CN112732489B - Data desensitization method and device based on database virtualization - Google Patents

Data desensitization method and device based on database virtualization Download PDF

Info

Publication number
CN112732489B
CN112732489B CN202110034262.XA CN202110034262A CN112732489B CN 112732489 B CN112732489 B CN 112732489B CN 202110034262 A CN202110034262 A CN 202110034262A CN 112732489 B CN112732489 B CN 112732489B
Authority
CN
China
Prior art keywords
desensitization
database
data
snapshot
virtual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110034262.XA
Other languages
Chinese (zh)
Other versions
CN112732489A (en
Inventor
任养超
马佩
张少辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202110034262.XA priority Critical patent/CN112732489B/en
Publication of CN112732489A publication Critical patent/CN112732489A/en
Application granted granted Critical
Publication of CN112732489B publication Critical patent/CN112732489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/256Integrating or interfacing systems involving database management systems in federated or virtual databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application aims to provide a data desensitizing method and equipment based on database virtualization, wherein the backup is performed on database data, and snapshot is performed on the backed-up data; virtualizing a database according to the snapshot time point to obtain a virtual database; and performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the quick preparation of database data and the desensitization of the virtual library are realized, and the problems of complicated data preparation and long time consumption after the failure of desensitization are quickly solved.

Description

Data desensitization method and device based on database virtualization
Technical Field
The present disclosure relates to the field of computers, and in particular, to a method and apparatus for data desensitization based on database virtualization.
Background
Currently, with the widespread use of database technology and large data, desensitization of database data is increasingly used. People enjoy data analysis to bring convenience to life of the people, and meanwhile, the people are also deeply bothered by personal information leakage and even harassment, so that desensitization of database data is particularly important. When the data of the database is desensitized, the desensitization mode in the common case is to desensitize the existing database or the recovery database, and the desensitization is successful when the desensitization operation is completed when the desensitization operation is performed on the data in the database. However, when the data of the desensitization database has an abnormality or error, which causes the failure of the desensitization process, the data which has been desensitized cannot be rolled back, and the desensitized data becomes dirty data. If the desensitization failure database data is directly desensitized again, the desensitized data can be secondarily desensitized, and the consistency of the desensitized data cannot be ensured. When the database is to be restored for re-desensitization, the restoration process of the database is tedious and time-consuming.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for data desensitization based on database virtualization, which solve the problem in the prior art that the database cannot be quickly recovered to provide desensitized data after failure of database data desensitization.
According to one aspect of the present application, there is provided a method of data desensitization based on database virtualization, the method comprising:
backing up database data, and snapshot the backed up data;
virtualizing a database according to the snapshot time point to obtain a virtual database;
and performing desensitization operation on the data in the virtual database to obtain a desensitization result.
Further, backing up database data, and snapshot the backed up data, including:
and carrying out timing backup on the database data, carrying out timing snapshot or manual snapshot on the backed data, and recording the created snapshot time point.
Further, virtualizing the database according to the snapshot-making time point, including:
and virtualizing one or more database instances according to the created snapshot time point, wherein the data contained in the instances comprises the data in the database corresponding to the created snapshot time point.
Further, desensitizing the data in the virtual database, including:
and carrying out covering desensitization or simulation desensitization on the data in the virtual database.
Further, the desensitizing operation is performed on the data in the virtual database, and after the desensitizing result is obtained, the method comprises the following steps:
if the desensitization result is successful in data desensitization, providing the virtual database to a user for testing;
and if the desensitization result is that the data desensitization fails, recycling the virtual database.
Further, the recovering the virtual database includes:
re-virtualizing the database according to the snapshot time point to obtain a new virtual database;
and adjusting a desensitization strategy to carry out desensitization operation on the new virtual database again.
Further, the adjusting the desensitization strategy includes:
and generating a random address desensitization rule, and adjusting a desensitization strategy according to the desensitization result of the first desensitization operation and the generated random address desensitization rule.
According to yet another aspect of the present application, there is also provided an apparatus for data desensitization based on database virtualization, the apparatus comprising:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform operations of the method as described above.
According to yet another aspect of the present application, there is also provided a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method as described above.
Compared with the prior art, the method and the device have the advantages that the backup is carried out on the database data, and the snapshot is carried out on the backed-up data; virtualizing a database according to the snapshot time point to obtain a virtual database; and performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the quick preparation of database data and the desensitization of the virtual library are realized, and the problems of complicated data preparation and long time consumption after the failure of desensitization are quickly solved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 illustrates a method flow diagram for database virtualization-based data desensitization provided in accordance with an aspect of the present application;
FIG. 2 illustrates a database virtualization-based desensitization flow diagram in an embodiment of the present application;
fig. 3 shows a schematic structural diagram of an apparatus for database virtualization-based data desensitization provided in yet another aspect of the present application.
The same or similar reference numbers in the drawings refer to the same or similar parts.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
In one typical configuration of the present application, the terminal, the devices of the service network, and the trusted party each include one or more processors (e.g., central processing units (Central Processing Unit, CPU)), input/output interfaces, network interfaces, and memory.
The Memory may include non-volatile Memory in a computer readable medium, random access Memory (Random Access Memory, RAM) and/or non-volatile Memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase-Change RAM (PRAM), static random access Memory (Static Random Access Memory, SRAM), dynamic random access Memory (Dynamic Random Access Memory, DRAM), other types of Random Access Memory (RAM), read-Only Memory (ROM), electrically erasable programmable read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash Memory or other Memory technology, read-Only optical disk read-Only Memory (Compact Disc Read-Only Memory, CD-ROM), digital versatile disks (Digital Versatile Disk, DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by the computing device. Computer readable media, as defined herein, does not include non-transitory computer readable media (transmission media), such as modulated data signals and carrier waves.
FIG. 1 illustrates a flow diagram of a method for database virtualization-based data desensitization provided in accordance with an aspect of the present application, the method comprising: step S11 to step S13, wherein in step S11, database data is backed up, and snapshot is carried out on the backed up data; step S12, virtualizing a database according to the snapshot time point to obtain a virtual database; and step S13, performing desensitization operation on the data in the virtual database to obtain a desensitization result. Therefore, the quick preparation of database data and the desensitization of the virtual library are realized, and the problems of complicated data preparation and long time consumption after the failure of desensitization are quickly solved.
Specifically, in step S11, database data is backed up, and snapshot is performed on the backed up data; and backing up the database, backing up the data therein, and performing snapshot operation on the backed-up data, thereby providing a data source of the database virtualization instance.
Specifically, in step S12, the database is virtualized according to the time point of snapshot, and a virtual database is obtained; the virtual database is virtualized according to the time point of the created snapshot, and the obtained data of the virtual database is consistent with the data of the database corresponding to the time point of the snapshot, so that the virtual database also has data, the original database is not operated when the desensitization is carried out, and the virtual database can be operated.
Specifically, in step S13, a desensitization operation is performed on the data in the virtual database, so as to obtain a desensitization result. The virtual database provides a database data virtualized by the database, the data in the virtual database is subjected to desensitization operation, certain sensitive information is subjected to data deformation through a desensitization rule, so that the sensitive privacy data is reliably protected, a desensitization result is obtained after the desensitization operation is performed, and the virtual database is further processed by the desensitization result, such as whether the virtual database is recovered or not.
In an embodiment of the present application, in step S11, database data is backed up regularly, and the backed up data is snapshot periodically or manually, and the created snapshot time point is recorded. And if the snapshot 1 is created 12 minutes and 12 seconds at the time of 12 days of 2021, 1 month and 5, the virtualized database instance can be created at the time of snapshot time point during recovery, the created virtualized database data is the data at the time of snapshot one creation, and the database backup snapshot can be used for creating periodic snapshots and manually creating snapshots according to the needs and time.
In step S12, one or more database instances are virtualized according to the created snapshot time point, where the data included in the instance includes the data in the database corresponding to the created snapshot time point. Here, according to the created snapshot time point virtualized database instance, the virtualized database instance contains data information in the database when the snapshot is created time point, and the virtual database can quickly create one or more virtual databases according to the snapshot data, so that complicated operation and long time consumption required by common physical recovery are avoided. For example, a virtual database I and a virtual database II are created according to the snapshot I, the data in the virtual database I and the virtual database II are database data of a snapshot time point, when desensitization is carried out, only the virtual database I or the virtual database II is connected to desensitize the virtual database data, and the virtual database is provided for a user after the desensitization is finished.
In one embodiment of the present application, in step S13, the data in the virtual database is subjected to masked desensitization or simulated desensitization. Here, the data in the virtual database is masked or simulated desensitized, such as masking the desensitized name: ABC, a after desensitization, or DEF after simulated desensitization ABC, the desensitization rules may be used to generate names, to generate organization names, to generate random identification numbers, etc., where the manner of desensitization rules includes, but is not limited to, the examples described above.
In an embodiment of the present application, after desensitizing the data in the virtual database to obtain a desensitization result, if the desensitization result is successful in desensitizing the data, providing the virtual database to a user for testing; and if the desensitization result is that the data desensitization fails, recycling the virtual database. Here, if the data desensitization is successful, the virtual database is provided for the user to test, and if the desensitization fails, the virtual database only needs to be recovered.
Then, after recovering the virtual database, re-virtualizing the database according to the snapshot time point to obtain a new virtual database; and adjusting a desensitization strategy to carry out desensitization operation on the new virtual database again. And recovering the virtual database with desensitization failure, and re-creating the virtual database with virtualized snapshot points, wherein when the desensitization process fails, recovering the virtual database I, and re-creating the virtual database II according to the snapshot I, wherein the data in the virtual database II is the same as the data in the virtual database I, and the data are the data when the snapshot I is created. The desensitization strategy is adjusted to desensitize the second virtual database again; therefore, the method can quickly create and destroy, can provide quick preparation work of desensitizing failure database data through virtualization of the database, and provides a complete set of brand new virtual library for desensitizing programs.
Wherein said adjusting a desensitization strategy comprises: and generating a random address desensitization rule, and adjusting a desensitization strategy according to the desensitization result of the first desensitization operation and the generated random address desensitization rule. Here, the first desensitization operation refers to a desensitization operation performed on data in the virtual database created for the first time, and after the failure of the first desensitization operation, the virtual database created for the first time is reclaimed, a new virtual database is created again, a random address desensitization rule is generated, for example, if five-level address information is selected when desensitizing for the first time, the five-level address of the town village in city and county is saved, at this time, the generated address length may exceed the range indicated by the database field, the method can fail in desensitization, so that the desensitization strategy of the second desensitization operation is reselected according to the desensitization result and the generated random address desensitization rule, for example, the third-level address such as the third-level address of the province, the city and county and the like is selected to be generated, the problem that the length of the generated address is overlong is solved, the desensitization operation is performed on the newly created virtual database according to the adjusted desensitization strategy, and the problems that data preparation is complicated and time-consuming is long after the desensitization failure are rapidly solved.
In a specific embodiment of the present application, as shown in fig. 2, a database data backup and a database snapshot are performed, when the snapshot is completed, a virtual database instance is created according to the database snapshot, a database virtualized database can be provided, when the virtualized database is desensitized, the database data can be directly provided for a user to test and use after the desensitization operation is successful, when the desensitization operation fails, the virtual database is recovered, the virtual database providing a data can be rapidly provided for the desensitization program for desensitizing by performing the virtualization creation operation on the database snapshot again, and when the user completes the use, the newly created virtual database instance is recovered, thereby completing the recovery of the data.
Further, embodiments of the present application provide a computer readable medium having stored thereon computer readable instructions executable by a processor to implement a method of database virtualization-based data desensitization as described above.
Corresponding to the above-described method, the present application further provides a terminal, which includes modules or units capable of performing the steps of the method described in fig. 1 or fig. 2 or the respective embodiments, where the modules or units may be implemented by hardware, software or a combination of hardware and software, and the present application is not limited thereto. For example, in an embodiment of the present application, there is also provided an apparatus for data desensitization based on database virtualization, the apparatus including:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform operations of the method as described above.
For example, computer-readable instructions, when executed, cause the one or more processors to:
backing up database data, and snapshot the backed up data;
virtualizing a database according to the snapshot time point to obtain a virtual database;
and performing desensitization operation on the data in the virtual database to obtain a desensitization result.
Fig. 3 shows a schematic structural diagram of an apparatus for data desensitization based on database virtualization according to another aspect of the present application, where the apparatus includes: the system comprises a snapshot device 11, a virtualization device 12 and a desensitizing device 13, wherein the snapshot device 11 is used for backing up database data and taking a snapshot of the backed up data; the virtualization device 12 is configured to virtualize the database according to the snapshot time point, and obtain a virtual database; the desensitizing device 13 is used for desensitizing the data in the virtual database to obtain a desensitizing result.
It should be noted that, the contents executed by the snapshot device 11, the virtualization device 12, and the desensitizing device 13 are the same as or corresponding to the contents in the steps S11, S12, and S13, and are not described herein for brevity.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions as described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Furthermore, portions of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application by way of operation of the computer. Program instructions for invoking the methods of the present application may be stored in fixed or removable recording media and/or transmitted via a data stream in a broadcast or other signal bearing medium and/or stored within a working memory of a computer device operating according to the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to operate a method and/or a solution according to the embodiments of the present application as described above.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.

Claims (6)

1. A method of database virtualization-based data desensitization, wherein the method comprises:
carrying out timing backup on database data, carrying out timing snapshot or manual snapshot on the backed-up data, and recording the created snapshot time point;
virtualizing a database according to the snapshot time point to obtain a virtual database;
desensitizing the data in the virtual database to obtain a desensitizing result;
if the desensitization result is successful in data desensitization, providing the virtual database to a user for testing;
if the desensitization result is that the data desensitization fails, recycling the virtual database;
re-virtualizing the database according to the snapshot time point to obtain a new virtual database;
and adjusting a desensitization strategy to carry out desensitization operation on the new virtual database again.
2. The method of claim 1, wherein virtualizing the database according to the point in time at which the snapshot was taken comprises:
and virtualizing one or more database instances according to the created snapshot time point, wherein the data contained in the instances comprises the data in the database corresponding to the created snapshot time point.
3. The method of claim 1 or 2, wherein desensitizing the data in the virtual database comprises:
and carrying out covering desensitization or simulation desensitization on the data in the virtual database.
4. The method of claim 1, wherein the adjusting a desensitization strategy comprises:
and generating a random address desensitization rule, and adjusting a desensitization strategy according to the desensitization result of the first desensitization operation and the generated random address desensitization rule.
5. An apparatus for database virtualization-based data desensitization, wherein the apparatus comprises:
one or more processors; and
a memory storing computer readable instructions that, when executed, cause the processor to perform the operations of the method of any one of claims 1 to 4.
6. A computer readable medium having stored thereon computer readable instructions executable by a processor to implement the method of any of claims 1 to 4.
CN202110034262.XA 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization Active CN112732489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110034262.XA CN112732489B (en) 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110034262.XA CN112732489B (en) 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization

Publications (2)

Publication Number Publication Date
CN112732489A CN112732489A (en) 2021-04-30
CN112732489B true CN112732489B (en) 2023-05-09

Family

ID=75590253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110034262.XA Active CN112732489B (en) 2021-01-11 2021-01-11 Data desensitization method and device based on database virtualization

Country Status (1)

Country Link
CN (1) CN112732489B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360476B (en) * 2021-06-21 2023-11-21 上海上讯信息技术股份有限公司 Method and equipment for program database virtualization plug

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105515963A (en) * 2015-12-03 2016-04-20 中国联合网络通信集团有限公司 Data gateway device and big data system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3019987B1 (en) * 2013-07-09 2019-01-09 Delphix Corp. Virtual database rewind
US10424222B2 (en) * 2015-10-27 2019-09-24 Hartford Fire Insurance Company Dynamic interface virtualization in a networked computing environment
CN106909475A (en) * 2015-12-23 2017-06-30 中国移动通信集团重庆有限公司 Row data backup, the method and apparatus recovered are stored in based on object
US11048820B2 (en) * 2017-07-21 2021-06-29 Sap Se Anonymized data storage and retrieval
CN110826105B (en) * 2019-11-15 2021-11-12 江苏苏宁银行股份有限公司 Distributed bank data desensitization method and system
CN111858546A (en) * 2020-06-22 2020-10-30 网联清算有限公司 Data processing method, device and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105515963A (en) * 2015-12-03 2016-04-20 中国联合网络通信集团有限公司 Data gateway device and big data system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Research on a data desensitization algorithm of blockchain distributed energy thrnsaction based on differential privacy;Yun Li等;《IEEE》;第980-985页 *
基于T-Closeness的大数据脱敏系统的设计与实现;邵华西;《中国优秀硕士学位论文全文数据库信息科技辑》(第08期);第I138-76页 *

Also Published As

Publication number Publication date
CN112732489A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
US20220114067A1 (en) Systems and methods for instantiation of virtual machines from backups
US7650356B2 (en) Generating an optimized restore plan
JP4796398B2 (en) Methods, systems, and products for metadata replication and restoration
US9411691B2 (en) Virtual machine disaster recovery
US10089186B1 (en) Method and apparatus for file backup
CN106951345A (en) A kind of conformance test method and device of magnetic disk of virtual machine data
US10108501B2 (en) Terminal backup and recovery method
US9823976B2 (en) Optimization to permit block based incremental backup across system reboot or crash
CN113360322B (en) Method and equipment for recovering data based on backup system
EP4014119A1 (en) Data race analysis based on altering function internal loads during time-travel debugging
CN112732489B (en) Data desensitization method and device based on database virtualization
US11500854B2 (en) Selective data synchronization to troubleshoot production environment failures
CN107818029B (en) Automatic test method for cloud hard disk data recovery consistency
CN112445780A (en) Master-slave architecture deployment method and device based on snapshot
CN110968565A (en) Database creation method and system
US8671075B1 (en) Change tracking indices in virtual machines
CN111274117A (en) Recommended service experiment and management method, device and system thereof
CN113312205B (en) Data verification method and device, storage medium and computer equipment
CN109656825B (en) Method and device for processing art resources, electronic equipment and storage medium
CN110471828B (en) Operating system testing method, device and equipment thereof
CN115454570A (en) Disaster recovery method, virtual machine system, device, and storage medium
CN114780208A (en) Method, system, device and storage medium for verifying backup validity of multi-platform virtual machine
CN113791934A (en) Data recovery method, computing device and storage medium
CN112596954A (en) Data backup and reconstruction method, device, equipment and storage medium
CN112463457A (en) Data protection method, device, medium and system for guaranteeing application consistency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant