Camouflaged data fragments.
3. cloud backup method according to claim 2 it is characterised in that described according to described data message to be backed up The step that species obtains Camouflaged data information includes;
Tentation data is downloaded from the Internet as Camouflaged data information according to the species of described data message to be backed up.
4. cloud backup method according to claim 2 it is characterised in that described by the plurality of first data slot and Multiple Camouflaged data fragments are assembled into two packets according to pre-defined algorithm, wherein, at least have one in each described packet The step of individual Camouflaged data fragment includes;
Mark is added to each described Camouflaged data fragment and each described first data slot;
The plurality of first data slot and multiple Camouflaged data fragment are assembled into two packets according to pre-defined algorithm, its In, at least there is in each described packet a Camouflaged data fragment.
5. a kind of cloud back-up device is it is characterised in that include:
Acquisition module, for obtaining data message to be backed up;
Cutting module, for cutting into multiple first data slots by described data message to be backed up;
Generation module, for generating multiple Camouflaged data fragments according to the described data message with backup;
Assembling module, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm Two packets, wherein, at least have a Camouflaged data fragment in each described packet;
Upper transmission module, for being uploaded to first server respectively by described two packets and second server is backed up.
6. cloud back-up device according to claim 5 is it is characterised in that described generation module includes:
First acquisition unit, for obtaining the species of data message to be backed up;
Second acquisition unit, obtains Camouflaged data information for the species according to described data message to be backed up;
Cutter unit, for cutting into multiple Camouflaged data fragments by described Camouflaged data information.
7. cloud back-up device according to claim 6 is it is characterised in that described second acquisition unit is used for being treated according to described The species of the data message of backup downloads tentation data from the Internet as Camouflaged data information.
8. cloud back-up device according to claim 7 is it is characterised in that described assembling module includes:
Mark unit, for adding mark to each described Camouflaged data fragment and each described first data slot;
Module unitss, for being assembled into the plurality of first data slot and multiple Camouflaged data fragment according to pre-defined algorithm Two packets, wherein, at least have a Camouflaged data fragment in each described packet.
CN201610775816.0A 2016-08-31 2016-08-31 Cloud backup method and device Active CN106355099B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610775816.0A CN106355099B (en) 2016-08-31 2016-08-31 Cloud backup method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610775816.0A CN106355099B (en) 2016-08-31 2016-08-31 Cloud backup method and device

Publications (2)

Publication Number Publication Date
CN106355099A true CN106355099A (en) 2017-01-25
CN106355099B CN106355099B (en) 2021-09-03

Family

ID=57857450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610775816.0A Active CN106355099B (en) 2016-08-31 2016-08-31 Cloud backup method and device

Country Status (1)

Country Link
CN (1) CN106355099B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007133791A2 (en) * 2006-05-15 2007-11-22 Richard Kane Data partitioning and distributing system
CN102262717A (en) * 2011-07-18 2011-11-30 百度在线网络技术(北京)有限公司 Method, device and equipment for changing original installation information and detecting installation information
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
CN103514198A (en) * 2012-06-25 2014-01-15 北京智慧风云科技有限公司 File management method, cloud storage system and cloud terminal server in cloud storage system
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN104637039A (en) * 2013-11-07 2015-05-20 深圳市腾讯计算机系统有限公司 Picture processing method and picture processing device
CN105426775A (en) * 2015-11-09 2016-03-23 北京联合大学 Method and system for protecting information security of smartphone
CN105577893A (en) * 2014-10-13 2016-05-11 中兴通讯股份有限公司 Method, device and terminal for information backup
US20160226838A1 (en) * 2012-11-12 2016-08-04 Infinite Io Systems and methods of transmitting data

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007133791A2 (en) * 2006-05-15 2007-11-22 Richard Kane Data partitioning and distributing system
CN102262717A (en) * 2011-07-18 2011-11-30 百度在线网络技术(北京)有限公司 Method, device and equipment for changing original installation information and detecting installation information
CN103514198A (en) * 2012-06-25 2014-01-15 北京智慧风云科技有限公司 File management method, cloud storage system and cloud terminal server in cloud storage system
US20160226838A1 (en) * 2012-11-12 2016-08-04 Infinite Io Systems and methods of transmitting data
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
CN104298926A (en) * 2013-07-19 2015-01-21 腾讯科技(深圳)有限公司 Method and device for running encrypted file
CN104637039A (en) * 2013-11-07 2015-05-20 深圳市腾讯计算机系统有限公司 Picture processing method and picture processing device
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN104134022A (en) * 2014-07-31 2014-11-05 北京深境智能科技有限公司 Information hiding and protecting method based on image
CN105577893A (en) * 2014-10-13 2016-05-11 中兴通讯股份有限公司 Method, device and terminal for information backup
CN105426775A (en) * 2015-11-09 2016-03-23 北京联合大学 Method and system for protecting information security of smartphone

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
叶薇: "支持多级隐私保护的云备份系统的研究与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Also Published As

Publication number Publication date
CN106355099B (en) 2021-09-03

Similar Documents

Publication Publication Date Title
US10079842B1 (en) Transparent volume based intrusion detection
US10984111B2 (en) Data driven parser selection for parsing event logs to detect security threats in an enterprise system
WO2017019717A1 (en) Dynamic attachment delivery in emails for advanced malicious content filtering
US9256741B2 (en) Method and device for determining propagation relationship of Trojan horse files
Aalst Challenges in business process analysis
CN108282347A (en) A kind of server data online management method and system
CN106355099A (en) Cloud backup method and device
CN115757639A (en) Data source synchronization method and device, electronic equipment and storage medium
US10482279B2 (en) Pattern-less private data detection on data sets
Yuanchao et al. Ultra-high speed fault phase selection method using morphology-wavelet transform
CN109634931B (en) Log uploading method and device
CN109728929B (en) Test method, test device and storage medium
Dongen et al. Process mining: fuzzy clustering and performance visualization
Ghasemabadi et al. Application of five processes of project management based on PMBOK-2008 standard to run EPM-2010 project management system: A case study of Arya Hamrah Samaneh Co.
CN110719260B (en) Intelligent network security analysis method and device and computer readable storage medium
Woropay et al. Semi-Markov model of the vehicle operation and maintenance processes within an urban transportation system
CN104636458A (en) Updating method and device for address information base
Fang et al. Modeling and Verifying MooseFS in CSP
Americas et al. USENIX Open Access Policy
CN114398654A (en) Product login management method and device, computer equipment and storage medium
CN112861093A (en) Verification method, device and equipment for access data and storage medium
CN112988457A (en) Data backup method, device and system and computer equipment
Tchórzewska-Cieślak et al. Analysis of risk connected with water supply system operating by means of the logical trees method
Dobrowolski et al. Crisis management via agent-based simulation
Tao et al. The payment pattern of Merger and Acquisition: An empirical analysis from China's listed companies

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant