CN105843701A - Data backup method and device - Google Patents

Data backup method and device Download PDF

Info

Publication number
CN105843701A
CN105843701A CN201510017191.7A CN201510017191A CN105843701A CN 105843701 A CN105843701 A CN 105843701A CN 201510017191 A CN201510017191 A CN 201510017191A CN 105843701 A CN105843701 A CN 105843701A
Authority
CN
China
Prior art keywords
crypted password
data
backup
clear crytpographic
crytpographic key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510017191.7A
Other languages
Chinese (zh)
Inventor
江波
任明月
丁晓亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510017191.7A priority Critical patent/CN105843701A/en
Publication of CN105843701A publication Critical patent/CN105843701A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the invention discloses a data backup method and device. When data in an intelligent terminal is need to be backed up, firstly an encrypted password set by a user is acquired; secondly, the data to be backed up in the intelligent terminal is acquired; and thirdly, the data to be backed up is encrypted through the encrypted password set by the user, and then the encrypted backup data is obtained, and the encrypted backup data is stored. Through the data backup method, backup data in the intelligent terminal can be encrypted through the encrypted password set by the user, the backup data can be stored in a ciphertext manner, and only the user knows the password, and in this way, leakage of private data of the user can be avoided, and the security of the backup data of the user can be ensured.

Description

Data back up method and device
Technical field
It relates to field of computer technology, particularly relate to a kind of data back up method and device.
Background technology
Along with science and technology develops rapidly, intelligent terminal's (such as, smart mobile phone, panel computer) becomes must not in people's life One of electronic product that can lack.When intelligent terminal is broken down, when user cannot settle a dispute by the parties concerned themselves, need special intelligence Keep in repair at terminal after-sales service.
When maintainer at after-sales service keeps in repair, it will usually the data backup in intelligent terminal out, then, After the breakdown maintenance well of intelligent terminal, then by backup data convert out to intelligent terminal.The number of intelligent terminal It is all on the terminal unit (such as, computer) that stores at after-sales service of clear-text way according to backup procedure.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of data back up method and device, and the disclosure is implemented Example discloses following technical scheme:
First aspect according to disclosure embodiment, it is provided that a kind of data back up method, including:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
In conjunction with first aspect, in the first possible implementation of first aspect, described utilize described Crypted password to needs The data of backup are encrypted, the Backup Data after being encrypted, including:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
In conjunction with first aspect, in the implementation that the second of first aspect is possible, the Crypted password of described acquisition user setup, Including:
Obtain the first Crypted password that user is inputted by input equipment, and acquisition user is inputted again by described input equipment The second Crypted password;
Judge that the first Crypted password and the second Crypted password are the most consistent;
If described first Crypted password is consistent with described second Crypted password, determine described first Crypted password or the second Crypted password Crypted password for user setup.
In conjunction with first aspect, in the third possible implementation of first aspect, described method also includes:
When reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Verify described clear crytpographic key the most consistent with described Crypted password;
If described clear crytpographic key is consistent with described Crypted password, the Backup Data after utilizing described clear crytpographic key to decipher described encryption, And the backup data store after deciphering deciphering obtained is in described intelligent terminal.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, described Verify described clear crytpographic key the most consistent with described Crypted password, including:
The eap-message digest of described clear crytpographic key is obtained according to hash algorithm;
The eap-message digest judging described clear crytpographic key is the most consistent with the eap-message digest of the described Crypted password being obtained ahead of time;
If the eap-message digest of described clear crytpographic key is consistent with the eap-message digest of described Crypted password, determine that described clear crytpographic key is with described Crypted password is consistent.
In conjunction with the third possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, described Method also includes:
If described clear crytpographic key is inconsistent with described Crypted password, show that prompting user re-enters the prompting message of clear crytpographic key.
Second aspect according to disclosure embodiment, it is provided that a kind of data backup device, including:
First acquisition module, for obtaining the Crypted password of user setup;
Second acquisition module, for obtaining the data needing backup;
Encrypting module, for utilizing described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Memory module, the Backup Data after storing described encryption.
In conjunction with second aspect, in the first possible implementation of second aspect, described encrypting module specifically for:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
In conjunction with second aspect, in the implementation that the second of second aspect is possible, described first acquisition module includes:
First obtains submodule, for obtaining the first Crypted password that user is inputted by input equipment;
Second obtains submodule, for obtaining the second Crypted password that user is inputted again by described input equipment;
First judges submodule, for judging that the first Crypted password and the second Crypted password are the most consistent;
First determines submodule, if judging that submodule judges described first Crypted password and described second encryption for described first Password is consistent, determines that described first Crypted password or the second Crypted password are the Crypted password of user setup.
In conjunction with second aspect, in the third possible implementation of second aspect, described device also includes:
3rd acquisition module, for when reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Correction verification module, is used for verifying described clear crytpographic key the most consistent with described Crypted password;
Deciphering module, if determining that described clear crytpographic key is consistent with described Crypted password for described correction verification module, utilizes described deciphering The Backup Data after described encryption deciphered by password, and the backup data store after deciphering deciphering obtained is in described intelligent terminal.
In conjunction with the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect, described Correction verification module includes:
3rd obtains submodule, for obtaining the eap-message digest of described clear crytpographic key according to hash algorithm;
Second judges submodule, for the message of the eap-message digest judging described clear crytpographic key and the described Crypted password being obtained ahead of time Make a summary the most consistent;
Second determines submodule, if judging that submodule judges that the eap-message digest of described clear crytpographic key adds with described for described second The eap-message digest of password is consistent, determines that described clear crytpographic key is consistent with described Crypted password.
In conjunction with the third possible implementation of second aspect, in the 5th kind of possible implementation of second aspect, described Device also includes:
Reminding module, if determining that described clear crytpographic key is inconsistent with described Crypted password for described correction verification module, shows that prompting is used The prompting message of clear crytpographic key is re-entered at family.
The 5th aspect according to disclosure embodiment, it is provided that a kind of terminal unit, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: when needing the number in intelligent terminal According to when backing up out, first obtain the Crypted password of user setup, then, obtain the data needing backup in intelligent terminal. Then, utilize the Crypted password of user setup that the data needing backup are encrypted, the Backup Data after being encrypted, And store the Backup Data after described encryption.Utilize this data back up method, the Backup Data of intelligent terminal can be utilized The Crypted password of user setup is encrypted, it is achieved Backup Data stores with encrypted test mode, and password only has user to know, from And avoid leaking the private data of user, it is ensured that the Backup Data safety of user.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, these public affairs can not be limited Open.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet embodiments of the invention, And for explaining the principle of the present invention together with description.
Fig. 1 is the flow chart according to a kind of data back up method shown in an exemplary embodiment;
Fig. 2 is the flow chart according to a kind of step S110 shown in an exemplary embodiment;
Fig. 3 is the flow chart according to the another kind of data back up method shown in an exemplary embodiment;
Fig. 4 is the flow chart according to a kind of step S220 shown in an exemplary embodiment;
Fig. 5 is the frame according to a kind of data backup device shown in an exemplary embodiment;
Fig. 6 is the block diagram of a kind of first acquisition module provided according to an exemplary embodiment;
Fig. 7 is the block diagram according to the another kind of data backup device shown in an exemplary embodiment;
Fig. 8 is the block diagram according to a kind of correction verification module shown in an exemplary embodiment;
Fig. 9 is the block diagram according to a kind of device 800 shown in an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.These accompanying drawings It is not intended to be limited by any mode the scope of disclosure design, but is this area skill by reference specific embodiment Art personnel illustrate the concept of the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to attached During figure, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary is implemented Embodiment described in example does not represent all embodiments consistent with the disclosure.On the contrary, they be only with such as The example of the apparatus and method that some aspects that described in detail in appended claims, the disclosure are consistent.
Fig. 1 is the flow chart according to a kind of data back up method shown in an exemplary embodiment, and the method is applied to terminal In equipment (such as, computer), as it is shown in figure 1, the method may comprise steps of:
In step s 110, the Crypted password of user setup is obtained.
When needs carry out data backup, need user setup Crypted password.Such as, intelligent terminal (such as, smart mobile phone, Panel computer etc.) when delivering to keep in repair at after-sales service, need by the data backup in intelligent terminal out, at this time, it may be necessary to User setup Crypted password.
User can obtain the Crypted password of user setup, such as, when described terminal unit is computer, institute by input equipment Stating input equipment can be keyboard.In the other embodiments of the disclosure, described input equipment can also is that special Password Input Device, for example, it is possible to be provided with the buttons such as numeral, letter, spcial character.
In the disclosure one exemplary embodiment, user when arranging Crypted password, may require that user input twice identical close Code, to prevent user misoperation.As in figure 2 it is shown, step S110 may comprise steps of:
In step S111, obtain the first Crypted password that user is inputted by input equipment, and obtain user by described defeated Enter the second Crypted password that equipment inputs again.
Obtain the first Crypted password of being inputted by input equipment of user, and remind user again to input Crypted password, then, then Obtain the second Crypted password of user's input.
In step S112, it is judged that the first Crypted password and the second Crypted password are the most consistent;If described first Crypted password and institute State the second Crypted password consistent, perform step S113;If described first Crypted password and described second Crypted password are inconsistent, hold Row step S114.
The first Crypted password and the second Crypted password that relatively obtain are the most identical, if both are identical, determine two Crypted passwords Unanimously;If both differ, it is determined that two Crypted passwords are inconsistent.
In step S113, determine that described first Crypted password is the Crypted password of user setup.
When the first Crypted password and the second Crypted password are consistent, using close as the encryption of user setup for the first Crypted password obtained Code.
In step S114, prompting user resets Crypted password.
When the first Crypted password and the second Crypted password are inconsistent, user is reminded to reset Crypted password.Sound can be passed through Prompting message user resets Crypted password;User can also be reminded to reset Crypted password by text message, such as, Display reminding frame on the terminal unit of helpdesk after sale.Or, not only export voice message but also show text message.
After having performed S110, in the step s 120, the data needing to back up are obtained.
Such as, when intelligent terminal's fault, it is possible to use the storage that the data in intelligent terminal copy to other is set by backup tool In standby (such as, computer).When after the failture evacuation of intelligent terminal, can by the data convert of backup to intelligent terminal, from And avoid the loss of data in intelligent terminal.
Such as, described intelligent terminal can be smart mobile phone, panel computer, notebook computer etc..
In step s 130, utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted.
Terminal unit needs the data of backup to be encrypted in utilizing the Crypted password of the user setup intelligent terminal to obtaining.
In the disclosure one exemplary embodiment, with described Crypted password as key and utilize AES to need backup data Data content be encrypted, i.e. utilize Crypted password to be converted into ciphertext after being encrypted data content in plain text, if deciphering Password is inconsistent with Crypted password, obtains unreadable code, it is impossible to obtain readable data content.
Or, it is possible to use Crypted password is compressed encryption to the data needing backup, i.e. the data compression needing backup is become Compressed package, and using Crypted password as the compressed code of this compressed package.
In step S140, store the Backup Data after described encryption.Such as, the backup data store after the encryption that will obtain arrives In computer.
The data back up method that the present embodiment provides, when needing the data backup in intelligent terminal out, first obtains user The Crypted password arranged, then, obtains the data needing backup in intelligent terminal.Then, the encryption of user setup is utilized The data needing backup are encrypted by password, the Backup Data after being encrypted, and store the backup number after described encryption According to.Utilize this data back up method, the Crypted password of user setup can be utilized to add the Backup Data of intelligent terminal Close, it is achieved Backup Data stores with encrypted test mode, and password only has user to know, thus avoid leaking the private data of user, Ensure the Backup Data safety of user.
Fig. 3 is the flow chart according to the another kind of data back up method shown in an exemplary embodiment, and the method is real shown in Fig. 1 On the basis of executing example, it is also possible to comprise the following steps:
In step S210, when reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input.
When needing to revert in intelligent terminal the Backup Data of intelligent terminal, user is needed to input clear crytpographic key.
In step S220, verify described clear crytpographic key the most consistent with described Crypted password;If described clear crytpographic key adds with described Password is consistent, performs step S230;If described clear crytpographic key is inconsistent with described Crypted password, perform step S240.
In the disclosure one exemplary embodiment, it is possible to use hash algorithm verification Crypted password is the most consistent with clear crytpographic key, as Shown in Fig. 4, step S220 may comprise steps of:
In step S221, obtain the eap-message digest of described clear crytpographic key according to hash algorithm.
Eap-message digest is message or the value of unique regular length corresponding to text, and it is by unidirectional Hash (Hash) algorithm pair Message is calculated.If message is changed in transmitting procedure, then receives the eap-message digest of message by calculating and send out The eap-message digest of the message sent compares, therefore, and can be with the integrity of verification message by eap-message digest.
In step S222, it is judged that the eap-message digest of described clear crytpographic key with the eap-message digest of the described Crypted password being obtained ahead of time is No unanimously;If the eap-message digest of described clear crytpographic key is consistent with the eap-message digest of described Crypted password, perform step S223;Otherwise, Perform step S224.
After the Crypted password obtaining user setup, hash algorithm is utilized to calculate the eap-message digest of this Crypted password and preserve.
Then, the eap-message digest comparing clear crytpographic key is the most consistent with the eap-message digest of Crypted password, thus judges what user inputted Whether clear crytpographic key is the Crypted password that user was arranged originally.
In step S223, determine that described clear crytpographic key is consistent with described Crypted password.
If the eap-message digest of clear crytpographic key is identical with the eap-message digest of Crypted password, it is determined that clear crytpographic key is consistent with Crypted password.
In step S224, determine that described clear crytpographic key is inconsistent with described Crypted password.
If the eap-message digest of clear crytpographic key is different from the eap-message digest of Crypted password, it is determined that clear crytpographic key differs with Crypted password Cause.
In step S230, the Backup Data after utilizing described clear crytpographic key to decipher described encryption, and after the deciphering that deciphering is obtained Backup data store in described intelligent terminal.
If clear crytpographic key is consistent with Crypted password, then utilize decipherment algorithm and clear crytpographic key that the Backup Data after encryption is solved Close, after being deciphered Backup Data, and by the backup data store after deciphering to intelligent terminal.
In step S240, show that prompting user re-enters the prompting message of clear crytpographic key.
If clear crytpographic key is inconsistent with Crypted password, then it is close that the clear crytpographic key mistake that prompting user inputs needs to re-enter deciphering Code, prompting message can be voice message, can also be text message, or, existing voice message and text message.
The data back up method that the present embodiment provides, when Backup Data is reverted in intelligent terminal by needs, obtains user's input Clear crytpographic key, verification clear crytpographic key is the most consistent with Crypted password, if after both unanimously, then utilize clear crytpographic key to encrypt Backup Data is decrypted, the Backup Data after being deciphered, and by the backup data store after deciphering to intelligent terminal.I.e. Backup Data after only storage is encrypted in terminal unit, in the backup data store after deciphering to intelligent terminal, and encrypts Password only has user to know, in such manner, it is possible to the data safety ensured in the intelligent terminal of user, prevents the private data of user from letting out Dew.
Fig. 5 is the block diagram according to a kind of data backup device shown in an exemplary embodiment, and this device is applied to terminal and sets Computer in Bei, such as at intelligent terminal's after-sales service.As it is shown in figure 5, this device include the first acquisition module 110, Two acquisition modules 120, encrypting module 130 and memory module 140.
This first acquisition module 110 is configured to, and obtains the Crypted password of user setup.
For example, it is desired to by the data backup in intelligent terminal out time, need user setup Crypted password, and obtained mould by first Block 110 obtains the Crypted password of user's input.
This second acquisition module 120 is configured to, and obtains the data needing backup.Such as, the data obtaining intelligent terminal need Backup, then need the data of backup in replicating intelligent terminal.
This encrypting module 130 is configured to, and utilizes described Crypted password to be encrypted the data needing backup, after being encrypted Backup Data.
Described encrypting module 130 specifically for, utilize described Crypted password that the data content of data needing backup is encrypted, Backup Data after being encrypted.
This memory module 140 is configured to, and stores the Backup Data after described encryption.By the backup data store after encryption to eventually In end equipment.
The data backup device that the present embodiment provides, when needing the data backup in intelligent terminal out, is obtained mould by first Block obtains the Crypted password of user setup, and then, the second acquisition module obtains the data needing backup in intelligent terminal.So After, encrypting module utilizes the Crypted password of user setup to be encrypted the data needing backup, the backup after being encrypted Data, and stored the Backup Data after described encryption by memory module.Utilize this data backup device, can by intelligence eventually The Backup Data of end utilizes the Crypted password of user setup to be encrypted, it is achieved Backup Data stores with encrypted test mode, password Only user knows, thus avoids leaking the private data of user, it is ensured that the Backup Data safety of user.
Fig. 6 is the block diagram of a kind of first acquisition module provided according to an exemplary embodiment, and described first in Fig. 5 obtains mould Block 110 includes: first obtains submodule 111, second obtains submodule 112, first judges that submodule 113 and first determines son Module 114.
This first acquisition submodule 111 is configured to, and obtains the first Crypted password that user is inputted by input equipment.
This second acquisition submodule 112 is configured to, and obtains the second Crypted password that user is inputted again by described input equipment.
This first judges that submodule 113 is configured to, it is judged that the first Crypted password and the second Crypted password are the most consistent.
This first determines that submodule 114 is configured to, when described first judges that submodule 113 judges described first Crypted password Time consistent with described second Crypted password, determine that described first Crypted password or the second Crypted password are the Crypted password of user setup.
Fig. 7 is the block diagram according to the another kind of data backup device shown in an exemplary embodiment, and this device is shown in Fig. 5 Can also include on the basis of embodiment: the 3rd acquisition module 210, correction verification module 220, deciphering module 230 and reminding module 240。
3rd acquisition module 210 is configured to, when reduce the Backup Data after described encryption time, obtain the deciphering of user's input Password.
This correction verification module 220 is configured to, and verifies described clear crytpographic key the most consistent with described Crypted password.
In the disclosure one exemplary embodiment, as shown in Figure 8, described correction verification module 220 includes: the 3rd acquisition submodule 221, Second judge submodule 222, second determine that submodule 223 and the 3rd determines submodule 224;
3rd obtains submodule 221 is configured to, and obtains the eap-message digest of described clear crytpographic key according to hash algorithm;
This second judges that submodule 222 is configured to, it is judged that the eap-message digest of described clear crytpographic key and the described encryption being obtained ahead of time The eap-message digest of password is the most consistent.
This second determines that submodule 223 is configured to, when described second judges that submodule 222 judges disappearing of described clear crytpographic key Breath summary is consistent with the eap-message digest of described Crypted password, determines that described clear crytpographic key is consistent with described Crypted password.
3rd determines that submodule 224 is configured to, when described second judges that submodule 222 judges disappearing of described clear crytpographic key Breath summary is inconsistent with the eap-message digest of described Crypted password, determines that described clear crytpographic key is consistent with described Crypted password.
This deciphering module 230 is configured to, when described correction verification module 220 determines that described clear crytpographic key is consistent with described Crypted password Time, the Backup Data after utilizing described clear crytpographic key to decipher described encryption, and the backup data store after the deciphering that deciphering is obtained In described intelligent terminal.
This reminding module 240 is configured to, when described correction verification module 220 determines that described clear crytpographic key differs with described Crypted password Cause, show that prompting user re-enters the prompting message of clear crytpographic key.
The data backup device that the present embodiment provides, when Backup Data is reverted in intelligent terminal by needs, the 3rd acquisition module Obtain the clear crytpographic key of user's input, then the most consistent with Crypted password by correction verification module verification clear crytpographic key, if both are consistent, Then clear crytpographic key is utilized to be decrypted by the Backup Data after encryption by deciphering module, the Backup Data after being deciphered, and will solve Backup data store after close is in intelligent terminal.From said process, terminal unit only stores the Backup Data after encryption, Backup data store after deciphering is in intelligent terminal, and Crypted password only has user to know, in such manner, it is possible to ensure user's Data safety in intelligent terminal, prevents the private data leakage of user.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method Embodiment is described in detail, explanation will be not set forth in detail herein.
Fig. 9 is the block diagram according to a kind of device 800 for data backup shown in an exemplary embodiment.Such as, dress Putting 800 can be mobile phone, computer, digital broadcast terminal, messaging devices, and game console, flat board sets Standby, armarium, body-building equipment, personal digital assistant etc..
As it is shown in figure 9, device 800 can include following one or more assembly: process assembly 802, memorizer 804, Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor Assembly 814, and communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, The operation that camera operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 is held Row instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or many Individual module, it is simple to process between assembly 802 and other assemblies is mutual.Such as, process assembly 802 and can include many matchmakers Module, with facilitate multimedia groupware 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data Example include on device 800 operation any application program or the instruction of method, contact data, telephone book data, Message, picture, video etc..Memorizer 804 can by any kind of volatibility or non-volatile memory device or it Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic Memorizer, flash memory, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more Touch sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch Or the border of sliding action, but also detect the persistent period relevant to described touch or slide and pressure.At some In embodiment, multimedia groupware 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 is in operation Pattern, during such as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive the multimedia number of outside According to.Each front-facing camera and post-positioned pick-up head can be a fixing optical lens system or have focal length and optics change Burnt ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, Mike Wind is configured to receive external audio signal.The audio signal received can be further stored at memorizer 804 or warp Sent by communications component 816.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting sound Frequently signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, startup are pressed Button and locking press button.
Sensor cluster 814 includes one or more sensor, for providing the state estimation of various aspects for device 800. Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as institute Stating display and keypad that assembly is device 800, sensor cluster 814 can also detect device 800 or device 800 The position change of one assembly, the presence or absence that user contacts with device 800, device 800 orientation or acceleration/deceleration Variations in temperature with device 800.Sensor cluster 814 can include proximity transducer, is configured to the most any Physical contact time detection near the existence of object.Sensor cluster 814 can also include optical sensor, such as CMOS or Ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 814 is all right Including acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device 800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An example Property embodiment in, communications component 816 receives from the external broadcasting management broadcast singal of system or broadcast via broadcast channel Relevant information.In one exemplary embodiment, described communications component 816 also includes near-field communication (NFC) module, with Promote junction service.Such as, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) Technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field-programmable gate array Row (FPGA), controller, microcontroller, microprocessor or other electronic components realize, and are used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction is additionally provided, such as Including the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Example As, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, Tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by the processor of intelligent terminal During execution so that terminal unit is able to carry out a kind of data back up method, and described method includes:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to other of the present invention Embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modification, purposes Or adaptations follow the present invention general principle and include the disclosure undocumented in the art known often Know or conventional techniques means.Description and embodiments is considered only as exemplary, true scope and spirit of the invention by under The claim in face is pointed out.
It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and Various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (13)

1. a data back up method, it is characterised in that including:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Method the most according to claim 1, it is characterised in that the described data utilizing described Crypted password that needs are backed up It is encrypted, the Backup Data after being encrypted, including:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
Method the most according to claim 1, it is characterised in that the Crypted password of described acquisition user setup, including:
Obtain the first Crypted password that user is inputted by input equipment, and acquisition user is inputted again by described input equipment The second Crypted password;
Judge that the first Crypted password and the second Crypted password are the most consistent;
If described first Crypted password is consistent with described second Crypted password, determine described first Crypted password or the second Crypted password Crypted password for user setup.
Method the most according to claim 1, it is characterised in that described method also includes:
When reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Verify described clear crytpographic key the most consistent with described Crypted password;
If described clear crytpographic key is consistent with described Crypted password, the Backup Data after utilizing described clear crytpographic key to decipher described encryption, And the backup data store after deciphering deciphering obtained is in described intelligent terminal.
Method the most according to claim 4, it is characterised in that the described clear crytpographic key of described verification with described Crypted password is No unanimously, including:
The eap-message digest of described clear crytpographic key is obtained according to hash algorithm;
The eap-message digest judging described clear crytpographic key is the most consistent with the eap-message digest of the described Crypted password being obtained ahead of time;
If the eap-message digest of described clear crytpographic key is consistent with the eap-message digest of described Crypted password, determine that described clear crytpographic key is with described Crypted password is consistent.
Method the most according to claim 4, it is characterised in that described method also includes:
If described clear crytpographic key is inconsistent with described Crypted password, show that prompting user re-enters the prompting message of clear crytpographic key.
7. a data backup device, it is characterised in that including:
First acquisition module, for obtaining the Crypted password of user setup;
Second acquisition module, for obtaining the data needing backup;
Encrypting module, for utilizing described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Memory module, the Backup Data after storing described encryption.
Device the most according to claim 7, it is characterised in that described encrypting module specifically for:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
Device the most according to claim 7, it is characterised in that described first acquisition module includes:
First obtains submodule, for obtaining the first Crypted password that user is inputted by input equipment;
Second obtains submodule, for obtaining the second Crypted password that user is inputted again by described input equipment;
First judges submodule, for judging that the first Crypted password and the second Crypted password are the most consistent;
First determines submodule, if judging that submodule judges described first Crypted password and described second encryption for described first Password is consistent, determines that described first Crypted password or the second Crypted password are the Crypted password of user setup.
Device the most according to claim 7, it is characterised in that described device also includes:
3rd acquisition module, for when reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Correction verification module, is used for verifying described clear crytpographic key the most consistent with described Crypted password;
Deciphering module, if determining that described clear crytpographic key is consistent with described Crypted password for described correction verification module, utilizes described deciphering The Backup Data after described encryption deciphered by password, and the backup data store after deciphering deciphering obtained is in described intelligent terminal.
11. devices according to claim 10, it is characterised in that described correction verification module includes:
3rd obtains submodule, for obtaining the eap-message digest of described clear crytpographic key according to hash algorithm;
Second judges submodule, for the message of the eap-message digest judging described clear crytpographic key and the described Crypted password being obtained ahead of time Make a summary the most consistent;
Second determines submodule, if judging that submodule judges that the eap-message digest of described clear crytpographic key adds with described for described second The eap-message digest of password is consistent, determines that described clear crytpographic key is consistent with described Crypted password.
12. devices according to claim 10, it is characterised in that described device also includes:
Reminding module, if determining that described clear crytpographic key is inconsistent with described Crypted password for described correction verification module, shows that prompting is used The prompting message of clear crytpographic key is re-entered at family.
13. 1 kinds of terminal units, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
CN201510017191.7A 2015-01-14 2015-01-14 Data backup method and device Pending CN105843701A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510017191.7A CN105843701A (en) 2015-01-14 2015-01-14 Data backup method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510017191.7A CN105843701A (en) 2015-01-14 2015-01-14 Data backup method and device

Publications (1)

Publication Number Publication Date
CN105843701A true CN105843701A (en) 2016-08-10

Family

ID=56579894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510017191.7A Pending CN105843701A (en) 2015-01-14 2015-01-14 Data backup method and device

Country Status (1)

Country Link
CN (1) CN105843701A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106959910A (en) * 2017-05-09 2017-07-18 广州响动信息科技有限公司 Remote data management method and system
CN109598157A (en) * 2018-12-04 2019-04-09 深圳忆联信息系统有限公司 SSD data guard method and system
CN109829318A (en) * 2018-12-17 2019-05-31 北京奇安信科技有限公司 A kind of encrypted backup processing method and processing device of file

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236958A1 (en) * 2003-05-25 2004-11-25 M-Systems Flash Disk Pioneers, Ltd. Method and system for maintaining backup of portable storage devices
US7330977B2 (en) * 2003-12-30 2008-02-12 Lenovo Pte Ltd Apparatus, system, and method for secure mass storage backup
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN102110031A (en) * 2011-02-23 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Android system-based application program backup and recovery method
CN102142066A (en) * 2010-02-03 2011-08-03 研祥智能科技股份有限公司 Computing equipment and backup recovery method thereof
CN102149078A (en) * 2010-02-09 2011-08-10 北京数字天域科技有限责任公司 Backup and restoring method for cellphone enterprise address list
CN102915263A (en) * 2012-10-19 2013-02-06 北京小米科技有限责任公司 Data backup method, system and equipment
CN104133737A (en) * 2014-06-27 2014-11-05 小米科技有限责任公司 Data backup method, backup data recovery method, data backup device and backup data recovery device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040236958A1 (en) * 2003-05-25 2004-11-25 M-Systems Flash Disk Pioneers, Ltd. Method and system for maintaining backup of portable storage devices
US7330977B2 (en) * 2003-12-30 2008-02-12 Lenovo Pte Ltd Apparatus, system, and method for secure mass storage backup
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN102142066A (en) * 2010-02-03 2011-08-03 研祥智能科技股份有限公司 Computing equipment and backup recovery method thereof
CN102149078A (en) * 2010-02-09 2011-08-10 北京数字天域科技有限责任公司 Backup and restoring method for cellphone enterprise address list
CN102110031A (en) * 2011-02-23 2011-06-29 宇龙计算机通信科技(深圳)有限公司 Android system-based application program backup and recovery method
CN102915263A (en) * 2012-10-19 2013-02-06 北京小米科技有限责任公司 Data backup method, system and equipment
CN104133737A (en) * 2014-06-27 2014-11-05 小米科技有限责任公司 Data backup method, backup data recovery method, data backup device and backup data recovery device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
涂敏 等: "《网络安全与管理》", 28 February 2009 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106959910A (en) * 2017-05-09 2017-07-18 广州响动信息科技有限公司 Remote data management method and system
CN109598157A (en) * 2018-12-04 2019-04-09 深圳忆联信息系统有限公司 SSD data guard method and system
CN109829318A (en) * 2018-12-17 2019-05-31 北京奇安信科技有限公司 A kind of encrypted backup processing method and processing device of file

Similar Documents

Publication Publication Date Title
CN104219058B (en) Authentication, identification authorization method and device
CN104243484B (en) Information interacting method and device, electronic equipment
CN104486083A (en) Supervisory video processing method and device
CN108269334A (en) Method for unlocking, terminal device and smart lock
CN104955031A (en) Information transmission method and device
CN104283876A (en) Operation authorization method and device
CN104009837B (en) Key updating method, device and terminal
CN104331668A (en) Wrong password prompting method and device
CN104125055A (en) Encryption and decryption method and electronic device
CN104573550A (en) Method and device for protecting data
CN105407098A (en) Identity verification method and device
CN104093119B (en) unlocking method and device
CN104158659B (en) Anti-counterfeit authentication method, device and system
CN103957103A (en) Safety authentication method and device and mobile terminal
CN104376248A (en) Method and device for carrying out user authentication on password input interface
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN104391712A (en) Shutdown method and device
CN105096419B (en) Unlocking method and device, door lock and intelligent wearable equipment
CN104331228A (en) Screen locking method and device
CN104468581B (en) The method and device of login application program
CN106127062A (en) unlocking method and device
CN106060098A (en) Processing method, processing device and processing system for verification codes
CN104852800B (en) Data transmission method and device
CN104869001A (en) Short message authentication method and device
CN106126986A (en) Lock unlocking processing method and the device of data partition

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160810

RJ01 Rejection of invention patent application after publication