CN105843701A - Data backup method and device - Google Patents
Data backup method and device Download PDFInfo
- Publication number
- CN105843701A CN105843701A CN201510017191.7A CN201510017191A CN105843701A CN 105843701 A CN105843701 A CN 105843701A CN 201510017191 A CN201510017191 A CN 201510017191A CN 105843701 A CN105843701 A CN 105843701A
- Authority
- CN
- China
- Prior art keywords
- crypted password
- data
- backup
- clear crytpographic
- crytpographic key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The embodiment of the invention discloses a data backup method and device. When data in an intelligent terminal is need to be backed up, firstly an encrypted password set by a user is acquired; secondly, the data to be backed up in the intelligent terminal is acquired; and thirdly, the data to be backed up is encrypted through the encrypted password set by the user, and then the encrypted backup data is obtained, and the encrypted backup data is stored. Through the data backup method, backup data in the intelligent terminal can be encrypted through the encrypted password set by the user, the backup data can be stored in a ciphertext manner, and only the user knows the password, and in this way, leakage of private data of the user can be avoided, and the security of the backup data of the user can be ensured.
Description
Technical field
It relates to field of computer technology, particularly relate to a kind of data back up method and device.
Background technology
Along with science and technology develops rapidly, intelligent terminal's (such as, smart mobile phone, panel computer) becomes must not in people's life
One of electronic product that can lack.When intelligent terminal is broken down, when user cannot settle a dispute by the parties concerned themselves, need special intelligence
Keep in repair at terminal after-sales service.
When maintainer at after-sales service keeps in repair, it will usually the data backup in intelligent terminal out, then,
After the breakdown maintenance well of intelligent terminal, then by backup data convert out to intelligent terminal.The number of intelligent terminal
It is all on the terminal unit (such as, computer) that stores at after-sales service of clear-text way according to backup procedure.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of data back up method and device, and the disclosure is implemented
Example discloses following technical scheme:
First aspect according to disclosure embodiment, it is provided that a kind of data back up method, including:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
In conjunction with first aspect, in the first possible implementation of first aspect, described utilize described Crypted password to needs
The data of backup are encrypted, the Backup Data after being encrypted, including:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
In conjunction with first aspect, in the implementation that the second of first aspect is possible, the Crypted password of described acquisition user setup,
Including:
Obtain the first Crypted password that user is inputted by input equipment, and acquisition user is inputted again by described input equipment
The second Crypted password;
Judge that the first Crypted password and the second Crypted password are the most consistent;
If described first Crypted password is consistent with described second Crypted password, determine described first Crypted password or the second Crypted password
Crypted password for user setup.
In conjunction with first aspect, in the third possible implementation of first aspect, described method also includes:
When reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Verify described clear crytpographic key the most consistent with described Crypted password;
If described clear crytpographic key is consistent with described Crypted password, the Backup Data after utilizing described clear crytpographic key to decipher described encryption,
And the backup data store after deciphering deciphering obtained is in described intelligent terminal.
In conjunction with the third possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, described
Verify described clear crytpographic key the most consistent with described Crypted password, including:
The eap-message digest of described clear crytpographic key is obtained according to hash algorithm;
The eap-message digest judging described clear crytpographic key is the most consistent with the eap-message digest of the described Crypted password being obtained ahead of time;
If the eap-message digest of described clear crytpographic key is consistent with the eap-message digest of described Crypted password, determine that described clear crytpographic key is with described
Crypted password is consistent.
In conjunction with the third possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, described
Method also includes:
If described clear crytpographic key is inconsistent with described Crypted password, show that prompting user re-enters the prompting message of clear crytpographic key.
Second aspect according to disclosure embodiment, it is provided that a kind of data backup device, including:
First acquisition module, for obtaining the Crypted password of user setup;
Second acquisition module, for obtaining the data needing backup;
Encrypting module, for utilizing described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Memory module, the Backup Data after storing described encryption.
In conjunction with second aspect, in the first possible implementation of second aspect, described encrypting module specifically for:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
In conjunction with second aspect, in the implementation that the second of second aspect is possible, described first acquisition module includes:
First obtains submodule, for obtaining the first Crypted password that user is inputted by input equipment;
Second obtains submodule, for obtaining the second Crypted password that user is inputted again by described input equipment;
First judges submodule, for judging that the first Crypted password and the second Crypted password are the most consistent;
First determines submodule, if judging that submodule judges described first Crypted password and described second encryption for described first
Password is consistent, determines that described first Crypted password or the second Crypted password are the Crypted password of user setup.
In conjunction with second aspect, in the third possible implementation of second aspect, described device also includes:
3rd acquisition module, for when reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Correction verification module, is used for verifying described clear crytpographic key the most consistent with described Crypted password;
Deciphering module, if determining that described clear crytpographic key is consistent with described Crypted password for described correction verification module, utilizes described deciphering
The Backup Data after described encryption deciphered by password, and the backup data store after deciphering deciphering obtained is in described intelligent terminal.
In conjunction with the third possible implementation of second aspect, in the 4th kind of possible implementation of second aspect, described
Correction verification module includes:
3rd obtains submodule, for obtaining the eap-message digest of described clear crytpographic key according to hash algorithm;
Second judges submodule, for the message of the eap-message digest judging described clear crytpographic key and the described Crypted password being obtained ahead of time
Make a summary the most consistent;
Second determines submodule, if judging that submodule judges that the eap-message digest of described clear crytpographic key adds with described for described second
The eap-message digest of password is consistent, determines that described clear crytpographic key is consistent with described Crypted password.
In conjunction with the third possible implementation of second aspect, in the 5th kind of possible implementation of second aspect, described
Device also includes:
Reminding module, if determining that described clear crytpographic key is inconsistent with described Crypted password for described correction verification module, shows that prompting is used
The prompting message of clear crytpographic key is re-entered at family.
The 5th aspect according to disclosure embodiment, it is provided that a kind of terminal unit, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: when needing the number in intelligent terminal
According to when backing up out, first obtain the Crypted password of user setup, then, obtain the data needing backup in intelligent terminal.
Then, utilize the Crypted password of user setup that the data needing backup are encrypted, the Backup Data after being encrypted,
And store the Backup Data after described encryption.Utilize this data back up method, the Backup Data of intelligent terminal can be utilized
The Crypted password of user setup is encrypted, it is achieved Backup Data stores with encrypted test mode, and password only has user to know, from
And avoid leaking the private data of user, it is ensured that the Backup Data safety of user.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, these public affairs can not be limited
Open.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet embodiments of the invention,
And for explaining the principle of the present invention together with description.
Fig. 1 is the flow chart according to a kind of data back up method shown in an exemplary embodiment;
Fig. 2 is the flow chart according to a kind of step S110 shown in an exemplary embodiment;
Fig. 3 is the flow chart according to the another kind of data back up method shown in an exemplary embodiment;
Fig. 4 is the flow chart according to a kind of step S220 shown in an exemplary embodiment;
Fig. 5 is the frame according to a kind of data backup device shown in an exemplary embodiment;
Fig. 6 is the block diagram of a kind of first acquisition module provided according to an exemplary embodiment;
Fig. 7 is the block diagram according to the another kind of data backup device shown in an exemplary embodiment;
Fig. 8 is the block diagram according to a kind of correction verification module shown in an exemplary embodiment;
Fig. 9 is the block diagram according to a kind of device 800 shown in an exemplary embodiment.
By above-mentioned accompanying drawing, it has been shown that the embodiment that the disclosure is clear and definite, hereinafter will be described in more detail.These accompanying drawings
It is not intended to be limited by any mode the scope of disclosure design, but is this area skill by reference specific embodiment
Art personnel illustrate the concept of the disclosure.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to attached
During figure, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary is implemented
Embodiment described in example does not represent all embodiments consistent with the disclosure.On the contrary, they be only with such as
The example of the apparatus and method that some aspects that described in detail in appended claims, the disclosure are consistent.
Fig. 1 is the flow chart according to a kind of data back up method shown in an exemplary embodiment, and the method is applied to terminal
In equipment (such as, computer), as it is shown in figure 1, the method may comprise steps of:
In step s 110, the Crypted password of user setup is obtained.
When needs carry out data backup, need user setup Crypted password.Such as, intelligent terminal (such as, smart mobile phone,
Panel computer etc.) when delivering to keep in repair at after-sales service, need by the data backup in intelligent terminal out, at this time, it may be necessary to
User setup Crypted password.
User can obtain the Crypted password of user setup, such as, when described terminal unit is computer, institute by input equipment
Stating input equipment can be keyboard.In the other embodiments of the disclosure, described input equipment can also is that special Password Input
Device, for example, it is possible to be provided with the buttons such as numeral, letter, spcial character.
In the disclosure one exemplary embodiment, user when arranging Crypted password, may require that user input twice identical close
Code, to prevent user misoperation.As in figure 2 it is shown, step S110 may comprise steps of:
In step S111, obtain the first Crypted password that user is inputted by input equipment, and obtain user by described defeated
Enter the second Crypted password that equipment inputs again.
Obtain the first Crypted password of being inputted by input equipment of user, and remind user again to input Crypted password, then, then
Obtain the second Crypted password of user's input.
In step S112, it is judged that the first Crypted password and the second Crypted password are the most consistent;If described first Crypted password and institute
State the second Crypted password consistent, perform step S113;If described first Crypted password and described second Crypted password are inconsistent, hold
Row step S114.
The first Crypted password and the second Crypted password that relatively obtain are the most identical, if both are identical, determine two Crypted passwords
Unanimously;If both differ, it is determined that two Crypted passwords are inconsistent.
In step S113, determine that described first Crypted password is the Crypted password of user setup.
When the first Crypted password and the second Crypted password are consistent, using close as the encryption of user setup for the first Crypted password obtained
Code.
In step S114, prompting user resets Crypted password.
When the first Crypted password and the second Crypted password are inconsistent, user is reminded to reset Crypted password.Sound can be passed through
Prompting message user resets Crypted password;User can also be reminded to reset Crypted password by text message, such as,
Display reminding frame on the terminal unit of helpdesk after sale.Or, not only export voice message but also show text message.
After having performed S110, in the step s 120, the data needing to back up are obtained.
Such as, when intelligent terminal's fault, it is possible to use the storage that the data in intelligent terminal copy to other is set by backup tool
In standby (such as, computer).When after the failture evacuation of intelligent terminal, can by the data convert of backup to intelligent terminal, from
And avoid the loss of data in intelligent terminal.
Such as, described intelligent terminal can be smart mobile phone, panel computer, notebook computer etc..
In step s 130, utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted.
Terminal unit needs the data of backup to be encrypted in utilizing the Crypted password of the user setup intelligent terminal to obtaining.
In the disclosure one exemplary embodiment, with described Crypted password as key and utilize AES to need backup data
Data content be encrypted, i.e. utilize Crypted password to be converted into ciphertext after being encrypted data content in plain text, if deciphering
Password is inconsistent with Crypted password, obtains unreadable code, it is impossible to obtain readable data content.
Or, it is possible to use Crypted password is compressed encryption to the data needing backup, i.e. the data compression needing backup is become
Compressed package, and using Crypted password as the compressed code of this compressed package.
In step S140, store the Backup Data after described encryption.Such as, the backup data store after the encryption that will obtain arrives
In computer.
The data back up method that the present embodiment provides, when needing the data backup in intelligent terminal out, first obtains user
The Crypted password arranged, then, obtains the data needing backup in intelligent terminal.Then, the encryption of user setup is utilized
The data needing backup are encrypted by password, the Backup Data after being encrypted, and store the backup number after described encryption
According to.Utilize this data back up method, the Crypted password of user setup can be utilized to add the Backup Data of intelligent terminal
Close, it is achieved Backup Data stores with encrypted test mode, and password only has user to know, thus avoid leaking the private data of user,
Ensure the Backup Data safety of user.
Fig. 3 is the flow chart according to the another kind of data back up method shown in an exemplary embodiment, and the method is real shown in Fig. 1
On the basis of executing example, it is also possible to comprise the following steps:
In step S210, when reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input.
When needing to revert in intelligent terminal the Backup Data of intelligent terminal, user is needed to input clear crytpographic key.
In step S220, verify described clear crytpographic key the most consistent with described Crypted password;If described clear crytpographic key adds with described
Password is consistent, performs step S230;If described clear crytpographic key is inconsistent with described Crypted password, perform step S240.
In the disclosure one exemplary embodiment, it is possible to use hash algorithm verification Crypted password is the most consistent with clear crytpographic key, as
Shown in Fig. 4, step S220 may comprise steps of:
In step S221, obtain the eap-message digest of described clear crytpographic key according to hash algorithm.
Eap-message digest is message or the value of unique regular length corresponding to text, and it is by unidirectional Hash (Hash) algorithm pair
Message is calculated.If message is changed in transmitting procedure, then receives the eap-message digest of message by calculating and send out
The eap-message digest of the message sent compares, therefore, and can be with the integrity of verification message by eap-message digest.
In step S222, it is judged that the eap-message digest of described clear crytpographic key with the eap-message digest of the described Crypted password being obtained ahead of time is
No unanimously;If the eap-message digest of described clear crytpographic key is consistent with the eap-message digest of described Crypted password, perform step S223;Otherwise,
Perform step S224.
After the Crypted password obtaining user setup, hash algorithm is utilized to calculate the eap-message digest of this Crypted password and preserve.
Then, the eap-message digest comparing clear crytpographic key is the most consistent with the eap-message digest of Crypted password, thus judges what user inputted
Whether clear crytpographic key is the Crypted password that user was arranged originally.
In step S223, determine that described clear crytpographic key is consistent with described Crypted password.
If the eap-message digest of clear crytpographic key is identical with the eap-message digest of Crypted password, it is determined that clear crytpographic key is consistent with Crypted password.
In step S224, determine that described clear crytpographic key is inconsistent with described Crypted password.
If the eap-message digest of clear crytpographic key is different from the eap-message digest of Crypted password, it is determined that clear crytpographic key differs with Crypted password
Cause.
In step S230, the Backup Data after utilizing described clear crytpographic key to decipher described encryption, and after the deciphering that deciphering is obtained
Backup data store in described intelligent terminal.
If clear crytpographic key is consistent with Crypted password, then utilize decipherment algorithm and clear crytpographic key that the Backup Data after encryption is solved
Close, after being deciphered Backup Data, and by the backup data store after deciphering to intelligent terminal.
In step S240, show that prompting user re-enters the prompting message of clear crytpographic key.
If clear crytpographic key is inconsistent with Crypted password, then it is close that the clear crytpographic key mistake that prompting user inputs needs to re-enter deciphering
Code, prompting message can be voice message, can also be text message, or, existing voice message and text message.
The data back up method that the present embodiment provides, when Backup Data is reverted in intelligent terminal by needs, obtains user's input
Clear crytpographic key, verification clear crytpographic key is the most consistent with Crypted password, if after both unanimously, then utilize clear crytpographic key to encrypt
Backup Data is decrypted, the Backup Data after being deciphered, and by the backup data store after deciphering to intelligent terminal.I.e.
Backup Data after only storage is encrypted in terminal unit, in the backup data store after deciphering to intelligent terminal, and encrypts
Password only has user to know, in such manner, it is possible to the data safety ensured in the intelligent terminal of user, prevents the private data of user from letting out
Dew.
Fig. 5 is the block diagram according to a kind of data backup device shown in an exemplary embodiment, and this device is applied to terminal and sets
Computer in Bei, such as at intelligent terminal's after-sales service.As it is shown in figure 5, this device include the first acquisition module 110,
Two acquisition modules 120, encrypting module 130 and memory module 140.
This first acquisition module 110 is configured to, and obtains the Crypted password of user setup.
For example, it is desired to by the data backup in intelligent terminal out time, need user setup Crypted password, and obtained mould by first
Block 110 obtains the Crypted password of user's input.
This second acquisition module 120 is configured to, and obtains the data needing backup.Such as, the data obtaining intelligent terminal need
Backup, then need the data of backup in replicating intelligent terminal.
This encrypting module 130 is configured to, and utilizes described Crypted password to be encrypted the data needing backup, after being encrypted
Backup Data.
Described encrypting module 130 specifically for, utilize described Crypted password that the data content of data needing backup is encrypted,
Backup Data after being encrypted.
This memory module 140 is configured to, and stores the Backup Data after described encryption.By the backup data store after encryption to eventually
In end equipment.
The data backup device that the present embodiment provides, when needing the data backup in intelligent terminal out, is obtained mould by first
Block obtains the Crypted password of user setup, and then, the second acquisition module obtains the data needing backup in intelligent terminal.So
After, encrypting module utilizes the Crypted password of user setup to be encrypted the data needing backup, the backup after being encrypted
Data, and stored the Backup Data after described encryption by memory module.Utilize this data backup device, can by intelligence eventually
The Backup Data of end utilizes the Crypted password of user setup to be encrypted, it is achieved Backup Data stores with encrypted test mode, password
Only user knows, thus avoids leaking the private data of user, it is ensured that the Backup Data safety of user.
Fig. 6 is the block diagram of a kind of first acquisition module provided according to an exemplary embodiment, and described first in Fig. 5 obtains mould
Block 110 includes: first obtains submodule 111, second obtains submodule 112, first judges that submodule 113 and first determines son
Module 114.
This first acquisition submodule 111 is configured to, and obtains the first Crypted password that user is inputted by input equipment.
This second acquisition submodule 112 is configured to, and obtains the second Crypted password that user is inputted again by described input equipment.
This first judges that submodule 113 is configured to, it is judged that the first Crypted password and the second Crypted password are the most consistent.
This first determines that submodule 114 is configured to, when described first judges that submodule 113 judges described first Crypted password
Time consistent with described second Crypted password, determine that described first Crypted password or the second Crypted password are the Crypted password of user setup.
Fig. 7 is the block diagram according to the another kind of data backup device shown in an exemplary embodiment, and this device is shown in Fig. 5
Can also include on the basis of embodiment: the 3rd acquisition module 210, correction verification module 220, deciphering module 230 and reminding module
240。
3rd acquisition module 210 is configured to, when reduce the Backup Data after described encryption time, obtain the deciphering of user's input
Password.
This correction verification module 220 is configured to, and verifies described clear crytpographic key the most consistent with described Crypted password.
In the disclosure one exemplary embodiment, as shown in Figure 8, described correction verification module 220 includes: the 3rd acquisition submodule 221,
Second judge submodule 222, second determine that submodule 223 and the 3rd determines submodule 224;
3rd obtains submodule 221 is configured to, and obtains the eap-message digest of described clear crytpographic key according to hash algorithm;
This second judges that submodule 222 is configured to, it is judged that the eap-message digest of described clear crytpographic key and the described encryption being obtained ahead of time
The eap-message digest of password is the most consistent.
This second determines that submodule 223 is configured to, when described second judges that submodule 222 judges disappearing of described clear crytpographic key
Breath summary is consistent with the eap-message digest of described Crypted password, determines that described clear crytpographic key is consistent with described Crypted password.
3rd determines that submodule 224 is configured to, when described second judges that submodule 222 judges disappearing of described clear crytpographic key
Breath summary is inconsistent with the eap-message digest of described Crypted password, determines that described clear crytpographic key is consistent with described Crypted password.
This deciphering module 230 is configured to, when described correction verification module 220 determines that described clear crytpographic key is consistent with described Crypted password
Time, the Backup Data after utilizing described clear crytpographic key to decipher described encryption, and the backup data store after the deciphering that deciphering is obtained
In described intelligent terminal.
This reminding module 240 is configured to, when described correction verification module 220 determines that described clear crytpographic key differs with described Crypted password
Cause, show that prompting user re-enters the prompting message of clear crytpographic key.
The data backup device that the present embodiment provides, when Backup Data is reverted in intelligent terminal by needs, the 3rd acquisition module
Obtain the clear crytpographic key of user's input, then the most consistent with Crypted password by correction verification module verification clear crytpographic key, if both are consistent,
Then clear crytpographic key is utilized to be decrypted by the Backup Data after encryption by deciphering module, the Backup Data after being deciphered, and will solve
Backup data store after close is in intelligent terminal.From said process, terminal unit only stores the Backup Data after encryption,
Backup data store after deciphering is in intelligent terminal, and Crypted password only has user to know, in such manner, it is possible to ensure user's
Data safety in intelligent terminal, prevents the private data leakage of user.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method
Embodiment is described in detail, explanation will be not set forth in detail herein.
Fig. 9 is the block diagram according to a kind of device 800 for data backup shown in an exemplary embodiment.Such as, dress
Putting 800 can be mobile phone, computer, digital broadcast terminal, messaging devices, and game console, flat board sets
Standby, armarium, body-building equipment, personal digital assistant etc..
As it is shown in figure 9, device 800 can include following one or more assembly: process assembly 802, memorizer 804,
Power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor
Assembly 814, and communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication,
The operation that camera operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 is held
Row instruction, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or many
Individual module, it is simple to process between assembly 802 and other assemblies is mutual.Such as, process assembly 802 and can include many matchmakers
Module, with facilitate multimedia groupware 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data
Example include on device 800 operation any application program or the instruction of method, contact data, telephone book data,
Message, picture, video etc..Memorizer 804 can by any kind of volatibility or non-volatile memory device or it
Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM),
Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic
Memorizer, flash memory, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface
Plate, screen may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more
Touch sensor is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch
Or the border of sliding action, but also detect the persistent period relevant to described touch or slide and pressure.At some
In embodiment, multimedia groupware 808 includes a front-facing camera and/or post-positioned pick-up head.When device 800 is in operation
Pattern, during such as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive the multimedia number of outside
According to.Each front-facing camera and post-positioned pick-up head can be a fixing optical lens system or have focal length and optics change
Burnt ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, Mike
Wind is configured to receive external audio signal.The audio signal received can be further stored at memorizer 804 or warp
Sent by communications component 816.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting sound
Frequently signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, startup are pressed
Button and locking press button.
Sensor cluster 814 includes one or more sensor, for providing the state estimation of various aspects for device 800.
Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as institute
Stating display and keypad that assembly is device 800, sensor cluster 814 can also detect device 800 or device 800
The position change of one assembly, the presence or absence that user contacts with device 800, device 800 orientation or acceleration/deceleration
Variations in temperature with device 800.Sensor cluster 814 can include proximity transducer, is configured to the most any
Physical contact time detection near the existence of object.Sensor cluster 814 can also include optical sensor, such as CMOS or
Ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 814 is all right
Including acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device
800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An example
Property embodiment in, communications component 816 receives from the external broadcasting management broadcast singal of system or broadcast via broadcast channel
Relevant information.In one exemplary embodiment, described communications component 816 also includes near-field communication (NFC) module, with
Promote junction service.Such as, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA)
Technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field-programmable gate array
Row (FPGA), controller, microcontroller, microprocessor or other electronic components realize, and are used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction is additionally provided, such as
Including the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Example
As, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM,
Tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by the processor of intelligent terminal
During execution so that terminal unit is able to carry out a kind of data back up method, and described method includes:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to other of the present invention
Embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modification, purposes
Or adaptations follow the present invention general principle and include the disclosure undocumented in the art known often
Know or conventional techniques means.Description and embodiments is considered only as exemplary, true scope and spirit of the invention by under
The claim in face is pointed out.
It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and
Various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (13)
1. a data back up method, it is characterised in that including:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Method the most according to claim 1, it is characterised in that the described data utilizing described Crypted password that needs are backed up
It is encrypted, the Backup Data after being encrypted, including:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
Method the most according to claim 1, it is characterised in that the Crypted password of described acquisition user setup, including:
Obtain the first Crypted password that user is inputted by input equipment, and acquisition user is inputted again by described input equipment
The second Crypted password;
Judge that the first Crypted password and the second Crypted password are the most consistent;
If described first Crypted password is consistent with described second Crypted password, determine described first Crypted password or the second Crypted password
Crypted password for user setup.
Method the most according to claim 1, it is characterised in that described method also includes:
When reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Verify described clear crytpographic key the most consistent with described Crypted password;
If described clear crytpographic key is consistent with described Crypted password, the Backup Data after utilizing described clear crytpographic key to decipher described encryption,
And the backup data store after deciphering deciphering obtained is in described intelligent terminal.
Method the most according to claim 4, it is characterised in that the described clear crytpographic key of described verification with described Crypted password is
No unanimously, including:
The eap-message digest of described clear crytpographic key is obtained according to hash algorithm;
The eap-message digest judging described clear crytpographic key is the most consistent with the eap-message digest of the described Crypted password being obtained ahead of time;
If the eap-message digest of described clear crytpographic key is consistent with the eap-message digest of described Crypted password, determine that described clear crytpographic key is with described
Crypted password is consistent.
Method the most according to claim 4, it is characterised in that described method also includes:
If described clear crytpographic key is inconsistent with described Crypted password, show that prompting user re-enters the prompting message of clear crytpographic key.
7. a data backup device, it is characterised in that including:
First acquisition module, for obtaining the Crypted password of user setup;
Second acquisition module, for obtaining the data needing backup;
Encrypting module, for utilizing described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Memory module, the Backup Data after storing described encryption.
Device the most according to claim 7, it is characterised in that described encrypting module specifically for:
The data content utilizing the described Crypted password data to needing backup is encrypted, the Backup Data after being encrypted.
Device the most according to claim 7, it is characterised in that described first acquisition module includes:
First obtains submodule, for obtaining the first Crypted password that user is inputted by input equipment;
Second obtains submodule, for obtaining the second Crypted password that user is inputted again by described input equipment;
First judges submodule, for judging that the first Crypted password and the second Crypted password are the most consistent;
First determines submodule, if judging that submodule judges described first Crypted password and described second encryption for described first
Password is consistent, determines that described first Crypted password or the second Crypted password are the Crypted password of user setup.
Device the most according to claim 7, it is characterised in that described device also includes:
3rd acquisition module, for when reduce the Backup Data after described encryption time, obtain the clear crytpographic key of user's input;
Correction verification module, is used for verifying described clear crytpographic key the most consistent with described Crypted password;
Deciphering module, if determining that described clear crytpographic key is consistent with described Crypted password for described correction verification module, utilizes described deciphering
The Backup Data after described encryption deciphered by password, and the backup data store after deciphering deciphering obtained is in described intelligent terminal.
11. devices according to claim 10, it is characterised in that described correction verification module includes:
3rd obtains submodule, for obtaining the eap-message digest of described clear crytpographic key according to hash algorithm;
Second judges submodule, for the message of the eap-message digest judging described clear crytpographic key and the described Crypted password being obtained ahead of time
Make a summary the most consistent;
Second determines submodule, if judging that submodule judges that the eap-message digest of described clear crytpographic key adds with described for described second
The eap-message digest of password is consistent, determines that described clear crytpographic key is consistent with described Crypted password.
12. devices according to claim 10, it is characterised in that described device also includes:
Reminding module, if determining that described clear crytpographic key is inconsistent with described Crypted password for described correction verification module, shows that prompting is used
The prompting message of clear crytpographic key is re-entered at family.
13. 1 kinds of terminal units, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the Crypted password of user setup, and obtain the data needing backup;
Utilize described Crypted password that the data needing backup are encrypted, the Backup Data after being encrypted;
Store the Backup Data after described encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510017191.7A CN105843701A (en) | 2015-01-14 | 2015-01-14 | Data backup method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510017191.7A CN105843701A (en) | 2015-01-14 | 2015-01-14 | Data backup method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105843701A true CN105843701A (en) | 2016-08-10 |
Family
ID=56579894
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510017191.7A Pending CN105843701A (en) | 2015-01-14 | 2015-01-14 | Data backup method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105843701A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106959910A (en) * | 2017-05-09 | 2017-07-18 | 广州响动信息科技有限公司 | Remote data management method and system |
CN109598157A (en) * | 2018-12-04 | 2019-04-09 | 深圳忆联信息系统有限公司 | SSD data guard method and system |
CN109829318A (en) * | 2018-12-17 | 2019-05-31 | 北京奇安信科技有限公司 | A kind of encrypted backup processing method and processing device of file |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
US7330977B2 (en) * | 2003-12-30 | 2008-02-12 | Lenovo Pte Ltd | Apparatus, system, and method for secure mass storage backup |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN102110031A (en) * | 2011-02-23 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Android system-based application program backup and recovery method |
CN102142066A (en) * | 2010-02-03 | 2011-08-03 | 研祥智能科技股份有限公司 | Computing equipment and backup recovery method thereof |
CN102149078A (en) * | 2010-02-09 | 2011-08-10 | 北京数字天域科技有限责任公司 | Backup and restoring method for cellphone enterprise address list |
CN102915263A (en) * | 2012-10-19 | 2013-02-06 | 北京小米科技有限责任公司 | Data backup method, system and equipment |
CN104133737A (en) * | 2014-06-27 | 2014-11-05 | 小米科技有限责任公司 | Data backup method, backup data recovery method, data backup device and backup data recovery device |
-
2015
- 2015-01-14 CN CN201510017191.7A patent/CN105843701A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
US7330977B2 (en) * | 2003-12-30 | 2008-02-12 | Lenovo Pte Ltd | Apparatus, system, and method for secure mass storage backup |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN102142066A (en) * | 2010-02-03 | 2011-08-03 | 研祥智能科技股份有限公司 | Computing equipment and backup recovery method thereof |
CN102149078A (en) * | 2010-02-09 | 2011-08-10 | 北京数字天域科技有限责任公司 | Backup and restoring method for cellphone enterprise address list |
CN102110031A (en) * | 2011-02-23 | 2011-06-29 | 宇龙计算机通信科技(深圳)有限公司 | Android system-based application program backup and recovery method |
CN102915263A (en) * | 2012-10-19 | 2013-02-06 | 北京小米科技有限责任公司 | Data backup method, system and equipment |
CN104133737A (en) * | 2014-06-27 | 2014-11-05 | 小米科技有限责任公司 | Data backup method, backup data recovery method, data backup device and backup data recovery device |
Non-Patent Citations (1)
Title |
---|
涂敏 等: "《网络安全与管理》", 28 February 2009 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106959910A (en) * | 2017-05-09 | 2017-07-18 | 广州响动信息科技有限公司 | Remote data management method and system |
CN109598157A (en) * | 2018-12-04 | 2019-04-09 | 深圳忆联信息系统有限公司 | SSD data guard method and system |
CN109829318A (en) * | 2018-12-17 | 2019-05-31 | 北京奇安信科技有限公司 | A kind of encrypted backup processing method and processing device of file |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104219058B (en) | Authentication, identification authorization method and device | |
CN104243484B (en) | Information interacting method and device, electronic equipment | |
CN104486083A (en) | Supervisory video processing method and device | |
CN108269334A (en) | Method for unlocking, terminal device and smart lock | |
CN104955031A (en) | Information transmission method and device | |
CN104283876A (en) | Operation authorization method and device | |
CN104009837B (en) | Key updating method, device and terminal | |
CN104331668A (en) | Wrong password prompting method and device | |
CN104125055A (en) | Encryption and decryption method and electronic device | |
CN104573550A (en) | Method and device for protecting data | |
CN105407098A (en) | Identity verification method and device | |
CN104093119B (en) | unlocking method and device | |
CN104158659B (en) | Anti-counterfeit authentication method, device and system | |
CN103957103A (en) | Safety authentication method and device and mobile terminal | |
CN104376248A (en) | Method and device for carrying out user authentication on password input interface | |
CN104318177A (en) | Protection method and protection device for data of terminal equipment | |
CN104391712A (en) | Shutdown method and device | |
CN105096419B (en) | Unlocking method and device, door lock and intelligent wearable equipment | |
CN104331228A (en) | Screen locking method and device | |
CN104468581B (en) | The method and device of login application program | |
CN106127062A (en) | unlocking method and device | |
CN106060098A (en) | Processing method, processing device and processing system for verification codes | |
CN104852800B (en) | Data transmission method and device | |
CN104869001A (en) | Short message authentication method and device | |
CN106126986A (en) | Lock unlocking processing method and the device of data partition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160810 |
|
RJ01 | Rejection of invention patent application after publication |