CN105554058A - Household private storage data remote backup method - Google Patents
Household private storage data remote backup method Download PDFInfo
- Publication number
- CN105554058A CN105554058A CN201510804928.XA CN201510804928A CN105554058A CN 105554058 A CN105554058 A CN 105554058A CN 201510804928 A CN201510804928 A CN 201510804928A CN 105554058 A CN105554058 A CN 105554058A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- backup
- data
- server
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a household private storage data remote backup method. The method comprises the steps that a first intelligent equipment user and a second intelligent equipment user require to log in an account management server simultaneously so that a friendly relation is established; when the first intelligent equipment user uploads or adjusts files of storage equipment, first intelligent equipment establishes a P2P data link with second intelligent equipment through a P2P through server (NTS), backup request interaction is transmitted if establishment is successful, and transmitting of backup data is started after interaction is successful; and the second intelligent equipment establishes a P2P data link with the first intelligent equipment through the P2P through server (NTS), a data synchronization request is transmitted if establishment is successful, and transmitting of the backup data is started after interaction is successful. Compared with the methods in the prior art, the method of remote backup of private data is realized so that cost of the storage equipment of local backup can be saved and possibility of mutual backup of remote equipment can be realized.
Description
Technical field
The present invention relates to the method for the privately owned storage remote data backup of family expenses privately owned cloud field of storage, particularly a kind of family.
Background technology
Along with the progress of science and technology and the demand of user, it is more and more important that the importance of private data highlights.The photo of such as kinsfolk and video, some special file etc.People get used to using CD or the backup of third party's access device a long time ago, in case cannot recover after loss of data, cause imponderable loss.And along with cloud store rise, the storage capacity of Cloud Server is more and more stronger, but there is very large possibility of defalcating in the data storage of publicly-owned cloud, so in order to the fail safe of data, people may select safer privately owned cloud to store the data of oneself, and then privately owned server exists in family after all, does not have the backup functionality of server, if realize local backup, a lot of cost costs may be caused.So this motion proposes a kind of way realizing family's private data remote backup.
Summary of the invention
For solving the problem, this motion proposes the method for the privately owned storage remote data backup of a kind of family, and object solves this motion will solve following problem: 1. the remote backup realizing the privately owned storage data of family; If 2. realize the fail safe of backup; 3. how to realize the reliability backed up; 4. how to realize the rapidity backed up; 5. be applicable to realizing the ageing of backup, the technical scheme with above-mentioned technical characteristic and advantage is realized by the method for the privately owned storage remote data backup of a kind of family, comprising:
S1, the first smart machine user and the second smart machine user need to log on account management server simultaneously, set up friend relation;
Time S2, the first smart machine user upload or adjust the file of memory device, first smart machine then sets up P2P data link by P2P pass through server (NTS) and the second smart machine, if be successfully established, then send backup request mutual, start after interaction success to send Backup Data;
S3, the second smart machine then set up P2P data link by P2P pass through server (NTS) and the first smart machine, if be successfully established, then send data synchronization request, after interaction success, then start to send Backup Data.
In the present invention, stochastic generation time described first smart machine user applies for setting up backup request also preserves the first random cipher, the second smart machine user is sent to by account management server (UTS), after second smart machine user accepts request, generate the second random cipher simultaneously and preserve and send to the first smart machine user.
When first smart machine sets up backup request by account management server (UTS) to the second smart machine transmission application, the second received random cipher is carried out verifying whether same password by the second smart machine, simultaneously, the first random cipher that second smart machine is preserved is verified by the first smart machine, be verified as same password, then the first smart machine and the second smart machine successfully set up backup relation.
First smart machine then sets up P2P data link by P2P pass through server (NTS) and the second smart machine, if set up the failure of P2P pass through server, then set up transfer link by transfer server (MTS) and the second smart machine and carry out data backup requests alternately, then start after interaction success to send Backup Data.
First smart machine and the second smart machine set up transfer link by transfer server (MTS), and to carry out data safety backup request mutual, connect at every turn and all need to input password password respectively, described password password is the first random cipher and the second random cipher respectively.
Second smart machine then sets up P2P data link by P2P pass through server (NTS) and the first smart machine, if set up the failure of P2P pass through server, then set up transfer link by MTS and the second smart machine, carry out data synchronization request mutual, the first smart machine starts data backup flow process.
Technical scheme of the present invention compared with prior art, realizes the way of the private data of remote backup oneself, saves the cost of the memory device of local one's duty, achieves the possibility that remote equipment backs up mutually.
Accompanying drawing explanation
Fig. 1 is the FB(flow block) schematic diagram of the method for the privately owned storage remote data backup of a kind of family of the present invention.
Fig. 2 is that the equipment room of Fig. 1 sets up backup relation flowage structure block diagram.
Fig. 3 is that the foundation backup of Fig. 1 connects flowage structure block diagram.
Fig. 4 is the data syn-chronization flowage structure block diagram of Fig. 1.
Fig. 5 is the data backup flowage structure block diagram of Fig. 1.
Fig. 6 be the privately owned storage remote data backup of a kind of family of the present invention method involved by system frame structure schematic diagram.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are described in detail, but the multitude of different ways that the present invention can be defined by the claims and cover is implemented.
Shown in composition graphs 1-6, for two equipment, please refer to Fig. 6, Fig. 6 is the system architecture involved by method of the present invention:
First smart machine: comprise the first smart machine user;
Second smart machine: comprise the second smart machine user;
Transfer server (MTS) is set up between the first smart machine and the second smart machine;
P2P pass through server (NTS) is set up between the first smart machine and the second smart machine;
Be connected with account management server (UTS) between the first and second smart machines.
As shown in Figure 1, Fig. 1 is the flowage structure block diagram of method of the present invention:
S1, the first smart machine user and the second smart machine user need to log on account management server simultaneously, set up friend relation;
Time S2, the first smart machine user upload or adjust the file of memory device, first smart machine then sets up P2P data link by P2P pass through server (NTS) and the second smart machine, if be successfully established, then send backup request mutual, start after interaction success to send Backup Data;
S3, the second smart machine then set up P2P data link by P2P pass through server (NTS) and the first smart machine, if be successfully established, then send data synchronization request, after interaction success, then start to send Backup Data.
In S1, first the first smart machine and the second smart machine will carry out identification, and set up backup relation flow process, specifically:
First smart machine user and the second smart machine user need to log on account management server simultaneously, and two users must be the user bounds of two different intelligent storage equipments, and set up friend relation.
And backup relation request must be set up by wanting to set up the initiation of backup end, assisting two users to set up the backup relation of the smart machine that two users bind by account management server.Now two smart machines stored must be simultaneously online.Stochastic generation password time first smart machine user applies for setting up backup request, the second smart machine user is sent to by account management server (UTS server), after second smart machine user accepts request, generate a random cipher simultaneously and send to the first smart machine user, the first smart machine that first smart machine user tells oneself to bind in these two passwords, second smart machine user is equally the second smart machine that these two passwords tell oneself to bind, first smart machine sends application by UTS to the second smart machine and sets up backup request, and carry the random cipher that the second smart machine user generates, second smart machine judges whether it is same password, if, to the first smart machine first smart machine, the random cipher sending the first smart machine user generation judges whether this password is the random cipher that the first smart machine user generates, if, then be successfully established.
After completing the first cloth, in S2, the first smart machine and the second smart machine carry out data backup, and idiographic flow shows:
Time first smart machine user uploads or adjusts the file of memory device, first smart machine then sets up P2P data link by NTS and the second smart machine, if be successfully established, then send backup request mutual, after interaction success, then start to send Backup Data, if set up P2P failure, then set up transfer link by MTS and the second smart machine, carry out data backup requests alternately, then start after interaction success to send Backup Data.In order to data security, connect at every turn and all need password password mutual, these two passwords are random cipher when setting up backup relation.
In S3, after completing above-mentioned steps, between two smart machines, need data syn-chronization flow process, make backup can continue to carry out, specifically:
When reaching the data syn-chronization time of user's setting, second smart machine then sets up P2P data link by NTS and the first smart machine, if be successfully established, then send data synchronization request, after interaction success, then start to send Backup Data, if set up P2P failure, then set up transfer link by MTS and the second smart machine, carry out data synchronization request alternately, the first smart machine starts data backup flow process.
As a specific embodiment of the present invention, composition graphs 1-Fig. 6 illustrates, such as user A has a privately owned memory device 1, user B also has a privately owned memory device 2, user A wishes that the privately owned memory device of user B can as the remote backup equipment 2 of oneself, it is account A that user A have registered an account, and the account has bound the privately owned memory device 1 of oneself, it is account B that user B have registered an account, and bind the privately owned memory device 2 of oneself, user A applies to become the good friend of user B, and obtain the agreement of user B, establish friend relation, user A wants to apply for the alternate device of the privately owned memory device 1 of user B as oneself now, so:
User A, by corresponding application program of mobile phone, initiates to set up backup relation request to user B, and carries random 128 secret key Key1, send to the mobile phone of user B to apply by UTS.After user B receives this request, can select to agree to or refusal.If user B agrees to, then stochastic generation 128 secret key Key2.The application program of mobile phone returning to user A is sent by UTS.
The application program of mobile phone of user B issues memory device 2 Key1 and Key2 simultaneously, and memory device 2 waits for that depositing equipment 1 applies for backup request.
The application program of mobile phone of user A can issue memory device 1 Key1 and Key2 simultaneously, and memory device 1 sends application backup request to by UTS memory device 2, and carries Key2.
Memory device 2 judges whether this Key2 is the Key that user B generates, and if so, is then proved to be successful, returns Key1 to memory device 1 by UTS.
Memory device 1 judges whether Key1 is the Key that user A generates, and being if it is successfully established, if not then thinking illegal equipment, setting up unsuccessfully.
After user A and user B sets up backup relation, implementation data can back up flow process, time user A revises the file content on memory device 1, be specially at every turn:
Whether memory device 2 inquired about by memory device 1 online, if not online, then one as a child checked again.
If memory device 2 is online, then attempts setting up P2P by NTS and connect, if set up P2P connection failure, enter next step action.
Set up P2P link failure, then start to transfer the registration of Party membership, etc. from one unit to another in foundation by MTS, all data forward through transfer server MTS.
Carry out files passe according to the file operation daily record that memory device 1 is preserved, delete, rename, the data backups such as adjustment position.
If backup failure appears in midway, then carry out link and reconnect, if reconnect three times all unsuccessfully, then record the daily record of current backup, wait for backup next time.
Finally, user A and user B carries out data syn-chronization flow process, and such as user A sets one day and carries out data syn-chronization.
Whether online memory device 2 when lock in time last time and present time were more than 24 hours, then can be inquired about memory device 1, if online, then as a child again inquire about for one.
If memory device 1 is online, then attempts setting up P2P by NTS and connect, if set up P2P connection failure, enter the 3rd step, successfully turn the 4th step.
Set up P2P link failure, then start to transfer the registration of Party membership, etc. from one unit to another in foundation by MTS, all data forward through transfer server MTS.
Trigger the stand-by program of memory device 1, start data backup flow process.
These are only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (6)
1. a method for the privately owned storage remote data backup of family, it is characterized in that, method comprises:
S1, the first smart machine user and the second smart machine user need to log on account management server simultaneously, set up friend relation;
Time S2, the first smart machine user upload or adjust the file of memory device, first smart machine then sets up P2P data link by P2P pass through server (NTS) and the second smart machine, if be successfully established, then send backup request mutual, start after interaction success to send Backup Data;
S3, the second smart machine then set up P2P data link by P2P pass through server (NTS) and the first smart machine, if be successfully established, then send data synchronization request, after interaction success, then start to send Backup Data.
2. the method for the privately owned storage remote data backup of a kind of family according to claim 1, it is characterized in that, stochastic generation time described first smart machine user applies for setting up backup request also preserves the first random cipher, the second smart machine user is sent to by account management server (UTS), after second smart machine user accepts request, generate the second random cipher simultaneously and preserve and send to the first smart machine user.
3. the method for the privately owned storage remote data backup of a kind of family according to claim 2, it is characterized in that, when first smart machine sets up backup request by account management server (UTS) to the second smart machine transmission application, the second received random cipher is carried out verifying whether same password by the second smart machine, simultaneously, the first random cipher that second smart machine is preserved is verified by the first smart machine, be verified as same password, then the first smart machine and the second smart machine successfully set up backup relation.
4. the method for the privately owned storage remote data backup of a kind of family according to claim 1, it is characterized in that, first smart machine then sets up P2P data link by P2P pass through server (NTS) and the second smart machine, if set up the failure of P2P pass through server, then set up transfer link by transfer server (MTS) and the second smart machine and carry out data backup requests alternately, then start after interaction success to send Backup Data.
5. the method for the privately owned storage remote data backup of a kind of family according to claim 4, it is characterized in that, first smart machine and the second smart machine set up transfer link by transfer server (MTS), and to carry out data safety backup request mutual, connect at every turn and all need to input password password respectively, described password password is the first random cipher and the second random cipher respectively.
6. the method for the privately owned storage remote data backup of a kind of family according to claim 1, it is characterized in that, second smart machine then sets up P2P data link by P2P pass through server (NTS) and the first smart machine, if set up the failure of P2P pass through server, then set up transfer link by MTS and the second smart machine, carry out data synchronization request mutual, the first smart machine starts data backup flow process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510804928.XA CN105554058A (en) | 2015-11-20 | 2015-11-20 | Household private storage data remote backup method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510804928.XA CN105554058A (en) | 2015-11-20 | 2015-11-20 | Household private storage data remote backup method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105554058A true CN105554058A (en) | 2016-05-04 |
Family
ID=55832990
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510804928.XA Pending CN105554058A (en) | 2015-11-20 | 2015-11-20 | Household private storage data remote backup method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105554058A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106371944A (en) * | 2016-06-30 | 2017-02-01 | 深圳市美贝壳科技有限公司 | Method for retrieving data after intelligent storage device is lost |
CN110430244A (en) * | 2019-07-16 | 2019-11-08 | 浙江大华技术股份有限公司 | Link establishment method, apparatus, filming apparatus and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902498A (en) * | 2010-07-02 | 2010-12-01 | 广州鼎甲计算机科技有限公司 | Network technology based storage cloud backup method |
CN102045385A (en) * | 2010-10-21 | 2011-05-04 | 李斌 | System and equipment for realizing personal cloud computing |
US20130067550A1 (en) * | 2011-09-09 | 2013-03-14 | Kingston Digital Inc. | Private cloud server and client architecture without utilizing a routing server |
CN104184812A (en) * | 2014-08-20 | 2014-12-03 | 四川九成信息技术有限公司 | Multi-point data transmission method based on private cloud |
CN104932956A (en) * | 2015-06-19 | 2015-09-23 | 华南理工大学 | Big-data-oriented cloud disaster tolerant backup method |
-
2015
- 2015-11-20 CN CN201510804928.XA patent/CN105554058A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902498A (en) * | 2010-07-02 | 2010-12-01 | 广州鼎甲计算机科技有限公司 | Network technology based storage cloud backup method |
CN102045385A (en) * | 2010-10-21 | 2011-05-04 | 李斌 | System and equipment for realizing personal cloud computing |
US20130067550A1 (en) * | 2011-09-09 | 2013-03-14 | Kingston Digital Inc. | Private cloud server and client architecture without utilizing a routing server |
CN104184812A (en) * | 2014-08-20 | 2014-12-03 | 四川九成信息技术有限公司 | Multi-point data transmission method based on private cloud |
CN104932956A (en) * | 2015-06-19 | 2015-09-23 | 华南理工大学 | Big-data-oriented cloud disaster tolerant backup method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106371944A (en) * | 2016-06-30 | 2017-02-01 | 深圳市美贝壳科技有限公司 | Method for retrieving data after intelligent storage device is lost |
CN110430244A (en) * | 2019-07-16 | 2019-11-08 | 浙江大华技术股份有限公司 | Link establishment method, apparatus, filming apparatus and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3073699B1 (en) | System and method for controlling mutual access of smart devices | |
TW201919363A (en) | Method and system for quantum key distribution and data processing | |
JP6517359B2 (en) | Account restoration protocol | |
CN103067158B (en) | Encrypting and decrypting method, encrypting and decrypting device and key management system | |
CN110602703B (en) | Bluetooth communication data encryption method, terminal and system for BLE | |
WO2016150327A1 (en) | Terminal remote assistance method, device and system | |
CN109286593B (en) | Method and device for transmission reconnection, computer equipment and storage medium | |
US9344417B2 (en) | Authentication method and system | |
CN112187831A (en) | Equipment network access method and device, storage medium and electronic equipment | |
CN107682363B (en) | Intelligent household product safety communication method, system and computer readable storage medium | |
US10129753B2 (en) | Methods and arrangements for authenticating a communication device | |
CN104158710A (en) | Automatic switchover method of service application channel based on open intelligent gateway platform | |
CN101083660A (en) | Session control based IP network authentication method of dynamic address distribution protocol | |
CN109561413B (en) | Bluetooth authentication and authorization method and system of BLE equipment | |
CN109104475A (en) | Connect restoration methods, apparatus and system | |
CN105554058A (en) | Household private storage data remote backup method | |
CN114726872A (en) | Data synchronization method and device, computer equipment and storage medium | |
CN103973438B (en) | communication channel dynamic encrypting method | |
EP3063920B1 (en) | Method for setting up, via an intermediate entity, a secure session between a first and a second entity, and corresponding entities and computer program products | |
CN113691394B (en) | VPN communication establishing and switching method and system | |
CN112235320B (en) | Cipher-based video networking multicast communication method and device | |
US20060031418A1 (en) | Authenticating client-to-client communication | |
CN109922042B (en) | Method and system for managing sub-keys of lost equipment | |
CN116346339A (en) | Data protection method, system and electronic equipment | |
EP2962443B1 (en) | Method for allowing a web server to detect the logout of a distant token |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160504 |
|
WD01 | Invention patent application deemed withdrawn after publication |