CN102915263B - A kind of data back up method, system and equipment - Google Patents

A kind of data back up method, system and equipment Download PDF

Info

Publication number
CN102915263B
CN102915263B CN201210401460.6A CN201210401460A CN102915263B CN 102915263 B CN102915263 B CN 102915263B CN 201210401460 A CN201210401460 A CN 201210401460A CN 102915263 B CN102915263 B CN 102915263B
Authority
CN
China
Prior art keywords
key
backed
data
server
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210401460.6A
Other languages
Chinese (zh)
Other versions
CN102915263A (en
Inventor
万钰臻
孙鹏
林俊琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201210401460.6A priority Critical patent/CN102915263B/en
Publication of CN102915263A publication Critical patent/CN102915263A/en
Application granted granted Critical
Publication of CN102915263B publication Critical patent/CN102915263B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of data back up method, system and equipment, wherein, the method for data backup comprises the following steps: obtain data to be backed up; Use the key obtaining to be in advance encrypted and to obtain ciphertext described data to be backed up; Described ciphertext is stored to storage card; Wherein, the described key storage obtaining is in advance needing the position of default access access. The embodiment of the present invention is by being used data to be backed up the secret key encryption of obtaining in advance, and the backup file of encrypting is kept in storage card, because key storage is in the position that needs default access access, therefore, the third party application without authority cannot obtain key, cannot decipher and obtain data to be backed up, thus the security that improves Backup Data.

Description

A kind of data back up method, system and equipment
Technical field
The present invention relates to technical field of information processing, more specifically, relate to a kind of data back up method, systemAnd equipment.
Background technology
Existing mobile terminal (such as mobile phone, panel computer etc.) is because intelligent degree is more and more higher, because ofThis has increasing function, therefore, has also stored a large amount of data in mobile terminal, comprises that user depositsThe file such as photo, document of storage, and address list, note, mail, for data such as arranging of mobile phone,These data are extremely important for user, but, due to brush machine, factory reset operation, mobile phone, may there is user data loss, loss in the existence of the destabilizing factors such as virus, malicious applicationSituation.
The existing method that prevents user data loss is the software by installation with backup functionality, extracts and usesThe data that family need to be backed up, in the storage card of mobile terminal, enter Backup Data copying and saving for userRow data are recovered, and storage card for example comprises SD card (SecureDigitalMemoryCard, safe digitalCard), TF card (TransFlashCard is called again microSDCard), mmc card (MultimediaCard, multimedia card).
For example, in existing mobile terminal operating system (Android operating system), third party's application is being installedWhen program, generally all can give the storage card authority of third party application access mobile terminal, the such the 3rdSide's application program can read the content in storage card. Therefore, may occur third party application withoutThe situation of the Backup Data of calling party in the situation of subscriber authorisation, causes the leakage of Backup Data, and impact is usedThe security of user data.
Summary of the invention
The proposition of the embodiment of the present invention a kind of data back up method, system and equipment, can improve backup numberAccording to security.
In order to achieve the above object, the embodiment of the present invention proposes a kind of data back up method, comprises the following steps:
Obtain data to be backed up;
Use the key obtaining to be in advance encrypted and to obtain ciphertext described data to be backed up;
Described ciphertext is stored to storage card;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
The embodiment of the present invention is by data to be backed up being used to the secret key encryption of obtaining in advance, and encryption is standbyPart file is kept in storage card, because key storage is in the position that needs default access access, therefore, noThe third party application with authority cannot obtain key, cannot decipher and obtain data to be backed up, thereby carryThe security of high Backup Data.
As technique scheme preferably, the key that described use is obtained in advance enters described data to be backed upBefore row is encrypted and obtained the step of ciphertext, described method also comprises:
Obtain in advance as described from the key of the described position reading pre-stored that needs default access accessKey; Or for described data generation key to be backed up is as the described key obtaining in advance.
This programme provides the possibility that obtains key.
As technique scheme preferably, for described data to be backed up generate key, adopt following either partyFormula:
Be that described data to be backed up generate key according to the unique identification of mobile terminal; Or use default randomNumber generating algorithm is that described data to be backed up generate key; Or send described data to be backed up to enter according to userThe time of the instruction of row backup is that described data to be backed up generate key.
This programme provides the optional mode that generates key.
As technique scheme preferably, the described position that needs default access access is mobile terminal this localityDefault store path. The position of this programme default access access is set to the default of mobile terminal this locality and depositsStorage path, can realize without the encrypted backup file safely of just networking.
As technique scheme preferably, use the key obtaining in advance to add described data to be backed upAfter the close step that obtains ciphertext, described method also comprises:
Described key is sent to server, is also described key so that described server is preserved described keyDistribute corresponding key identification;
Receive the key identification that described server sends;
Delete the local described key of preserving.
This programme be in fact by key storage to server, improved the security of key, thus furtherImprove the security of Backup Data.
As technique scheme preferably, described described ciphertext is stored in storage card, adopt as belowFormula: described key identification and described ciphertext are stored in storage card.
As technique scheme preferably, described by described key identification and the storage of described ciphertext backup fileAfter step in storage card, described method also comprises:
Read described key identification, and send to described server, so that described server is to described closeAfter the success of key ID authentication, return to the key that described key identification is corresponding;
Receive key corresponding to described key identification that described server returns;
Use the key that described key identification is corresponding to be decrypted described ciphertext, obtain data to be backed up.
This programme has further provided the method for the Backup Data deciphering of encrypting, and the method makes not have powerThird party's application or other users of limit cannot obtain Backup Data.
The embodiment of the present invention also proposes a kind of data backup system, comprising: mobile terminal;
Described mobile terminal comprises:
Acquisition module, for obtaining data to be backed up;
Encrypting module, for use the key that obtains in advance to described data to be backed up be encrypted obtain closeLiterary composition;
Memory module, for being stored to storage card by described ciphertext;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
As technique scheme preferably, described mobile terminal also comprises:
Key Acquisition Module, for the key from the described position reading pre-stored that needs default access accessAs the described key obtaining in advance, or, for generating key, described data to be backed up obtain in advance as describedKey.
As technique scheme preferably, described encrypting module is used for:
Be that described data to be backed up generate key according to the unique identification of mobile terminal; Or use default randomNumber generating algorithm is that described data to be backed up generate key; Or send described data to be backed up to enter according to userThe time of the instruction of row backup is that described data to be backed up generate key.
As technique scheme preferably, the described position that needs default access access is mobile terminal this localityDefault store path.
As technique scheme preferably, described system also comprises server;
Described mobile terminal also comprises:
The first sending module, for using the key obtaining in advance to described number to be backed up at described encrypting moduleAccording to after being encrypted and obtaining ciphertext, described key is sent to described server;
The first receiver module, the key identification sending for receiving described server;
The first processing module, for deleting the local described key of preserving;
Described server comprises:
The second receiver module, the key sending for mobile terminal receive;
The second processing module, is used to key identification corresponding to described encryption key distribution;
The second sending module, for being sent to described mobile terminal by described key identification.
As technique scheme preferably, described memory module is used for:
Described key identification and described ciphertext are stored in storage card.
As technique scheme preferably, described mobile terminal also comprises:
The 3rd sending module, for reading described key identification, and sends to described server, so that instituteState server and return to the key that described key identification is corresponding after to described key identification authentication success;
The 3rd receiver module, key corresponding to described key identification returning for receiving described server;
Deciphering module, for using the key that described key identification is corresponding to be decrypted described ciphertext, obtainsData to be backed up;
Described server also comprises:
The 4th receiver module, the key identification sending for mobile terminal receive;
The 4th sending module, for to after described key identification authentication success by corresponding described key identification closeKey is sent to described mobile terminal.
The embodiment of the present invention also proposes a kind of equipment, and described equipment comprises:
One or more processors;
Memory; With
One or more modules, described one or more module stores in described memory and be configured to byDescribed one or more processor is carried out, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key obtaining to be in advance encrypted and to obtain ciphertext described data to be backed up;
Described ciphertext is stored to and the storage card of described equipment connection;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
The further feature of the embodiment of the present invention and advantage will be set forth in the following description, and, partlyFrom description, become apparent, or understand by implementing the embodiment of the present invention. The embodiment of the present inventionObject and other advantages can be by referring in particular in write description, claims and accompanying drawingThe structure going out realizes and obtains.
Below by drawings and Examples, the technical scheme of the embodiment of the present invention is done further and retouched in detailState.
Brief description of the drawings
Accompanying drawing is used to provide the further understanding to the embodiment of the present invention, and forms a part for description,For explaining the present invention, do not form the restriction to the embodiment of the present invention together with embodiments of the present invention. ?In accompanying drawing:
Fig. 1 is the flow chart of the data back up method of preferred embodiment of the present invention proposition;
Fig. 2 is the flow chart of the data back up method of the present invention's one specific embodiment proposition;
Fig. 3 is the flow chart of the data restoration method of another specific embodiment proposition of the present invention;
Fig. 4 is the flow chart of the data back up method of another specific embodiment proposition of the present invention;
Fig. 5 is the flow chart of the data restoration method of the another specific embodiment proposition of the present invention;
Fig. 6 is the structural representation of the data backup system of preferred embodiment of the present invention proposition;
Fig. 7 is the structural representation of the data backup system of the present invention's one specific embodiment proposition.
Detailed description of the invention
Below in conjunction with accompanying drawing, the embodiment of the present invention is described, should be appreciated that embodiment described hereinOnly, for the description and interpretation embodiment of the present invention, be not intended to limit the present invention embodiment.
Be illustrated in figure 1 a kind of data back up method that the preferred embodiment of the present invention proposes, comprise:
Step S11: obtain data to be backed up;
Step S12: use the key obtaining to be in advance encrypted and to obtain ciphertext described data to be backed up;
Step S13: described ciphertext is stored to storage card;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
The embodiment of the present invention is by data to be backed up being used to the secret key encryption of obtaining in advance, and encryption is standbyPart file is kept in storage card, because key storage is in the position that needs default access access, therefore, noThe third party application with authority cannot obtain key, cannot decipher and obtain data to be backed up, thereby carryThe security of high Backup Data.
As shown in Figure 2, the present embodiment provides a kind of data back up method, is that the embodiment of the present invention providesAnother preferred embodiment, in this embodiment, taking mobile phone as example, comprises the following steps:
Step S21: user opens the backup tool in mobile phone.
Backup tool in mobile phone can be the function carrying in mobile phone, also the application journey of user installationOrder.
Step S22: user right is verified.
For example, by being set, the method for password judges whether user can open this backup tool.
Particularly, in the time that user opens backup tool, need user to input correct password, only have user defeatedEnter correct password, just thought that user can use this backup tool.
Step S23: user plays backup request by verifying rear selection Data Concurrent to be backed up.
Step S24: obtain key S according to this backup request.
This key S can be formed and stored in the position that needs default access access in advance, for example, be stored in handIn the memory that machine carries, in the time that user initiates backup request, need the position of default access access from thisRead key.
Wherein, the memory of mobile phone includes but not limited to EEPROM(ElectricallyErasableProgrammableRead-OnlyMemory, EEPROM), flash memory(Flash) etc.; This memory location only has ROOT(computer realm term, in Unix systemWith in class unix system and Android, the general called after root of power user of system, root is systemIn unique power user, there is authorities all in system, as start or stop a process, delete orIncreasing user, increase or forbidding hardware etc.) authority is just addressable, and other third party applications cannotAccess, the user with ROOT authority is power user unique in mobile phone operating system, has in systemAll authorities, can access and revise the file in mobile phone.
This key S generates in real time.
Wherein, the mode of generation key can adopt the following any mode that includes but not limited to:
Be that described data to be backed up generate key according to the unique identification of mobile terminal, which is same terminalThe same key of backup setting; Or using default Generating Random Number is that described data to be backed up are rawBecome key, which all can generate a key S at random for backup request each time, to increase safetyProperty; Or the time of sending the instruction that described data to be backed up are backed up according to user is described to be backed upData generate key, and which is chosen with the time factor of time correlation as the basis that generates key S, withEnsure the randomness of S.
The generation method that those skilled in the art will appreciate that key S can be used any one existingThe technology of generation key, be not construed as limiting in the present embodiment.
Step S25: the data to be backed up that user is selected are packed and obtained packet to be backed up.
Here, the some Backup Datas that user can be selected are compressed into a packet, wherein, need standbyThe data of part can be the application program of note, message registration, note, calendar item, installation and number whereinAccording to and for parameters of system or software etc.
Step S26: use key S to treat backup data package and be encrypted and obtain ciphertext, this ciphertext encryptsBackup file.
Step S27: this ciphertext is stored to the storage card of mobile phone, key S is stored to the pre-of mobile phone this localityIf store path.
It is in mobile phone this locality, to need default access to access that the default store path of this mobile phone this locality is presetPosition, is the memory of mobile phone in the present embodiment, and this memory location only has ROOT authorityUser or third party apply just addressable.
Preferably, while ciphertext being stored in the storage card of mobile phone, being also included as backup file and distributing titleProcess, distribute the method for title to be: according to the time distribution title of current backup, or according to current standbyPart number of times distributes title.
The embodiment of the data restoration method corresponding with above-mentioned data back up method as shown in Figure 3, comprising:
Step S31: user opens the backup tool in mobile phone.
Step S32: user inputs password to carry out Authority Verification.
For example, by being set, the method for password judges whether user can open this backup tool.
Particularly, in the time that user opens backup tool, need user to input correct password, only have user defeatedEnter correct password, just thought that user can use this backup tool.
Step S33: user is by the rear initiation of checking data reduction request, and selecting ciphertext is encrypt before standbyPart file.
Step S34: whether authentication of users has ROOT authority, if so, continues execution step S35; IfNo, finish.
Step S35: read the corresponding key S of ciphertext that user selects from the memory of mobile phone.
Step S36: use key S to ciphertext be decrypted, decompressing obtains Backup Data.
The present embodiment is the default store path to mobile terminal this locality, i.e. depositing of mobile phone by key storageIn reservoir, this memory space only has the user with ROOT authority just can access, and also, only hasThe user of ROOT authority or third party application just can obtain this key, and therefore this key can obtainProtection well, the security of Backup Data also improves greatly.
As shown in Figure 4, another specific embodiment provides a kind of data back up method, is the embodiment of the present inventionThe another preferred embodiment providing, in this embodiment, taking panel computer as example, comprises following stepRapid:
Step S41: user is by applying for the registration of and obtain primary account number to server.
Wherein, primary account number is community's account alternatively, is specifically as follows cell-phone number, mailbox, the pet name etc., everyIndividual main account is provided with corresponding password, need to be by the cipher authentication of server when user logins.
Step S42: user is by primary account number game server.
Step S43: user initiates backup request by the backup tool in panel computer, and selects to be backed upData.
Step S44: generate a random cipher as key S according to this backup request.
Step S45: the data to be backed up that user is selected are compressed and are packaged into packet to be backed up.
Step S46: use key S to treat backup data package and be encrypted, the backup file that obtains encrypting isCiphertext.
Step S47: key S is sent to server.
Preferably, when transmission, can select escape way, for example Secure Hypertext Transfer Protocol (HypertextTransferProtocoloverSecureSocketLayer,https)。
Step S48: server is received after key S, generates a pair of key pair that can be used for asymmetric arithmetic:PKI PK and private key SK.
Step S49: server is primary account number, the key S association store with user by this key pair, and by closeThe PKI PK of key centering is sent to terminal.
Step S410: terminal is by PK and ciphertext association store, and the key S of the local storage of deletion.
Particularly, PK and ciphertext can be kept in a file, also can be packaged as a file and depositStorage.
As the second preferred embodiment, in step S410, can also be:
Terminal is used PK to be encrypted PKI, preserves the key S after encrypting, and deletes key S expressly.
The embodiment of the data restoration method corresponding with above-mentioned data back up method as shown in Figure 5, comprising:
Step S51: user is by primary account number game server.
Step S52: user initiates the request of reduction backup by the backup tool in panel computer, and selectsThe backup file that ciphertext was encrypted.
Step S53: obtain and the PKI PK of this ciphertext association store, and PK is sent to server.
For the second embodiment in step S410, this step S53 also comprises:
Key S after the PK that uses public-key is encrypted sends to server.
Step S54: server is verified PK, obtains key S's to judge whether this user hasAuthority, if so, performs step S55.
Preferably, the method that server is verified PK can be in the following way:
Step S541: server expressly uses the PK receiving to be encrypted by any one section, obtains ciphertext.
Step S542: the private key SK of whois lookup and this user's primary account number association store, uses this SKAbove-mentioned ciphertext is decrypted, if can obtain original plaintext, explanation checking is legal.
Step S55: the key S of whois lookup and this PKI PK association store, and S is sent to endEnd; Preferably, in the time sending S, can select escape way, for example, use https.
For the second embodiment in step S410, this step S55 can replace with:
Server uses the private key S corresponding with this PKI PK to be decrypted the key S after encrypting, and obtainsKey S expressly, and send to terminal.
Step S56: use S to ciphertext be decrypted, decompressing obtains Backup Data.
The present embodiment be by key storage to user is carried out in the server of authentication, obtain that this is closeSecondly key, first will carry out authentication to user, and, the PKI that provide user verifies, therefore,Can protect well this key, thereby improve the security of Backup Data.
The embodiment of the present invention also proposes a kind of data backup system, as shown in Figure 6, and this data backup system bagDraw together: mobile terminal 700;
Described mobile terminal 700 comprises:
Acquisition module 701, for obtaining data to be backed up;
Encrypting module 702, for using the key obtaining in advance that described data to be backed up are encrypted and are obtainedCiphertext;
Memory module 703, for being stored to storage card by described ciphertext;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
Preferably, mobile terminal 700 also comprises:
Key Acquisition Module, for the key from the described position reading pre-stored that needs default access accessAs the described key obtaining in advance, or, for generating key, described data to be backed up obtain in advance as describedKey.
Preferably, encrypting module 702 for:
Be that described data to be backed up generate key according to the unique identification of mobile terminal; Or use default randomNumber generating algorithm is that described data to be backed up generate key; Or send described data to be backed up to enter according to userThe time of the instruction of row backup is that described data to be backed up generate key.
Wherein, the described location optimization that needs default access access is the default storage road of mobile terminal this localityFootpath.
As shown in Figure 7, described system also comprises server 800;
Mobile terminal 700 also comprises:
The first sending module 705, for use at described encrypting module the key that obtains in advance to described treat standbyAfter piece of data is encrypted and obtains ciphertext, described key is sent to described server;
The first receiver module 706, the key identification sending for receiving described server;
The first processing module 707, for deleting the local described key of preserving;
Server 800 comprises:
The second receiver module 801, the key sending for mobile terminal receive;
The second processing module 802, is used to key identification corresponding to described encryption key distribution;
The second sending module 803, for being sent to described mobile terminal by described key identification.
Preferably, memory module 703 for: described key identification and described ciphertext are stored in to storage card.
Preferably, mobile terminal 700 also comprises:
The 3rd sending module, for reading described key identification, and sends to described server, so that instituteState server and return to the key that described key identification is corresponding after to described key identification authentication success;
The 3rd receiver module, key corresponding to described key identification returning for receiving described server;
Deciphering module, for using the key that described key identification is corresponding to be decrypted described ciphertext, obtainsData to be backed up;
Described server 800 also comprises:
The 4th receiver module, the key identification sending for mobile terminal receive;
The 4th sending module, for to after described key identification authentication success by corresponding described key identification closeKey is sent to described mobile terminal.
The embodiment of the present invention also proposes a kind of equipment, and described equipment comprises:
One or more processors;
Memory; With
One or more modules (programs), described one or more module stores in described memory alsoBe configured to be carried out by described one or more processors, wherein, described one or more modules have as followsFunction:
Obtain data to be backed up;
Use the key obtaining to be in advance encrypted and to obtain ciphertext described data to be backed up;
Described ciphertext is stored to and the storage card of described equipment connection;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
Preferably, described one or more module can also comprise following function:
Before the key obtaining in advance in use is encrypted described data to be backed up and obtains ciphertext, from describedNeed the key of position reading pre-stored of default access access as the described key obtaining in advance; Or,For described data to be backed up generate key as the described key obtaining in advance.
Preferably, the key that described use is obtained is in advance encrypted and obtains ciphertext described data to be backed up,In the following way:
Be that described data to be backed up generate key according to the unique identification of described equipment; Or use default randomNumber generating algorithm is that described data to be backed up generate key; Or send described data to be backed up to enter according to userThe time of the instruction of row backup is that described data to be backed up generate key.
Preferably, the default store path that the described position that needs default access to access is described memory.
Preferably, described one or more module can also comprise following function:
After the key obtaining in advance in described use is encrypted and obtains ciphertext described data to be backed up, willDescribed key sends to server, is also described encryption key distribution pair so that described server is preserved described keyThe key identification of answering;
Receive the key identification that described server sends;
Delete the described key that described equipment is preserved.
Preferably, described described ciphertext is stored to and the storage card of described equipment connection, in the following way:
Described key identification and described ciphertext are stored in the storage card with described equipment connection.
Preferably, described one or more module can also comprise following function:
Described, described key identification and described ciphertext backup file are stored in and the depositing of described equipment connectionAfter in card storage, read described key identification, and send to described server, so that described server existsTo returning to the key that described key identification is corresponding after described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use the key that described key identification is corresponding to be decrypted described ciphertext, obtain data to be backed up.
In addition, the present embodiment also provides a kind of non-volatile readable storage medium, in this storage medium, storesHave one or more modules (programs), these one or more modules are used in has one or more placesWhile managing the equipment of device, can make this equipment carry out the instruction (instructions) of following steps:
Obtain data to be backed up;
Use the key obtaining to be in advance encrypted and to obtain ciphertext described data to be backed up;
Described ciphertext is stored to and the storage card of described equipment connection;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
Preferably, described one or more module can also make this equipment carry out the instruction of following steps:
Before the key obtaining in advance in use is encrypted described data to be backed up and obtains ciphertext, from describedNeed the key of position reading pre-stored of default access access as the described key obtaining in advance; Or,For described data to be backed up generate key as the described key obtaining in advance.
Preferably, the key that described use is obtained is in advance encrypted and obtains ciphertext described data to be backed up,In the following way:
Be that described data to be backed up generate key according to the unique identification of described equipment; Or use default randomNumber generating algorithm is that described data to be backed up generate key; Or send described data to be backed up to enter according to userThe time of the instruction of row backup is that described data to be backed up generate key.
Preferably, the default store path that the described position that needs default access to access is described memory.
Preferably, described one or more module can also make this equipment carry out the instruction of following steps:
After the key obtaining in advance in described use is encrypted and obtains ciphertext described data to be backed up, willDescribed key sends to server, is also described encryption key distribution pair so that described server is preserved described keyThe key identification of answering;
Receive the key identification that described server sends;
Delete the described key that described equipment is preserved.
Preferably, described described ciphertext is stored to and the storage card of described equipment connection, in the following way:
Described key identification and described ciphertext are stored in the storage card with described equipment connection.
Preferably, described one or more module can also make this equipment carry out the instruction of following steps:
Described, described key identification and described ciphertext backup file are stored in and the depositing of described equipment connectionAfter in card storage, read described key identification, and send to described server, so that described server existsTo returning to the key that described key identification is corresponding after described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use the key that described key identification is corresponding to be decrypted described ciphertext, obtain data to be backed up.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or meterCalculation machine program product. Therefore, the present invention can adopt complete hardware implementation example, completely implement software example or knotClose the form of the embodiment of software and hardware aspect. And the present invention can adopt at one or more wherein bagsThe computer-usable storage medium that contains computer usable program code (include but not limited to magnetic disc store andOptical memory etc.) form of the upper computer program of implementing.
The present invention is that reference is according to the method for the embodiment of the present invention, equipment (system) and computer program productThe flow chart of product and/or block diagram are described. Should understand can be by computer program instructions realization flow figure and/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/Or the combination of square frame. Can provide these computer program instructions to all-purpose computer, special-purpose computer, embeddingThe processor of formula processor or other programmable data processing device, to produce a machine, makes by calculatingThe instruction that the processor of machine or other programmable data processing device is carried out produces for realizing at flow chart oneThe device of the function of specifying in square frame of individual flow process or multiple flow process and/or block diagram or multiple square frame.
These computer program instructions also can be stored in energy vectoring computer or other programmable data processing are establishedIn the standby computer-readable memory with ad hoc fashion work, make to be stored in this computer-readable memoryInstruction produce and comprise the manufacture of command device, this command device is realized in flow process or multiple of flow chartThe function of specifying in square frame of flow process and/or block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makeMust on computer or other programmable devices, carry out sequence of operations step to produce computer implemented placeReason, thus the instruction of carrying out on computer or other programmable devices is provided for realizing one of flow chartThe step of the function of specifying in square frame of flow process or multiple flow process and/or block diagram or multiple square frame.
Obviously, those skilled in the art can carry out various changes and modification and not depart from this present inventionBright spirit and scope. Like this, if of the present invention these amendment and modification belong to the claims in the present invention andWithin the scope of its equivalent technologies, the present invention be also intended to comprise these change and modification interior.

Claims (11)

1. a data back up method, is characterized in that, comprises the following steps:
Obtain data to be backed up;
Data packing to be backed up is obtained to packet to be backed up;
Use the key obtaining to be in advance encrypted and to obtain ciphertext described packet to be backed up;
Described key is sent to server, is also described key so that described server is preserved described keyDistribute corresponding key identification;
Receive the key identification that described server sends;
Delete the local described key of preserving;
Described key identification and described ciphertext are stored to storage card;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
2. method according to claim 1, is characterized in that, the key that described use is obtained in advanceBefore described data to be backed up are encrypted to the step that obtains ciphertext, described method also comprises:
Obtain in advance as described from the key of the described position reading pre-stored that needs default access accessKey; Or,
For described data to be backed up generate key as the described key obtaining in advance.
3. method according to claim 2, is characterized in that, for described data to be backed up generate closeKey, adopts following either type:
Be that described data to be backed up generate key according to the unique identification of mobile terminal; Or,
Using default Generating Random Number is that described data to be backed up generate key; Or,
The time of sending the instruction that described data to be backed up are backed up according to user is described number to be backed upAccording to generating key.
4. method according to claim 1, is characterized in that, the described default access that needs is accessedPosition is the default store path of mobile terminal this locality.
5. method according to claim 1, is characterized in that, described by described key identification and instituteState after ciphertext is stored in the step in storage card, described method also comprises:
Read described key identification, and send to described server, so that described server is to described closeAfter the success of key ID authentication, return to the key that described key identification is corresponding;
Receive key corresponding to described key identification that described server returns;
Use the key that described key identification is corresponding to be decrypted described ciphertext, obtain data to be backed up.
6. a data backup system, is characterized in that, comprising: mobile terminal and server;
Described mobile terminal comprises:
Acquisition module, for obtaining data to be backed up, obtains packet to be backed up by data packing to be backed up;
Encrypting module, for use the key that obtains in advance to described packet to be backed up be encrypted obtain closeLiterary composition;
The first sending module, for using the key obtaining in advance to described number to be backed up at described encrypting moduleAccording to after being encrypted and obtaining ciphertext, described key is sent to described server;
The first receiver module, the key identification sending for receiving described server;
The first processing module, for deleting the local described key of preserving;
Memory module, for being stored to storage card by described key identification and described ciphertext;
Wherein, the described key storage obtaining is in advance needing the position of default access access;
Described server comprises:
The second receiver module, the key sending for mobile terminal receive;
The second processing module, is used to key identification corresponding to described encryption key distribution;
The second sending module, for being sent to described mobile terminal by described key identification.
7. system according to claim 6, is characterized in that, described mobile terminal also comprises:
Key Acquisition Module, for the key from the described position reading pre-stored that needs default access accessAs the described key obtaining in advance, or, for generating key, described data to be backed up obtain in advance as describedKey.
8. system according to claim 7, is characterized in that, described encrypting module is used for:
Be that described data to be backed up generate key according to the unique identification of mobile terminal; Or,
Using default Generating Random Number is that described data to be backed up generate key; Or,
The time of sending the instruction that described data to be backed up are backed up according to user is described number to be backed upAccording to generating key.
9. system according to claim 6, is characterized in that, the described default access that needs is accessedPosition is the default store path of mobile terminal this locality.
10. system according to claim 6, is characterized in that, described mobile terminal also comprises:
The 3rd sending module, for reading described key identification, and sends to described server, so that instituteState server and return to the key that described key identification is corresponding after to described key identification authentication success;
The 3rd receiver module, key corresponding to described key identification returning for receiving described server;
Deciphering module, for using the key that described key identification is corresponding to be decrypted described ciphertext, obtainsData to be backed up;
Described server also comprises:
The 4th receiver module, the key identification sending for mobile terminal receive;
The 4th sending module, for to after described key identification authentication success by corresponding described key identification closeKey is sent to described mobile terminal.
11. 1 kinds of data backup devices, is characterized in that, described data backup device comprises:
One or more processors;
Memory; With
One or more modules, described one or more module stores in described memory and be configured to byDescribed one or more processor is carried out, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Data packing to be backed up is obtained to packet to be backed up;
Use the key obtaining to be in advance encrypted and to obtain ciphertext described packet to be backed up;
Described key is sent to server, is also described key so that described server is preserved described keyDistribute corresponding key identification;
Receive the key identification that described server sends;
Delete the local described key of preserving;
Described key identification and described ciphertext are stored to and the storage card of described equipment connection;
Wherein, the described key storage obtaining is in advance needing the position of default access access.
CN201210401460.6A 2012-10-19 2012-10-19 A kind of data back up method, system and equipment Active CN102915263B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210401460.6A CN102915263B (en) 2012-10-19 2012-10-19 A kind of data back up method, system and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210401460.6A CN102915263B (en) 2012-10-19 2012-10-19 A kind of data back up method, system and equipment

Publications (2)

Publication Number Publication Date
CN102915263A CN102915263A (en) 2013-02-06
CN102915263B true CN102915263B (en) 2016-05-11

Family

ID=47613636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210401460.6A Active CN102915263B (en) 2012-10-19 2012-10-19 A kind of data back up method, system and equipment

Country Status (1)

Country Link
CN (1) CN102915263B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103176864B (en) * 2013-03-11 2016-03-23 广东欧珀移动通信有限公司 A kind of backup method based on Android system, device and mobile terminal
CN104144174B (en) * 2013-05-06 2017-11-24 华为技术有限公司 Protect method, user equipment and the server of privacy of user data
CN103617005A (en) * 2013-11-28 2014-03-05 中国联合网络通信集团有限公司 Access method, device and system for intelligent card
CN104699559B (en) * 2013-12-04 2019-03-26 腾讯科技(深圳)有限公司 Backing up distributed data method and system
CN103634789A (en) * 2013-12-17 2014-03-12 北京网秦天下科技有限公司 Mobile terminal and method
CN105843701A (en) * 2015-01-14 2016-08-10 小米科技有限责任公司 Data backup method and device
CN105071927B (en) * 2015-07-17 2018-12-28 上海众人网络安全技术有限公司 Method is locally stored in a kind of mobile device data
CN106357678A (en) * 2016-10-24 2017-01-25 宇龙计算机通信科技(深圳)有限公司 Cloud encryption storage method for intelligent terminal and intelligent terminal
KR102534072B1 (en) * 2017-01-09 2023-05-19 인터디지털 매디슨 페턴트 홀딩스 에스에이에스 Methods and Apparatus for Performing Secure Backup and Restore
CN107025408B (en) * 2017-03-29 2018-08-14 宁夏宁信信息科技有限公司 Mobile hard disk key generation method and system based on cloud platform verification technique
CN107102913B (en) * 2017-04-01 2019-02-22 Oppo广东移动通信有限公司 Data back up method, device and computer equipment
CN107273725B (en) * 2017-05-14 2020-07-07 四川盛世天成信息技术有限公司 Data backup method and system for confidential information
CN107704743A (en) * 2017-08-23 2018-02-16 深圳市优品壹电子有限公司 Device and Related product with data backup function
CN109240849B (en) * 2018-08-09 2021-05-18 苏州市科远软件技术开发有限公司 Data backup method and device and multipoint control unit for video conference system
CN109684129B (en) * 2018-11-20 2020-05-05 北京深思数盾科技股份有限公司 Data backup recovery method, storage medium, encryption machine, client and server
CN111414628B (en) * 2019-01-08 2024-01-02 阿里巴巴集团控股有限公司 Data storage method and device and computing equipment
CN110275801B (en) * 2019-06-21 2020-12-11 珠海格力电器股份有限公司 Data recovery method, device, system, computer equipment and storage medium
CN110865905A (en) * 2019-09-24 2020-03-06 平安科技(深圳)有限公司 Data restoration method and device, computer equipment and storage medium
CN110704243A (en) * 2019-09-25 2020-01-17 Oppo(重庆)智能科技有限公司 Data recovery method and device, terminal equipment and storage medium
CN112733130B (en) * 2021-01-18 2022-11-29 成都质数斯达克科技有限公司 Account registration method and device, electronic equipment and readable storage medium
CN113094212B (en) * 2021-04-30 2024-04-02 杭州海康威视数字技术股份有限公司 Video backup method and device and video backup system
CN114896219B (en) * 2022-07-15 2022-09-20 深圳市沃特沃德信息有限公司 Method and device for storing resource data, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134660A (en) * 1997-06-30 2000-10-17 Telcordia Technologies, Inc. Method for revoking computer backup files using cryptographic techniques
CN1992746A (en) * 2005-12-28 2007-07-04 集嘉通讯股份有限公司 Data backup and reduction method
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN102387209A (en) * 2011-10-24 2012-03-21 深圳市智慧宇宙管理咨询有限公司 System and method for obtaining call information, device and method for sending call information as well as mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7240219B2 (en) * 2003-05-25 2007-07-03 Sandisk Il Ltd. Method and system for maintaining backup of portable storage devices
CN102662798A (en) * 2012-04-12 2012-09-12 青岛海信移动通信技术股份有限公司 Data recovery method and terminal for Android system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134660A (en) * 1997-06-30 2000-10-17 Telcordia Technologies, Inc. Method for revoking computer backup files using cryptographic techniques
CN1992746A (en) * 2005-12-28 2007-07-04 集嘉通讯股份有限公司 Data backup and reduction method
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN102387209A (en) * 2011-10-24 2012-03-21 深圳市智慧宇宙管理咨询有限公司 System and method for obtaining call information, device and method for sending call information as well as mobile terminal

Also Published As

Publication number Publication date
CN102915263A (en) 2013-02-06

Similar Documents

Publication Publication Date Title
CN102915263B (en) A kind of data back up method, system and equipment
CN111191286B (en) HyperLegger Fabric block chain private data storage and access system and method thereof
CN110224814B (en) Block chain data sharing method and device
CN111935080B (en) Data sharing method and device of block chain, computer equipment and storage medium
CN106301774B (en) Safety chip, its encryption key generation method and encryption method
CN111090875A (en) Contract deployment method and device
CN105812332A (en) Data protection method
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
CN106527673A (en) Method and apparatus for binding wearable device, and electronic payment method and apparatus
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN204360381U (en) mobile device
CN104094267A (en) Method, device, and system for securely sharing media content from a source device
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN112989356B (en) Blank security chip burning method, system, blank security chip and storage medium
CN105117635A (en) Local data security protection system and method
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN104468562A (en) Portable transparent data safety protection terminal oriented to mobile applications
CN109697370A (en) Database data encipher-decipher method, device, computer equipment and storage medium
CN104994095A (en) Equipment authentication method, clients, server and system
US11783091B2 (en) Executing entity-specific cryptographic code in a cryptographic coprocessor
CN107729760B (en) CSP implementation method based on Android system and intelligent terminal
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN107872315B (en) Data processing method and intelligent terminal
CN108809631B (en) Quantum key service management system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 100085 Beijing city Haidian District Qinghe Street No. 68 Huarun colorful city shopping center two floor 13

Applicant after: Xiaomi Technology Co., Ltd.

Address before: 100102, No. 50, block B, building No. 12, winding stone world building, Wangjing West Road, Beijing, Chaoyang District

Applicant before: Beijing Xiaomi Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant