CN105302490B - Date storage method - Google Patents

Date storage method Download PDF

Info

Publication number
CN105302490B
CN105302490B CN201510729253.7A CN201510729253A CN105302490B CN 105302490 B CN105302490 B CN 105302490B CN 201510729253 A CN201510729253 A CN 201510729253A CN 105302490 B CN105302490 B CN 105302490B
Authority
CN
China
Prior art keywords
data
encryption
storage
user
local cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510729253.7A
Other languages
Chinese (zh)
Other versions
CN105302490A (en
Inventor
陈建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan starry Star Technology Co., Ltd.
Original Assignee
Sichuan Starry Star Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Starry Star Technology Co Ltd filed Critical Sichuan Starry Star Technology Co Ltd
Priority to CN201510729253.7A priority Critical patent/CN105302490B/en
Publication of CN105302490A publication Critical patent/CN105302490A/en
Application granted granted Critical
Publication of CN105302490B publication Critical patent/CN105302490B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention discloses a kind of date storage method, is applied to data-storage system, the system comprises computer and server, the method includes:The computer divides local cipher disk according to user setting, and the local cipher disk is independent data space;By user, this stores to the data of local cipher disk and is encrypted, and obtains the first encryption data;First encryption data is synchronized into the encryption disc that other at least one storage devices are arrived in storage, the encryption disc of other at least one storage devices divides in advance;The authentication information of the local cipher disk is issued into the server;The server receives and stores the authentication information.

Description

Date storage method
Technical field
The present invention relates to computer realm more particularly to a kind of date storage methods.
Background technology
Dropbox can be regarded as being stored in hard disk or USB flash disk on network, therefore Dropbox is also known as Network U plate or network hard disc, For providing a user the file management facilities such as online file storage, access, backup, shared.By Dropbox, no matter user exists Anywhere, as long as can connect to internet, so that it may pass through the file of on-line storage in mobile terminal administration Dropbox.
There are many existing Dropbox storage modes, for example, provided application No. is 201210362185.1 application documents The file uploading method of network hard disc stores file according to document;For another example application No. is The network disk file storage method that the application documents of 201280000563.X provide carries out file storage according to file name.
Dropbox is widely used, but Dropbox can increase by one as a kind of method of effective backup local file A administrator role produces new security risk.
User obtains the data preserved by password after data are stored to Dropbox;Then user cannot obtain storage to no password Data can ensure data safety to a certain degree.But in the method that Dropbox stores data, there is Dropbox administrator management to use Family stores the permission of data, and the data that Dropbox administrator can inquire user's storage even delete storage content or freeze Dropbox account Number, influence data storage security.
Invention content
The present invention proposes a kind of date storage method, can enhance the safety of local datastore.
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, the system comprises calculating Machine and server, the method includes:
The computer divides local cipher disk according to user setting, and it is empty that the local cipher disk is independent data storage Between;
By user, this stores to the data of local cipher disk and is encrypted, and obtains the first encryption data;
By first encryption data synchronize storage to other at least one storage devices encryption disc, it is described other at least The encryption disc of one storage device divides in advance;
The authentication information of the local cipher disk is issued into the server;
The server receives the authentication information;
The server stores the authentication information in a manner of preset.
Date storage method proposed by the present invention, according to user setting divide local cipher disk, by user this store to The data of local cipher disk are encrypted, and obtain encryption data, and encryption data is synchronized storage to be set to other at least one storages Standby encryption disc, to which the data encryption for being stored in local cipher disk is stored in other storage devices, to enhance local number According to the safety of storage.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the present invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of date storage method embodiment of the present invention;
Fig. 2 is a kind of Computer Systems Organization schematic diagram of date storage method embodiment of the present invention;
Fig. 3 is that the encryption disc storage space of date storage method embodiment of the present invention uses schematic diagram;
Fig. 4 is another flow chart of date storage method embodiment of the present invention;
Wherein,
S1 core memory equipment
S2 storage servers
S3 computers
S4 mobile devices.
Specific implementation mode
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, the system comprises calculating Machine and server, the method includes:
Step 101, the computer divide local cipher disk according to user setting, and the local cipher disk is independent number According to memory space;
Step 102, by user, this stores to the data of local cipher disk and is encrypted, and obtains the first encryption data;
First encryption data is synchronized the encryption disc that other at least one storage devices are arrived in storage by step 103, described The encryption disc of other at least one storage devices divides in advance;
The authentication information of the local cipher disk is issued the server by step 104;
Step 105, the server receive the authentication information;
Step 106, the server store the authentication information in a manner of preset.
In practical applications, the authentication information includes account, password and/or dynamic password.
Local cipher disk is divided according to user setting in the present embodiment, this is stored to the data of local cipher disk by user It is encrypted, obtains encryption data, encryption data is synchronized into the encryption disc that other at least one storage devices are arrived in storage, thus will The data encryption for being stored in local cipher disk is stored in other storage devices, to enhance the safety of local datastore.And And the authentication information of the local cipher disk is issued the server by the present embodiment computer, the server is with preset Mode stores the authentication information received;In this way, computer and server are all stored with authentication information, and server is with specific Mode store the authentication information, the invisible authentication information of the people other than user strengthens the data safety of user.This Outside, the authentication information that user is kept in many places, can make user all facilitate reading data in the case of online and offline.
To keep the purpose, technical scheme and advantage of the present embodiment clearer, below in conjunction with the attached drawing in the present embodiment, Technical solution in the present embodiment is clearly and completely described, it is clear that described embodiment is that a part of the invention is real Example is applied, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creativeness The every other embodiment obtained under the premise of labour, shall fall within the protection scope of the present invention.
Memory in the present embodiment can be the equipment with data storage function, specifically, should have data to store work( The equipment of energy can be the equipment comprising storage chip, storage hard disk, such as computer etc., the present embodiment does not limit.
Embodiment 1
The date storage method of the present embodiment is realized by the equipment with store function such as computer.The present embodiment with Computer illustrates for realizing the date storage method, but the date storage method of the present embodiment is not limited to computer.
As shown in Figure 1, the date storage method includes:
Step 11:Local cipher disk is divided according to user setting, local cipher disk is independent data space.
In the present embodiment, part memory space is marked off as local in the storage device of computer according to user setting Encryption disc, for storing local encryption data.
To realize that the encryption disc on computer can actively ensure the safety of storage content, encryption disc can be set in the present embodiment Access password, while secure logon facility also can be used, user, which needs to log in, could access local cipher disk.
For example, when user accesses local cipher disk, the errors number that user inputs password is limited.After number exceeds, Refusal accesses again in a period of time, for example, can just again attempt to access after several hours or after one day.
When networking, reserved phone number can be given to send short message, remind user password input error.
When offline, then lock that the encryption disc is current and within a period of time it is inaccessible.
In order to avoid the content of local cipher disk can not be opened in the case of no network, local account encryption is allowed Code check.If continuous cipher authentication failed reaches setting number, the verification it is required that user networks.
After user networks, the verification frequency of user is can control in server end, has avoided Brute Force user name close The case where code, occurs, to guarantee data security.
Step 12:By user, this stores to the data of local cipher disk and is encrypted, and obtains the first encryption data.
A variety of cipher modes can be used in the present embodiment, the present embodiment does not limit specific cipher mode.
This is stored to the data of local cipher disk user, after encryption, obtains the first encryption data.Data encryption can Actively enhance safety when data are propagated on the internet.
Step 13:First encryption data is synchronized into the encryption disc that other at least one storage devices are arrived in storage, it is at least one The encryption disc of storage device divides in advance.
It should be appreciated that the present available capacity for the encryption disc that any storage device divides in advance is more than encrypted data institute The memory capacity needed.
In the present embodiment, whether the present available capacity that can prejudge storage device encryption disc is more than encrypted data Required memory capacity when confirming that the present available capacity of storage device encryption disc is enough, then starts to the storage device Synchronize storage.
In this way, when a encryption data is written to encryption disc, the encryption data is at least one on internet Storage device synchronizes storage.
In the present embodiment, the required storage of the first encryption data of synchronous storage can be pre-set according to different scenes and set Standby quantity, the usually storage device of the first encryption data of synchronous storage should more than two, it is preferable that are at least ten.In this way, Backup quantity of data by increasing redundancy ensures that user can obtain the first encryption data in time, ensures the storage of the first encryption data Safety, prevent loss of data.
In the present embodiment, preservation current crypto data can be detected automatically and active storage device quantity, current quantity are small It when preset quantity, is dominated by server, from encryption data in the memory space backup of trend any active ues.
In the present embodiment, the first encryption data synchronize storage to other at least one storage devices when, using P2P technologies into Row data transmission.System server can be set in the present embodiment to assist establishing P2P links.First it is detected that living in current ink Storage device near jump, and attempt to carry out P2P connections.If link establishment fails, it is active to reselect another Data storage device establishes P2P links.
In order to avoid currently available synchronous memory device is very little, sufficient amount of common storage can also be provided in the present embodiment Equipment, e.g., at least ten, P2P links when ensuring any moment between local memory device and public server can succeed It establishes.
In the present embodiment, by user, this stores to the data of local cipher disk and is encrypted in step 12, obtains first When encryption data, secret key can be generated at random, by the secret key, by user, this stores to the data of local cipher disk and is encrypted, Obtain the first encryption data.
In the present embodiment, when the data that this is stored to local cipher disk are encrypted, computer can generate one at random A secret key, the key are uniquely determined by the data, can only can be decrypted the encryption data by the secret key, be obtained the data, To improve data storage safety.
Preferably, which can save in local side and server end.
In the present embodiment, in step 13 by encrypted data sync storage to the encryption of other at least one storage devices Further include that the first encryption data is read from least one processor according to secret key after user identity is by verification after disk.
In the present embodiment, first encryption data in local cipher disk storage and other at least one storage devices Middle synchronous storage.After verifying user identity, by the key uniquely mapped with first encryption data, opening is stored in some First encryption data in current addressable storage device encryption disc.
Various ways verification user identity, such as account number cipher mode, dynamic password mode etc. can be used, the present embodiment is not It limits.
In the present embodiment, a user can be provided with encryption disc in more storage devices;Different user can be at same Respective encryption disc is provided in equipment.In the present embodiment, cipher server can be set and preserved using the date storage method Whole user informations, the user information may include user name, password and other verification informations etc..First each user is believed Breath is encrypted, it is preferable that obtains the encryption subscriber information string for capableing of the unique mark user.Then the encryption is used again Family information character string is uploaded to cipher server.Therefore, at cipher server end, user information is not stored in clear, Yong Huxin Breath is transparent for cipher server.The information such as the password of user only have user, use the username and password of oneself Etc. information, which could be decrypted, and the decryption be only limitted to for user login information verify.Therefore, it both ensure that close Code server end can not inquire the personal information of user, and plaintext user information is avoided to be leaked accidentally, be deposited to enhance data The privacy of storage.
In the present embodiment, the file row that file server preserves the whole users for using the date storage method can be set Table.User synchronizes more when its any data being preset in the storage device of local cipher disk to its encryption disc is modified New this document list, then other storage devices for being preset with local cipher disk can be after its login next time and when coupling internet certainly It is dynamic to be synchronized.User it is any be preset with the account that oneself is logged in the storage device of local cipher disk when, may be selected automatic It is fetched from internet and belongs to the data of himself to his new encryption disc.
It is further comprising the steps of after dividing local cipher disk according to user setting in step 11 in the present embodiment:
The second encryption data is received, which is the first encryption number synchronized from other storage device According to;
Second encryption data is stored to local cipher disk;
When deleting the second encryption data of local cipher disk storage, it is at least one which is transferred to other The encryption disc of the encryption disc of storage device, other storage devices divides in advance.
The present embodiment carries out dynamic itemset counting to the current active backup of each data file encryption, according to each encryption data The current active backup counting of file decides whether to continue to synchronize storage to other available storage devices.
In the present embodiment, when deleting the second encryption data of local cipher disk storage, the second encryption data is transferred to it The encryption disc of his at least one storage device.Therefore, if the encryption data of one of storage device storage is deleted or lost, By the way that encryption data to other storage device unloadings, is led to disappear because of the storage device of storage encryption data Encryption data is caused to lose, to improve data storage security.
It should be noted that in the present embodiment, when local cipher disk, which deletes it, stores data, can simultaneously or it is default when Between, for example, deleting corresponding data in all synchronous memory devices after 24 hours.To prevent user misoperation from deleting accidentally Data, in order to which data are restored.
In the present embodiment, by user, this stores to the data of local cipher disk and is encrypted step 12, obtain first plus Further include following steps before ciphertext data:
Stored to the data of local cipher disk according to this, generate corresponding cryptographic Hash, the cryptographic Hash unique mark this It stores to the data of local cipher disk;
It is generated when other any users being asked to be stored in data file identical with the cryptographic Hash in its local cipher disk Key;
Receive the key;
Correspondingly, by user, this stores to the data of local cipher disk and is encrypted, and obtaining the first encryption data includes:
According to the key, to user, this stores to the data of local cipher disk and is encrypted.
In the present embodiment, at encryption disc end when Initiative Inventory Management data, according to user, this is stored to the number of local cipher disk According to file content, filename weigh its cryptographic Hash.Cryptographic Hash can be used as the unique identification information of file, according to two files Cryptographic Hash both can judge whether be same substantive content file.
In the present embodiment, by user, this stores to the cryptographic Hash of the data of local cipher disk and is reported to file-management services Device;Inquiry cryptographic Hash whether there is in the listed files that document management server is safeguarded;If the cryptographic Hash has existed, The key generated when other any users being asked to be stored in data file identical with the cryptographic Hash in its local cipher disk;It receives User this store the keys of the data to local cipher disk;According to the key of reception, to user, this is stored to local cipher The data of disk are encrypted, and no longer active synchronization stores the data to other storage devices.
It gets in touch with other users if user fails, a new secret key is automatically generated, to this document It is encrypted locally, and active synchronization stores the storage device of data to other at least two or more.
In the present embodiment, after generating key, further include:
The request that other storage device obtains the secret key is received, obtains secret key request by other storage device The data and this to be stored this send when storing identical to the data of local cipher disk;
According to the request for obtaining the secret key, the secret key is sent to other storage device.
Such case is possessed by multiple and different network users for the file of same substantive content, the present embodiment passes through Kazakhstan Uncommon value judge certain two file whether be same substantive content file.For substantially identical file, the present embodiment no longer exists It is local to generate random key for this document, but by asking the close of this document to the other users for having possessed this document Key.It is receiving after other storage device obtains the request of this document secret key, to other storage device hair Give the secret key.
It should be noted that in the present embodiment, " first ", " second " are only thought to divide for convenience of description, do not constitute to this The restriction of square embodiment.
The date storage method of the present embodiment, local cipher disk is divided according to user setting, and by user, this is stored to this The data of ground encryption disc are encrypted, and obtain encryption data, and encryption data, which is synchronized storage, arrives other at least one storage devices Encryption disc, to which the data encryption for being stored in local cipher disk is stored in other storage devices, to enhance local data The safety of storage.
Embodiment 2
As shown in Fig. 2, the present embodiment proposes that a kind of computer system, the date storage method that the present embodiment proposes can be applied In the computer system.
The computer system includes the 4 class equipment interconnected by internet, respectively core memory equipment S1, storage service Device S2, computer S3, mobile device S4.Wherein, core memory equipment S1 is used to store user information, the index of user file is believed Breath etc., while can also assist establishing P2P links.Setting multiple cores server S 1 within the system, on the one hand can provide more Powerful dispatching, another party is also for load balancing and disaster recovery.
Storage server S2 be then when synchronizing storage data in order to avoid user do not have on current ink it is sufficient amount of its His any active ues establish P2P connections and synchrodata such case and reserved setting therewith, and effect and function are equal to one A ordinary user's account.
Computer S3, mobile device S4 are terminal devices workable for computer system ordinary user.
In the local cipher disk of computer S3, local data is both stored, also storage is from other users in the network link Backup Data.The Backup Data of these other users is transparent to local user.Local user's account can inquire local add Currently practical available memory capacity size in close disk, but the Backup Data for belonging to other users cannot be accessed.
Encryption disc is not pre-set on mobile device S4.User can be visited by the application program installed on mobile device S4 It asks data and management data, and the data for backing up storage on network is downloaded into mobile terminal S4, but do not undertake mobile end data Backup to the task of network and backup other users data.
It should be understood that Fig. 2 is only Application Scenarios-Example, the restriction to the present embodiment is not constituted.
Embodiment 3
In the present embodiment date storage method, the actual use situation of any local cipher disk capacity is as shown in Figure 3. The memory space that local user divides is defined as local cipher disk.Refer to that user cannot with space in the local cipher disk The space of data is written again, local user's free space refers to local user in the maximum capacity that data are written into encryption disc. It has used in space, that is, has included the encryption data of local user, also included the encryption data that network other users synchronize storage.It is synchronous The encryption data for storing other users is backstage automatic running, can be transparent to local user, can also be arranged to this The prompting of ground user.
Therefore, local cipher disk had both stored local cipher data, also store from the network link other users it is standby Part data.Preferably, the Backup Data of these other users is transparent to local user, and local user's account can inquire local Currently practical available memory capacity size in encryption disc, but the synchronous storage data for belonging to other users cannot be accessed.
For example, user is assigned with the memory space of 1G, as local cipher disk, but user has only used the number of 500M at present According to then the remaining spaces 500M, can store the encryption data for synchronizing storage from other storage devices.
Embodiment 4
This reality is discussed in detail so that executive agent is with the computer of store function as an example in the present embodiment combination concrete scene Apply the date storage method of example.
It should be noted that in the present embodiment, file is identical as the meaning of data.As shown in figure 4, the present embodiment provides one Kind date storage method, including:
41 computers divide encryption disc according to user's operation;
42 computers prepare that unencrypted file is written to local cipher disk;
43 computers determine the cryptographic Hash of the unencrypted file, and by the cryptographic Hash reporting file management server;
Whether 44 document management servers judge this document synchronized storage according to the cryptographic Hash;
If synchronized storage, executes 45;If synchronous storage not yet, executes 48;
45 ask the key of this document to the user for being stored with this document is synchronized;
46 judge whether the key for asking this document succeeds;
If it succeeds, executing 47;48 are executed if failure;
47 are identified using the key pair local unencrypted file;
The 48 random key values for generating this document.
49 utilize the secret key value, encryption disc of the synchronous storage to other storage devices after this document is encrypted
This gives the methods of the shared key between the file of identical cryptographic Hash.The present embodiment also gives to work as and ask When asking key is shared to fail, the method that a new key carrys out encryption data is in addition generated.The present embodiment is by cryptographic Hash to phase It is screened with file, and by same file shared key and encryption data, being deposited to be substantially reduced prepare more part file The potential same file of method for storing is repeated as many times the storage pressure that storage tape is come, to which the idle storage on internet both be utilized Resource, and data storage security can be enhanced.
Various embodiments of the present invention are described above, above description is exemplary, and non-exclusive, and It is not limited to disclosed each embodiment.Without departing from the scope and spirit of illustrated each embodiment, for this skill Many modifications and changes will be apparent from for the those of ordinary skill in art field.The selection of term used herein, purport In the principle, practical application or improvement to the technology in market for best explaining each embodiment, or make the art Other those of ordinary skill can understand each embodiment disclosed herein.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice disclosure disclosed herein Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques.

Claims (7)

1. a kind of date storage method, which is characterized in that be applied to data-storage system, the system comprises computers and service Device, the method includes:
The computer divides local cipher disk according to user setting, and the local cipher disk is independent data space;
By user, this stores to the data of local cipher disk and is encrypted, and obtains the first encryption data;
First encryption data is synchronized into storage to the encryption disc of other at least one storage devices, described other are at least one The encryption disc of storage device divides in advance;
The authentication information of the local cipher disk is issued into the server;
The server receives and stores the authentication information.
2. date storage method according to claim 1, which is characterized in that
The authentication information includes account, password and/or dynamic password;
Correspondingly, the storage authentication information includes:
It includes account, password and/or dynamic password that the server is stored described in a manner of preset.
3. date storage method according to claim 1, which is characterized in that described by user, this is stored to local cipher The data of disk are encrypted, and obtain the first encryption data and include the following steps:
It is random to generate secret key;
According to the secret key, by user, this stores to the data of local cipher disk and is encrypted, and obtains the first encryption number According to.
4. date storage method according to claim 1, which is characterized in that described to divide local cipher according to user setting It is further comprising the steps of after disk:
Receive the second encryption data, first encryption that second encryption data is synchronized from other storage device Data;
Second encryption data is stored to local cipher disk;
Delete local cipher disk storage second encryption data when, by second encryption data be transferred to other at least one The encryption disc of the encryption disc of a storage device, at least other storage device divides in advance.
5. date storage method according to claim 3, which is characterized in that described by user, this is stored to local cipher The data of disk are encrypted, further comprising the steps of before obtaining the first encryption data:
Stored to the data of local cipher disk according to this, generate corresponding cryptographic Hash, the cryptographic Hash unique mark this deposit It stores up to the data of local cipher disk;
It is generated when other any users being asked to be stored in data file identical with the cryptographic Hash in its local cipher disk close Key;
Receive the key;
Correspondingly, by user, this stores to the data of local cipher disk and is encrypted, and obtaining the first encryption data includes:
According to the key, to user, this stores to the data of local cipher disk and is encrypted.
6. date storage method according to claim 3, which is characterized in that further comprising the steps of:
The request that other storage device obtains the secret key is received, it is described to obtain the secret key request by described other The storage device data to be stored are sent when storing identical to the data of local cipher disk with described this;
According to the request for obtaining the secret key, the secret key is sent to other described storage device.
7. date storage method according to claim 3, which is characterized in that described synchronize the first encrypted data is deposited It is further comprising the steps of after the encryption disc for storing up other at least one storage devices:
After user identity is by verification, first encryption data is read from at least one processor according to the secret key.
CN201510729253.7A 2015-10-30 2015-10-30 Date storage method Active CN105302490B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510729253.7A CN105302490B (en) 2015-10-30 2015-10-30 Date storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510729253.7A CN105302490B (en) 2015-10-30 2015-10-30 Date storage method

Publications (2)

Publication Number Publication Date
CN105302490A CN105302490A (en) 2016-02-03
CN105302490B true CN105302490B (en) 2018-10-09

Family

ID=55199803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510729253.7A Active CN105302490B (en) 2015-10-30 2015-10-30 Date storage method

Country Status (1)

Country Link
CN (1) CN105302490B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110688057B (en) * 2018-07-05 2023-05-23 阿里巴巴集团控股有限公司 Distributed storage method and device
CN109064596B (en) * 2018-07-25 2021-07-13 云丁智能科技(北京)有限公司 Password management method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287298A (en) * 2008-05-29 2008-10-15 德信无线通讯科技(北京)有限公司 Authentication method and system for mobile communication terminal
CN103607409A (en) * 2013-11-29 2014-02-26 中国科学院深圳先进技术研究院 Method for protecting cloud storage data and cloud server
CN103731439A (en) * 2011-12-31 2014-04-16 华茂云天科技(北京)有限公司 Elastic storage service system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
US8751804B1 (en) * 2011-06-30 2014-06-10 Decho Corporation Controlling access to data within encrypted copies of files using salt parameters
CN104156377A (en) * 2013-05-13 2014-11-19 孙良茵 Virtual file system achieving reliability through multi-network-disk redundant storage

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101287298A (en) * 2008-05-29 2008-10-15 德信无线通讯科技(北京)有限公司 Authentication method and system for mobile communication terminal
US8751804B1 (en) * 2011-06-30 2014-06-10 Decho Corporation Controlling access to data within encrypted copies of files using salt parameters
CN103731439A (en) * 2011-12-31 2014-04-16 华茂云天科技(北京)有限公司 Elastic storage service system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN104156377A (en) * 2013-05-13 2014-11-19 孙良茵 Virtual file system achieving reliability through multi-network-disk redundant storage
CN103607409A (en) * 2013-11-29 2014-02-26 中国科学院深圳先进技术研究院 Method for protecting cloud storage data and cloud server

Also Published As

Publication number Publication date
CN105302490A (en) 2016-02-03

Similar Documents

Publication Publication Date Title
US11218312B2 (en) Secure file sharing method and system
AU2013101722A4 (en) Data security management system
US9825927B2 (en) Systems and methods for securing data using multi-factor or keyed dispersal
CN105183402B (en) Date storage method
US20150249687A1 (en) Systems and methods for securing data in the cloud
EP2990987B1 (en) Computer system and method for encrypted remote storage
US20130042105A1 (en) Systems and methods for securing data in motion
KR20130084604A (en) Method to control and limit readability of electronic documents
US9866591B1 (en) Enterprise messaging platform
EP2692107B1 (en) Managed authentication on a distributed network
CN109845183A (en) For from client device to the method for cloud storage system storing data block
CN105224262A (en) Data processing method
CN105302490B (en) Date storage method
CN105426783B (en) More Backup Data storage methods
JP5485452B1 (en) Key management system, key management method, user terminal, key generation management device, and program
CN205430310U (en) Data storage device
CN105407091A (en) Data processing method
CN105426767B (en) Date storage method
CN205080542U (en) Data storage device
CN105426768B (en) Ciphertext date storage method
CN205230060U (en) Data storage device
CN110010215A (en) A kind of health file management system
US11777727B1 (en) Distributed digital wallet seed phrase
CN105262834A (en) Data storage method
CN205265735U (en) Data storage device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170929

Address after: 610000 Building 8, B District, 6, Jing Rong International Plaza, 200 Tianfu five street, Chengdu hi tech Zone, Sichuan

Applicant after: Sichuan starry Star Technology Co., Ltd.

Address before: 210000 Qinhuai City, Nanjing Province, the main street in the morning of the day on the morning of the 1865 Creative Park E-8 building, room 388, building, Room 202

Applicant before: NANJING QINSHE MINGSHI INFORMATION TECHNOLOGY CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant