CN105426767A - Data storage method - Google Patents

Data storage method Download PDF

Info

Publication number
CN105426767A
CN105426767A CN201510731692.1A CN201510731692A CN105426767A CN 105426767 A CN105426767 A CN 105426767A CN 201510731692 A CN201510731692 A CN 201510731692A CN 105426767 A CN105426767 A CN 105426767A
Authority
CN
China
Prior art keywords
data
user
local cipher
stored
cipher dish
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510731692.1A
Other languages
Chinese (zh)
Other versions
CN105426767B (en
Inventor
陈建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan starry Star Technology Co., Ltd.
Original Assignee
Nanjing Qinshe Mingshi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Qinshe Mingshi Information Technology Co Ltd filed Critical Nanjing Qinshe Mingshi Information Technology Co Ltd
Priority to CN201510731692.1A priority Critical patent/CN105426767B/en
Publication of CN105426767A publication Critical patent/CN105426767A/en
Application granted granted Critical
Publication of CN105426767B publication Critical patent/CN105426767B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The present invention discloses a data storage method, which is applied to a data storage system. The system comprises a server and at least one computer. The method comprises: a first computer dividing a local encrypted disk according to use setting, wherein the local encrypted disk is an independent data storage space; encrypting data currently stored by a user into the local encrypted disk, so as to obtain first encrypted data; sending the first encrypted data to the server; synchronously storing the data into an encrypted disk of at least one other computer, wherein the encrypted disk of the at least one other computer is divided in advance; when the first computer receives an instruction of deleting data, the first computer querying the server for information of a computer that stores the data; and when the number of the computer that stores the data is smaller than a preset number, the first computer synchronously storing the data into the at least one other computer.

Description

Date storage method
Technical field
The present invention relates to computer realm, particularly relate to a kind of date storage method.
Background technology
Net dish can be regarded as and leaves hard disk on network or USB flash disk in, and therefore net dish is also called Network U plate or network hard disc, and for providing to user, online file stores, access, backup, the file management facilities such as to share.By net dish, no matter user anywhere, as long as can internet be connected to, just by the file of on-line storage in mobile terminal administration net dish.
Existing net disk storage mode has multiple, and such as, the file uploading method of the network hard disc that the application documents that application number is 201210362185.1 provide, stores file according to document; Again such as, the net dish file memory method that the application documents that application number is 201280000563.X provide, carries out file storage according to file name.
Net dish, as a kind of method of effective backup local file, is widely used, but net dish can increase an administrator role, creates new security risk.
After data are stored to net dish, user obtains the data of preserving by password; Without password then user can not obtain the data of storage, to a certain degree can ensure data security.But in the method for net disk storage data, net disk management person has leading subscriber and stores the authority of data, net disk management person the data that store of inquiring user even can delete and stores content or freeze the net number of checking accounts, and affects data storage security.
Summary of the invention
The present invention proposes a kind of date storage method, can strengthen the security of local datastore.
The embodiment of the present invention provides a kind of date storage method, be applied to data-storage system, described system comprises server and at least one computing machine, and described method comprises: the first computing machine arranges according to user and divides local cipher dish, and described local cipher dish is independently data space; The data that this is stored to local cipher dish by user are encrypted, and obtain the first enciphered data; Described first enciphered data is issued server; By the encryption disc of described data sync storage to other at least one computing machines, the encryption disc of other at least one computing machines described divides in advance; When described first computing machine receives the instruction of deleting data, described first computing machine stores the information of the computing machine of described data to server lookup; When the quantity of computing machine storing described data is less than default quantity, described first computing machine by described data sync storage to other at least one computing machines.
The date storage method that the present invention proposes, arrange according to user and divide local cipher dish, the data that this is stored to local cipher dish by user are encrypted, obtain enciphered data, by the encryption disc of enciphered data stores synchronized to other at least one memory devices, thus the data encryption being stored in local cipher dish is stored in other memory devices, thus strengthen the security of local datastore.In addition, when deleting data, the quantity once the computing machine storing described data is less than default quantity, controls described data and backups to other computing machines, to ensure data security.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows embodiment according to the invention, and is used from instructions one and explains principle of the present invention.
Fig. 1 is a kind of process flow diagram of date storage method embodiment of the present invention;
Fig. 2 is a kind of Computer Systems Organization schematic diagram of date storage method embodiment of the present invention;
Fig. 3 is that the encryption disc storage space of date storage method embodiment of the present invention uses schematic diagram;
Fig. 4 is another process flow diagram of date storage method embodiment of the present invention;
Wherein,
S1 core memory equipment
S2 storage server
S3 computing machine
S4 mobile device.
Embodiment
The embodiment of the present invention provides a kind of date storage method, is applied to data-storage system, and described system comprises server and at least one computing machine, and described method comprises:
Step 101, the first computing machine arrange according to user and divide local cipher dish, and described local cipher dish is independently data space;
Step 102, the data that this is stored to local cipher dish by user are encrypted, and obtain the first enciphered data;
Step 103, described first enciphered data is issued server;
Step 104, by the encryption disc of described data sync storage to other at least one computing machines, the encryption disc of other at least one computing machines described divides in advance;
Step 105, when described first computing machine receive delete the instruction of data time, described first computing machine stores the information of the computing machine of described data to server lookup;
Step 106, when the quantity of computing machine storing described data is less than default quantity, described first computing machine by described data sync storage to other at least one computing machines.
Arrange according to user in the present embodiment and divide local cipher dish, the data that this is stored to local cipher dish by user are encrypted, obtain enciphered data, by the encryption disc of enciphered data stores synchronized to other at least one memory devices, thus the data encryption being stored in local cipher dish is stored in other memory devices, thus strengthen the security of local datastore.And in the present embodiment when deleting data, the quantity once the computing machine storing described data is less than default quantity, controls described data and backups to other computing machines, to ensure data security.
For making the object of the present embodiment, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the present embodiment, the technical scheme in the present embodiment is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Storer in the present embodiment can be the equipment with data storage function, concrete, and this equipment with data storage function can be the equipment comprising storage chip, storage hard disk, and such as computing machine etc., the present embodiment does not limit.
Embodiment 1
The date storage method of the present embodiment, by the equipment with memory function, as computing machine realizes.The present embodiment realizes this date storage method for computing machine and is described, but the date storage method of the present embodiment is not limited to computing machine.
As shown in Figure 1, this date storage method comprises:
Step 11: arrange according to user and divide local cipher dish, local cipher dish is independently data space.
In the present embodiment, be arranged on according to user in the memory storage of computing machine and mark off part storage space as local cipher dish, for depositing local enciphered data.
For the encryption disc realized on computing machine initiatively can ensure the safety storing content, can arrange the access code of encryption disc, also can adopt secure logon facility simultaneously in the present embodiment, user needs login could access local cipher dish.
Such as, when user accesses local cipher dish, limit the errors number that user inputs password.After number of times exceeds, refuse again to access within a period of time, such as, after several hours or after one day, just again can attempt access.
During networking, send note, reminding user Password Input mistake can to reserved phone number.
During off-line, then lock inaccessible within this encryption disc current and a period of time.
In order to avoid cannot open the content of local cipher dish when there is no network, local account encrypted code can be allowed to verify.If continous cipher authentication failed reaches set point number, then require that user networks checking.
After user's networking, the checking frequency of user can be controlled at server end, avoid the situation of Brute Force user name password to occur, thus guarantee data security.
Step 12: the data that this is stored to local cipher dish by user are encrypted, obtains the first enciphered data.
Can adopt multiple cipher mode in the present embodiment, the present embodiment does not limit concrete cipher mode.
User this be stored to the data of local cipher dish, after encryption, obtain the first enciphered data.Data encryption initiatively can strengthen security when data are propagated on the internet.
Step 13: by the encryption disc of the first enciphered data stores synchronized to other at least one memory devices, the encryption disc of at least one memory device divides in advance.
Should be appreciated that the present available capacity of the encryption disc that arbitrary memory device divides in advance be greater than encryption after the memory capacity required for data.
In the present embodiment, whether the present available capacity can prejudging memory device encryption disc is greater than the memory capacity required for data after encryption, when confirming that the present available capacity of memory device encryption disc is enough, then starts to carry out stores synchronized to this memory device.
Like this, in time writing a enciphered data to encryption disc, this enciphered data at least one memory device on internet is carried out stores synchronized.
In the present embodiment, can pre-set the memory device quantity required for stores synchronized first enciphered data according to different scenes, the memory device of usual stores synchronized first enciphered data more than 2, preferably, should be at least 10.Like this, ensure that user can obtain the first enciphered data in time by the backup quantity of data increasing redundancy, ensure the security that the first enciphered data stores to prevent loss of data.
In the present embodiment, automatically can detect and preserve current crypto data and active memory device quantity, when current quantity is less than predetermined number, be dominated by server, enciphered data in the storage space backup of trend any active ues.
In the present embodiment, when the first enciphered data stores synchronized is to other at least one memory devices, P2P technology is adopted to carry out data transmission.System server can be arranged in the present embodiment assist and set up P2P link.First neighbouring memory device active in current ink detected, and attempt carrying out P2P connection.If link establishment failure, then the data storage device reselecting another one active sets up P2P link.
In order to avoid current available synchronous memory device very little, the present embodiment also can provide the common storage device of sufficient amount, and e.g., at least 10, P2P link during to guarantee any instant between local memory device and public server can successfully be set up.
In the present embodiment, the data that in step 12, this is stored to local cipher dish by user are encrypted, when obtaining the first enciphered data, and can the secret key of stochastic generation, be encrypted by these secret key data that this is stored to local cipher dish by user, obtain the first enciphered data.
In the present embodiment, when being encrypted these data being stored to local cipher dish, computing machine can stochastic generation secret key, this key is uniquely determined by these data, can only can decipher this enciphered data by this secret key, obtain this data, thus improve data storage safety.
Preferably, this secret key can be kept at local side and server end.
In the present embodiment, step 13 by encryption after data sync storage to other at least one memory devices encryption disc after, be also included in user identity by verify after, read the first enciphered data according to secret key from least one storer.
In the present embodiment, this first enciphered data has stored and stores synchronized in other at least one memory devices in local cipher dish.After identifying user identity, by the key uniquely mapped with this first enciphered data, open this first enciphered data be kept in certain current addressable memory device encryption disc.
Can adopt various ways identifying user identity, such as account number cipher mode, dynamic password mode etc., the present embodiment does not limit.
In the present embodiment, a user can be provided with encryption disc on multiple stage memory device; Different user can be provided with respective encryption disc on same equipment.In the present embodiment, can arrange cipher server and preserve the whole user profile using this date storage method, this user profile can comprise user name, password and other authorization informations etc.First be encrypted each user profile, preferably, obtaining can the encrypting user information character string of this user of unique identification.Again this encrypting user information character string is uploaded to cipher server subsequently.Therefore, at cipher server end, user profile is not stored in clear, and user profile is transparent for cipher server.The information such as the password of user only have user, use the information such as the username and password of oneself, could to this decrypts information, and this deciphering is only limitted to verify for user login information.Therefore, both ensure that cipher server end cannot the personal information of inquiring user, and avoided again plaintext user information accidentally to be leaked, thus strengthened the privacy that data store.
In the present embodiment, the listed files that the whole users using this date storage method preserved by file server can be set.When user modifies to the data of its encryption disc on its arbitrary memory device being preset with local cipher dish, this listed files of synchronized update, then other memory device being preset with local cipher dish can obtain synchronous automatically when its next time logs in afterwards and connects internet.When user logs in the account of oneself on arbitrary memory device being preset with local cipher dish, can select automatically to fetch from internet belong to himself data to his new encryption disc.
In the present embodiment, after division local cipher dish being set according to user in step 11, further comprising the steps of:
Receive the second enciphered data, this second enciphered data is from the first synchronous enciphered data of other memory device;
This second enciphered data is stored to local cipher dish;
When deleting the second enciphered data of local cipher disk storage, by this second enciphered data unloading to the encryption disc of other at least one memory devices, the encryption disc of these other memory devices divides in advance.
Dynamic itemset counting is carried out in the present embodiment active backup current to each data file encryption, and the active backup counting current according to each data file encryption determines whether continue to carry out stores synchronized to other available memory devices.
In the present embodiment, when deleting the second enciphered data of local cipher disk storage, by the second enciphered data unloading to the encryption disc of other at least one memory devices.Therefore, if the enciphered data that one of them memory device stores is deleted or is lost, by by the memory device unloading of enciphered data to other, thus enciphered data will be caused to lose because the memory device of storage encryption data disappears, thus raising data storage security.
It should be noted that, in the present embodiment, when local cipher dish delete its store data time, simultaneously or Preset Time, such as, data corresponding in all synchronous memory device after 24 hours, can be deleted.Thus prevent user misoperation from accidentally deleting data, so that date restoring.
In the present embodiment, step 12 data that this is stored to local cipher dish by user are encrypted, and before obtaining the first enciphered data, also comprise the steps:
Be stored to the data of local cipher dish according to this, generate corresponding cryptographic hash, this cryptographic hash unique identification this be stored to the data of local cipher dish;
Ask other arbitrary users in its local cipher dish stored in the key generated during the data file identical with this cryptographic hash;
Receive this key;
Accordingly, the data that this is stored to local cipher dish by user are encrypted, and obtain the first enciphered data and comprise:
According to this key, the data that this is stored to local cipher dish to user are encrypted.
In the present embodiment, when encryption disc end Initiative Inventory Management data, according to user, this is stored to the file content of the data of local cipher dish, filename takes its cryptographic hash.Cryptographic hash can be used as the unique identification information of file, just can judge that whether both be the file of same flesh and blood according to the cryptographic hash of two files.
In the present embodiment, the cryptographic hash that this is stored to the data of local cipher dish by user reports document management server; Whether exist in the listed files that inquiry cryptographic hash is safeguarded at document management server; If this cryptographic hash exists, then ask other arbitrary users in its local cipher dish stored in the key generated during the data file identical with this cryptographic hash; This is stored to the key of the data of local cipher dish to receive user; According to the key received, the data that this is stored to local cipher dish to user are encrypted, and no longer active synchronization stores these data to other memory devices.
If user fails and to get in touch with other users, then automatically generate a new secret key, this file is encrypted in this locality, and active synchronization stores these data to other memory devices of more than at least 2.
In the present embodiment, after generating key, also comprise:
Receive the request that this secret key got by other memory device, get this secret key request by other memory device for the data and this that store this be stored to the data of local cipher dish identical time transmission;
According to the request obtaining this secret key, send this secret key to these other memory device.
File for same flesh and blood is had this situation by multiple different network user, by cryptographic hash, the present embodiment judges that whether certain two file is the file of same flesh and blood.For the file that essence is identical, the present embodiment no longer in this locality for this file generated random key, but by ask the key of this file to other users having this file.After receiving and getting the request of the secret key of this file from other memory device, send this secret key to these other memory device.
It should be noted that, in the present embodiment, " first ", " second " are only thought for convenience of description and division are not formed the restriction to our embodiment.
The date storage method of the present embodiment, arrange according to user and divide local cipher dish, the data that this is stored to local cipher dish by user are encrypted, obtain enciphered data, by the encryption disc of enciphered data stores synchronized to other at least one memory devices, thus the data encryption being stored in local cipher dish is stored in other memory devices, thus strengthen the security of local datastore.
Embodiment 2
As shown in Figure 2, the present embodiment proposes a kind of computer system, and the date storage method that the present embodiment proposes can be applicable to this computer system.
This computer system comprises by 4 interconnected kind equipments of internet, is respectively core memory equipment S1, storage server S2, computing machine S3, mobile device S4.Wherein, core memory equipment S1 is used for the index information etc. of storing subscriber information, user file, also can assist simultaneously and set up P2P link.Arrange multiple Core server S1 within the system, can provide more powerful dispatching on the one hand, the opposing party is also in order to load balancing and disaster recovery.
When storage server S2 is then in order to avoid user's stores synchronized data, current ink does not have other any active ues of sufficient amount set up with it P2P to connect and this situation of synchrodata and reserved to arrange, its effect and functional equivalent be in domestic consumer's account.
Computing machine S3, mobile device S4 are this spendable terminal devices of computer system domestic consumer.
In the local cipher dish of computing machine S3, both store local data, also store the Backup Data from other users in this network link.The Backup Data of these other users is transparent to local user.Local user's account can inquire about the available memory capacity size of current reality in local cipher dish, but can not access the Backup Data belonging to other users.
Mobile device S4 does not pre-set encryption disc.The application program of user by mobile device S4 installs, visit data and management data, and the data of back-up storage on network are downloaded to mobile terminal S4, but do not bear and mobile terminal data are backuped to network and backs up the task of other user data.
Be to be understood that Fig. 2 is only Application Scenarios-Example, do not form the restriction to the present embodiment.
Embodiment 3
In the present embodiment date storage method, the actual service condition of arbitrary local cipher disk capacity as shown in Figure 3.The storage space that local user divides is defined as local cipher dish.In this local cipher dish, refer to that user cannot write the space of data again with space, local user's free space refers to that local user is at the max cap. writing data in encryption disc.Use in space, namely comprised the enciphered data of local user, also comprised the enciphered data of other user's stores synchronized of network.The enciphered data of other users of stores synchronized is that backstage is run automatically, can be transparent, also can arrange the prompting to local user to local user.
Therefore, local cipher dish had both stored local cipher data, also stored the Backup Data from other users in this network link.Preferably, the Backup Data of these other users is transparent to local user, and local user's account can inquire about the available memory capacity size of current reality in local cipher dish, but can not access the stores synchronized data belonging to other users.
Such as, user is assigned with the storage space of 1G, and as local cipher dish, but user only employs the data of 500M at present, and so remaining 500M space, can store the enciphered data from other memory device stores synchronized.
Embodiment 4
The present embodiment, in conjunction with concrete scene, is the date storage method that the present embodiment introduced in detail by the computing machine with memory function for executive agent.
It should be noted that, in the present embodiment, file is identical with the implication of data.As shown in Figure 4, the present embodiment provides a kind of date storage method, comprising:
41 computing machines divide encryption disc according to user operation;
42 computing machines prepare to local cipher dish write unencryption file;
The cryptographic hash of this unencryption file determined by 43 computing machines, and by this cryptographic hash reporting file management server;
Whether 44 document management servers judge this file stores synchronized according to this cryptographic hash; If stores synchronized, then perform 45; If also there is no stores synchronized, then perform 48;
45 have the user of this file to ask the key of this file to stores synchronized;
46 judge that whether the key of this file of request is successful;
If success, then perform 47; If failure, performs 48;
47 use the local unencryption file of this double secret key to identify;
The key value of 48 these files of stochastic generation.
49 utilize this secret key value, by stores synchronized after this file encryption to the encryption disc of other memory devices
This gives the method for shared key between the file of identical cryptographic hash.The present embodiment give also when asking Authentication theory failure, and the key that generation one is new in addition carrys out the method for enciphered data.The present embodiment is screened same file by cryptographic hash, and pass through same file shared key and enciphered data, thus the same file significantly reducing this many backup files storage means potential repeatedly stores the storage pressure brought, thus the idle storage resources that both make use of on internet, can data storage security be strengthened again.
Be described above various embodiments of the present invention, above-mentioned explanation is exemplary, and non-exclusive, and be also not limited to disclosed each embodiment.When not departing from the scope and spirit of illustrated each embodiment, many modifications and changes are all apparent for those skilled in the art.The selection of term used herein, is intended to explain best the principle of each embodiment, practical application or the improvement to the technology in market, or makes other those of ordinary skill of the art can understand each embodiment disclosed herein.
Those skilled in the art, at consideration instructions and after putting into practice disclosed herein disclosing, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.

Claims (6)

1. a date storage method, is characterized in that, is applied to data-storage system, and described system comprises server and at least one computing machine, and described method comprises:
First computing machine arranges according to user and divides local cipher dish, and described local cipher dish is independently data space;
The data that this is stored to local cipher dish by user are encrypted, and obtain the first enciphered data;
Described first enciphered data is issued server;
By the encryption disc of described data sync storage to other at least one computing machines, the encryption disc of other at least one computing machines described divides in advance;
When described first computing machine receives the instruction of deleting data, described first computing machine stores the information of the computing machine of described data to server lookup;
When the quantity of computing machine storing described data is less than default quantity, described first computing machine by described data sync storage to other at least one computing machines.
2. date storage method according to claim 1, is characterized in that, the described data that this is stored to local cipher dish by user are encrypted, and obtains the first enciphered data and comprises following steps:
The secret key of stochastic generation;
Be encrypted according to the described secret key data that this is stored to local cipher dish by user, obtain described first enciphered data.
3. date storage method according to claim 1, is characterized in that, described arrange divide local cipher dish according to user after, further comprising the steps of:
Receive the second enciphered data, the second described enciphered data is from synchronous described first enciphered data of other memory device;
Second enciphered data is stored to local cipher dish;
When deleting described second enciphered data of local cipher disk storage, by described second enciphered data unloading to the encryption disc of other at least one memory devices, the encryption disc of described at least other memory device divides in advance.
4. date storage method according to claim 3, is characterized in that, the described data that this is stored to local cipher dish by user are encrypted, before obtaining the first enciphered data, further comprising the steps of:
Be stored to the data of local cipher dish according to this, generate corresponding cryptographic hash, described cryptographic hash unique identification this be stored to the data of local cipher dish;
Ask other arbitrary users in its local cipher dish stored in the key generated during the data file identical with described cryptographic hash;
Receive described key;
Accordingly, the data that this is stored to local cipher dish by user are encrypted, and obtain the first enciphered data and comprise:
According to described key, the data that this is stored to local cipher dish to user are encrypted.
5. date storage method according to claim 3, is characterized in that, further comprising the steps of:
Receive the request that described secret key got by other memory device, described in get described secret key request by other memory device described for the data that store and described this be stored to the data of local cipher dish identical time send;
According to the request of the described secret key of described acquisition, send described secret key to other memory device described.
6. date storage method according to claim 3, is characterized in that, described by encryption after data sync storage to other at least one memory devices encryption disc after, further comprising the steps of:
User identity, by after checking, reads described first enciphered data according to described secret key from least one storer described.
CN201510731692.1A 2015-10-30 2015-10-30 Date storage method Active CN105426767B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510731692.1A CN105426767B (en) 2015-10-30 2015-10-30 Date storage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510731692.1A CN105426767B (en) 2015-10-30 2015-10-30 Date storage method

Publications (2)

Publication Number Publication Date
CN105426767A true CN105426767A (en) 2016-03-23
CN105426767B CN105426767B (en) 2019-04-05

Family

ID=55504970

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510731692.1A Active CN105426767B (en) 2015-10-30 2015-10-30 Date storage method

Country Status (1)

Country Link
CN (1) CN105426767B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090300210A1 (en) * 2008-05-28 2009-12-03 James Michael Ferris Methods and systems for load balancing in cloud-based networks
CN101883103A (en) * 2009-04-15 2010-11-10 埃森哲环球服务有限公司 The method and system of the client-side extensions of Web server gang fight structure in the cloud data center
CN103731439A (en) * 2011-12-31 2014-04-16 华茂云天科技(北京)有限公司 Elastic storage service system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN104156377A (en) * 2013-05-13 2014-11-19 孙良茵 Virtual file system achieving reliability through multi-network-disk redundant storage
CN104331346A (en) * 2014-11-21 2015-02-04 四川神琥科技有限公司 Data protection method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090300210A1 (en) * 2008-05-28 2009-12-03 James Michael Ferris Methods and systems for load balancing in cloud-based networks
CN101883103A (en) * 2009-04-15 2010-11-10 埃森哲环球服务有限公司 The method and system of the client-side extensions of Web server gang fight structure in the cloud data center
CN103731439A (en) * 2011-12-31 2014-04-16 华茂云天科技(北京)有限公司 Elastic storage service system
CN103812927A (en) * 2012-11-14 2014-05-21 书生云服务公司 Storage method
CN104156377A (en) * 2013-05-13 2014-11-19 孙良茵 Virtual file system achieving reliability through multi-network-disk redundant storage
CN104331346A (en) * 2014-11-21 2015-02-04 四川神琥科技有限公司 Data protection method

Also Published As

Publication number Publication date
CN105426767B (en) 2019-04-05

Similar Documents

Publication Publication Date Title
US11586757B2 (en) Systems and methods for a cryptographic file system layer
AU2013101722A4 (en) Data security management system
JP6878609B2 (en) Data backup methods and data backup devices, storage media and servers
US10685141B2 (en) Method for storing data blocks from client devices to a cloud storage system
CN105183402A (en) Data storage method
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN105224262A (en) Data processing method
CN103763355A (en) Cloud data uploading and access control method
CN105426775A (en) Method and system for protecting information security of smartphone
CN100449501C (en) Computer network datarecovering method
CN105302490A (en) Data storage method
CN105426783A (en) Multi-backup data storage method
CN105407091A (en) Data processing method
CN205080542U (en) Data storage device
CN205430310U (en) Data storage device
CN205230060U (en) Data storage device
CN105187379A (en) Multi-party distrust-based password split managing method
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device
CN105426767A (en) Data storage method
CN105262834A (en) Data storage method
CN105357193A (en) Anti-blasting data storage method
CN205265735U (en) Data storage device
CN105426768A (en) Non-plaintext data storage method
CN101470643B (en) Fixed hardware security unit backup and recovery method and system
CN115037452B (en) Data protection method, system and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170930

Address after: 610000 Building 8, B District, 6, Jing Rong International Plaza, 200 Tianfu five street, Chengdu hi tech Zone, Sichuan

Applicant after: Sichuan starry Star Technology Co., Ltd.

Address before: 210000 Qinhuai City, Nanjing Province, the main street in the morning of the day on the morning of the 1865 Creative Park E-8 building, room 388, building, Room 202

Applicant before: NANJING QINSHE MINGSHI INFORMATION TECHNOLOGY CO., LTD.

GR01 Patent grant
GR01 Patent grant