CN106528334A - Data backup method and apparatus - Google Patents

Data backup method and apparatus Download PDF

Info

Publication number
CN106528334A
CN106528334A CN201610939399.9A CN201610939399A CN106528334A CN 106528334 A CN106528334 A CN 106528334A CN 201610939399 A CN201610939399 A CN 201610939399A CN 106528334 A CN106528334 A CN 106528334A
Authority
CN
China
Prior art keywords
data
backed
information
encryption
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610939399.9A
Other languages
Chinese (zh)
Inventor
马志峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610939399.9A priority Critical patent/CN106528334A/en
Publication of CN106528334A publication Critical patent/CN106528334A/en
Priority to PCT/CN2017/095904 priority patent/WO2018076879A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the invention provide a data backup method and apparatus. The method comprises the following steps of encrypting to-be-backed-up data by adopting an encryption algorithm to obtain encrypted data; segmenting the encrypted data by adopting a segmentation algorithm to obtain a plurality of data segments; adding identifier information for each data segment, wherein the identifier information is related to name information of the to-be-backed-up data; and uploading the data segments to at least two first servers for performing dispersed storage, and uploading the identifier information to a second server. According to the method and the apparatus provided by the embodiments of the invention, the security of backup data stored in a cloud server can be improved.

Description

Data back up method and device
Technical field
The present invention relates to the communications field, more particularly to a kind of data back up method and device.
Background technology
With the development of network technology, the use of the technology such as high in the clouds big data, cloud backup and cloud are synchronous is more and more universal.
In prior art, user obtains the data having backed up beyond the clouds from mobile terminal side to be needed to log in cloud account, so Download from Cloud Server afterwards.If server is caused by hacker attacks or the work mistake of operator internal work personnel After the Backup Data of one server is revealed, the information of user is caused to be obtained by lawless person, consequently, it is possible to bringing sternly to user The economic loss of weight.
The content of the invention
The embodiment of the present invention provides a kind of data back up method and device, to solve the safety of Backup Data in correlation technique Problem.
The embodiment of the present invention provides a kind of data back up method, comprises the following steps:
Backup Data is treated using AES to be encrypted, to obtain encryption data;
The encryption data is split using partitioning algorithm, to obtain multiple data slots;
Add identification information to each data slot, the name information of the identification information and the data to be backed up It is associated;
The plurality of data slot is uploaded at least two first servers carries out distributed and saved, and the mark is believed Breath is uploaded to second server.
The embodiment of the present invention also provides a kind of data backup device, including:
Encrypting module, is encrypted for treating Backup Data using AES, to obtain encryption data;
Segmentation module, for being split to the encryption data using partitioning algorithm, to obtain multiple data slots;
Mark module, for adding identification information to each data slot, the identification information is to be backed up with described The name information of data is associated;
Upper transmission module, carries out distributed and saved for the plurality of data slot is uploaded at least two first servers, And the identification information is uploaded to into second server.
The embodiment of the present invention is treated Backup Data using AES and is encrypted, to obtain encryption data;Using segmentation Algorithm is split to the encryption data, to obtain multiple data slots;Add identification information to each data slot, The identification information is associated with the name information of the data to be backed up;The plurality of data slot is uploaded at least two First server carries out distributed and saved, and the identification information is uploaded to second server, so as to complete data backup operation; Also, due to being to be divided into dispersion after multiple data slots to be stored at least two first clothes the encryption data of data to be backed up In business device so that even if other people obtain the data in one of first server, cannot also obtain use by hacking technique The complete Backup Data at family, also, as the plurality of identification information storage is in second server, even if disabled user is simultaneously The data in the plurality of first server are obtained, not the identification information, disabled user also cannot be by each of the Backup Data Individual data slot is extracted from mass data, thus improves the security of Backup Data.
Description of the drawings
Scene graph of the Fig. 1 for the data backup system in one embodiment of the present invention.
Fig. 2 is the flow chart of the data back up method in another preferred embodiment of the invention.
Fig. 3 is the flow chart of the data back up method in another preferred embodiment of the invention.
Fig. 4 is the structure chart of the data backup device in another preferred embodiment of the invention.
Fig. 5 is the structure chart of the mobile terminal in another preferred embodiment of the invention.
Specific embodiment
Schema is refer to, wherein identical element numbers represent identical component, and the principle of the present invention is to be implemented in one Illustrate in appropriate computing environment.The following description is that, based on the illustrated specific embodiment of the invention, which should not be by It is considered as and limits the present invention other specific embodiments not detailed herein.
In the following description, the preferred embodiments of the present invention will be with reference to the operation by performed by or multi-section computer The step of and symbol illustrating, unless otherwise stating clearly.Therefore, which will appreciate that these steps and operation, wherein have carrying for several times To be performed by computer, include by representing with the computer disposal list of the electronic signal of the data in a structuring pattern Unit is manipulated.At this manipulation transforms data or the position that is maintained in the memory system of the computer, which can be matched somebody with somebody again Put or in addition in a manner familiar to those skilled in the art changing the running of the computer.The data knot maintained by the data Provider location of the structure for the internal memory, which has by particular characteristics defined in the data form.But, the principle of the invention is with above-mentioned Illustrating, which is not represented as a kind of restriction to word, those skilled in the art will appreciate that the plurality of step of described below and Operation is also may be implemented in the middle of hardware.
Data synchronous system provided in an embodiment of the present invention, mainly includes data synchronization unit and server, wherein, should Data synchronization unit can be specifically integrated in as in the mobile terminals such as panel computer, mobile phone, and the server can lead to mobile terminal Cross wired or wireless network to be attached.
Such as, Fig. 1 is refer to, the schematic diagram of a scenario of the data backup system that Fig. 1 is provided for the present invention, the data backup are filled Put, be mainly used in Backup Data being treated using AES and be encrypted, to obtain encryption data;Adopt The encryption data is split with partitioning algorithm, to obtain multiple data slots;To each data slot addition mark Knowledge information, the identification information are associated with the name information of the data to be backed up;The plurality of data slot is uploaded to At least two first servers carry out distributed and saved, and the identification information is uploaded to second server.
In the present embodiment, will be described from the angle of data backup device, the data backup device can specifically collect In the mobile terminals such as Cheng Ru panel computers, mobile phone.
Refer to Fig. 2, Fig. 2 is the flow chart of the data back up method in one embodiment of the present invention, and which mainly uses In mobile terminal, the data back up method is comprised the following steps:
S101, Backup Data is treated using AES it is encrypted, to obtain encryption data;
S102, the encryption data is split using partitioning algorithm, to obtain multiple data slots;
S103, add identification information to each data slot, the name of the identification information and the data to be backed up Title information is associated;
S104, the plurality of data slot is uploaded at least two first servers carries out distributed and saved, and will be described Identification information is uploaded to second server.
Below each step of the data back up method is described in detail.
In step S101, the AES can adopt conventional encryption algorithm of the prior art, it would however also be possible to employ The AES of custom-made.The data to be backed up are the higher data of privacy degrees, such as bank card number and password, privacy Photo, vital document etc..
In step S102, the partitioning algorithm can be split according to data capacity size, each data slot Data capacity can be identical value, or different values, for example, the first fragment be 2B, the second fragment be 3B, the 3rd Fragment is 4B etc..Certainly, which is not limited to this.The partitioning algorithm can also form number according to segmentation is carried out according to other standards According to fragment.
In step S103, each data slot is all added into an identification information, the identification information and data to be backed up Name information be association, for example, the entitled a1 of data to be backed up, the identification information be a1b1, wherein, b1 is the data The identification number of fragment, to distinguish each data slot.
In step S104, the dispersion of the plurality of data slot is stored at least two first servers, so i.e. The leaking data in one of first server is made, the partial data of user cannot be also obtained.And the identification information is deposited Storage is in second server.
When user needs to download the data, being obtained from the second server according to the name information of data to be synchronized should Multiple identification informations, each identification information are interrelated with the name information.Then, according to the plurality of identification information, from this Corresponding data slot is obtained at least two first servers, it is then this is more using combinational algorithm corresponding with partitioning algorithm Individual data fragment combination finally can obtain the number to be synchronized using decipherment algorithm corresponding with AES into encryption data According to.
From the foregoing, it will be observed that the present invention treats Backup Data using AES be encrypted, to obtain encryption data;Using point Cut algorithm to split the encryption data, to obtain multiple data slots;To each data slot addition mark letter Breath, the identification information are associated with the name information of the data to be backed up;The plurality of data slot is uploaded at least Two first servers carry out distributed and saved, and the identification information is uploaded to second server, so as to complete data backup Operation;Also, due to being to be divided into dispersion after multiple data slots to be stored at least two the encryption data of data to be backed up In first server so that even if other people are obtained the data in one of first server, also cannot by hacking technique The complete Backup Data of user is obtained, also, as the plurality of identification information storage is in second server, even if illegal use Family obtains the data in the plurality of first server simultaneously, not the identification information, and disabled user also cannot be by the backup number According to each data slot extract from mass data;Backup Data such that it is able to prevent user is learned have by people Improve the beneficial effect of the security of Backup Data.
Refer to Fig. 3, Fig. 3 is the flow chart of the data back up method in preferably another embodiment of the invention, and which is mainly transported For, in mobile terminal, the data back up method is comprised the following steps:
S201, acquisition target data to be backed up;
S202, Camouflaged data is obtained according to the target data to be backed up;
S203, the target data to be backed up and the Camouflaged data are combined, to obtain data to be backed up;
S204, Backup Data is treated using AES it is encrypted, to obtain encryption data;
S205, the encryption data is split using partitioning algorithm, to obtain multiple data slots;
S206, add identification information to each data slot, the name of the identification information and the data to be backed up Title information is associated;
S207, the plurality of data slot is uploaded at least two first servers carries out distributed and saved, and will be described Identification information is uploaded to second server.
Below each step of the data back up method is described in detail.
In step S201, when terminal detects the higher data of level of security to be updated, the number of the renewal is extracted According to as target data to be backed up, wherein the higher data of the level of security can be Bank Account Number code data, photo, important Contract documents, important technology file etc..
In step S202, when being embodied as, Camouflaged data is obtained according to the type of the target data to be backed up.Cause This, step S202 is specifically included:
S2021, the type information for obtaining the target data to be backed up;For example, the type information can for literal type, Numeric type and picture/mb-type etc..
S2022, the Camouflaged data that corresponding types are obtained according to the type information.For example, when the target data to be backed up For photo when, the Camouflaged data of acquisition is also photo.The photo can be downloaded from network automatically, it is also possible to from local data base Extract.
In step S203, datum target data to be backed up are combined to form data to be backed up with Camouflaged data.
In step S204, the AES can adopt conventional encryption algorithm of the prior art, it would however also be possible to employ The AES of custom-made.
For example, when the AES using custom-made, step S204 includes following sub-step:
S2041, the unique features information for obtaining user;The unique features information can be the finger print information of user, iris Information or acoustic information etc..
S2042, according to the corresponding AES of the unique features acquisition of information;For example, user input is fingerprint letter Breath, then corresponding AES is A algorithm, if input is acoustic information, then corresponding AES is B algorithms, If input be iris information, then for AES be C algorithms.
S2043, the data to be backed up are encrypted according to the AES, to obtain encryption data.Using step The AES obtained in rapid S2043 is encrypted treating Backup Data, after downloading the data afterwards, it is necessary to be input into identical Unique features information, can just get corresponding decipherment algorithm, so as to be decrypted to encryption data.
In step S205, the partitioning algorithm can be split according to data capacity size, each data slot Data capacity can be identical value, or different values, for example, the first fragment be 2B, the second fragment be 3B, the 3rd Fragment is 4B etc..Certainly, which is not limited to this.The partitioning algorithm can also form number according to segmentation is carried out according to other standards According to fragment.Specifically, in the present embodiment, step S205 specifically includes following sub-step:
S2051, according to the corresponding partitioning algorithm of the unique features acquisition of information;For example, user input is fingerprint letter Breath, then corresponding partitioning algorithm is W algorithms, if input is acoustic information, then corresponding partitioning algorithm is Y algorithms, If input defeated iris information, then for partitioning algorithm be Z algorithms.
S2052, the encryption data is split using the partitioning algorithm, to obtain multiple data slots.
In step S206, each data slot all adds an identification information, the identification information and data to be backed up Name information is association, and for example, the entitled a1 of data to be backed up, the identification information are a1b1, wherein, b1 is the data slice The identification number of section, to distinguish each data slot.
In step S207, the dispersion of the plurality of data slot is stored at least two first servers, so i.e. The leaking data in one of server is made, cannot also obtain user completes data.By the identification information storage In two servers.
When user needs to download the data, being obtained from the second server according to the name information of data to be synchronized should Multiple identification informations, each identification information are interrelated with the name information.Then, according to the plurality of identification information, from this Corresponding data slot is obtained at least two first servers, it is then this is more using combinational algorithm corresponding with partitioning algorithm Individual data fragment combination finally can obtain the number to be synchronized using decipherment algorithm corresponding with AES into encryption data According to.Then, remove the Camouflaged data in the data to be synchronized, you can obtain the target data of final needs.
From the foregoing, it will be observed that the present invention treats Backup Data using AES be encrypted, to obtain encryption data;Using point Cut algorithm to split the encryption data, to obtain multiple data slots;To each data slot addition mark letter Breath, the identification information are associated with the name information of the data to be backed up;The plurality of data slot is uploaded at least Two first servers carry out distributed and saved, and the identification information is uploaded to second server, so as to complete data backup Operation;Also, due to being to be divided into dispersion after multiple data slots to be stored at least two the encryption data of data to be backed up In first server so that even if other people are obtained the data in one of first server, also cannot by hacking technique The complete Backup Data of user is obtained, also, as the plurality of identification information storage is in second server, even if illegal use Family obtains the data in the plurality of first server simultaneously, not the identification information, and disabled user also cannot be by the backup number According to each data slot extract from mass data;Backup Data such that it is able to prevent user is learned have by people Improve the beneficial effect of the security of Backup Data.
Refer to Fig. 4, Fig. 4 is the structure chart of the data backup device 300 in one embodiment of the present invention, and which is mainly transported For, in mobile terminal, the data backup device 300 includes:First acquisition module 301, the second acquisition module 302, composite module 303rd, encrypting module 304, segmentation module 305, mark module 306 and upper transmission module 307.
Wherein, first acquisition module 301 is used to obtain target data to be backed up.First acquisition module 301 includes Four acquiring units 3011 and the 5th acquiring unit 3012.Wherein the 4th acquiring unit 3011 is used to obtain the mesh to be backed up The type information of mark data;5th acquiring unit 3012 is for the camouflage number according to type information acquisition corresponding types According to.
Second acquisition module 302 is for according to target data to be backed up acquisition Camouflaged data.
Composite module 303 for the target data to be backed up and the Camouflaged data are combined, to be treated Backup Data.
Encrypting module 304 is encrypted for treating Backup Data using AES, to obtain encryption data.The encryption Module 304 includes first acquisition unit 3041, second acquisition unit 3042, ciphering unit 3043.Wherein, the first acquisition unit 3041 are used to obtain the unique features information of user;The second acquisition unit 3042 is for according to the unique features acquisition of information Corresponding AES;The ciphering unit 3043 for being encrypted to the data to be backed up according to the AES, with Obtain encryption data.
Split module 305 for splitting to the encryption data using partitioning algorithm, to obtain multiple data slots. The segmentation module 305 includes the 3rd acquiring unit 3051, cutting unit 3052.Wherein, the 3rd acquiring unit 3051 is used for basis The corresponding partitioning algorithm of the unique features acquisition of information;Cutting unit 3052 is used for using the partitioning algorithm to the encryption Data are split, to obtain multiple data slots.
Mark module 306 is for each data slot addition identification information, identification information and the number to be backed up According to name information be associated.
Upper transmission module 307 carries out dispersion guarantor for the plurality of data slot is uploaded at least two first servers Deposit, and identification information is uploaded to into second server.
From the foregoing, it will be observed that the present invention treats Backup Data using AES by encrypting module be encrypted, to obtain Encryption data;Segmentation module is split to the encryption data using partitioning algorithm, to obtain multiple data slots;Mark mould Block adds identification information to each data slot, and the identification information is related to the name information of the data to be backed up Connection;The plurality of data slot is uploaded at least two first servers and carries out distributed and saved by upper transmission module, and by the mark Knowledge information is uploaded to second server, so as to complete data backup operation;Also, due to being by the encryption data of data to be backed up Dispersion after being divided into multiple data slots is stored at least two first servers so that even if other people are by hacking technique, The data in one of first server are obtained, the complete Backup Data of user cannot be also obtained, also, it is many due to this Individual identification information storage is in second server, even if disabled user obtains the data in the plurality of first server simultaneously, Each data slot of the Backup Data also cannot be extracted from mass data by the not no identification information, disabled user; Beneficial effect with the security for improving Backup Data.
As shown in figure 5, the embodiment of the present invention also provides a kind of mobile terminal 400, the mobile terminal 400 can include radio frequency (RF, Radio Frequency) circuit 401, the memory for including one or more computer-readable recording mediums 402nd, input block 403, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407, the processor 408 for including or more than one processing core, and the part such as power supply 409. It will be understood by those skilled in the art that the restriction of the terminal structure illustrated in Fig. 5 not structure paired terminal, can be included than diagram More or less of part, or some parts are combined, or different part arrangements.Wherein:
RF circuits 401 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, transfer to one or more than one processor 408 is processed;In addition, will be related to up data is activation to Base station.Generally, RF circuits 401 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier (LNA, Low Noise Amplifier), duplexer etc..Additionally, RF circuits 401 can also by radio communication and network and its His equipment communication.The radio communication can use arbitrary communication standard or agreement, including but not limited to global system for mobile telecommunications system System (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is many Location (WCDMA, Wideband Code Division Multiple Access), Long Term Evolution (LTE, Long Term Evolution), Email, Short Message Service (SMS, Short Messaging Service) etc..
Memory 402 can be used to store software program and module, and processor 408 is stored in memory 402 by operation Software program and module, so as to perform various function application and data processing.Memory 402 can mainly include storage journey Sequence area and storage data field, wherein, storing program area can storage program area, the application program (ratio needed at least one function Such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use created data according to terminal (such as voice data, phone directory etc.) etc..Additionally, memory 402 can include high-speed random access memory, can also include Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory 402 can also include Memory Controller, to provide processor 408 and input block 403 to memory 402 Access.
Input block 403 can be used for the numeral or character information of receives input, and produce and user's setting and function The relevant keyboard of control, mouse, action bars, optics or trace ball signal input.Specifically, in a specific embodiment In, input block 403 may include Touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or tactile Control plate, user can be collected thereon or neighbouring touch operation (such as user use any suitable objects such as finger, stylus or Operation of the annex on Touch sensitive surface or near Touch sensitive surface), and corresponding connection dress is driven according to formula set in advance Put.Optionally, Touch sensitive surface may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus inspection The touch orientation of survey user, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then give processor 408, and can reception processing Order that device 408 is sent simultaneously is performed.Furthermore, it is possible to adopt resistance-type, condenser type, infrared ray and surface acoustic wave etc. various Type realizes Touch sensitive surface.Except Touch sensitive surface, input block 403 can also include other input equipments.Specifically, other are defeated Enter equipment and can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse One or more in mark, action bars etc..
Display unit 404 can be used for show by user input information or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.Show Unit 404 may include display floater, optionally, can using liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) are configuring display floater.Further , Touch sensitive surface can cover display floater, when Touch sensitive surface is detected thereon or after neighbouring touch operation, send process to Device 408 is provided accordingly according to the type of touch event with preprocessor 408 on a display panel with determining the type of touch event Visual output.Although in Figure 5, Touch sensitive surface and display floater are realizing being input into and be input into as two independent parts Function, but in some embodiments it is possible to will be Touch sensitive surface integrated with display floater and realization input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjusting the brightness of display floater, proximity transducer can cut out display floater and/or the back of the body when terminal is moved in one's ear Light.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of Gravity accelerometer Size, can detect that size and the direction of gravity when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Can also configure as terminal Gyroscope, barometer, hygrometer, thermometer, the other sensors such as infrared ray sensor, will not be described here.
Voicefrequency circuit 406, loudspeaker, microphone can provide the COBBAIF between user and terminal.Voicefrequency circuit 406 can Electric signal after the voice data for receiving is changed, is transferred to loudspeaker, is converted to voice signal output by loudspeaker;It is another The voice signal of collection is converted to electric signal by aspect, microphone, and voice data is converted to after being received by voicefrequency circuit 406, then After voice data output processor 408 is processed, Jing RF circuits 401 being sent to such as another terminal, or by voice data Export to memory 402 further to process.Voicefrequency circuit 406 is also possible that earphone jack, with provide peripheral hardware earphone with The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronicses postal by WiFi module 407 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 5 shows WiFi module 407, but it is understood that, which is simultaneously not belonging to must be configured into for terminal, can not change as needed completely Omit in the scope of the essence for becoming invention.
Processor 408 is the control centre of terminal, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module that are stored in memory 402, and call and be stored in memory 402 Data, perform the various functions and processing data of terminal, so as to carry out integral monitoring to mobile phone.Optionally, processor 408 can be wrapped Include one or more processing cores;Preferably, processor 408 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are processed mainly with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated in processor 408.
Terminal also includes the power supply 409 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system is logically contiguous with processor 408, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.Power supply 409 can also include one or more direct current or AC power, recharging system, power failure inspection The random component such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, terminal can also include camera, bluetooth module etc., will not be described here.Specifically in this enforcement In example, the processor 408 in terminal can be according to following instruction, will be the process of one or more application program corresponding Executable file is loaded in memory 402, and by processor 408 running the application program being stored in memory 402, from And each function of the data back up method and device in realizing above-described embodiment:Backup Data is treated using AES is carried out Encryption, to obtain encryption data;The encryption data is split using partitioning algorithm, to obtain multiple data slots;Give Each data slot adds identification information, and the identification information is associated with the name information of the data to be backed up;Will The plurality of data slot is uploaded at least two first servers and carries out distributed and saved, and the identification information is uploaded to Two servers.
There is provided herein the various operations of embodiment.In one embodiment, one or more described operations can be with structure The computer-readable instruction stored on one or more computer-readable mediums, which will make to succeed in one's scheme when being performed by electronic equipment Calculation equipment performs the operation.Describing the order of some or all of operations, to should not be construed as to imply that these operations necessarily suitable Sequence correlation.It will be appreciated by those skilled in the art that the alternative sequence of the benefit with this specification.Furthermore, it is to be understood that Not all operation must be present in each embodiment provided in this article.
And, word " preferred " used herein means serving as example, example or illustration.Feng Wen is described as " preferably " any aspect or design be not necessarily to be construed as than in terms of other or design it is more favourable.Conversely, the use purport of word " preferred " Concept is being proposed in a concrete fashion.As used in this application term "or" is intended to mean the "or" for including and non-excluded "or".I.e., unless otherwise or clear from the context, " X is using A or B " means that nature includes any one of arrangement. That is, if X uses A;X uses B;Or X uses A and B both, then " X is using A or B " is met in aforementioned any example.
And, although illustrating and describing the disclosure, this area skill relative to one or more implementations Art personnel are based on the reading to the specification and drawings and understand it will be appreciated that equivalent variations and modification.The disclosure include it is all this The modification of sample and modification, and be limited only by the scope of the following claims.Particularly with by said modules (such as element, Resource etc.) various functions that perform, the term for describing such component is intended to corresponding to the specified work(for performing the component The random component (unless otherwise instructed) of energy (for example which is functionally of equal value), even if illustrated herein with execution in structure The disclosure exemplary implementations in the open structure of function be not equal to.Although additionally, the special characteristic of the disclosure is Jing is disclosed relative to the only one in some implementations, but this feature can be to given or application-specific with such as For be expect and other favourable implementations one or more other combinations of features.And, with regard to term " including ", " tool Have ", " containing " or its deformation be used in specific embodiment or claim for, such term be intended to with term The similar mode of "comprising" includes.
During each functional unit in the embodiment of the present invention can be integrated in a processing module, or unit list Solely it is physically present, it is also possible to which two or more units are integrated in a module.Above-mentioned integrated module can both be adopted The form of hardware is realized, it would however also be possible to employ the form of software function module is realized.If the integrated module is with software function The form of module is realized and as when independent production marketing or use, it is also possible to is stored in an embodied on computer readable storage and is situated between In matter.Storage medium mentioned above can be read-only storage, disk or CD etc..Above-mentioned each device or system, can be with Perform the method in correlation method embodiment.
In sum, although the present invention it is disclosed above with preferred embodiment, but above preferred embodiment and be not used to limit The system present invention, one of ordinary skill in the art without departing from the spirit and scope of the present invention, can make various changes and profit Adorn, therefore protection scope of the present invention is defined by the scope that claim is defined.

Claims (10)

1. a kind of data back up method, it is characterised in that comprise the following steps:
Backup Data is treated using AES to be encrypted, to obtain encryption data;
The encryption data is split using partitioning algorithm, to obtain multiple data slots;
Add identification information to each data slot, the identification information is associated with the name information of the data to be backed up;
The plurality of data slot is uploaded at least two first servers carries out distributed and saved, and by the identification information Reach second server.
2. data back up method according to claim 1, it is characterised in that described that data to be backed up are encrypted, The step of to obtain encryption data, includes:
Obtain the unique features information of user;
According to the corresponding AES of the unique features acquisition of information;
The data to be backed up are encrypted according to the AES, to obtain encryption data.
3. data back up method according to claim 2, it is characterised in that the employing partitioning algorithm is to the encryption number According to being split, include the step of to obtain multiple data slots:
According to the corresponding partitioning algorithm of the unique features acquisition of information;
The encryption data is split using the partitioning algorithm, to obtain multiple data slots.
4. data back up method according to claim 1, it is characterised in that the employing AES treats Backup Data Be encrypted, the step of to obtain encryption data before, also include:
Obtain target data to be backed up;
Camouflaged data is obtained according to the target data to be backed up;
The target data to be backed up and the Camouflaged data are combined, to obtain data to be backed up.
5. data back up method according to claim 4, it is characterised in that described to be obtained according to the target data to be backed up The step of taking Camouflaged data includes:
Obtain the type information of the target data to be backed up;
The Camouflaged data of corresponding types is obtained according to the type information.
6. a kind of data backup device, it is characterised in that include:
Encrypting module, is encrypted for treating Backup Data using AES, to obtain encryption data;
Segmentation module, for being split to the encryption data using partitioning algorithm, to obtain multiple data slots;
Mark module, for adding identification information, the identification information and the data to be backed up to each data slot Name information be associated;
Upper transmission module, carries out distributed and saved for the plurality of data slot is uploaded at least two first servers, and will The identification information is uploaded to second server.
7. data backup device according to claim 6, it is characterised in that the encrypting module includes:
First acquisition unit, for obtaining the unique features information of user;
Second acquisition unit, for according to the corresponding AES of the unique features acquisition of information;
Ciphering unit, for being encrypted to the data to be backed up according to the AES, to obtain encryption data.
8. data backup device according to claim 7, it is characterised in that the segmentation module includes:
3rd acquiring unit, for according to the corresponding partitioning algorithm of the unique features acquisition of information;
Cutting unit, for being split to the encryption data using the partitioning algorithm, to obtain multiple data slots.
9. data backup device according to claim 6, it is characterised in that also include:
First acquisition module, for obtaining target data to be backed up;
Second acquisition module, for obtaining Camouflaged data according to the target data to be backed up;
Composite module, the target data to be backed up and the Camouflaged data are combined, to obtain data to be backed up.
10. data backup device according to claim 9, it is characterised in that first acquisition module includes:
4th acquiring unit, for obtaining the type information of the target data to be backed up;
5th acquiring unit, for the Camouflaged data of corresponding types is obtained according to the type information.
CN201610939399.9A 2016-10-25 2016-10-25 Data backup method and apparatus Pending CN106528334A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610939399.9A CN106528334A (en) 2016-10-25 2016-10-25 Data backup method and apparatus
PCT/CN2017/095904 WO2018076879A1 (en) 2016-10-25 2017-08-03 Data backup method and apparatus, storage medium, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610939399.9A CN106528334A (en) 2016-10-25 2016-10-25 Data backup method and apparatus

Publications (1)

Publication Number Publication Date
CN106528334A true CN106528334A (en) 2017-03-22

Family

ID=58292486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610939399.9A Pending CN106528334A (en) 2016-10-25 2016-10-25 Data backup method and apparatus

Country Status (2)

Country Link
CN (1) CN106528334A (en)
WO (1) WO2018076879A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018076879A1 (en) * 2016-10-25 2018-05-03 广东欧珀移动通信有限公司 Data backup method and apparatus, storage medium, and terminal
CN109871698A (en) * 2019-01-14 2019-06-11 深圳市奥特尔软件技术有限公司 Data processing method, device, computer equipment and storage medium
CN109976948A (en) * 2019-03-18 2019-07-05 北京思源互联科技有限公司 Private information backup method and recovery method and system
CN110138754A (en) * 2019-04-26 2019-08-16 珍岛信息技术(上海)股份有限公司 A kind of cloudy client information processing system and its resource share method
CN111709040A (en) * 2020-06-04 2020-09-25 江苏智先生信息科技有限公司 Sensitive data oriented secure discrete storage method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990606B (en) * 2019-12-11 2023-10-03 Tcl移动通信科技(宁波)有限公司 Picture storage method and device, storage medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102365849A (en) * 2009-05-25 2012-02-29 株式会社日立制作所 Storage device and its control method
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN104935429A (en) * 2014-03-17 2015-09-23 Tcl集团股份有限公司 Data processing method and system employing multi-encryption technology
CN105577893A (en) * 2014-10-13 2016-05-11 中兴通讯股份有限公司 Method, device and terminal for information backup

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102365849A (en) * 2009-05-25 2012-02-29 株式会社日立制作所 Storage device and its control method
CN102412967A (en) * 2011-09-29 2012-04-11 用友软件股份有限公司 Data transmission system and method
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN104935429A (en) * 2014-03-17 2015-09-23 Tcl集团股份有限公司 Data processing method and system employing multi-encryption technology
CN105577893A (en) * 2014-10-13 2016-05-11 中兴通讯股份有限公司 Method, device and terminal for information backup

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018076879A1 (en) * 2016-10-25 2018-05-03 广东欧珀移动通信有限公司 Data backup method and apparatus, storage medium, and terminal
CN109871698A (en) * 2019-01-14 2019-06-11 深圳市奥特尔软件技术有限公司 Data processing method, device, computer equipment and storage medium
CN109976948A (en) * 2019-03-18 2019-07-05 北京思源互联科技有限公司 Private information backup method and recovery method and system
CN110138754A (en) * 2019-04-26 2019-08-16 珍岛信息技术(上海)股份有限公司 A kind of cloudy client information processing system and its resource share method
CN111709040A (en) * 2020-06-04 2020-09-25 江苏智先生信息科技有限公司 Sensitive data oriented secure discrete storage method

Also Published As

Publication number Publication date
WO2018076879A1 (en) 2018-05-03

Similar Documents

Publication Publication Date Title
CN106528334A (en) Data backup method and apparatus
EP3200487B1 (en) Message processing method and apparatus
CN103425736B (en) A kind of web information recognition, Apparatus and system
CN103616981B (en) application processing method, device and mobile terminal
CN103400076B (en) Malware detection methods, devices and systems on a kind of mobile terminal
CN104376353B (en) The generation of Quick Response Code, read method, terminal and server
CN104158790B (en) user login method, device and equipment
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN103368958A (en) Method, device and system for detecting webpage
CN105912905A (en) Fingerprint unlocking method and terminal
CN106658489A (en) Terminal application processing method, device and mobile terminal
CN103763112B (en) A kind of user identity protection method and apparatus
CN104967601A (en) Data processing method and apparatus
CN104901806B (en) A kind of virtual resource processing method, device and system
CN104852885A (en) Method, device and system for verifying verification code
CN104424431A (en) Method and device for resetting virtual machine user login password
CN106534093A (en) Terminal data processing method, device and system
CN101176082B (en) Communication terminal, security device, and integrated circuit
CN106550032A (en) A kind of data back up method, apparatus and system
CN106529312A (en) Method and device for permission control of mobile terminal, and mobile terminal
CN103327029B (en) A kind of detection method of malice network address and equipment
CN106611152A (en) User identity determination method and apparatus
CN106529332A (en) Permission control method and apparatus for mobile terminal, and mobile terminal
CN107592409A (en) Application control method and device
CN106940770A (en) A kind of screen locking method, device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication