CN102609333A - System and method for ensuring file backup integrity in encrypted environment - Google Patents

System and method for ensuring file backup integrity in encrypted environment Download PDF

Info

Publication number
CN102609333A
CN102609333A CN2011103798749A CN201110379874A CN102609333A CN 102609333 A CN102609333 A CN 102609333A CN 2011103798749 A CN2011103798749 A CN 2011103798749A CN 201110379874 A CN201110379874 A CN 201110379874A CN 102609333 A CN102609333 A CN 102609333A
Authority
CN
China
Prior art keywords
file
backup
path
local
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103798749A
Other languages
Chinese (zh)
Inventor
耿振民
卞欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Original Assignee
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN2011103798749A priority Critical patent/CN102609333A/en
Publication of CN102609333A publication Critical patent/CN102609333A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a system for ensuring file backup integrity in an encrypted environment. The system is characterized in that the system comprises a file real-time monitor module, a file backup encryption generation module, a file backup storage module, and a backup file synchronization module. The system provided by the invention can monitor file operations of a user, and carry out record, treatment and concentrated backup to ensure the security and integrity of the backup files. A method for ensuring file backup integrity in the encrypted environment comprises backing up files of an appointed types, forcedly storing the backup files in a remote server, storing the backup files in a local server when no connection is constructed, then automatically synchronizing the backup files to the remote server after constructing connection, and deleting the local backup files at the same time, wherein all backup files are subjected to encryption treatment to ensure the security and integrity of the backup files.

Description

A kind of system and method that guarantees the file backup integrality in the environment of encrypting
Technical field
The invention belongs to the computer security technique field, relate in particular to a kind of system that guarantees the file backup integrality in the environment of encrypting, simultaneously, the invention still further relates to the method that guarantees the file backup integrality in the environment of encrypting.
Background technology
Popularize along with informationalized, occupied more and more important position as the data of information carrier, Data Protection has become the key that informationized society is able to survival and development.Also emerge in an endless stream to the Data Protection means, the method that traditional document backup is adopted timed backup always or duplicated, this method has its limitation: data volume is bigger, need do full backup or duplicates, and takies than the macroreticular resource.Also have and adopt the mode of backing up in realtime, but higher, can't fully guarantee the integrality of Backup Data for network requirement.
In the traditional data resist technology, the management mode that is based on single time point copying data of employing.The continuous schedule data guard method then can be realized the data access to random time point: it can independently be revised general data and continue to catch or follow the tracks of, and preserves the data that changing, thus the method that realization recovers from any non-preset in past.
Summary of the invention
First goal of the invention of the present invention provides a kind of system that guarantees the file backup integrality of encrypting in the environment, file operation that can supervisory user, and the line item of going forward side by side is handled and is carried out centralized backup, guarantees the security and the integrality of backup file.
Second goal of the invention of the present invention provides a kind of method that guarantees the file backup integrality in the environment of encrypting; Can the file of specified type be backed up through the method, and backup is forced and is kept at remote server, be kept at this locality in the time of can't connecting; Automatically be synchronized to remote server after the connection; The local backup file of deletion, and all backup files simultaneously all passes through encryption, thereby has guaranteed the security and the integrality of backup file.
To achieve these goals, the present invention adopts following technical scheme:
A kind of system that guarantees the file backup integrality in the environment of encrypting, wherein, said system comprises:
The file real-time monitoring module is monitored the file operation of target machine, when opening file to file type or open software and carry out record;
Generation module is encrypted in file backup, is used for reading monitor message from internal memory, simultaneously through cryptographic operation, generates backup file, deposits to filebuf, simultaneously message is sent to the back-up storage module;
The file backup memory module is used to accept the message that generation module is encrypted in file backup, backup file is left in the disk collapse directories of appointment;
The backup file synchronization module is used for the local backup file is uploaded to remote directory.
Further, file real-time monitoring module synchronization monitoring user's file operation, and apply for that certain memory headroom is used to deposit the monitor message of obtaining.
Further; Said file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before file in information such as the filename, file path that obtain and the storing directory compare; Identical covering, different newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment.
Further, the every disk collapse directories at a distance from a local appointment of time period autoscan of said backup file synchronization module is if exist backup file in this catalogue of scanning discovery; Automatically the long-range path of depositing of search is if can open remote path, then with the relevant information (filename of local file; Path, modification time) with relevant information (filename, the path of remote directory; Modification time) compares; Guarantee that the file on the remote server is newer, the local backup file is uploaded to remote directory, delete local file simultaneously; If remote path can't be opened, then stop automatically, circulate with this.
A kind of method that guarantees the file backup integrality in the environment of encrypting, wherein,
This method comprises the steps:
A: file opening real-time monitoring module monitoring; File operation to target machine is monitored, when opening file to file type or open software and carry out record, if file has carried out preserving or the disk read-write motion such as deposited in addition; Spanned file operation information immediately then; Be recorded as monitor message, be saved to monitor message in the internal memory after, message is sent to file backup encrypts generation module;
B: the notice that generation module receives the file real-time monitoring module is encrypted in file backup; And from internal memory, read monitor message, extract wherein filename, file path, action type (preserve, other deposits) and running time; Pass through cryptographic operation simultaneously; Generate backup file, deposit, simultaneously message is sent to the back-up storage module to filebuf;
C: the file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before the information such as filename, file path obtained compare with the file in the storing directory, identical covering, difference is newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment.
D: the every disk collapse directories of backup file synchronization module at a distance from a local appointment of time period autoscan,
If have backup file in this catalogue of scanning discovery, search for the long-range path of depositing automatically, if can open remote path; Then with the relevant information (filename, path, modification time) of local file and the relevant information (filename of remote directory; The path, modification time) compare, guarantee that the file on the remote server is newer; The local backup file is uploaded to remote directory, deletes local file simultaneously; If remote path can't be opened, then stop automatically, circulate with this.
Further, said monitoring file type and software only carry out optional backup to the file type of appointment.
Further, backup file is carried out cryptographic operation, in the monitoring file operation, log file is preserved and disk such as to be deposited in addition and write action, when writing disk, carries out encrypted backup.
Further, the backup file synchronization module is deleted the local backup file in the back synchronously automatically.
Guarantee the file operation that the system of file backup integrality can supervisory user in the encryption environment provided by the invention, the line item of going forward side by side is handled and is carried out centralized backup; Guarantee the security and the integrality of backup file; The method that guarantees the file backup integrality in this encryption environment can back up the file of specified type, and backup is forced and is kept at remote server, is kept at this locality in the time of can't connecting; Automatically be synchronized to remote server after the connection; The local backup file of deletion, and all backup files simultaneously all passes through encryption, thereby has guaranteed the security and the integrality of backup file.
Description of drawings
Fig. 1 is a system architecture synoptic diagram provided by the invention;
Fig. 2 is the generative process synoptic diagram of backup file under the encryption environment provided by the invention;
Fig. 3 is a backup file synchronizing process synoptic diagram provided by the invention;
Embodiment
Specify the present invention below in conjunction with accompanying drawing, it explains principle of the present invention as the part of this instructions through embodiment, other aspects of the present invention, and characteristic and advantage thereof will become very clear through this detailed description.
As shown in Figure 1, a kind of system that guarantees the file backup integrality in the environment of encrypting, wherein, said system comprises:
The file real-time monitoring module is monitored the file operation of target machine, when opening file to file type or open software and carry out record;
Generation module is encrypted in file backup, is used for reading monitor message from internal memory, simultaneously through cryptographic operation, generates backup file, deposits to filebuf, simultaneously message is sent to the back-up storage module;
The file backup memory module is used to accept the message that generation module is encrypted in file backup, backup file is left in the disk collapse directories of appointment;
The backup file synchronization module is used for the local backup file is uploaded to remote directory.
Further, file real-time monitoring module synchronization monitoring user's file operation, and apply for that certain memory headroom is used to deposit the monitor message of obtaining.
Further; Said file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before file in information such as the filename, file path that obtain and the storing directory compare; Identical covering, different newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment
Further, the every disk collapse directories at a distance from a local appointment of time period autoscan of said backup file synchronization module is if exist backup file in this catalogue of scanning discovery; Automatically the long-range path of depositing of search is if can open remote path, then with the relevant information (filename of local file; Path, modification time) with relevant information (filename, the path of remote directory; Modification time) compares; Guarantee that the file on the remote server is newer, the local backup file is uploaded to remote directory, delete local file simultaneously; If remote path can't be opened, then stop automatically, circulate with this.
A kind of method that guarantees the file backup integrality in the environment of encrypting, wherein,
This method comprises the steps:
A: file opening real-time monitoring module monitoring; File operation to target machine is monitored, when opening file to file type or open software and carry out record, if file has carried out preserving or the disk read-write motion such as deposited in addition; Spanned file operation information immediately then; Be recorded as monitor message, be saved to monitor message in the internal memory after, message is sent to file backup encrypts generation module;
B: the notice that generation module receives the file real-time monitoring module is encrypted in file backup; And from internal memory, read monitor message, extract wherein filename, file path, action type (preserve, other deposits) and running time; Pass through cryptographic operation simultaneously; Generate backup file, deposit, simultaneously message is sent to the back-up storage module to filebuf;
C: the file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before the information such as filename, file path obtained compare with the file in the storing directory, identical covering, difference is newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment.
D: the every disk collapse directories of backup file synchronization module at a distance from a local appointment of time period autoscan,
If have backup file in this catalogue of scanning discovery, search for the long-range path of depositing automatically, if can open remote path; Then with the relevant information (filename, path, modification time) of local file and the relevant information (filename of remote directory; The path, modification time) compare, guarantee that the file on the remote server is newer; The local backup file is uploaded to remote directory, deletes local file simultaneously; If remote path can't be opened, then stop automatically, circulate with this.
Further, said monitoring file type and software only carry out optional backup to the file type of appointment.
Further, backup file is carried out cryptographic operation, in the monitoring file operation, log file is preserved and disk such as to be deposited in addition and write action, when writing disk, carries out encrypted backup.
Further, the backup file synchronization module is deleted the local backup file in the back synchronously automatically.
Be illustrated in figure 2 as the generative process of encrypting backup file under the environment; After the file real-time monitoring module is opened monitoring; File operation to target machine is monitored, when opening file to file type or open software and carry out record, if file (source file) has carried out preserving or the disk read-write motion such as deposited in addition; Then spanned file operation information immediately is recorded as monitor message; Message is sent to the file backup generation module, and file backup is encrypted generation module and is received the notice of file real-time monitoring module, and from internal memory, reads monitor message; Filename, file path, the action type extracted wherein (are preserved; Other deposits) and the running time, simultaneously through cryptographic operation, generate backup file; Deposit to filebuf, simultaneously message is sent to the back-up storage module; The file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before the information such as filename, file path obtained compare with the file in the storing directory, identical covering, difference is newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment.The back-up storage module is responsible for the backup file that generates is stored, and the backup file acquiescence leaves on the file server of distant place, and memory module is at first carried out the identification of remote directory, and the backup file that before generates will be deposited in the telefile storing directory of setting; If can't discern remote directory, then deposit automatically and the local disk directory of hiding.
In realization; The user can select the file of a plurality of types or software to monitor; File real-time monitoring module synchronization monitoring user's file operation; And apply for that certain memory headroom is used to deposit the monitor message of obtaining, and the file real-time monitoring module only deposits this monitor message in internal memory, and generation module is encrypted in backup will accomplish the work of treatment to monitor message; Must exist bigger time difference between monitoring and the processing.If generation module directly fetches data from internal memory, the monitor message that does not then have enough time to handle will be covered by the new monitor message that the file monitor module is generated, and produces the information dropout phenomenon that causes owing to information processing is untimely.Therefore message buffer to be set, monitor message is in time taken out from internal memory deposit in the message buffer, so both can guarantee that monitor message do not lose, guarantee the timely processing of monitor message again.
Generation module is encrypted in backup will take out also deletion monitor message in time from message buffer; And real-time monitoring module wants constantly in message buffer, to add new monitor message; But can cause real-time monitoring module and backup to encrypt the competition of generation module like this to message buffer; Therefore generation module must be deleted after reading monitor message, and discharges the control to message buffer, and then carries out information processing.
Backup encryption generation module comprises the processing of monitor message, extracts key message, deletion duplicate message, pooling information.Extract key message promptly extracts required file from monitor message filename, file path, action type, running time, and spanned file lastest imformation.Generation module is accomplished according to lastest imformation and is generated backup actions then, carries out encryption simultaneously.
As shown in Figure 3, in order to guarantee the integrality of backup file, must carry out remote server and synchronous working with the backup file between the local backup catalogue.The synchronization module of startup file backup at set intervals, at first the hiding disk directory in this locality of backup file is deposited in scanning, when catalogue is not sky; Connect the telefile server, the file in the store files catalogue is specified in scanning, and scans content comprises filename; Modification time, storing directory etc. are compared with local file automatically; When the content of scanning does not all match, upload this document to remote directory, delete local file simultaneously; When having only modification time not match, upload file covers the similar documents on the telefile server, deletes local file simultaneously.When the local backup storing directory was sky, synchronization module quit work, and circulates with this.
Guarantee the file operation that the system of file backup integrality can supervisory user in the encryption environment provided by the invention, the line item of going forward side by side is handled and is carried out centralized backup; Guarantee the security and the integrality of backup file; The method that guarantees the file backup integrality in this encryption environment can back up the file of specified type, and backup is forced and is kept at remote server, is kept at this locality in the time of can't connecting; Automatically be synchronized to remote server after the connection; The local backup file of deletion, and all backup files simultaneously all passes through encryption, thereby has guaranteed the security and the integrality of backup file.
The above disclosed the preferred embodiments of the present invention that are merely can not limit the present invention's interest field certainly with this, so according to the equivalent variations that claim of the present invention is done, still belong to the scope that the present invention is contained.

Claims (8)

1. encrypt the system that guarantees the file backup integrality in the environment for one kind, wherein, said system comprises:
The file real-time monitoring module is monitored the file operation of target machine, when opening file to file type or open software and carry out record;
Generation module is encrypted in file backup, is used for reading monitor message from internal memory, simultaneously through cryptographic operation, generates backup file, deposits to filebuf, simultaneously message is sent to the back-up storage module;
The file backup memory module is used to accept the message that generation module is encrypted in file backup, backup file is left in the disk collapse directories of appointment;
The backup file synchronization module is used for the local backup file is uploaded to remote directory.
2. guarantee the system of file backup integrality in the encryption environment as claimed in claim 1, it is characterized in that, file real-time monitoring module synchronization monitoring user's file operation, and apply for that certain memory headroom is used to deposit the monitor message of obtaining.
3. guarantee the system of file backup integrality in the encryption environment as claimed in claim 1; It is characterized in that; Said file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before file in information such as the filename, file path that obtain and the storing directory compare; Identical covering, different newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment.
4. guarantee the system of file backup integrality in the encryption environment as claimed in claim 1, it is characterized in that, the every disk collapse directories of said backup file synchronization module at a distance from a local appointment of time period autoscan; If have backup file in this catalogue of scanning discovery, search for the long-range path of depositing automatically, if can open remote path; Then with the relevant information (filename, path, modification time) of local file and the relevant information (filename of remote directory; The path, modification time) compare, guarantee that the file on the remote server is newer; The local backup file is uploaded to remote directory, deletes local file simultaneously; If remote path can't be opened, then stop automatically, circulate with this.
5. encrypt the method that guarantees the file backup integrality in the environment for one kind, it is characterized in that this method comprises the steps:
A: file opening real-time monitoring module monitoring; File operation to target machine is monitored, when opening file to file type or open software and carry out record, if file has carried out preserving or the disk read-write motion such as deposited in addition; Spanned file operation information immediately then; Be recorded as monitor message, be saved to monitor message in the internal memory after, message is sent to file backup encrypts generation module;
B: the notice that generation module receives the file real-time monitoring module is encrypted in file backup; And from internal memory, read monitor message, extract wherein filename, file path, action type (preserve, other deposits) and running time; Pass through cryptographic operation simultaneously; Generate backup file, deposit, simultaneously message is sent to the back-up storage module to filebuf;
C: the file backup memory module receives after file backup encrypts the message of generation module, at first scans the long-range path of depositing, with before the information such as filename, file path obtained compare with the file in the storing directory, identical covering, difference is newly-built; If can't obtain the long-range path of depositing, then transfer local storage automatically to, backup file is left in the disk collapse directories of appointment.
D: the backup file synchronization module whenever at a distance from the disk collapse directories of a local appointment of time period autoscan, if having backup file in this catalogue of scanning discovery, is searched for the long-range path of depositing automatically; If can open remote path, then with relevant information (filename, the path of local file; Modification time) with the relevant information (filename of remote directory; The path, modification time) compare, guarantee that the file on the remote server is newer; The local backup file is uploaded to remote directory, deletes local file simultaneously; If remote path can't be opened, then stop automatically, circulate with this.
6. guarantee the method for file backup integrality in the encryption environment as claimed in claim 5, it is characterized in that said monitoring file type and software only carry out optional backup to the file type of appointment.
7. guarantee the method for file backup integrality in the encryption environment as claimed in claim 5; It is characterized in that, backup file is carried out cryptographic operation, in the monitoring file operation; Log file is preserved and disk such as to be deposited in addition and write action, when writing disk, carries out encrypted backup.
8. guarantee the method for file backup integrality in the encryption environment as claimed in claim 5, it is characterized in that said backup file synchronization module back is synchronously deleted the local backup file automatically.
CN2011103798749A 2011-11-25 2011-11-25 System and method for ensuring file backup integrity in encrypted environment Pending CN102609333A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103798749A CN102609333A (en) 2011-11-25 2011-11-25 System and method for ensuring file backup integrity in encrypted environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103798749A CN102609333A (en) 2011-11-25 2011-11-25 System and method for ensuring file backup integrity in encrypted environment

Publications (1)

Publication Number Publication Date
CN102609333A true CN102609333A (en) 2012-07-25

Family

ID=46526725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103798749A Pending CN102609333A (en) 2011-11-25 2011-11-25 System and method for ensuring file backup integrity in encrypted environment

Country Status (1)

Country Link
CN (1) CN102609333A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103209179A (en) * 2013-03-15 2013-07-17 苏州九光信息科技有限公司 Secure network storage method and secure network storage system
CN104375848A (en) * 2013-08-14 2015-02-25 英华达(上海)科技有限公司 Real-time information recording system and method and computer program product allowing real-time information recording
CN105955844A (en) * 2016-04-27 2016-09-21 成都爱可信科技有限公司 Secret-related file backup method of data center
CN106096447A (en) * 2016-06-15 2016-11-09 杭州华三通信技术有限公司 A kind of document protection method and device
CN106919574A (en) * 2015-12-24 2017-07-04 中国科学院深圳先进技术研究院 A kind of method of real-time processing remote synchronization file
CN107797889A (en) * 2017-11-14 2018-03-13 北京思特奇信息技术股份有限公司 A kind of method and apparatus of checking system file backup integrity
CN108459928A (en) * 2018-03-13 2018-08-28 厦门市美亚柏科信息股份有限公司 A kind of related data association method for visualizing, terminal device and storage medium
CN109213442A (en) * 2018-08-14 2019-01-15 深圳市瑞致达科技有限公司 Document copying method, terminal device and computer readable storage medium
CN109901970A (en) * 2019-02-15 2019-06-18 视联动力信息技术股份有限公司 A kind of monitoring method and device regarding networked terminals
CN110515767A (en) * 2019-08-09 2019-11-29 济南浪潮数据技术有限公司 Snapshot data backup method, device, equipment and readable storage medium storing program for executing
CN111538637A (en) * 2020-04-27 2020-08-14 苏州浪潮智能科技有限公司 Method and system for automatically monitoring file synchronization result
CN113032804A (en) * 2021-03-22 2021-06-25 北京爱思考科技有限公司 Data security management method, device, equipment, system and storage medium
CN113434339A (en) * 2021-06-29 2021-09-24 湖南方心科技股份有限公司 Data encryption transmission system and method based on combined cycle backup for intelligent computing center

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005301464A (en) * 2004-04-08 2005-10-27 Hitachi Ltd Backup method and system
CN1988535A (en) * 2005-12-23 2007-06-27 腾讯科技(深圳)有限公司 Synchronous method, system for file storage and customer terminal
CN101025702A (en) * 2006-02-17 2007-08-29 深圳奇峰创智科技有限公司 Method for automatic backup using computer network
CN101051929A (en) * 2006-04-05 2007-10-10 中兴通讯股份有限公司 Data synchronizing method between data network terminals
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102110029A (en) * 2009-12-25 2011-06-29 中国长城计算机深圳股份有限公司 System backup and restoration method
US20110184998A1 (en) * 2010-01-22 2011-07-28 Palahnuk Samuel L Universally accessible encrypted internet file system for wired and wireless computing devices supplanting synchronization, backup and email file attachment
CN102169453A (en) * 2011-03-08 2011-08-31 杭州电子科技大学 File online backup method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005301464A (en) * 2004-04-08 2005-10-27 Hitachi Ltd Backup method and system
CN1988535A (en) * 2005-12-23 2007-06-27 腾讯科技(深圳)有限公司 Synchronous method, system for file storage and customer terminal
CN101025702A (en) * 2006-02-17 2007-08-29 深圳奇峰创智科技有限公司 Method for automatic backup using computer network
CN101051929A (en) * 2006-04-05 2007-10-10 中兴通讯股份有限公司 Data synchronizing method between data network terminals
CN101403988A (en) * 2008-11-05 2009-04-08 中国科学院计算技术研究所 File back-up system and method of computer system
CN102110029A (en) * 2009-12-25 2011-06-29 中国长城计算机深圳股份有限公司 System backup and restoration method
US20110184998A1 (en) * 2010-01-22 2011-07-28 Palahnuk Samuel L Universally accessible encrypted internet file system for wired and wireless computing devices supplanting synchronization, backup and email file attachment
CN102169453A (en) * 2011-03-08 2011-08-31 杭州电子科技大学 File online backup method

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103209179A (en) * 2013-03-15 2013-07-17 苏州九光信息科技有限公司 Secure network storage method and secure network storage system
CN104375848A (en) * 2013-08-14 2015-02-25 英华达(上海)科技有限公司 Real-time information recording system and method and computer program product allowing real-time information recording
CN104375848B (en) * 2013-08-14 2017-06-16 英华达(上海)科技有限公司 Information Microprocessor System for Real Time Record and method
CN106919574A (en) * 2015-12-24 2017-07-04 中国科学院深圳先进技术研究院 A kind of method of real-time processing remote synchronization file
CN106919574B (en) * 2015-12-24 2021-06-15 杭州中科先进技术研究院有限公司 Method for processing remote synchronous file in real time
CN105955844A (en) * 2016-04-27 2016-09-21 成都爱可信科技有限公司 Secret-related file backup method of data center
CN106096447A (en) * 2016-06-15 2016-11-09 杭州华三通信技术有限公司 A kind of document protection method and device
CN107797889A (en) * 2017-11-14 2018-03-13 北京思特奇信息技术股份有限公司 A kind of method and apparatus of checking system file backup integrity
CN107797889B (en) * 2017-11-14 2021-05-04 北京思特奇信息技术股份有限公司 Method and device for checking system file backup integrity
CN108459928B (en) * 2018-03-13 2020-09-11 厦门市美亚柏科信息股份有限公司 Related data association visualization method, terminal device and storage medium
CN108459928A (en) * 2018-03-13 2018-08-28 厦门市美亚柏科信息股份有限公司 A kind of related data association method for visualizing, terminal device and storage medium
CN109213442A (en) * 2018-08-14 2019-01-15 深圳市瑞致达科技有限公司 Document copying method, terminal device and computer readable storage medium
CN109901970A (en) * 2019-02-15 2019-06-18 视联动力信息技术股份有限公司 A kind of monitoring method and device regarding networked terminals
CN109901970B (en) * 2019-02-15 2022-05-06 视联动力信息技术股份有限公司 Method and device for monitoring video network terminal
CN110515767A (en) * 2019-08-09 2019-11-29 济南浪潮数据技术有限公司 Snapshot data backup method, device, equipment and readable storage medium storing program for executing
CN111538637A (en) * 2020-04-27 2020-08-14 苏州浪潮智能科技有限公司 Method and system for automatically monitoring file synchronization result
CN111538637B (en) * 2020-04-27 2022-08-12 苏州浪潮智能科技有限公司 Method and system for automatically monitoring file synchronization result
CN113032804A (en) * 2021-03-22 2021-06-25 北京爱思考科技有限公司 Data security management method, device, equipment, system and storage medium
CN113434339A (en) * 2021-06-29 2021-09-24 湖南方心科技股份有限公司 Data encryption transmission system and method based on combined cycle backup for intelligent computing center

Similar Documents

Publication Publication Date Title
CN102609333A (en) System and method for ensuring file backup integrity in encrypted environment
CN102004883B (en) Trace tracking method for electronic files
KR101626186B1 (en) Differential file and system restores from peers and the cloud
TW200607341A (en) Media asset management system for managing video segments from fixed-area security cameras and associated methods
CN104156278A (en) File version control system and file version control method
WO2010150277A4 (en) A method and system for directory management
CN103377415A (en) Novel archive digitization management system
CN101398823B (en) Method and system for implementing remote storage by virtual file systems technology
CN102708152A (en) Integrated management method for electronic evidence
CN103460197A (en) Computer system, file management method and metadata server
CN102411637A (en) Metadata management method of distributed file system
CN101667180B (en) System and method for space management of database
CN103955530A (en) Data reconstruction and optimization method of on-line repeating data deletion system
CN103902410A (en) Data backup acceleration method for cloud storage system
CN104156377A (en) Virtual file system achieving reliability through multi-network-disk redundant storage
CN107506366A (en) A kind of document life management method and system based on globally unique ID
CN104866394A (en) Distributed file backup method and system
CN102541986A (en) File operation monitoring and auditing method
CN103226965A (en) Time-bitmap-based audio/video data access method
CN102053880A (en) Rar file carving recovery method based on contents
CN101739468A (en) Digital processing and managing system of court exhibits
WO2023185111A1 (en) Quick access method and device for data file
CN104572891B (en) A kind of file updating method for network information separation storage
CN104750698A (en) Surveillance video positioning search method and system
CN103176868A (en) File status backup method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120725