WO2018076863A1 - Data storage method, apparatus, storage medium, server and system - Google Patents

Data storage method, apparatus, storage medium, server and system Download PDF

Info

Publication number
WO2018076863A1
WO2018076863A1 PCT/CN2017/095618 CN2017095618W WO2018076863A1 WO 2018076863 A1 WO2018076863 A1 WO 2018076863A1 CN 2017095618 W CN2017095618 W CN 2017095618W WO 2018076863 A1 WO2018076863 A1 WO 2018076863A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
terminal
storage address
server
security
Prior art date
Application number
PCT/CN2017/095618
Other languages
French (fr)
Chinese (zh)
Inventor
马志峰
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Publication of WO2018076863A1 publication Critical patent/WO2018076863A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Definitions

  • the present invention belongs to the field of communications technologies, and in particular, to a data storage method, apparatus, storage medium, server, and system.
  • the terminal can upload the data generated by the user to the corresponding cloud storage server for backup, and download the data from the cloud storage server to the terminal when necessary.
  • Embodiments of the present invention provide a data storage method, apparatus, storage medium, server, and system, which can improve the security of data stored by a server.
  • the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • a saving unit configured to save the data to a preset storage address
  • a scanning unit configured to invoke a security protection process to perform a security scan on the data to obtain a scan result
  • a storage unit configured to: if the data is determined to be security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
  • the embodiment of the present invention provides a storage medium on which a computer program is stored.
  • the computer program is executed on a computer, the computer is caused to perform a data storage method according to an embodiment of the present invention.
  • An embodiment of the present invention provides a server, including a memory, and a processor, by using a computer program stored in the memory, to perform the following steps:
  • the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • the embodiment of the invention further provides a system for data storage, comprising a server and a terminal, the server comprising the above-mentioned device for data storage.
  • Embodiments of the present invention provide a data storage method, apparatus, storage medium, server, and system, which can improve the security of data stored by a server.
  • FIG. 1 is a schematic flowchart diagram of a method for data storage according to an embodiment of the present invention.
  • FIG. 2 is another schematic flowchart of a method for data storage provided by an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention.
  • FIG. 4 is another schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
  • FIG. 7 is another schematic structural diagram of a server according to an embodiment of the present invention.
  • the data uploaded by the terminal to the cloud storage server is likely to carry a computer virus, which will secure the data in the cloud storage server. threatening.
  • An embodiment of the present invention provides a data storage method, including:
  • the method further includes: deleting the data from the preset storage address if the data is determined to be unsafe data according to the scan result.
  • the step of deleting the data from the preset storage address may include: determining, according to the scan result, If the data is unsafe data, the security processing process is invoked to process the data; if the data is detected as not being processed into security data, the data is deleted from the preset storage address.
  • the method may further include: if the data is detected to be processed into security data, the processed data is processed by The preset storage address is stored in a storage address in the server corresponding to the terminal.
  • the method further includes: sending prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal It is unsafe data and is deleted by the server.
  • the method further includes: clearing data in the preset storage address.
  • the method may further include: sending, to the terminal, the terminal for prompting the terminal
  • the uploaded data is security data and is stored to the information of the storage address corresponding to the terminal.
  • FIG. 1 is a schematic flowchart diagram of a data storage method according to an embodiment of the present invention.
  • the process may include:
  • step S101 the uploaded data is received from the terminal.
  • step S102 the data is saved to a preset storage address.
  • steps S101 and S102 of the embodiment of the present invention when the server receives the data uploaded by the terminal, the server first stores the data in a specified storage space, that is, a preset storage address.
  • the preset storage address is a storage space for temporarily storing data uploaded by the terminal, which is different from the storage space corresponding to each terminal in the server.
  • the storage address corresponding to the terminal A is the first storage address
  • the storage address corresponding to the terminal B is the second storage address, and the like.
  • the preset storage address is a storage space different from the first storage address and the second storage address.
  • the server when receiving the data uploaded by the terminal, the server first saves the data in a pre-specified preset storage address instead of saving to the first storage address immediately. After that, if the data uploaded by the terminal B is received, the server first saves the data uploaded by the terminal B to the preset storage address instead of the second storage address.
  • step S103 the security protection process is invoked to perform a security scan on the data to obtain a scan result.
  • the server may be triggered to invoke the security protection process to perform security scanning on the data uploaded by the terminal, and obtain a scan result.
  • the server can invoke a preset anti-virus software (security protection software) to perform a security scan on the data stored in the preset storage address. After the scan ends, the anti-virus software will report a scan result to the server.
  • security protection software security protection software
  • step S104 if it is determined that the data is security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • the server may store the data from the preset storage address into the storage address corresponding to the terminal in the server. For example, after determining that the data uploaded by the terminal terminal is the security data, the server may cut the data from the preset storage address to the first storage address corresponding to the terminal A in the server.
  • the server determines the data uploaded by the terminal as the security data. If the security protection process detects a computer virus, a Trojan, or a malicious program in the data uploaded by the terminal, the server determines the data uploaded by the terminal as unsafe data, and the like.
  • the server when receiving the data uploaded by the terminal, the server does not immediately save the data to the storage space corresponding to the terminal in the server, but first saves the data in a certain A specified temporary storage space and a security scan of the data. Only when no computer virus, trojan or malicious program is scanned in the data, the data is stored by the temporary storage space to the storage space corresponding to the terminal in the server. In this way, the server can effectively prevent the server from receiving data containing computer viruses, Trojans, or malicious programs, and pose a security threat to a large amount of data stored in the server.
  • FIG. 2 is another schematic flowchart of a method for data storage according to an embodiment of the present disclosure, where the process may include:
  • step S201 the server receives the uploaded data from the terminal.
  • step S202 the server saves the data to a preset storage address.
  • steps S201 and S202 may include:
  • the server may first save the data to a specified preset storage address.
  • the preset storage address is a storage space for temporarily storing data uploaded by the terminal, which is different from the storage space corresponding to each terminal in the server.
  • the storage address corresponding to the terminal A is the first storage address
  • the storage address corresponding to the terminal B is the second storage address
  • the preset storage address is a storage space different from the first storage address and the second storage address.
  • the server when receiving data uploaded by the terminal, the server may first save the data in the preset storage address and not save to the first storage address.
  • the server may The data in the preset storage address is cleared, so that the preset storage address can be used to save data uploaded by the next terminal, and the like. That is, in an embodiment, after the server stores the data uploaded by the terminal from the preset storage address to the storage address corresponding to the terminal in the server, the method may further include the following steps: clearing the data in the preset storage address. .
  • step S203 the server invokes the security protection process to perform a security scan on the data to obtain a scan result.
  • step S204 based on the scan result, the server determines whether the data is security data.
  • the server may invoke the security protection process to perform security scan on the data and obtain the scan result.
  • the server can invoke the preset anti-virus software to scan the data uploaded by the terminal. After the scan ends, the server can obtain the scan result reported by the anti-virus software.
  • the server may determine, according to the scan result, whether the data uploaded by the terminal is security data.
  • the server may determine the data uploaded by the terminal as the security data. If the scan result shows that the security protection process detects a computer virus, a Trojan, a malicious program, and the like in the data uploaded by the terminal, the server can determine the data uploaded by the terminal as unsafe data, and the like.
  • step S205 if it is determined that the data is security data, the server stores the data from the preset storage address to a storage address corresponding to the terminal in the server.
  • the server determines that the data uploaded by the terminal is the security data, and the server may be triggered to store the data uploaded by the terminal from the preset storage address into the storage address corresponding to the terminal in the server.
  • the server may cut the data uploaded by the terminal terminal from the preset storage address to the first storage address corresponding to the terminal A in the server.
  • the server may further send a message to the terminal, where the information is used.
  • the data uploaded by the terminal is prompted to be secure data, and is stored in a storage address corresponding to the terminal.
  • the method may further include the following steps: sending, to the terminal, the terminal to upload The data is security data and is stored to the storage address corresponding to the terminal.
  • step S206 if it is determined that the data is unsafe data, the server deletes the data from the preset storage address.
  • step S207 the server sends a prompt message to the terminal, and the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  • step S204 the server determines that the data uploaded by the terminal is unsafe data. Then, because the data uploaded by the terminal this time contains computer viruses, Trojans or malicious programs. Therefore, in this case, the server may delete the data uploaded by the terminal from the preset storage address.
  • the server may also send a prompt message to the terminal, and the prompt information is used to prompt the terminal that the data uploaded by the terminal is deleted by the server because it contains a computer virus, a Trojan, or a malicious program.
  • the prompt information may also prompt the terminal to start the security protection software to perform security scanning on the terminal data to check for hidden computer viruses, Trojans or malicious degrees in the terminal.
  • the prompt information may also prompt the terminal to re-send the request for the data uploading operation to the server after the computer virus, Trojan or malicious program hidden in the terminal is checked, and so on, which is not specifically limited herein.
  • the server deletes the data from the preset storage address, which may include:
  • the security processing process is called to process the data.
  • the data is deleted from the preset storage address.
  • the server determines that the data uploaded by the terminal is unsafe data according to the scan result of the security protection process. Then, the server can also invoke the security processing process to process the data uploaded by the terminal. For example, the security protection process detects that the data uploaded by the terminal contains a Trojan. At this point, the server can call the preset anti-virus software to perform Trojan removal processing on the data.
  • anti-virus software can not kill all computer viruses, Trojans or malicious programs. Therefore, if it is detected that the data uploaded by the terminal is still insecure after being processed by the security processing process, the security processing process cannot eliminate the computer virus, Trojan or malicious program carried in the data uploaded by the terminal. In this case, the server can delete the data uploaded by the terminal from the preset storage address.
  • the method may further include the following steps:
  • the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • the anti-virus software detects that the Trojan program carried in the data uploaded by the terminal has a corresponding record in the virus database of the anti-virus software and a corresponding elimination method, and then the anti-virus software can upload the Trojan program from the terminal according to the method of eliminating the record thereof. Eliminated in the data. That is to say, if it is detected that the data uploaded by the terminal has become security data after being processed by the security processing process, the server may store the processed data from the preset storage address into the storage address corresponding to the terminal.
  • the processed data is stored in the storage address corresponding to the terminal by the preset storage address, and may further include: After detecting that the data uploaded by the terminal has been processed into security data, it is further possible to detect whether the processed data is missing from the original data of the terminal compared to the data originally uploaded by the terminal.
  • the server may be stored by a preset storage address into a storage address in the server corresponding to the terminal.
  • the server If it is detected that the processed data is compared with the data originally uploaded by the terminal, the lack of normal data of the terminal occurs.
  • the data uploaded by the terminal to the server is five document files. Because these files carry computer viruses, the server performs security processing on the five document files, and the computer viruses are cleared, but it is found during processing. Two of the five documents were infected with a computer virus, so the two documents were removed along with the computer virus.
  • the server can save the remaining three documents from the preset storage address.
  • the storage is stored in the storage address corresponding to the terminal, or the server may also delete the remaining three documents, and so on, which is not specifically limited herein.
  • An embodiment of the present invention provides an apparatus for data storage, including:
  • a receiving unit configured to receive the uploaded data from the terminal
  • a saving unit configured to save the data to a preset storage address
  • a scanning unit configured to invoke a security protection process to perform a security scan on the data to obtain a scan result
  • a storage unit configured to: if the data is determined to be security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
  • the apparatus further includes: a deleting unit, configured to delete the data from the preset storage address if it is determined that the data is unsafe data according to the scan result.
  • the deleting unit is configured to: if the data is determined to be unsafe data according to the scan result, invoke a security processing process to process the data. If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address. If it is detected that the data has become processed after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • the device further includes: a prompting unit, configured to send prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  • a prompting unit configured to send prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  • the storage unit is further configured to: clear data in the preset storage address.
  • the storage unit may be further configured to send, to the terminal, information for prompting the terminal to upload data as security data, and storing the information to a storage address corresponding to the terminal.
  • FIG. 3 is a schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention.
  • the apparatus 300 for data storage may include a receiving unit 301, a saving unit 302, a scanning unit 303, and a storage unit 304.
  • the receiving unit 301 is configured to receive the uploaded data from the terminal.
  • the saving unit 302 is configured to save the data to a preset storage address.
  • the receiving unit 301 and the saving unit 302 can be used to:
  • the saving unit 302 of the server may first store the data in a specified storage space, that is, a preset storage address.
  • the preset storage address is a storage space for temporarily storing data uploaded by the terminal, which is different from the storage space corresponding to each terminal in the server.
  • the storage address corresponding to the terminal A is the first storage address
  • the storage address corresponding to the terminal B is the second storage address, and the like.
  • the preset storage address is a storage space different from the first storage address and the second storage address.
  • the saving unit 302 of the server may first save the data in a preset storage address specified in advance, instead of saving to the first storage address immediately. Then, if the receiving unit 301 receives the data uploaded by the B terminal, the saving unit 302 first saves the data uploaded by the B terminal to the preset storage address instead of the second storage address.
  • the scanning unit 303 is configured to invoke a security protection process to perform security scanning on the data to obtain a scan result.
  • the scanning unit 303 of the server may be triggered to invoke the security protection process to perform security scanning on the data uploaded by the terminal, and obtain a scan result.
  • the scanning unit 303 may invoke a preset anti-virus software to perform a security scan on the data stored in the preset storage address, and report the scan result to the server.
  • the storage unit 304 is configured to: if it is determined that the data is security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
  • the server may determine, according to the scan result, whether the data uploaded by the terminal is security data.
  • the server determines the data uploaded by the terminal as the security data. If the security protection process invoked by the scanning unit 303 detects a computer virus, a Trojan, a malicious program, and the like in the data uploaded by the terminal, the server determines the data uploaded by the terminal as unsafe data, and the like.
  • the storage unit 304 may be triggered to store the data from the preset storage address to the storage address corresponding to the terminal in the server. For example, if the server determines that the data uploaded by the terminal is the security data, the storage unit 304 may transfer the data uploaded by the terminal terminal from the preset storage address to the first storage address corresponding to the terminal.
  • the server when the receiving unit 301 receives the data uploaded by the terminal, the server does not immediately save the data to the storage space corresponding to the terminal in the server, but first saves the unit.
  • the data is saved in the preset storage address by 302, and the data is scanned by the scanning unit 303. Only when no computer virus, trojan or malicious program is scanned in the data, the data is stored by the storage unit 304 from the preset storage address to the storage space corresponding to the terminal in the server. In this way, the server can effectively prevent the server from receiving data containing computer viruses, Trojans, or malicious programs, and pose a security threat to a large amount of data stored in the server.
  • FIG. 4 is another schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention.
  • the device 300 for data storage may further include: a deleting unit 305 and a prompting unit 306.
  • the deleting unit 305 is configured to delete the data from the preset storage address if it is determined that the data is unsafe data according to the scan result.
  • the server determines, according to the scan result, that the data uploaded by the terminal is unsafe data.
  • the deleting unit 305 may be triggered to upload the data of the terminal. Remove directly from the default storage address.
  • the data stored in the server can be effectively prevented from being threatened by the data by directly deleting the data from the preset storage address.
  • the deleting unit 305 can be used to:
  • the security processing process is invoked to process the data
  • the data is deleted from the preset storage address
  • the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • the server determines, according to the scan result reported by the scanning unit 303, that the data uploaded by the terminal is unsafe data, then the server may also invoke the security processing process to process the data uploaded by the terminal.
  • the security protection process detects that the data uploaded by the terminal contains a Trojan.
  • the server can call the preset anti-virus software to eliminate the processing of the Trojan.
  • the deletion unit 305 of the triggering server may delete the data uploaded by the terminal from the preset storage address.
  • the anti-virus software detects that the Trojan program carried in the data uploaded by the terminal has a corresponding record in the virus database of the anti-virus software and the corresponding elimination method, the anti-virus software can upload the Trojan program from the terminal according to the recorded method. Eliminated in the data. That is to say, if it is detected that the data uploaded by the terminal has become security data after being processed by the security processing process, the server may store the processed data from the preset storage address into the storage address corresponding to the terminal.
  • the prompting unit 306 is configured to send prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  • the prompting unit 306 of the triggering server may send a prompt message to the terminal, where the prompting information is used to prompt the terminal to upload data. Contains computer viruses, Trojans, or malicious programs, etc., and is deleted by the server.
  • FIG. 5 is a schematic diagram of a scenario of a data storage system according to an embodiment of the present invention.
  • the system of data storage described above may include one or more servers, as well as one or more terminals.
  • the server can integrate the device for data storage as described in the above embodiments.
  • the above terminal may include an input device, an output device, a processor, a memory, and the like.
  • the above input device can be a physical button.
  • the above output device can be a display screen.
  • the above processor can be a central processing unit (CPU, Central Processing Unit).
  • the above memory may be a high speed RAM memory or a non-volatile memory (non-volatile) Memory), such as disk storage.
  • the above input device, output device, processor, and memory are connected by a bus.
  • the first terminal, the second terminal, and the third terminal respectively upload the first data, the second data, and the third data to the server.
  • the server After receiving the data, the server will save the data to the specified default storage address first. For example, the server saves the first data to the preset first storage address, saves the second data to the preset second storage address, and saves the third data to the preset third storage address.
  • the server invokes the security protection process to perform security scanning on the first data, the second data, and the third data respectively in the preset first storage address, the preset second storage address, and the preset third storage address, and obtain corresponding correspondences. Three scan results.
  • the server determines, according to the obtained scan result, whether the first data, the second data, and the third data are security data. For example, the server determines that the first data and the second data are security data that does not contain a computer virus, a trojan, or a malicious program, and the third data is unsafe data.
  • the server may store the first data from the preset first storage address to the storage address corresponding to the first terminal in the server, and store the second data from the preset second storage address into the server and the second terminal. The corresponding storage address.
  • the third data is deleted from the preset third storage address.
  • the server may separately send the first prompt information, the second prompt information, and the third prompt information to the first terminal, the second terminal, and the third terminal.
  • the first prompt information and the second prompt information are used to notify the first terminal and the second terminal that the uploaded data is security data, and is stored in the corresponding storage address.
  • the third prompt information is used to notify the third terminal that the uploaded data is unsafe data, has been deleted by the server, and the like.
  • the server when receiving the data uploaded by the terminal, the server does not immediately save the data to the storage space corresponding to the terminal in the server, but first saves the data to the pre-stored data. Set the storage address and perform a security scan of the data. Only when no computer virus, trojan or malicious program is scanned in the data, the data is stored by the preset storage address to the storage address corresponding to the terminal in the server. If a computer virus, Trojan, or malicious program is detected in the data, the server can directly delete the data. In this way, the server can effectively prevent the server from receiving data containing computer viruses, Trojans, or malicious programs, and pose a security threat to a large amount of data stored in the server.
  • the embodiment of the present invention provides a storage medium on which a computer program is stored.
  • the computer program is executed on a computer, the computer is caused to perform a data storage method according to an embodiment of the present invention.
  • the embodiment of the invention further provides a server, wherein any device for data storage provided by the above embodiments can be integrated.
  • FIG. 6 is a schematic structural diagram of a server 400 according to an embodiment of the present invention.
  • the server 400 can include one or more processing core processor 401, one or more computer readable storage media storage 402, communication unit 403, and the like.
  • the processor 401 is the control center of the server, connecting various portions of the entire server using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 402, and recalling data stored in the memory 402, Execute the server's various functions and process data to monitor the server as a whole.
  • Processor 401 can include one or more processing cores.
  • the processor 401 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 401.
  • the memory 402 can be used to store software programs and modules, and the processor 401 executes various functional applications and data processing by running software programs and modules stored in the memory 402.
  • the communication unit 403 can be used for receiving and transmitting signals during the process of transmitting and receiving information.
  • communication unit 403 receives signals transmitted by the terminals and hands them over to one or more processors 401 for processing.
  • the communication unit 403 transmits the feedback signal sent by the processor 401 to the terminal.
  • the processor 401 in the server loads the executable file corresponding to the process of one or more applications into the memory 402 according to the following instruction, and executes the application stored in the memory 402 by the processor 401 to execute The following steps:
  • the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  • the server may further include components such as a power source 404, an input unit 405, and a display unit 406.
  • components such as a power source 404, an input unit 405, and a display unit 406.
  • the server structure illustrated in FIG. 6 does not constitute a limitation to the server, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements. among them:
  • the power supply 404 can be logically coupled to the processor 401 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the power supply 404 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the input unit 405 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • Display unit 406 can be used to display information entered by the user or information provided to the user as well as various graphical user interfaces of the server, which can be composed of graphics, text, icons, video, and any combination thereof.
  • the display unit 406 can include a display panel.
  • the display unit can adopt a liquid crystal display (LCD, Liquid Crystal Display), Organic Light Emitting Diode (OLED, Organic Light-Emitting) Diode) and other forms to configure the display panel.
  • LCD liquid crystal display
  • OLED Organic Light Emitting Diode
  • the processor 401 may perform the following steps: if it is determined that the data is unsafe data according to the scan result, the data is from a preset storage address. Deleted.
  • the processor 401 may perform the following steps when performing the step of deleting the data from the preset storage address if the data is determined to be unsafe according to the scan result. And if it is determined that the data is unsafe data according to the scan result, the security processing process is invoked to process the data. If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address.
  • the processor 401 may further perform the following steps: if it is detected that the data is processed and becomes security data, The processed data is stored by the preset storage address to a storage address in the server corresponding to the terminal.
  • the processor 401 may further perform the step of: sending prompt information to the terminal, the prompt information is used for prompting
  • the data uploaded by the terminal is unsafe data and is deleted by the server.
  • the processor 401 may further perform the step of: clearing the preset Store the data in the address.
  • the processor 401 may further perform the following steps: sending the terminal to the terminal
  • the data for prompting the terminal to upload is security data, and is stored to the information of the storage address corresponding to the terminal.
  • the device for storing the data provided by the embodiment of the present invention is the same as the method for data storage in the above embodiment, and any device provided in the method for storing the data may be run on the device for storing the data.
  • any device provided in the method for storing the data may be run on the device for storing the data.
  • the implementation of the method refer to the method embodiment of the data storage, and details are not described herein again.
  • the related program can be controlled by a computer program.
  • the computer program can be stored in a computer readable storage medium, such as in a memory, and executed by at least one processor, and can include an implementation of the method as described in the data storage during execution.
  • the storage medium may be a magnetic disk, an optical disk, a read only memory (ROM, Read) Only Memory), random access memory (RAM, Random Access Memory), etc.
  • each functional module may be integrated into one processing chip, or each module may exist physically separately, or two or more modules may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated module if implemented in the form of a software functional module and sold or used as a standalone product, may also be stored in a computer readable storage medium, such as a read only memory, a magnetic disk or an optical disk, etc. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Virology (AREA)
  • Bioethics (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

A data storage method, comprising: receiving uploaded data from a terminal (S101); saving the data to a preset storage address (S102); calling a security process to scan the data securely so as to obtain a scan result (S103); and storing the data from the preset storage address to a storage address in a server which corresponds to the terminal if determined from the scan result that the data is secure data (S104). Said method may improve the security of data stored in a server.

Description

数据存储的方法、装置、存储介质、服务器及系统 Data storage method, device, storage medium, server and system
本申请要求于2016年10月25日提交中国专利局、申请号为201610949089.5、发明名称为“数据存储的方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims priority to Chinese Patent Application, filed on Jan. 25, 2016, filed on Jan. 25,,,,,,,,,,,,,,,,,,, in.
技术领域Technical field
本发明属于通信技术领域,尤其涉及一种数据存储的方法、装置、存储介质、服务器及系统。The present invention belongs to the field of communications technologies, and in particular, to a data storage method, apparatus, storage medium, server, and system.
背景技术Background technique
随着信息数据交流越来越频繁,使用云存储服务的用户也越来越多。借助于云存储服务,终端可以将用户使用过程中产生的数据上传到对应的云存储服务器中予以备份,并在有需要的时候从云存储服务器中将数据下载到终端。As information and data exchanges become more frequent, more and more users use cloud storage services. With the help of the cloud storage service, the terminal can upload the data generated by the user to the corresponding cloud storage server for backup, and download the data from the cloud storage server to the terminal when necessary.
技术问题technical problem
本发明实施例提供一种数据存储的方法、装置、存储介质、服务器及系统,能提高服务器存储的数据的安全性。Embodiments of the present invention provide a data storage method, apparatus, storage medium, server, and system, which can improve the security of data stored by a server.
技术解决方案Technical solution
本发明实施例提供一种数据存储的方法,包括:An embodiment of the present invention provides a data storage method, including:
从终端处接收上传的数据;Receiving uploaded data from the terminal;
将所述数据保存至预设存储地址;Saving the data to a preset storage address;
调用安全防护进程对所述数据进行安全扫描,得到扫描结果;Calling the security protection process to perform a security scan on the data to obtain a scan result;
若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And if the data is determined to be the security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
本发明实施例还提供一种数据存储的装置,包括:The embodiment of the invention further provides an apparatus for data storage, comprising:
接收单元,用于从终端处接收上传的数据;a receiving unit, configured to receive the uploaded data from the terminal;
保存单元,用于将所述数据保存至预设存储地址;a saving unit, configured to save the data to a preset storage address;
扫描单元,用于调用安全防护进程对所述数据进行安全扫描,得到扫描结果;a scanning unit, configured to invoke a security protection process to perform a security scan on the data to obtain a scan result;
存储单元,用于若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And a storage unit, configured to: if the data is determined to be security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
本发明实施例提供一种存储介质,其上存储有计算机程序,当所述计算机程序在计算机上执行时,使得所述计算机执行如本发明实施例提供的数据存储的方法。The embodiment of the present invention provides a storage medium on which a computer program is stored. When the computer program is executed on a computer, the computer is caused to perform a data storage method according to an embodiment of the present invention.
本发明实施例提供一种服务器,包括存储器,处理器,所述处理器通过调用所述存储器中存储的计算机程序,用于执行如下步骤:An embodiment of the present invention provides a server, including a memory, and a processor, by using a computer program stored in the memory, to perform the following steps:
从终端处接收上传的数据;Receiving uploaded data from the terminal;
将所述数据保存至预设存储地址;Saving the data to a preset storage address;
调用安全防护进程对所述数据进行安全扫描,得到扫描结果;Calling the security protection process to perform a security scan on the data to obtain a scan result;
若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And if the data is determined to be the security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
本发明实施例还提供一种数据存储的系统,包括服务器和终端,所述服务器包括上述的数据存储的装置。The embodiment of the invention further provides a system for data storage, comprising a server and a terminal, the server comprising the above-mentioned device for data storage.
有益效果 Beneficial effect
本发明实施例提供一种数据存储的方法、装置、存储介质、服务器及系统,能提高服务器存储的数据的安全性。Embodiments of the present invention provide a data storage method, apparatus, storage medium, server, and system, which can improve the security of data stored by a server.
附图说明DRAWINGS
下面结合附图,通过对本发明的具体实施方式详细描述,将使本发明的技术方案及其有益效果显而易见。The technical solutions of the present invention and the beneficial effects thereof will be apparent from the following detailed description of the embodiments of the invention.
图1是本发明实施例提供的数据存储的方法的流程示意图。FIG. 1 is a schematic flowchart diagram of a method for data storage according to an embodiment of the present invention.
图2是本发明实施例提供的数据存储的方法的另一流程示意图。2 is another schematic flowchart of a method for data storage provided by an embodiment of the present invention.
图3是本发明实施例提供的数据存储的装置的结构示意图。FIG. 3 is a schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention.
图4是本发明实施例提供的数据存储的装置的另一结构示意图。FIG. 4 is another schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention.
图5是本发明实施例提供的数据存储的系统的场景示意图。FIG. 5 is a schematic diagram of a system of a data storage system according to an embodiment of the present invention.
图6是本发明实施例提供的服务器的结构示意图。FIG. 6 is a schematic structural diagram of a server according to an embodiment of the present invention.
图7是本发明实施例提供的服务器的另一结构示意图。FIG. 7 is another schematic structural diagram of a server according to an embodiment of the present invention.
本发明的最佳实施方式BEST MODE FOR CARRYING OUT THE INVENTION
请参照图式,其中相同的组件符号代表相同的组件,本发明的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所例示的本发明具体实施例,其不应被视为限制本发明未在此详述的其它具体实施例。Referring to the drawings, wherein like reference numerals refer to the same components, the principles of the invention are illustrated in the context of a suitable computing environment. The following description is based on the specific embodiments of the invention, which are not to be construed as limiting the invention.
在实际使用过程中,如果用户终端在使用过程中已经感染了如木马等计算机病毒,那么终端上传到云存储服务器中的数据也很可能携带有计算机病毒,这将对云存储服务器中的数据安全构成威胁。In actual use, if the user terminal has been infected with a computer virus such as a Trojan horse during use, the data uploaded by the terminal to the cloud storage server is likely to carry a computer virus, which will secure the data in the cloud storage server. threatening.
本发明实施例提供一种数据存储的方法,包括:An embodiment of the present invention provides a data storage method, including:
从终端处接收上传的数据;Receiving uploaded data from the terminal;
将所述数据保存至预设存储地址;Saving the data to a preset storage address;
调用安全防护进程对所述数据进行安全扫描,得到扫描结果;Calling the security protection process to perform a security scan on the data to obtain a scan result;
若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And if the data is determined to be the security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
在一种实施方式中,在所述得到扫描结果的步骤之后,还可以包括:若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。In an embodiment, after the step of obtaining the scan result, the method further includes: deleting the data from the preset storage address if the data is determined to be unsafe data according to the scan result.
在一种实施方式中,所述若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除的步骤,可以包括:若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理;若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除。In an embodiment, if the determining that the data is unsafe data according to the scan result, the step of deleting the data from the preset storage address may include: determining, according to the scan result, If the data is unsafe data, the security processing process is invoked to process the data; if the data is detected as not being processed into security data, the data is deleted from the preset storage address.
在一种实施方式中,在所述调用安全处理进程对所述数据进行处理的步骤之后,还可以包括:若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。In an embodiment, after the step of invoking the security processing process to process the data, the method may further include: if the data is detected to be processed into security data, the processed data is processed by The preset storage address is stored in a storage address in the server corresponding to the terminal.
在一种实施方式中,在所述将所述数据从预设存储地址中删除的步骤之后,还可以包括:发送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。In an embodiment, after the step of deleting the data from the preset storage address, the method further includes: sending prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal It is unsafe data and is deleted by the server.
在一种实施方式中,在所述将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址的步骤之后,还可以包括:清空所述预设存储地址中的数据。In an embodiment, after the step of storing the data from a preset storage address to a storage address corresponding to the terminal in the server, the method further includes: clearing data in the preset storage address.
在一种实施方式中,在所述将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址的步骤之后,还可以包括:向所述终端发送用于提示所述终端上传的数据为安全数据,并被存储到与所述终端对应的存储地址的信息。In an embodiment, after the step of storing the data by a preset storage address to a storage address corresponding to the terminal in the server, the method may further include: sending, to the terminal, the terminal for prompting the terminal The uploaded data is security data and is stored to the information of the storage address corresponding to the terminal.
请参阅图1,图1是本发明实施例提供的数据存储的方法的流程示意图,流程可以包括:Referring to FIG. 1 , FIG. 1 is a schematic flowchart diagram of a data storage method according to an embodiment of the present invention. The process may include:
在步骤S101中,从终端处接收上传的数据。In step S101, the uploaded data is received from the terminal.
在步骤S102中,将该数据保存至预设存储地址。In step S102, the data is saved to a preset storage address.
在本发明实施例的步骤S101和S102中,当服务器接收到终端上传的数据时,服务器先将该数据存储到一个指定的存储空间,即预设存储地址中。In steps S101 and S102 of the embodiment of the present invention, when the server receives the data uploaded by the terminal, the server first stores the data in a specified storage space, that is, a preset storage address.
需要说明的是,预设存储地址是一个用于临时存储终端所上传的数据的存储空间,有别于服务器中与各个终端对应的存储空间。例如,在服务器中,甲终端对应的存储地址为第一存储地址,乙终端对应的存储地址为第二存储地址,等等。而预设存储地址是不同于第一存储地址以及第二存储地址的一个存储空间。例如当接收到甲终端上传的数据时,服务器先将该数据保存在预先指定的预设存储地址,而不是立即保存到第一存储地址。之后,若接收到乙终端上传的数据,那么服务器也是先将乙终端上传的数据保存到预设存储地址中,而不是第二存储地址。It should be noted that the preset storage address is a storage space for temporarily storing data uploaded by the terminal, which is different from the storage space corresponding to each terminal in the server. For example, in the server, the storage address corresponding to the terminal A is the first storage address, the storage address corresponding to the terminal B is the second storage address, and the like. The preset storage address is a storage space different from the first storage address and the second storage address. For example, when receiving the data uploaded by the terminal, the server first saves the data in a pre-specified preset storage address instead of saving to the first storage address immediately. After that, if the data uploaded by the terminal B is received, the server first saves the data uploaded by the terminal B to the preset storage address instead of the second storage address.
在步骤S103中,调用安全防护进程对该数据进行安全扫描,得到扫描结果。In step S103, the security protection process is invoked to perform a security scan on the data to obtain a scan result.
比如,在服务器将终端上传的数据保存到预设存储地址之后,可以触发服务器调用安全防护进程对终端上传的数据进行安全扫描,并得到扫描结果。例如,服务器可以调用预设的杀毒软件(安全防护软件)对保存在预设存储地址中的数据进行安全扫描。在扫描结束后,该杀毒软件会向服务器上报一个扫描结果。For example, after the server saves the data uploaded by the terminal to the preset storage address, the server may be triggered to invoke the security protection process to perform security scanning on the data uploaded by the terminal, and obtain a scan result. For example, the server can invoke a preset anti-virus software (security protection software) to perform a security scan on the data stored in the preset storage address. After the scan ends, the anti-virus software will report a scan result to the server.
在步骤S104中,若根据该扫描结果确定出该数据为安全数据,则将该数据由预设存储地址存储到服务器中与该终端对应的存储地址。In step S104, if it is determined that the data is security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
比如,在得到扫描结果之后,如果服务器根据该扫描结果判断出终端上传的数据为安全数据,那么服务器就可以将该数据从预设存储地址存储到服务器中与该终端对应的存储地址中。例如,服务器在确定甲终端上传的数据为安全数据后,可以将该数据由预设存储地址剪切到服务器中与甲终端对应的第一存储地址保存起来。For example, after the scan result is obtained, if the server determines that the data uploaded by the terminal is the security data according to the scan result, the server may store the data from the preset storage address into the storage address corresponding to the terminal in the server. For example, after determining that the data uploaded by the terminal terminal is the security data, the server may cut the data from the preset storage address to the first storage address corresponding to the terminal A in the server.
需要说明的是,当安全防护进程在终端上传的数据中未检测到计算机病毒、木马以及恶意程序等时,服务器会将终端上传的数据确定为安全数据。而如果安全防护进程在终端上传的数据中检测到了计算机病毒、木马以及恶意程序等,那么服务器会将终端上传的数据确定为不安全数据,等等。It should be noted that when the security protection process does not detect a computer virus, a Trojan, or a malicious program in the data uploaded by the terminal, the server determines the data uploaded by the terminal as the security data. If the security protection process detects a computer virus, a Trojan, or a malicious program in the data uploaded by the terminal, the server determines the data uploaded by the terminal as unsafe data, and the like.
可以理解的是,在本发明实施例中,当接收到终端上传的数据时,服务器并不是立即将该数据保存到服务器中与该终端对应的存储空间中,而是先将该数据保存在某个指定的临时存储空间,并对该数据进行安全扫描。只有当在该数据中没有扫描到计算机病毒、木马或恶意程序等时,才会将该数据由临时存储空间存储到服务器中与该终端对应的存储空间。通过这种方式,可以有效避免服务器因接收到包含计算机病毒、木马或恶意程序的数据,而对存储在服务器中的大量数据造成安全威胁。It can be understood that, in the embodiment of the present invention, when receiving the data uploaded by the terminal, the server does not immediately save the data to the storage space corresponding to the terminal in the server, but first saves the data in a certain A specified temporary storage space and a security scan of the data. Only when no computer virus, trojan or malicious program is scanned in the data, the data is stored by the temporary storage space to the storage space corresponding to the terminal in the server. In this way, the server can effectively prevent the server from receiving data containing computer viruses, Trojans, or malicious programs, and pose a security threat to a large amount of data stored in the server.
请参阅图2,图2为本发明实施例提供的数据存储的方法的另一流程示意图,流程可以包括:Referring to FIG. 2, FIG. 2 is another schematic flowchart of a method for data storage according to an embodiment of the present disclosure, where the process may include:
在步骤S201中,服务器从终端处接收上传的数据。In step S201, the server receives the uploaded data from the terminal.
在步骤S202中,服务器将该数据保存至预设存储地址。In step S202, the server saves the data to a preset storage address.
比如,步骤S201和S202可以包括:For example, steps S201 and S202 may include:
当接收到终端上传的数据时,服务器可以先将该数据保存到指定的预设存储地址中。When receiving data uploaded by the terminal, the server may first save the data to a specified preset storage address.
需要说明的是,预设存储地址是一个用于临时存储终端所上传的数据的存储空间,有别于服务器中与各个终端对应的存储空间。例如,在服务器中,甲终端对应的存储地址为第一存储地址,乙终端对应的存储地址为第二存储地址,等等。而预设存储地址是不同于第一存储地址以及第二存储地址等的一个存储空间。It should be noted that the preset storage address is a storage space for temporarily storing data uploaded by the terminal, which is different from the storage space corresponding to each terminal in the server. For example, in the server, the storage address corresponding to the terminal A is the first storage address, the storage address corresponding to the terminal B is the second storage address, and the like. The preset storage address is a storage space different from the first storage address and the second storage address.
例如,当接收到甲终端上传的数据时,服务器可以先将该数据保存在预设存储地址中,而暂不保存到第一存储地址。For example, when receiving data uploaded by the terminal, the server may first save the data in the preset storage address and not save to the first storage address.
另外,由于预设存储地址为用于临时保存终端上传的数据的存储空间,因此,在服务器将临时保存在预设存储地址中的数据存储到与该终端对应的存储地址之后,服务器可以将该预设存储地址中的数据清空,以便该预设存储地址可以用于保存下一个终端上传的数据,等等。也即,在一种实施方式中,在服务器将终端上传的数据由预设存储地址存储到服务器中与该终端对应的存储地址之后,还可以包括如下步骤:清空该预设存储地址中的数据。In addition, since the preset storage address is a storage space for temporarily storing data uploaded by the terminal, after the server stores the data temporarily saved in the preset storage address to the storage address corresponding to the terminal, the server may The data in the preset storage address is cleared, so that the preset storage address can be used to save data uploaded by the next terminal, and the like. That is, in an embodiment, after the server stores the data uploaded by the terminal from the preset storage address to the storage address corresponding to the terminal in the server, the method may further include the following steps: clearing the data in the preset storage address. .
在步骤S203中,服务器调用安全防护进程对该数据进行安全扫描,得到扫描结果。In step S203, the server invokes the security protection process to perform a security scan on the data to obtain a scan result.
在步骤S204中,根据该扫描结果,服务器判断该数据是否为安全数据。In step S204, based on the scan result, the server determines whether the data is security data.
比如,在将终端上传的数据保存至预设存储地址之后,可以由服务器调用安全防护进程对该数据进行安全扫描,并得到扫描结果。例如,服务器可以调用预设的杀毒软件对终端上传的数据进行扫描。在扫描结束后,服务器可以获取到杀毒软件上报的扫描结果。For example, after saving the data uploaded by the terminal to the preset storage address, the server may invoke the security protection process to perform security scan on the data and obtain the scan result. For example, the server can invoke the preset anti-virus software to scan the data uploaded by the terminal. After the scan ends, the server can obtain the scan result reported by the anti-virus software.
在获取到扫描结果后,服务器可以根据该扫描结果,判断终端上传的数据是否为安全数据。After obtaining the scan result, the server may determine, according to the scan result, whether the data uploaded by the terminal is security data.
需要说明的是,当扫描结果显示安全防护进程在终端上传的数据中未检测到计算机病毒、木马以及恶意程序等时,服务器可以将终端上传的数据确定为安全数据。而如果扫描结果显示安全防护进程在终端上传的数据中检测到了计算机病毒、木马以及恶意程序等,那么服务器可以将终端上传的数据确定为不安全数据,等等。It should be noted that when the scan result shows that the security protection process does not detect a computer virus, a Trojan, a malicious program, and the like in the data uploaded by the terminal, the server may determine the data uploaded by the terminal as the security data. If the scan result shows that the security protection process detects a computer virus, a Trojan, a malicious program, and the like in the data uploaded by the terminal, the server can determine the data uploaded by the terminal as unsafe data, and the like.
在步骤S205中,若判断出该数据为安全数据,则服务器将该数据由预设存储地址存储到服务器中与该终端对应的存储地址。In step S205, if it is determined that the data is security data, the server stores the data from the preset storage address to a storage address corresponding to the terminal in the server.
比如,在步骤S204中服务器判断出终端上传的数据为安全数据,那么可以触发服务器将终端上传的数据由预设存储地址存储到服务器中与该终端对应的存储地址中。For example, in the step S204, the server determines that the data uploaded by the terminal is the security data, and the server may be triggered to store the data uploaded by the terminal from the preset storage address into the storage address corresponding to the terminal in the server.
例如,服务器确定出甲终端上传的数据为安全数据,那么服务器可以将甲终端上传的数据由预设存储地址剪切到服务器中与甲终端对应的第一存储地址。For example, if the server determines that the data uploaded by the terminal is security data, the server may cut the data uploaded by the terminal terminal from the preset storage address to the first storage address corresponding to the terminal A in the server.
在一种实施方式中,在上述服务器将终端上传的数据由预设存储地址存储到服务器中与该终端对应的存储地址的步骤之后,服务器还可以向该终端发送一则信息,该信息用于提示该终端上传的数据为安全数据,已存储到与该终端对应的存储地址中。在一种实施方式中,在服务器将终端上传的数据由预设存储地址存储到服务器中与该终端对应的存储地址的步骤之后,还可以包括如下步骤:向该终端发送用于提示该终端上传的数据为安全数据,并被存储到与该终端对应的存储地址的信息。In an embodiment, after the server stores the data uploaded by the terminal from the preset storage address to the storage address corresponding to the terminal in the server, the server may further send a message to the terminal, where the information is used. The data uploaded by the terminal is prompted to be secure data, and is stored in a storage address corresponding to the terminal. In an embodiment, after the step of the server storing the data uploaded by the terminal from the preset storage address to the storage address corresponding to the terminal in the server, the method may further include the following steps: sending, to the terminal, the terminal to upload The data is security data and is stored to the storage address corresponding to the terminal.
在步骤S206中,若判断出该数据为不安全数据,则服务器将该数据从预设存储地址中删除。In step S206, if it is determined that the data is unsafe data, the server deletes the data from the preset storage address.
在步骤S207中,服务器发送提示信息至该终端,该提示信息用于提示该终端上传的数据为不安全数据,并被服务器删除。In step S207, the server sends a prompt message to the terminal, and the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
比如,在步骤S204中服务器判断出终端上传的数据为不安全数据。那么,由于该终端本次上传的数据中包含有计算机病毒、木马或恶意程序等。因此,在这种情况下,服务器可以将该终端本次上传的数据从预设存储地址中删除。For example, in step S204, the server determines that the data uploaded by the terminal is unsafe data. Then, because the data uploaded by the terminal this time contains computer viruses, Trojans or malicious programs. Therefore, in this case, the server may delete the data uploaded by the terminal from the preset storage address.
之后,服务器还可以向该终端发送一则提示信息,该提示信息用于提示该终端其本次上传的数据因包含有计算机病毒、木马或恶意程序等,而被服务器删除。此外,该提示信息还可以提示终端启动安全防护软件对终端数据进行安全扫描,以查杀终端中隐藏的计算机病毒、木马或恶意程度等。或者,该提示信息还可以提示终端在查杀完毕隐藏在其中的计算机病毒、木马或恶意程序后,重新向服务器发送进行数据上传操作的请求,等等,此处不做具体限定。Afterwards, the server may also send a prompt message to the terminal, and the prompt information is used to prompt the terminal that the data uploaded by the terminal is deleted by the server because it contains a computer virus, a Trojan, or a malicious program. In addition, the prompt information may also prompt the terminal to start the security protection software to perform security scanning on the terminal data to check for hidden computer viruses, Trojans or malicious degrees in the terminal. Alternatively, the prompt information may also prompt the terminal to re-send the request for the data uploading operation to the server after the computer virus, Trojan or malicious program hidden in the terminal is checked, and so on, which is not specifically limited herein.
在一种实施方式中,步骤S206中所述若根据该扫描结果确定出该数据为不安全数据,则服务器将该数据从预设存储地址中删除,可以包括:In an embodiment, if the data is determined to be unsafe data according to the scan result, the server deletes the data from the preset storage address, which may include:
若根据该扫描结果确定出该数据为不安全数据,则调用安全处理进程对该数据进行处理。If it is determined according to the scan result that the data is unsafe data, the security processing process is called to process the data.
若检测到该数据经过处理后未变为安全数据,则将该数据从预设存储地址中删除。If it is detected that the data has not become safe data after being processed, the data is deleted from the preset storage address.
比如,服务器根据安全防护进程的扫描结果判断出终端上传的数据为不安全数据,那么此时服务器还可以调用安全处理进程对终端上传的数据进行处理。例如,安全防护进程检测到终端上传的数据中包含有木马程序。此时,服务器可以调用预设的杀毒软件,对该数据进行木马程序清除处理。For example, the server determines that the data uploaded by the terminal is unsafe data according to the scan result of the security protection process. Then, the server can also invoke the security processing process to process the data uploaded by the terminal. For example, the security protection process detects that the data uploaded by the terminal contains a Trojan. At this point, the server can call the preset anti-virus software to perform Trojan removal processing on the data.
然而,由于杀毒软件的病毒库带有一定的局限性,杀毒软件无法对所有的计算机病毒、木马或恶意程序进行查杀。所以,若检测到终端上传的数据经过安全处理进程的处理后仍然为不安全的数据,也即安全处理进程无法消除终端上传的数据中携带的计算机病毒、木马或恶意程序等。在这种情况下,服务器可以将终端上传的数据从预设存储地址中删除。However, due to the limitations of the virus database of anti-virus software, anti-virus software can not kill all computer viruses, Trojans or malicious programs. Therefore, if it is detected that the data uploaded by the terminal is still insecure after being processed by the security processing process, the security processing process cannot eliminate the computer virus, Trojan or malicious program carried in the data uploaded by the terminal. In this case, the server can delete the data uploaded by the terminal from the preset storage address.
在一种实施方式中,在上述调用安全处理进程对终端上传的数据进行处理的步骤之后,还可以包括如下步骤:In an embodiment, after the step of invoking the security processing process to process the data uploaded by the terminal, the method may further include the following steps:
若检测到该数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与该终端对应的存储地址。If it is detected that the data becomes safe data after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
比如,杀毒软件检测到终端上传的数据中携带的木马程序在杀毒软件的病毒库中有相应的记载以及对应的消除方法,那么杀毒软件就可以按照其记载的消除方法将该木马程序从终端上传的数据中消除。也就是说,若检测到终端上传的数据经过安全处理进程的处理后变为了安全数据,那么服务器可以将经过处理后的数据由预设存储地址存储到与该终端对应的存储地址中。For example, the anti-virus software detects that the Trojan program carried in the data uploaded by the terminal has a corresponding record in the virus database of the anti-virus software and a corresponding elimination method, and then the anti-virus software can upload the Trojan program from the terminal according to the method of eliminating the record thereof. Eliminated in the data. That is to say, if it is detected that the data uploaded by the terminal has become security data after being processed by the security processing process, the server may store the processed data from the preset storage address into the storage address corresponding to the terminal.
在一种实施方式中,上述若检测到该数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与该终端对应的存储地址,还可以包括:若检测到终端上传的数据经过处理后变为了安全数据,则还可以进一步检测经过处理后的数据相比于终端原来上传的数据是否发生终端正常数据的缺失。In an embodiment, if the data is processed to become the security data, the processed data is stored in the storage address corresponding to the terminal by the preset storage address, and may further include: After detecting that the data uploaded by the terminal has been processed into security data, it is further possible to detect whether the processed data is missing from the original data of the terminal compared to the data originally uploaded by the terminal.
若检测到经过处理后的数据相比于终端原来上传的数据,并没有发生终端正常的数据的缺失,而仅仅是终端原来上传的数据中的计算机病毒、木马或恶意程序被清除了,那么服务器可以将经过处理后的数据由预设存储地址存储到服务器中与该终端对应的存储地址中。If it is detected that the processed data is compared with the data originally uploaded by the terminal, the lack of normal data of the terminal does not occur, but only the computer virus, Trojan or malicious program in the originally uploaded data of the terminal is cleared, then the server The processed data may be stored by a preset storage address into a storage address in the server corresponding to the terminal.
若检测到经过处理后的数据相比于终端原来上传的数据,发生了终端正常数据的缺失。比如,终端向服务器上传的数据为五份文档文件,因这些文件中携带有计算机病毒,服务器对这五份文档文件进行了安全处理,清除了其中的计算机病毒,但是在处理过程中发现是这五份文档中的两份文档感染了计算机病毒,因此将这两份文档连同计算机病毒一起删除了。在这种情况下,由于经过处理后的数据相比于终端原来上传的数据发生了缺失(即由五份文档变为三份文档),因此服务器可以将剩余的三份文档由预设存储地址存储到与该终端对应的存储地址中,或者服务器也可以将剩余的三份文档也一并删除,等等,此处不做具体限定。If it is detected that the processed data is compared with the data originally uploaded by the terminal, the lack of normal data of the terminal occurs. For example, the data uploaded by the terminal to the server is five document files. Because these files carry computer viruses, the server performs security processing on the five document files, and the computer viruses are cleared, but it is found during processing. Two of the five documents were infected with a computer virus, so the two documents were removed along with the computer virus. In this case, since the processed data is missing compared to the data originally uploaded by the terminal (that is, from five documents to three documents), the server can save the remaining three documents from the preset storage address. The storage is stored in the storage address corresponding to the terminal, or the server may also delete the remaining three documents, and so on, which is not specifically limited herein.
本发明实施例提供一种数据存储的装置,包括:An embodiment of the present invention provides an apparatus for data storage, including:
接收单元,用于从终端处接收上传的数据;a receiving unit, configured to receive the uploaded data from the terminal;
保存单元,用于将所述数据保存至预设存储地址;a saving unit, configured to save the data to a preset storage address;
扫描单元,用于调用安全防护进程对所述数据进行安全扫描,得到扫描结果;a scanning unit, configured to invoke a security protection process to perform a security scan on the data to obtain a scan result;
存储单元,用于若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And a storage unit, configured to: if the data is determined to be security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
在一种实施方式中,所述装置还包括:删除单元,用于若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。In an embodiment, the apparatus further includes: a deleting unit, configured to delete the data from the preset storage address if it is determined that the data is unsafe data according to the scan result.
在一种实施方式中,所述删除单元用于:若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理。若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除。若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。In an embodiment, the deleting unit is configured to: if the data is determined to be unsafe data according to the scan result, invoke a security processing process to process the data. If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address. If it is detected that the data has become processed after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
在一种实施方式中,所述装置还包括:提示单元,用于发送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。In an embodiment, the device further includes: a prompting unit, configured to send prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
在一种实施方式中,所述存储单元,还可以用于:清空所述预设存储地址中的数据。In an embodiment, the storage unit is further configured to: clear data in the preset storage address.
在一种实施方式中,所述存储单元,还可以用于向所述终端发送用于提示所述终端上传的数据为安全数据,并被存储到与所述终端对应的存储地址的信息。In an embodiment, the storage unit may be further configured to send, to the terminal, information for prompting the terminal to upload data as security data, and storing the information to a storage address corresponding to the terminal.
请参阅图3,图3为本发明实施例提供的数据存储的装置的结构示意图。数据存储的装置300可以包括:接收单元301,保存单元302,扫描单元303,以及存储单元304。Please refer to FIG. 3. FIG. 3 is a schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention. The apparatus 300 for data storage may include a receiving unit 301, a saving unit 302, a scanning unit 303, and a storage unit 304.
接收单元301,用于从终端处接收上传的数据。The receiving unit 301 is configured to receive the uploaded data from the terminal.
保存单元302,用于将所述数据保存至预设存储地址。The saving unit 302 is configured to save the data to a preset storage address.
比如,接收单元301和保存单元302可以用于:For example, the receiving unit 301 and the saving unit 302 can be used to:
当服务器的接收单元301接收到终端上传的数据时,服务器的保存单元302可以先将该数据存储到一个指定的存储空间,即预设存储地址。When the receiving unit 301 of the server receives the data uploaded by the terminal, the saving unit 302 of the server may first store the data in a specified storage space, that is, a preset storage address.
需要说明的是,预设存储地址是一个用于临时存储终端所上传的数据的存储空间,有别于服务器中与各个终端对应的存储空间。例如,在服务器中,甲终端对应的存储地址为第一存储地址,乙终端对应的存储地址为第二存储地址,等等。而预设存储地址是不同于第一存储地址以及第二存储地址的一个存储空间。例如当接收单元301接收到甲终端上传的数据时,服务器的保存单元302可以先将该数据保存在预先指定的预设存储地址,而不是立即保存到第一存储地址。之后,若接收单元301接收到乙终端上传的数据,那么保存单元302也是先将乙终端上传的数据保存到预设存储地址中,而不是第二存储地址。It should be noted that the preset storage address is a storage space for temporarily storing data uploaded by the terminal, which is different from the storage space corresponding to each terminal in the server. For example, in the server, the storage address corresponding to the terminal A is the first storage address, the storage address corresponding to the terminal B is the second storage address, and the like. The preset storage address is a storage space different from the first storage address and the second storage address. For example, when the receiving unit 301 receives the data uploaded by the terminal A, the saving unit 302 of the server may first save the data in a preset storage address specified in advance, instead of saving to the first storage address immediately. Then, if the receiving unit 301 receives the data uploaded by the B terminal, the saving unit 302 first saves the data uploaded by the B terminal to the preset storage address instead of the second storage address.
扫描单元303,用于调用安全防护进程对所述数据进行安全扫描,得到扫描结果。The scanning unit 303 is configured to invoke a security protection process to perform security scanning on the data to obtain a scan result.
比如,在保存单元302将终端上传的数据保存到预设存储地址中之后,可以触发服务器的扫描单元303调用安全防护进程对终端上传的数据进行安全扫描,并得到扫描结果。例如,扫描单元303可以调用预设的杀毒软件对保存在预设存储地址中的数据进行安全扫描,并将扫描结果上报给服务器。For example, after the saving unit 302 saves the data uploaded by the terminal to the preset storage address, the scanning unit 303 of the server may be triggered to invoke the security protection process to perform security scanning on the data uploaded by the terminal, and obtain a scan result. For example, the scanning unit 303 may invoke a preset anti-virus software to perform a security scan on the data stored in the preset storage address, and report the scan result to the server.
存储单元304,用于若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。The storage unit 304 is configured to: if it is determined that the data is security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
比如,在扫描单元303将扫描结果上报给服务器之后,服务器可以根据该扫描结果判断终端上传的数据是否为安全数据。For example, after the scanning unit 303 reports the scan result to the server, the server may determine, according to the scan result, whether the data uploaded by the terminal is security data.
需要说明的是,当扫描单元303调用的安全防护进程在终端上传的数据中未检测到计算机病毒、木马以及恶意程序等时,服务器会将终端上传的数据确定为安全数据。而如果扫描单元303调用的安全防护进程在终端上传的数据中检测到了计算机病毒、木马以及恶意程序等,那么服务器会将终端上传的数据确定为不安全数据,等等。It should be noted that when the security protection process invoked by the scanning unit 303 does not detect a computer virus, a Trojan, a malicious program, or the like in the data uploaded by the terminal, the server determines the data uploaded by the terminal as the security data. If the security protection process invoked by the scanning unit 303 detects a computer virus, a Trojan, a malicious program, and the like in the data uploaded by the terminal, the server determines the data uploaded by the terminal as unsafe data, and the like.
若服务器根据扫描单元303上报的扫描结果判断出终端上传的数据为安全数据,那么可以触发存储单元304将该数据由预设存储地址存储到服务器中与该终端对应的存储地址。例如,若服务器确定出甲终端上传的数据为安全数据,则存储单元304可以将甲终端上传的数据由预设存储地址转存到甲终端对应的第一存储地址中。If the server determines that the data uploaded by the terminal is the security data according to the scan result reported by the scanning unit 303, the storage unit 304 may be triggered to store the data from the preset storage address to the storage address corresponding to the terminal in the server. For example, if the server determines that the data uploaded by the terminal is the security data, the storage unit 304 may transfer the data uploaded by the terminal terminal from the preset storage address to the first storage address corresponding to the terminal.
可以理解的是,在本发明实施例中,当接收单元301接收到终端上传的数据时,服务器并不是立即将该数据保存到服务器中与该终端对应的存储空间中,而是先由保存单元302将该数据保存在预设存储地址,并由扫描单元303对该数据进行安全扫描。只有当在该数据中没有扫描到计算机病毒、木马或恶意程序等时,才会由存储单元304将该数据由预设存储地址存储到服务器中与该终端对应的存储空间。通过这种方式,可以有效避免服务器因接收到包含计算机病毒、木马或恶意程序的数据,而对存储在服务器中的大量数据造成安全威胁。It can be understood that, in the embodiment of the present invention, when the receiving unit 301 receives the data uploaded by the terminal, the server does not immediately save the data to the storage space corresponding to the terminal in the server, but first saves the unit. The data is saved in the preset storage address by 302, and the data is scanned by the scanning unit 303. Only when no computer virus, trojan or malicious program is scanned in the data, the data is stored by the storage unit 304 from the preset storage address to the storage space corresponding to the terminal in the server. In this way, the server can effectively prevent the server from receiving data containing computer viruses, Trojans, or malicious programs, and pose a security threat to a large amount of data stored in the server.
请一并参阅图4,图4为本发明实施例提供的数据存储的装置的另一结构示意图。数据存储的装置300还可以包括:删除单元305以及提示单元306。Referring to FIG. 4, FIG. 4 is another schematic structural diagram of an apparatus for data storage according to an embodiment of the present invention. The device 300 for data storage may further include: a deleting unit 305 and a prompting unit 306.
删除单元305,用于若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。The deleting unit 305 is configured to delete the data from the preset storage address if it is determined that the data is unsafe data according to the scan result.
比如,在扫描单元303将扫描结果上报给服务器之后,服务器根据该扫描结果判断出终端上传的数据为不安全的数据,在这种情况下,可以触发删除单元305将该终端本次上传的数据直接从预设存储地址中删除。For example, after the scanning unit 303 reports the scan result to the server, the server determines, according to the scan result, that the data uploaded by the terminal is unsafe data. In this case, the deleting unit 305 may be triggered to upload the data of the terminal. Remove directly from the default storage address.
可以理解的是,在确定出终端上传的数据为不安全的数据时,通过将该数据直接从预设存储地址中删除,可以有效避免服务器中存储的数据遭受安全威胁。It can be understood that when the data uploaded by the terminal is determined to be unsecure data, the data stored in the server can be effectively prevented from being threatened by the data by directly deleting the data from the preset storage address.
在一种实施方式中,删除单元305可以用于:In an embodiment, the deleting unit 305 can be used to:
若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理;If it is determined that the data is unsafe data according to the scan result, the security processing process is invoked to process the data;
若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除;If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address;
若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。If it is detected that the data has become processed after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
比如,服务器根据扫描单元303上报的扫描结果判断出终端上传的数据为不安全数据,那么此时服务器还可以调用安全处理进程对终端上传的数据进行处理。例如,安全防护进程检测到终端上传的数据中包含有木马程序。此时,服务器可以调用预设的杀毒软件,对该数据进行木马程序的消除处理。For example, the server determines, according to the scan result reported by the scanning unit 303, that the data uploaded by the terminal is unsafe data, then the server may also invoke the security processing process to process the data uploaded by the terminal. For example, the security protection process detects that the data uploaded by the terminal contains a Trojan. At this point, the server can call the preset anti-virus software to eliminate the processing of the Trojan.
然而,由于杀毒软件的病毒库带有一定的局限性,杀毒软件无法对所有的计算机病毒、木马或恶意程序进行查杀。所以,若检测到终端上传的数据经过安全处理进程的处理后仍然为不安全的数据,也即安全处理进程无法消除终端上传的数据中携带的计算机病毒、木马或恶意程序等。在这种情况下,可以触发服务器的删除单元305将终端上传的数据从预设存储地址中删除。However, due to the limitations of the virus database of anti-virus software, anti-virus software can not kill all computer viruses, Trojans or malicious programs. Therefore, if it is detected that the data uploaded by the terminal is still insecure after being processed by the security processing process, the security processing process cannot eliminate the computer virus, Trojan or malicious program carried in the data uploaded by the terminal. In this case, the deletion unit 305 of the triggering server may delete the data uploaded by the terminal from the preset storage address.
而如果杀毒软件检测到终端上传的数据中携带的木马程序在杀毒软件的病毒库中有相应的记载以及对应的消除方法,那么杀毒软件就可以按照其记载的方法将该木马程序从终端上传的数据中消除。也就是说,若检测到终端上传的数据经过安全处理进程的处理后变为了安全数据,那么服务器可以将经过处理后的数据由预设存储地址存储到与该终端对应的存储地址中。If the anti-virus software detects that the Trojan program carried in the data uploaded by the terminal has a corresponding record in the virus database of the anti-virus software and the corresponding elimination method, the anti-virus software can upload the Trojan program from the terminal according to the recorded method. Eliminated in the data. That is to say, if it is detected that the data uploaded by the terminal has become security data after being processed by the security processing process, the server may store the processed data from the preset storage address into the storage address corresponding to the terminal.
提示单元306,用于发送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。The prompting unit 306 is configured to send prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
比如,在删除单元305将终端上传的数据从预设存储地址中删除之后,可以触发服务器的提示单元306向该终端发送一则提示信息,该提示信息用于提示该终端因其上传的数据中包含计算机病毒、木马或恶意程序等,而被服务器删除。For example, after the deleting unit 305 deletes the data uploaded by the terminal from the preset storage address, the prompting unit 306 of the triggering server may send a prompt message to the terminal, where the prompting information is used to prompt the terminal to upload data. Contains computer viruses, Trojans, or malicious programs, etc., and is deleted by the server.
本发明还提供一种数据存储的系统。请参阅图5,图5为本发明实施例提供的数据存储的系统的场景示意图。The present invention also provides a system for data storage. Referring to FIG. 5, FIG. 5 is a schematic diagram of a scenario of a data storage system according to an embodiment of the present invention.
上述数据存储的系统可以包括一个或多个服务器,以及一个或多个终端。其中,该服务器可以集成如上述实施例所述的数据存储的装置。The system of data storage described above may include one or more servers, as well as one or more terminals. Wherein, the server can integrate the device for data storage as described in the above embodiments.
上述终端可以包括输入设备、输出设备、处理器以及存储器等。上述输入设备可为物理按键。上述输出设备可为显示屏。上述处理器可以为中央处理器(CPU,Central Processing Unit)。上述存储器可以是高速RAM存储器,也可为非不稳定的存储器(non-volatile memory),例如磁盘存储器。上述输入设备、输出设备、处理器以及存储器通过总线连接。The above terminal may include an input device, an output device, a processor, a memory, and the like. The above input device can be a physical button. The above output device can be a display screen. The above processor can be a central processing unit (CPU, Central Processing Unit). The above memory may be a high speed RAM memory or a non-volatile memory (non-volatile) Memory), such as disk storage. The above input device, output device, processor, and memory are connected by a bus.
比如,第一终端、第二终端以及第三终端分别向服务器上传了第一数据、第二数据以及第三数据。服务器在接收到这些数据后,会将这些数据先保存到指定的预设存储地址中。例如,服务器将第一数据保存到预设第一存储地址中,将第二数据保存到预设第二存储地址中,以及将第三数据保存到预设第三存储地址中。For example, the first terminal, the second terminal, and the third terminal respectively upload the first data, the second data, and the third data to the server. After receiving the data, the server will save the data to the specified default storage address first. For example, the server saves the first data to the preset first storage address, saves the second data to the preset second storage address, and saves the third data to the preset third storage address.
然后,服务器调用安全防护进程在预设第一存储地址、预设第二存储地址以及预设第三存储地址中分别对第一数据、第二数据以及第三数据进行安全扫描,并得到对应的三份扫描结果。Then, the server invokes the security protection process to perform security scanning on the first data, the second data, and the third data respectively in the preset first storage address, the preset second storage address, and the preset third storage address, and obtain corresponding correspondences. Three scan results.
接着,服务器根据获取到的扫描结果,判断第一数据、第二数据以及第三数据是否为安全数据。例如,服务器判断出第一数据和第二数据为不包含计算机病毒、木马或恶意程序的安全数据,而第三数据为不安全的数据。Then, the server determines, according to the obtained scan result, whether the first data, the second data, and the third data are security data. For example, the server determines that the first data and the second data are security data that does not contain a computer virus, a trojan, or a malicious program, and the third data is unsafe data.
基于上述判断结果,服务器可以将第一数据由预设第一存储地址存储到服务器中与第一终端对应的存储地址,将第二数据由预设第二存储地址存储到服务器中与第二终端对应的存储地址。而将第三数据从预设第三存储地址中删除。之后,服务器可以分别发送第一提示信息、第二提示信息以及第三提示信息到第一终端、第二终端以及第三终端。其中,第一提示信息和第二提示信息分别用于通知第一终端和第二终端其上传的数据为安全数据,并被存储到对应的存储地址中。而第三提示信息则用于通知第三终端其上传的数据为不安全数据,已被服务器删除,等等。The server may store the first data from the preset first storage address to the storage address corresponding to the first terminal in the server, and store the second data from the preset second storage address into the server and the second terminal. The corresponding storage address. The third data is deleted from the preset third storage address. Afterwards, the server may separately send the first prompt information, the second prompt information, and the third prompt information to the first terminal, the second terminal, and the third terminal. The first prompt information and the second prompt information are used to notify the first terminal and the second terminal that the uploaded data is security data, and is stored in the corresponding storage address. The third prompt information is used to notify the third terminal that the uploaded data is unsafe data, has been deleted by the server, and the like.
可以理解的是,在本发明实施例中,当接收到终端上传的数据时,服务器并不是立即将该数据保存到服务器中与该终端对应的存储空间中,而是先将该数据保存到预设存储地址中,并对该数据进行安全扫描。只有当在该数据中没有扫描到计算机病毒、木马或恶意程序等时,才会将该数据由预设存储地址存储到服务器中与该终端对应的存储地址。若在该数据中检测到计算机病毒、木马或恶意程序等,则服务器可以将该数据直接删除。通过这种方式,可以有效避免服务器因接收到包含计算机病毒、木马或恶意程序的数据,而对存储在服务器中的大量数据造成安全威胁。It can be understood that, in the embodiment of the present invention, when receiving the data uploaded by the terminal, the server does not immediately save the data to the storage space corresponding to the terminal in the server, but first saves the data to the pre-stored data. Set the storage address and perform a security scan of the data. Only when no computer virus, trojan or malicious program is scanned in the data, the data is stored by the preset storage address to the storage address corresponding to the terminal in the server. If a computer virus, Trojan, or malicious program is detected in the data, the server can directly delete the data. In this way, the server can effectively prevent the server from receiving data containing computer viruses, Trojans, or malicious programs, and pose a security threat to a large amount of data stored in the server.
本发明实施例提供一种存储介质,其上存储有计算机程序,当所述计算机程序在计算机上执行时,使得所述计算机执行如本发明实施例提供的数据存储的方法。The embodiment of the present invention provides a storage medium on which a computer program is stored. When the computer program is executed on a computer, the computer is caused to perform a data storage method according to an embodiment of the present invention.
本发明实施例还提供了一种服务器,其中可以集成如上实施例所提供的任一数据存储的装置。The embodiment of the invention further provides a server, wherein any device for data storage provided by the above embodiments can be integrated.
请参考图6,其示出了本发明实施例所涉及的服务器400的结构示意图。Please refer to FIG. 6, which is a schematic structural diagram of a server 400 according to an embodiment of the present invention.
该服务器400可以包括一个或者一个以上处理核心的处理器401、一个或一个以上计算机可读存储介质的存储器402、通信单元403等部件。The server 400 can include one or more processing core processor 401, one or more computer readable storage media storage 402, communication unit 403, and the like.
处理器401是该服务器的控制中心,利用各种接口和线路连接整个服务器的各个部分,通过运行或执行存储在存储器402内的软件程序和/或模块,以及调用存储在存储器402内的数据,执行服务器的各种功能和处理数据,从而对服务器进行整体监控。处理器401可包括一个或多个处理核心。处理器401可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等。调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器401中。The processor 401 is the control center of the server, connecting various portions of the entire server using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 402, and recalling data stored in the memory 402, Execute the server's various functions and process data to monitor the server as a whole. Processor 401 can include one or more processing cores. The processor 401 can integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 401.
存储器402可用于存储软件程序以及模块,处理器401通过运行存储在存储器402的软件程序以及模块,从而执行各种功能应用以及数据处理。The memory 402 can be used to store software programs and modules, and the processor 401 executes various functional applications and data processing by running software programs and modules stored in the memory 402.
通信单元403可用于收发信息过程中,信号的接收和发送。特别地,通信单元403接收终端发送的信号,并将信号交由一个或者一个以上处理器401处理。同时,通信单元403将处理器401发出的反馈信号发送给终端。The communication unit 403 can be used for receiving and transmitting signals during the process of transmitting and receiving information. In particular, communication unit 403 receives signals transmitted by the terminals and hands them over to one or more processors 401 for processing. At the same time, the communication unit 403 transmits the feedback signal sent by the processor 401 to the terminal.
服务器中的处理器401会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行文件加载到存储器402中,并由处理器401来运行存储在存储器402中的应用程序,执行如下步骤:The processor 401 in the server loads the executable file corresponding to the process of one or more applications into the memory 402 according to the following instruction, and executes the application stored in the memory 402 by the processor 401 to execute The following steps:
从终端处接收上传的数据;Receiving uploaded data from the terminal;
将所述数据保存至预设存储地址;Saving the data to a preset storage address;
调用安全防护进程对所述数据进行安全扫描,得到扫描结果;Calling the security protection process to perform a security scan on the data to obtain a scan result;
若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And if the data is determined to be the security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
如图7所示,在一种实施方式中,服务器还可以包括电源404、输入单元405、以及显示单元406等部件。本领域技术人员可以理解,图6中示出的服务器结构并不构成对服务器的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:As shown in FIG. 7, in an embodiment, the server may further include components such as a power source 404, an input unit 405, and a display unit 406. It will be understood by those skilled in the art that the server structure illustrated in FIG. 6 does not constitute a limitation to the server, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements. among them:
电源404可以通过电源管理系统与处理器401逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源404还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。The power supply 404 can be logically coupled to the processor 401 through a power management system to manage functions such as charging, discharging, and power management through the power management system. The power supply 404 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
输入单元405可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。 The input unit 405 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
显示单元406可用于显示由用户输入的信息或提供给用户的信息以及服务器的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元406可包括显示面板。在一种实施方式中,显示单元可以采用液晶显示器 (LCD,Liquid Crystal Display)、有机发光二极管(OLED,Organic Light-Emitting Diode)等形式来配置显示面板。Display unit 406 can be used to display information entered by the user or information provided to the user as well as various graphical user interfaces of the server, which can be composed of graphics, text, icons, video, and any combination thereof. The display unit 406 can include a display panel. In an embodiment, the display unit can adopt a liquid crystal display (LCD, Liquid Crystal Display), Organic Light Emitting Diode (OLED, Organic Light-Emitting) Diode) and other forms to configure the display panel.
在一种实施方式中,在执行得到扫描结果的步骤之后,处理器401可以执行如下步骤:若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。In an embodiment, after performing the step of obtaining the scan result, the processor 401 may perform the following steps: if it is determined that the data is unsafe data according to the scan result, the data is from a preset storage address. Deleted.
在一种实施方式中,处理器401在执行所述若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除的步骤时,可以包括如下步骤:若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理。若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除。In an embodiment, the processor 401 may perform the following steps when performing the step of deleting the data from the preset storage address if the data is determined to be unsafe according to the scan result. And if it is determined that the data is unsafe data according to the scan result, the security processing process is invoked to process the data. If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address.
在一种实施方式中,在执行所述调用安全处理进程对所述数据进行处理的步骤之后,处理器401还可以执行如下步骤:若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。In an implementation manner, after performing the step of invoking the security processing process to process the data, the processor 401 may further perform the following steps: if it is detected that the data is processed and becomes security data, The processed data is stored by the preset storage address to a storage address in the server corresponding to the terminal.
在一种实施方式中,在执行所述将所述数据从预设存储地址中删除的步骤之后,处理器401还可以执行如下步骤:发送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。In an implementation manner, after performing the step of deleting the data from the preset storage address, the processor 401 may further perform the step of: sending prompt information to the terminal, the prompt information is used for prompting The data uploaded by the terminal is unsafe data and is deleted by the server.
在一种实施方式中,在执行所述将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址的步骤之后,处理器401还可以执行如下步骤:清空所述预设存储地址中的数据。In an implementation manner, after performing the step of storing the data from a preset storage address to a storage address corresponding to the terminal in the server, the processor 401 may further perform the step of: clearing the preset Store the data in the address.
在一种实施方式中,在执行所述将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址的步骤之后,处理器401还可以执行如下步骤:向所述终端发送用于提示所述终端上传的数据为安全数据,并被存储到与所述终端对应的存储地址的信息。In an embodiment, after performing the step of storing the data from a preset storage address to a storage address corresponding to the terminal in the server, the processor 401 may further perform the following steps: sending the terminal to the terminal The data for prompting the terminal to upload is security data, and is stored to the information of the storage address corresponding to the terminal.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见上文针对数据存储的方法的详细描述,此处不再赘述。In the foregoing embodiments, the descriptions of the various embodiments are all focused, and the detailed descriptions of the methods for data storage are not described herein.
本发明实施例提供的所述数据存储的装置与上文实施例中的数据存储的方法属于同一构思,在所述数据存储的装置上可以运行所述数据存储的方法实施例中提供的任一方法,其实现过程详见所述数据存储的方法实施例,此处不再赘述。The device for storing the data provided by the embodiment of the present invention is the same as the method for data storage in the above embodiment, and any device provided in the method for storing the data may be run on the device for storing the data. For the implementation of the method, refer to the method embodiment of the data storage, and details are not described herein again.
需要说明的是,对本发明实施例所述数据存储的方法而言,本领域普通技术人员可以理解实现本发明实施例所述数据存储的方法的全部或部分流程,是可以通过计算机程序来控制相关的硬件来完成,所述计算机程序可存储于一计算机可读取存储介质中,如存储在存储器中,并被至少一个处理器执行,在执行过程中可包括如所述数据存储的方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)等。It should be noted that, in the method for data storage according to the embodiment of the present invention, those skilled in the art can understand all or part of the process for implementing the data storage method according to the embodiment of the present invention, and the related program can be controlled by a computer program. The computer program can be stored in a computer readable storage medium, such as in a memory, and executed by at least one processor, and can include an implementation of the method as described in the data storage during execution. The flow of the example. Wherein, the storage medium may be a magnetic disk, an optical disk, a read only memory (ROM, Read) Only Memory), random access memory (RAM, Random Access Memory), etc.
对本发明实施例的所述数据存储的装置而言,其各功能模块可以集成在一个处理芯片中,也可以是各个模块单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中,所述存储介质譬如为只读存储器,磁盘或光盘等。For the data storage device of the embodiment of the present invention, each functional module may be integrated into one processing chip, or each module may exist physically separately, or two or more modules may be integrated into one module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. The integrated module, if implemented in the form of a software functional module and sold or used as a standalone product, may also be stored in a computer readable storage medium, such as a read only memory, a magnetic disk or an optical disk, etc. .
以上对本发明实施例所提供的一种数据存储的方法、装置、存储介质、服务器以及系统进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。The method, device, storage medium, server and system for data storage provided by the embodiments of the present invention are described in detail. The principles and embodiments of the present invention are described in the following examples. The description is only for helping to understand the method of the present invention and its core ideas; at the same time, for those skilled in the art, according to the idea of the present invention, there will be changes in specific embodiments and application scopes. The contents of this specification are not to be construed as limiting the invention.

Claims (20)

  1. 一种数据存储的方法,其中,所述方法包括:A method of data storage, wherein the method comprises:
    从终端处接收上传的数据;Receiving uploaded data from the terminal;
    将所述数据保存至预设存储地址;Saving the data to a preset storage address;
    调用安全防护进程对所述数据进行安全扫描,得到扫描结果;Calling the security protection process to perform a security scan on the data to obtain a scan result;
    若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And if the data is determined to be the security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  2. 根据权利要求1所述的数据存储的方法,其中,在得到扫描结果的步骤之后,还包括:The method of data storage according to claim 1, wherein after the step of obtaining a scan result, the method further comprises:
    若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。If it is determined according to the scan result that the data is unsafe data, the data is deleted from the preset storage address.
  3. 根据权利要求2所述的数据存储的方法,其中,所述若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除,包括:The method of data storage according to claim 2, wherein, if it is determined that the data is unsafe data according to the scan result, deleting the data from a preset storage address comprises:
    若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理;If it is determined that the data is unsafe data according to the scan result, the security processing process is invoked to process the data;
    若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除。If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address.
  4. 根据权利要求3所述的数据存储的方法,其中,在调用安全处理进程对所述数据进行处理的步骤之后,还包括:The method of data storage according to claim 3, wherein after the step of invoking the security processing process to process the data, the method further comprises:
    若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。If it is detected that the data has become processed after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  5. 根据权利要求4所述的数据存储的方法,其中,在将所述数据从预设存储地址中删除的步骤之后,还包括:The method of data storage according to claim 4, wherein after the step of deleting the data from the preset storage address, the method further comprises:
    发送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。The prompt information is sent to the terminal, and the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  6. 根据权利要求1所述的数据存储的方法,其中,在将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址的步骤之后,还包括:The method of data storage according to claim 1, wherein after the step of storing the data from a preset storage address to a storage address corresponding to the terminal in the server, the method further comprises:
    清空所述预设存储地址中的数据。Clear the data in the preset storage address.
  7. 根据权利要求1所述的数据存储的方法,其中,在将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址的步骤之后,还包括:The method of data storage according to claim 1, wherein after the step of storing the data from a preset storage address to a storage address corresponding to the terminal in the server, the method further comprises:
    向所述终端发送用于提示所述终端上传的数据为安全数据,并被存储到与所述终端对应的存储地址的信息。Sending, to the terminal, data for prompting the terminal to upload as security data, and storing the information to a storage address corresponding to the terminal.
  8. 一种数据存储的装置,其中,所述装置包括:A device for data storage, wherein the device comprises:
    接收单元,用于从终端处接收上传的数据;a receiving unit, configured to receive the uploaded data from the terminal;
    保存单元,用于将所述数据保存至预设存储地址;a saving unit, configured to save the data to a preset storage address;
    扫描单元,用于调用安全防护进程对所述数据进行安全扫描,得到扫描结果;a scanning unit, configured to invoke a security protection process to perform a security scan on the data to obtain a scan result;
    存储单元,用于若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And a storage unit, configured to: if the data is determined to be security data according to the scan result, store the data from a preset storage address to a storage address in the server corresponding to the terminal.
  9. 根据权利要求8所述的数据存储的装置,其中,所述装置还包括:The apparatus of data storage of claim 8 wherein said apparatus further comprises:
    删除单元,用于若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。And a deleting unit, configured to delete the data from the preset storage address if it is determined that the data is unsafe data according to the scan result.
  10. 根据权利要求9所述的数据存储的装置,其中,所述删除单元用于:The apparatus for data storage according to claim 9, wherein said deleting unit is for:
    若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理;If it is determined that the data is unsafe data according to the scan result, the security processing process is invoked to process the data;
    若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除;If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address;
    若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。If it is detected that the data has become processed after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  11. 根据权利要求10所述的数据存储的装置,其中,所述装置还包括:The apparatus of data storage of claim 10, wherein the apparatus further comprises:
    提示单元,用于发送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。The prompting unit is configured to send the prompting information to the terminal, where the prompting information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  12. 根据权利要求8所述的数据存储的装置,其中,所述存储单元,用于:The apparatus for data storage according to claim 8, wherein said storage unit is configured to:
    清空所述预设存储地址中的数据。Clear the data in the preset storage address.
  13. 一种存储介质,其上存储有计算机程序,其中,当所述计算机程序在计算机上执行时,使得所述计算机执行如权利要求1至7中任一项所述的数据存储的方法。A storage medium having stored thereon a computer program, wherein the computer program, when executed on a computer, causes the computer to perform the method of data storage according to any one of claims 1 to 7.
  14. 一种服务器,包括存储器,处理器,其中,所述处理器通过调用所述存储器中存储的计算机程序,用于执行如下步骤:A server includes a memory, a processor, wherein the processor executes the following steps by calling a computer program stored in the memory:
    从终端处接收上传的数据;Receiving uploaded data from the terminal;
    将所述数据保存至预设存储地址;Saving the data to a preset storage address;
    调用安全防护进程对所述数据进行安全扫描,得到扫描结果;Calling the security protection process to perform a security scan on the data to obtain a scan result;
    若根据所述扫描结果确定出所述数据为安全数据,则将所述数据由预设存储地址存储到服务器中与所述终端对应的存储地址。And if the data is determined to be the security data according to the scan result, the data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  15. 根据权利要求14所述的服务器,其中,所述处理器执行如下步骤:The server of claim 14, wherein the processor performs the following steps:
    若根据所述扫描结果确定出所述数据为不安全数据,则将所述数据从预设存储地址中删除。If it is determined according to the scan result that the data is unsafe data, the data is deleted from the preset storage address.
  16. 根据权利要求15所述的服务器,其中,所述处理器执行如下步骤:The server of claim 15 wherein said processor performs the following steps:
    若根据所述扫描结果确定出所述数据为不安全数据,则调用安全处理进程对所述数据进行处理;If it is determined that the data is unsafe data according to the scan result, the security processing process is invoked to process the data;
    若检测到所述数据经过处理后未变为安全数据,则将所述数据从预设存储地址中删除。If it is detected that the data has not become security data after being processed, the data is deleted from the preset storage address.
  17. 根据权利要求16所述的服务器,其中,所述处理器执行如下步骤:The server of claim 16 wherein said processor performs the following steps:
    若检测到所述数据经过处理后变为安全数据,则将经过处理后的数据由预设存储地址存储到服务器中与所述终端对应的存储地址。If it is detected that the data has become processed after being processed, the processed data is stored by the preset storage address to a storage address corresponding to the terminal in the server.
  18. 根据权利要求17所述的服务器,其中,所述处理器执行如下步骤:The server of claim 17 wherein said processor performs the following steps:
    送提示信息至所述终端,所述提示信息用于提示所述终端上传的数据为不安全数据,并被服务器删除。And sending the prompt information to the terminal, where the prompt information is used to prompt the data uploaded by the terminal to be unsafe data, and is deleted by the server.
  19. 根据权利要求14所述的服务器,其中,所述处理器执行如下步骤:The server of claim 14, wherein the processor performs the following steps:
    清空所述预设存储地址中的数据。Clear the data in the preset storage address.
  20. 一种数据存储的系统,包括服务器和终端,其中,所述服务器包括如权利要求8至12中任一项所述的数据存储的装置。A system for data storage, comprising a server and a terminal, wherein the server comprises the device for data storage according to any one of claims 8 to 12.
PCT/CN2017/095618 2016-10-25 2017-08-02 Data storage method, apparatus, storage medium, server and system WO2018076863A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610949089.5A CN106503556A (en) 2016-10-25 2016-10-25 The method of data storage, apparatus and system
CN201610949089.5 2016-10-25

Publications (1)

Publication Number Publication Date
WO2018076863A1 true WO2018076863A1 (en) 2018-05-03

Family

ID=58322958

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/095618 WO2018076863A1 (en) 2016-10-25 2017-08-02 Data storage method, apparatus, storage medium, server and system

Country Status (2)

Country Link
CN (1) CN106503556A (en)
WO (1) WO2018076863A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291788A (en) * 2020-11-13 2021-01-29 Oppo广东移动通信有限公司 Data processing method, device, storage medium, terminal and network access point equipment
CN112835970A (en) * 2021-02-02 2021-05-25 上海华盖科技发展股份有限公司 Big data security visualization interaction analysis system and method

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503556A (en) * 2016-10-25 2017-03-15 广东欧珀移动通信有限公司 The method of data storage, apparatus and system
CN107391310A (en) * 2017-07-30 2017-11-24 安徽云帮邦网络技术有限公司 A kind of computer data cloud service backup method
CN108156170A (en) * 2018-01-03 2018-06-12 郑州云海信息技术有限公司 Checking and killing method is isolated in a kind of Cloud Server virus
CN108829360A (en) * 2018-05-09 2018-11-16 安徽天斯努信息技术股份有限公司 A kind of cloud printing merchant end management system
CN112287373A (en) * 2020-11-13 2021-01-29 Oppo广东移动通信有限公司 Data processing method, device, storage medium and network access point equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120084341A1 (en) * 2010-09-30 2012-04-05 Microsoft Corporation Presenting availability statuses of synchronized objects
CN104023070A (en) * 2014-06-16 2014-09-03 杜海洋 File compression method based on cloud storage
CN104410683A (en) * 2014-11-21 2015-03-11 四川神琥科技有限公司 Data backup method
CN105323261A (en) * 2015-12-15 2016-02-10 北京奇虎科技有限公司 Data detection method and device
CN106503556A (en) * 2016-10-25 2017-03-15 广东欧珀移动通信有限公司 The method of data storage, apparatus and system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1153146C (en) * 2001-03-16 2004-06-09 联想(北京)有限公司 Geteway level computer network virus preventing method and device
CN102055730B (en) * 2009-11-02 2013-09-11 华为终端有限公司 Cloud processing system, cloud processing method and cloud computing agent device
RU2449348C1 (en) * 2010-11-01 2012-04-27 Закрытое акционерное общество "Лаборатория Касперского" System and method for virus-checking data downloaded from network at server side
CN105912424A (en) * 2011-09-30 2016-08-31 北京奇虎科技有限公司 Cloud architecture based terminal program quick backup and recovery method
CN103916441A (en) * 2013-01-07 2014-07-09 爱国者电子科技有限公司 NAS system preventing computer viruses and method for searching for and killing computer viruses
CN103632094B (en) * 2013-11-04 2017-11-14 天津汉柏信息技术有限公司 A kind of cloud computing big data uploads virus defense system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120084341A1 (en) * 2010-09-30 2012-04-05 Microsoft Corporation Presenting availability statuses of synchronized objects
CN104023070A (en) * 2014-06-16 2014-09-03 杜海洋 File compression method based on cloud storage
CN104410683A (en) * 2014-11-21 2015-03-11 四川神琥科技有限公司 Data backup method
CN105323261A (en) * 2015-12-15 2016-02-10 北京奇虎科技有限公司 Data detection method and device
CN106503556A (en) * 2016-10-25 2017-03-15 广东欧珀移动通信有限公司 The method of data storage, apparatus and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291788A (en) * 2020-11-13 2021-01-29 Oppo广东移动通信有限公司 Data processing method, device, storage medium, terminal and network access point equipment
CN112835970A (en) * 2021-02-02 2021-05-25 上海华盖科技发展股份有限公司 Big data security visualization interaction analysis system and method

Also Published As

Publication number Publication date
CN106503556A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
WO2018076863A1 (en) Data storage method, apparatus, storage medium, server and system
WO2018076841A1 (en) Data sharing method, apparatus, storage medium and server
WO2018076861A1 (en) Data transmission control method, apparatus, storage medium, server and system
WO2018076889A1 (en) Data backup method, device, system, storage medium and server
WO2018082142A1 (en) Screen recording method and device
WO2018076867A1 (en) Data backup deleting method, device and system, storage medium and server
WO2018076865A1 (en) Data sharing method, device, storage medium, and electronic device
WO2019174090A1 (en) Screenshot file sharing control method, apparatus and device, and computer storage medium
WO2018076868A1 (en) Data synchronization method, device and system, storage medium and server
WO2018233352A1 (en) Data transmission method, device, terminal and computer-readable storage medium
WO2018076890A1 (en) Data backup method, device, storage medium, server and system
WO2018090823A1 (en) Method and system for protecting system partition key data, and terminal
WO2010062063A2 (en) Method and system for preventing browser-based abuse
WO2018076844A1 (en) Data backup method and device, storage medium and electronic apparatus
WO2018076812A1 (en) Data request response method and device, storage medium, server and system
WO2018076881A1 (en) Data synchronization method and device, storage medium and server
WO2018076864A1 (en) Data synchronization method, apparatus, storage medium and electronic device
WO2015018243A1 (en) Ios device based webpage blocking method and device
WO2017092498A1 (en) Information management method and user terminal
WO2014189275A1 (en) Apparatus and method of recognizing external device in a communication system
WO2018076829A1 (en) Terminal data processing method, apparatus, system, storage medium and server
WO2018076879A1 (en) Data backup method and apparatus, storage medium, and terminal
WO2018076869A1 (en) Data backup method, apparatus, storage medium and electronic device
WO2018076870A1 (en) Data processing method and apparatus, storage medium, server, and data processing system
WO2018076842A1 (en) Data backup method, device, system, storage medium, and electronic device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17863546

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17863546

Country of ref document: EP

Kind code of ref document: A1