CN112732489B - Data desensitization method and device based on database virtualization - Google Patents
Data desensitization method and device based on database virtualization Download PDFInfo
- Publication number
- CN112732489B CN112732489B CN202110034262.XA CN202110034262A CN112732489B CN 112732489 B CN112732489 B CN 112732489B CN 202110034262 A CN202110034262 A CN 202110034262A CN 112732489 B CN112732489 B CN 112732489B
- Authority
- CN
- China
- Prior art keywords
- desensitization
- database
- data
- snapshot
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/256—Integrating or interfacing systems involving database management systems in federated or virtual databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application aims to provide a data desensitizing method and equipment based on database virtualization, wherein the backup is performed on database data, and snapshot is performed on the backed-up data; virtualizing a database according to the snapshot time point to obtain a virtual database; and performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the quick preparation of database data and the desensitization of the virtual library are realized, and the problems of complicated data preparation and long time consumption after the failure of desensitization are quickly solved.
Description
Technical Field
The present disclosure relates to the field of computers, and in particular, to a method and apparatus for data desensitization based on database virtualization.
Background
Currently, with the widespread use of database technology and large data, desensitization of database data is increasingly used. People enjoy data analysis to bring convenience to life of the people, and meanwhile, the people are also deeply bothered by personal information leakage and even harassment, so that desensitization of database data is particularly important. When the data of the database is desensitized, the desensitization mode in the common case is to desensitize the existing database or the recovery database, and the desensitization is successful when the desensitization operation is completed when the desensitization operation is performed on the data in the database. However, when the data of the desensitization database has an abnormality or error, which causes the failure of the desensitization process, the data which has been desensitized cannot be rolled back, and the desensitized data becomes dirty data. If the desensitization failure database data is directly desensitized again, the desensitized data can be secondarily desensitized, and the consistency of the desensitized data cannot be ensured. When the database is to be restored for re-desensitization, the restoration process of the database is tedious and time-consuming.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for data desensitization based on database virtualization, which solve the problem in the prior art that the database cannot be quickly recovered to provide desensitized data after failure of database data desensitization.
According to one aspect of the present application, there is provided a method of data desensitization based on database virtualization, the method comprising:
backing up database data, and snapshot the backed up data;
virtualizing a database according to the snapshot time point to obtain a virtual database;
and performing desensitization operation on the data in the virtual database to obtain a desensitization result.
Further, backing up database data, and snapshot the backed up data, including:
and carrying out timing backup on the database data, carrying out timing snapshot or manual snapshot on the backed data, and recording the created snapshot time point.
Further, virtualizing the database according to the snapshot-making time point, including:
and virtualizing one or more database instances according to the created snapshot time point, wherein the data contained in the instances comprises the data in the database corresponding to the created snapshot time point.
Further, desensitizing the data in the virtual database, including:
and carrying out covering desensitization or simulation desensitization on the data in the virtual database.
Further, the desensitizing operation is performed on the data in the virtual database, and after the desensitizing result is obtained, the method comprises the following steps:
if the desensitization result is successful in data desensitization, providing the virtual database to a user for testing;
and if the desensitization result is that the data desensitization fails, recycling the virtual database.
Further, the recovering the virtual database includes:
re-virtualizing the database according to the snapshot time point to obtain a new virtual database;
and adjusting a desensitization strategy to carry out desensitization operation on the new virtual database again.
Further, the adjusting the desensitization strategy includes:
and generating a random address desensitization rule, and adjusting a desensitization strategy according to the desensitization result of the first desensitization operation and the generated random address desensitization rule.
According to yet another aspect of the present application, there is also provided an apparatus for data desensitization based on database virtualization, the apparatus comprising:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform operations of the method as described above.
According to yet another aspect of the present application, there is also provided a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method as described above.
Compared with the prior art, the method and the device have the advantages that the backup is carried out on the database data, and the snapshot is carried out on the backed-up data; virtualizing a database according to the snapshot time point to obtain a virtual database; and performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the quick preparation of database data and the desensitization of the virtual library are realized, and the problems of complicated data preparation and long time consumption after the failure of desensitization are quickly solved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 illustrates a method flow diagram for database virtualization-based data desensitization provided in accordance with an aspect of the present application;
FIG. 2 illustrates a database virtualization-based desensitization flow diagram in an embodiment of the present application;
fig. 3 shows a schematic structural diagram of an apparatus for database virtualization-based data desensitization provided in yet another aspect of the present application.
The same or similar reference numbers in the drawings refer to the same or similar parts.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
In one typical configuration of the present application, the terminal, the devices of the service network, and the trusted party each include one or more processors (e.g., central processing units (Central Processing Unit, CPU)), input/output interfaces, network interfaces, and memory.
The Memory may include non-volatile Memory in a computer readable medium, random access Memory (Random Access Memory, RAM) and/or non-volatile Memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase-Change RAM (PRAM), static random access Memory (Static Random Access Memory, SRAM), dynamic random access Memory (Dynamic Random Access Memory, DRAM), other types of Random Access Memory (RAM), read-Only Memory (ROM), electrically erasable programmable read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash Memory or other Memory technology, read-Only optical disk read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), digital versatile disks (Digital Versatile Disk, DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by the computing device. Computer readable media, as defined herein, does not include non-transitory computer readable media (transmission media), such as modulated data signals and carrier waves.
FIG. 1 illustrates a flow diagram of a method for database virtualization-based data desensitization provided in accordance with an aspect of the present application, the method comprising: step S11 to step S13, wherein in step S11, database data is backed up, and snapshot is carried out on the backed up data; step S12, virtualizing a database according to the snapshot time point to obtain a virtual database; and step S13, performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the quick preparation of database data and the desensitization of the virtual library are realized, and the problems of complicated data preparation and long time consumption after the failure of desensitization are quickly solved.
Specifically, in step S11, database data is backed up, and snapshot is performed on the backed up data; and backing up the database, backing up the data therein, and performing snapshot operation on the backed-up data, thereby providing a data source of the database virtualization instance.
Specifically, in step S12, the database is virtualized according to the time point of snapshot, and a virtual database is obtained; the virtual database is virtualized according to the time point of the created snapshot, and the obtained data of the virtual database is consistent with the data of the database corresponding to the time point of the snapshot, so that the virtual database also has data, the original database is not operated when the desensitization is carried out, and the virtual database can be operated.
Specifically, in step S13, a desensitization operation is performed on the data in the virtual database, so as to obtain a desensitization result. The virtual database provides a database data virtualized by the database, the data in the virtual database is subjected to desensitization operation, certain sensitive information is subjected to data deformation through a desensitization rule, so that the sensitive privacy data is reliably protected, a desensitization result is obtained after the desensitization operation is performed, and the virtual database is further processed by the desensitization result, such as whether the virtual database is recovered or not.
In an embodiment of the present application, in step S11, database data is backed up regularly, and the backed up data is snapshot periodically or manually, and the created snapshot time point is recorded. And if the snapshot 1 is created 12 minutes and 12 seconds at the time of 12 days of 2021, 1 month and 5, the virtualized database instance can be created at the time of snapshot time point during recovery, the created virtualized database data is the data at the time of snapshot one creation, and the database backup snapshot can be used for creating periodic snapshots and manually creating snapshots according to the needs and time.
In step S12, one or more database instances are virtualized according to the created snapshot time point, where the data included in the instance includes the data in the database corresponding to the created snapshot time point. Here, according to the created snapshot time point virtualized database instance, the virtualized database instance contains data information in the database when the snapshot is created time point, and the virtual database can quickly create one or more virtual databases according to the snapshot data, so that complicated operation and long time consumption required by common physical recovery are avoided. For example, a virtual database I and a virtual database II are created according to the snapshot I, the data in the virtual database I and the virtual database II are database data of a snapshot time point, when desensitization is carried out, only the virtual database I or the virtual database II is connected to desensitize the virtual database data, and the virtual database is provided for a user after the desensitization is finished.
In one embodiment of the present application, in step S13, the data in the virtual database is subjected to masked desensitization or simulated desensitization. Here, the data in the virtual database is masked or simulated desensitized, such as masking the desensitized name: ABC, a after desensitization, or DEF after simulated desensitization ABC, the desensitization rules may be used to generate names, to generate organization names, to generate random identification numbers, etc., where the manner of desensitization rules includes, but is not limited to, the examples described above.
In an embodiment of the present application, after desensitizing the data in the virtual database to obtain a desensitization result, if the desensitization result is successful in desensitizing the data, providing the virtual database to a user for testing; and if the desensitization result is that the data desensitization fails, recycling the virtual database. Here, if the data desensitization is successful, the virtual database is provided for the user to test, and if the desensitization fails, the virtual database only needs to be recovered.
Then, after recovering the virtual database, re-virtualizing the database according to the snapshot time point to obtain a new virtual database; and adjusting a desensitization strategy to carry out desensitization operation on the new virtual database again. And recovering the virtual database with desensitization failure, and re-creating the virtual database with virtualized snapshot points, wherein when the desensitization process fails, recovering the virtual database I, and re-creating the virtual database II according to the snapshot I, wherein the data in the virtual database II is the same as the data in the virtual database I, and the data are the data when the snapshot I is created. The desensitization strategy is adjusted to desensitize the second virtual database again; therefore, the method can quickly create and destroy, can provide quick preparation work of desensitizing failure database data through virtualization of the database, and provides a complete set of brand new virtual library for desensitizing programs.
Wherein said adjusting a desensitization strategy comprises: and generating a random address desensitization rule, and adjusting a desensitization strategy according to the desensitization result of the first desensitization operation and the generated random address desensitization rule. Here, the first desensitization operation refers to a desensitization operation performed on data in the virtual database created for the first time, and after the failure of the first desensitization operation, the virtual database created for the first time is reclaimed, a new virtual database is created again, a random address desensitization rule is generated, for example, if five-level address information is selected when desensitizing for the first time, the five-level address of the town village in city and county is saved, at this time, the generated address length may exceed the range indicated by the database field, the method can fail in desensitization, so that the desensitization strategy of the second desensitization operation is reselected according to the desensitization result and the generated random address desensitization rule, for example, the third-level address such as the third-level address of the province, the city and county and the like is selected to be generated, the problem that the length of the generated address is overlong is solved, the desensitization operation is performed on the newly created virtual database according to the adjusted desensitization strategy, and the problems that data preparation is complicated and time-consuming is long after the desensitization failure are rapidly solved.
In a specific embodiment of the present application, as shown in fig. 2, a database data backup and a database snapshot are performed, when the snapshot is completed, a virtual database instance is created according to the database snapshot, a database virtualized database can be provided, when the virtualized database is desensitized, the database data can be directly provided for a user to test and use after the desensitization operation is successful, when the desensitization operation fails, the virtual database is recovered, the virtual database providing a data can be rapidly provided for the desensitization program for desensitizing by performing the virtualization creation operation on the database snapshot again, and when the user completes the use, the newly created virtual database instance is recovered, thereby completing the recovery of the data.
Further, embodiments of the present application provide a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method of database virtualization-based data desensitization as described above.
Corresponding to the above-described method, the present application further provides a terminal, which includes modules or units capable of performing the steps of the method described in fig. 1 or fig. 2 or the respective embodiments, where the modules or units may be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is also provided an apparatus for data desensitization based on database virtualization, the apparatus including:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform operations of the method as described above.
For example, computer-readable instructions, when executed, cause the one or more processors to:
backing up database data, and snapshot the backed up data;
virtualizing a database according to the snapshot time point to obtain a virtual database;
and performing desensitization operation on the data in the virtual database to obtain a desensitization result.
Fig. 3 shows a schematic structural diagram of an apparatus for data desensitization based on database virtualization according to another aspect of the present application, where the apparatus includes: the system comprises a snapshot device 11, a virtualization device 12 and a desensitizing device 13, wherein the snapshot device 11 is used for backing up database data and taking a snapshot of the backed up data; the virtualization device 12 is configured to virtualize the database according to the snapshot time point, and obtain a virtual database; the desensitizing device 13 is used for desensitizing the data in the virtual database to obtain a desensitizing result.
It should be noted that, the contents executed by the snapshot device 11, the virtualization device 12, and the desensitizing device 13 are the same as or corresponding to the contents in the steps S11, S12, and S13, and are not described herein for brevity.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions as described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Furthermore, portions of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application by way of operation of the computer. Program instructions for invoking the methods of the present application may be stored in fixed or removable recording media and/or transmitted via a data stream in a broadcast or other signal bearing medium and/or stored within a working memory of a computer device operating according to the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to operate a method and/or a solution according to the embodiments of the present application as described above.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.
Claims (6)
1. A method of database virtualization-based data desensitization, wherein the method comprises:
carrying out timing backup on database data, carrying out timing snapshot or manual snapshot on the backed-up data, and recording the created snapshot time point;
virtualizing a database according to the snapshot time point to obtain a virtual database;
desensitizing the data in the virtual database to obtain a desensitizing result;
if the desensitization result is successful in data desensitization, providing the virtual database to a user for testing;
if the desensitization result is that the data desensitization fails, recycling the virtual database;
re-virtualizing the database according to the snapshot time point to obtain a new virtual database;
and adjusting a desensitization strategy to carry out desensitization operation on the new virtual database again.
2. The method of claim 1, wherein virtualizing the database according to the point in time at which the snapshot was taken comprises:
and virtualizing one or more database instances according to the created snapshot time point, wherein the data contained in the instances comprises the data in the database corresponding to the created snapshot time point.
3. The method of claim 1 or 2, wherein desensitizing the data in the virtual database comprises:
and carrying out covering desensitization or simulation desensitization on the data in the virtual database.
4. The method of claim 1, wherein the adjusting a desensitization strategy comprises:
and generating a random address desensitization rule, and adjusting a desensitization strategy according to the desensitization result of the first desensitization operation and the generated random address desensitization rule.
5. An apparatus for database virtualization-based data desensitization, wherein the apparatus comprises:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any one of claims 1 to 4.
6. A computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method of any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110034262.XA CN112732489B (en) | 2021-01-11 | 2021-01-11 | Data desensitization method and device based on database virtualization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110034262.XA CN112732489B (en) | 2021-01-11 | 2021-01-11 | Data desensitization method and device based on database virtualization |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112732489A CN112732489A (en) | 2021-04-30 |
CN112732489B true CN112732489B (en) | 2023-05-09 |
Family
ID=75590253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110034262.XA Active CN112732489B (en) | 2021-01-11 | 2021-01-11 | Data desensitization method and device based on database virtualization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112732489B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113360476B (en) * | 2021-06-21 | 2023-11-21 | 上海上讯信息技术股份有限公司 | Method and equipment for program database virtualization plug |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105515963A (en) * | 2015-12-03 | 2016-04-20 | 中国联合网络通信集团有限公司 | Data gateway device and big data system |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3019987B1 (en) * | 2013-07-09 | 2019-01-09 | Delphix Corp. | Virtual database rewind |
US10424222B2 (en) * | 2015-10-27 | 2019-09-24 | Hartford Fire Insurance Company | Dynamic interface virtualization in a networked computing environment |
CN106909475A (en) * | 2015-12-23 | 2017-06-30 | 中国移动通信集团重庆有限公司 | Row data backup, the method and apparatus recovered are stored in based on object |
US11048820B2 (en) * | 2017-07-21 | 2021-06-29 | Sap Se | Anonymized data storage and retrieval |
CN110826105B (en) * | 2019-11-15 | 2021-11-12 | 江苏苏宁银行股份有限公司 | Distributed bank data desensitization method and system |
CN111858546A (en) * | 2020-06-22 | 2020-10-30 | 网联清算有限公司 | Data processing method, device and system |
-
2021
- 2021-01-11 CN CN202110034262.XA patent/CN112732489B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105515963A (en) * | 2015-12-03 | 2016-04-20 | 中国联合网络通信集团有限公司 | Data gateway device and big data system |
Non-Patent Citations (2)
Title |
---|
Research on a data desensitization algorithm of blockchain distributed energy thrnsaction based on differential privacy;Yun Li等;《IEEE》;第980-985页 * |
基于T-Closeness的大数据脱敏系统的设计与实现;邵华西;《中国优秀硕士学位论文全文数据库信息科技辑》(第08期);第I138-76页 * |
Also Published As
Publication number | Publication date |
---|---|
CN112732489A (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220114067A1 (en) | Systems and methods for instantiation of virtual machines from backups | |
US7650356B2 (en) | Generating an optimized restore plan | |
JP4796398B2 (en) | Methods, systems, and products for metadata replication and restoration | |
US9411691B2 (en) | Virtual machine disaster recovery | |
US10089186B1 (en) | Method and apparatus for file backup | |
CN106951345A (en) | A kind of conformance test method and device of magnetic disk of virtual machine data | |
US10108501B2 (en) | Terminal backup and recovery method | |
US9823976B2 (en) | Optimization to permit block based incremental backup across system reboot or crash | |
CN113360322B (en) | Method and equipment for recovering data based on backup system | |
EP4014119A1 (en) | Data race analysis based on altering function internal loads during time-travel debugging | |
CN112732489B (en) | Data desensitization method and device based on database virtualization | |
US11500854B2 (en) | Selective data synchronization to troubleshoot production environment failures | |
CN107818029B (en) | Automatic test method for cloud hard disk data recovery consistency | |
CN112445780A (en) | Master-slave architecture deployment method and device based on snapshot | |
CN110968565A (en) | Database creation method and system | |
US8671075B1 (en) | Change tracking indices in virtual machines | |
CN111274117A (en) | Recommended service experiment and management method, device and system thereof | |
CN113312205B (en) | Data verification method and device, storage medium and computer equipment | |
CN109656825B (en) | Method and device for processing art resources, electronic equipment and storage medium | |
CN110471828B (en) | Operating system testing method, device and equipment thereof | |
CN115454570A (en) | Disaster recovery method, virtual machine system, device, and storage medium | |
CN114780208A (en) | Method, system, device and storage medium for verifying backup validity of multi-platform virtual machine | |
CN113791934A (en) | Data recovery method, computing device and storage medium | |
CN112596954A (en) | Data backup and reconstruction method, device, equipment and storage medium | |
CN112463457A (en) | Data protection method, device, medium and system for guaranteeing application consistency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |