CN107480543A - The read method and device of a kind of data - Google Patents
The read method and device of a kind of data Download PDFInfo
- Publication number
- CN107480543A CN107480543A CN201710667914.7A CN201710667914A CN107480543A CN 107480543 A CN107480543 A CN 107480543A CN 201710667914 A CN201710667914 A CN 201710667914A CN 107480543 A CN107480543 A CN 107480543A
- Authority
- CN
- China
- Prior art keywords
- data
- reconstruct
- target data
- backup
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention discloses a kind of read method of data and device, and applied to server, methods described includes:Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that the quantity and storage location of the first data of the target data are formed, wherein, each first data represents a part for the target data encrypted by different keys;By first data storage into multiple backups corresponding with the quantity of first data set in advance;According to the multiple backup, reconstitute data after the reconstruct of the target data;Data after the reconstruct are sent to the client.Using embodiment provided by the invention, it is intended to strengthen the security of data, avoid going wrong when digital independent.
Description
Technical field
The present invention relates to the reading technical field of data, the read method and device of more particularly to a kind of data.
Background technology
In today's society, personal and enterprise is engaged in activity via computer system more and more.These computer systems,
Including special and non-dedicated computer network, various types of sensitive informations are commonly stored, file and transmitted.So as to more
It can not be read via the storage of these systems and the data transmitted to be more necessary to ensure that or otherwise be endangered.
A kind of conventional solution for being used to protect computer system is to provide login and password function.But password pipe
Reason has been found to be that cost is quite high, because a big chunk help desk, which calls, is directed to password question.In addition, password
The security very little of offer, it is easy to for example inadequately access by heavy attack because they are typically stored in
In file.
The solution of another kind protection computer system is to provide password infrastructure.In general cryptography refers to lead to
Cross and transform the data into or be encrypted to unreadable form to protect data.The person that only possesses encryption key pair could by data deciphering into
Available formats.Cryptography be used to identify user, such as certification, to allow access privileges, such as authorize, to create digital card
Book and signature etc..A kind of popular cryptographic system is public key cryptosyst, and it uses two keys:Public key that owner both knows about and
The private key that only its people or enterprise owner just know.In general, with the data of a key encryption be with another come
Decryption, and two keys can not all be re-created with another.
Unfortunately, even foregoing typical common key cryptosystem is also still to be highly dependent on user to obtain security
's.For example, cryptographic system for example issues private key by the browser of user to user.Then not seasoned enough user is general should
Private key stores on a hard disk drive, and the hard disk drive can usually pass through open department of computer science as such as internet
System comes what is accessed by other people.On the other hand, user may be the clumsy title of the file selection comprising its private key, such as
“key.”.The result of foregoing and other behavior is so that one or more key bes much more likely to suffer injury.
The content of the invention
The technical problems to be solved by the invention are to provide the read method and device of a kind of data, it is intended to strengthen data
Security, avoid going wrong when digital independent.
To achieve the above object, the present invention provides following technical scheme:A kind of read method of data, applied to service
Device, methods described include:
Receive the request for the reading target data that client is sent;
According to it is described request and the target data, it is determined that form the first data of the target data quantity and
Storage location, wherein, each first data represents a part for the target data encrypted by different keys;
By first data storage into multiple backups corresponding with the quantity of first data set in advance;
According to the multiple backup, reconstitute data after the reconstruct of the target data;
Data after the reconstruct are sent to the client.
Optionally, before data after according to the multiple backup, reconstituting the reconstruct of the target data, the side
Method also includes:
To each backup setting encryption key and decruption key in the multiple backup.
Optionally, it is described according to the multiple backup, reconstitute data after the reconstruct of the target data, including:
According to key corresponding to each backup, the data in the multiple backup are decrypted using the key;
Using the data after decryption as the data after reconstruct.
In addition, the embodiment of the present invention additionally provides a kind of reading device of data, applied to server, described device bag
Include:
Receiving module, the request of the reading target data for receiving client transmission;
Determining module, for according to it is described request and the target data, it is determined that forming the first of the target data
The quantity and storage location of data, wherein, each first data represents the target data encrypted by different keys
A part;
Memory module, for by first data storage to set in advance corresponding with the quantity of first data
In multiple backups;
Reconstructed module, for according to the multiple backup, reconstituting data after the reconstruct of the target data;
Sending module, for data after the reconstruct to be sent to the client.
Optionally, described device also includes setup module, and the setup module is specifically used for:
To each backup setting encryption key and decruption key in the multiple backup.
Optionally, the reconstructed module, including:
Deciphering module, for the key according to corresponding to each backup, using the key in the multiple backup
Data are decrypted;
As module, for using the data after decryption as the data after reconstruct.
Using a kind of read method of data provided in an embodiment of the present invention, applied to server, methods described includes:Connect
Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that forming the mesh
The quantity and storage location of the first data of data are marked, wherein, each first data represents what is encrypted by different keys
A part for the target data;By first data storage to set in advance corresponding with the quantity of first data
In multiple backups;According to the multiple backup, reconstitute data after the reconstruct of the target data;By data after the reconstruct
Send to the client.The first data corresponding with request are backed up, and are reconstructed according to multiple Backup Datas, will
Data after reconstruct are sent to client, therefore, can strengthen the security of data, and avoid asking when digital independent
Topic.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the read method of data provided in an embodiment of the present invention;
Fig. 2 is the structural representation of the reading device of data provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of invention of greater clarity, below by accompanying drawing and embodiment, to this
Inventive technique scheme is further elaborated.However, it should be understood that specific embodiment described herein is only solving
Technical solution of the present invention is released, is not intended to limit the invention the scope of technical scheme.
To solve prior art problem, the embodiment of the present invention provides a kind of read method and device of data, individually below
It is described in detail.
Fig. 1 is that the schematic flow sheet of the read method of data provided in an embodiment of the present invention is applied to server, the side
Method includes:
S101, receive the request for the reading target data that client is sent;
S102, according to the request and the target data, it is determined that forming the number of the first data of the target data
Amount and storage location, wherein, each first data represents a part for the target data encrypted by different keys;
S103, by first data storage to multiple backups corresponding with the quantity of first data set in advance
In;
S104, according to the multiple backup, reconstitute data after the reconstruct of the target data;
S105, data after the reconstruct are sent to the client.
In the embodiment of the present invention, client sends the request for reading target data to server, it is to be understood that target
Data can be stored at least one position.Exemplary, target data is stored in 3 different positions, respectively position 1,
Position 2 and position 3.And the data on each position are encrypted by different keys and the part that belongs to target data.
Then the first data corresponding on position 1, position 2 and position 3 are stored to set in advance with described the respectively
In multiple backups corresponding to the quantity of one data, specifically, can be by corresponding first data on position 1, position 2 and position 3
On village's disposal site 4, position 5 and position 6.Then will be stored on position 4, position 5 and position 6 corresponding with first data
Data be reconstructed, and the data after reconstruct are sent to client.
In a kind of implementation of the present invention, the target data can be reconstituted according to the multiple backup
Reconstruct after before data, methods described also includes:Each backup setting encryption key in the multiple backup is conciliate
Key.
Specifically, it is described according to the multiple backup, reconstitute data after the reconstruct of the target data, including:
According to key corresponding to each backup, the data in the multiple backup are decrypted using the key;
Using the data after decryption as the data after reconstruct.
In the implementation of the present invention, to each backup setting encryption key in multiple backups and it can decrypt close
Key, then use corresponding to decruption key each data back up is decrypted, by the data after all decryption carry out again
Structure, sent after reconstruct to client.
Using a kind of read method of data provided in an embodiment of the present invention, applied to server, methods described includes:Connect
Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that forming the mesh
The quantity and storage location of the first data of data are marked, wherein, each first data represents what is encrypted by different keys
A part for the target data;By first data storage to set in advance corresponding with the quantity of first data
In multiple backups;According to the multiple backup, reconstitute data after the reconstruct of the target data;By data after the reconstruct
Send to the client.The first data corresponding with request are backed up, and are reconstructed according to multiple Backup Datas, will
Data after reconstruct are sent to client, therefore, can strengthen the security of data, and avoid asking when digital independent
Topic.
Referring to Fig. 2, Fig. 2 is the structural representation of the reading device of data provided in an embodiment of the present invention, applied to service
Device, described device include:
Receiving module 201, the request of the reading target data for receiving client transmission;
Determining module 202, for according to the request and the target data, it is determined that forming the of the target data
The quantity and storage location of one data, wherein, each first data represents the number of targets encrypted by different keys
According to a part;
Memory module 203, for by first data storage to set in advance with first data quantity pair
In the multiple backups answered;
Reconstructed module 204, for according to the multiple backup, reconstituting data after the reconstruct of the target data;
Sending module 205, for data after the reconstruct to be sent to the client.
Specifically, described device also includes setup module, the setup module is specifically used for:
To each backup setting encryption key and decruption key in the multiple backup.
Specifically, the reconstructed module 204, including:
Deciphering module, for the key according to corresponding to each backup, using the key in the multiple backup
Data are decrypted;
As module, for using the data after decryption as the data after reconstruct.
Using a kind of reading device of data provided in an embodiment of the present invention, applied to server, described device includes:Connect
Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that forming the mesh
The quantity and storage location of the first data of data are marked, wherein, each first data represents what is encrypted by different keys
A part for the target data;By first data storage to set in advance corresponding with the quantity of first data
In multiple backups;According to the multiple backup, reconstitute data after the reconstruct of the target data;By data after the reconstruct
Send to the client.The first data corresponding with request are backed up, and are reconstructed according to multiple Backup Datas, will
Data after reconstruct are sent to client, therefore, can strengthen the security of data, and avoid asking when digital independent
Topic.
Moreover, it will be appreciated that although the present specification is described in terms of embodiments, not each embodiment is only wrapped
Containing an independent technical scheme, this narrating mode of specification is only that those skilled in the art should for clarity
Using specification as an entirety, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
It is appreciated that other embodiment.
Claims (6)
1. a kind of read method of data, it is characterised in that applied to server, methods described includes:
Receive the request for the reading target data that client is sent;
According to the request and the target data, it is determined that forming quantity and the storage of the first data of the target data
Position, wherein, each first data represents a part for the target data encrypted by different keys;
By first data storage into multiple backups corresponding with the quantity of first data set in advance;
According to the multiple backup, reconstitute data after the reconstruct of the target data;
Data after the reconstruct are sent to the client.
2. the read method of data according to claim 1, it is characterised in that according to the multiple backup, structure again
After into the reconstruct of the target data before data, methods described also includes:
To each backup setting encryption key and decruption key in the multiple backup.
3. the read method of data according to claim 2, it is characterised in that it is described according to the multiple backup, again
Data after the reconstruct of the target data are formed, including:
According to key corresponding to each backup, the data in the multiple backup are decrypted using the key;
Using the data after decryption as the data after reconstruct.
4. a kind of reading device of data, it is characterised in that applied to server, described device includes:
Receiving module, the request of the reading target data for receiving client transmission;
Determining module, for according to it is described request and the target data, it is determined that forming the first data of the target data
Quantity and storage location, wherein, each first data represents the one of the target data encrypted by different keys
Part;
Memory module, for by first data storage to set in advance corresponding multiple with the quantity of first data
In backup;
Reconstructed module, for according to the multiple backup, reconstituting data after the reconstruct of the target data;
Sending module, for data after the reconstruct to be sent to the client.
5. the reading device of data according to claim 4, it is characterised in that described device also includes setup module, institute
Setup module is stated to be specifically used for:
To each backup setting encryption key and decruption key in the multiple backup.
6. the reading device of data according to claim 5, it is characterised in that the reconstructed module, including:
Deciphering module, for the key according to corresponding to each backup, using the key to the data in the multiple backup
It is decrypted;
As module, for using the data after decryption as the data after reconstruct.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710667914.7A CN107480543A (en) | 2017-08-07 | 2017-08-07 | The read method and device of a kind of data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710667914.7A CN107480543A (en) | 2017-08-07 | 2017-08-07 | The read method and device of a kind of data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107480543A true CN107480543A (en) | 2017-12-15 |
Family
ID=60598815
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710667914.7A Pending CN107480543A (en) | 2017-08-07 | 2017-08-07 | The read method and device of a kind of data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107480543A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094394A (en) * | 2007-07-17 | 2007-12-26 | 中国科学院软件研究所 | Method for guaranteeing safe transmission of video data, and video monitoring system |
CN102664928A (en) * | 2012-04-01 | 2012-09-12 | 南京邮电大学 | Data secure access method used for cloud storage and user terminal system |
CN103259762A (en) * | 2012-02-16 | 2013-08-21 | 中兴通讯股份有限公司 | File encryption and decryption method and system based on cloud storage |
CN103607393A (en) * | 2013-11-21 | 2014-02-26 | 浪潮电子信息产业股份有限公司 | Data safety protection method based on data partitioning |
CN106778312A (en) * | 2016-12-29 | 2017-05-31 | 昆明微图科技有限公司 | The encipher-decipher method of file encryption-decryption system |
-
2017
- 2017-08-07 CN CN201710667914.7A patent/CN107480543A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094394A (en) * | 2007-07-17 | 2007-12-26 | 中国科学院软件研究所 | Method for guaranteeing safe transmission of video data, and video monitoring system |
CN103259762A (en) * | 2012-02-16 | 2013-08-21 | 中兴通讯股份有限公司 | File encryption and decryption method and system based on cloud storage |
CN102664928A (en) * | 2012-04-01 | 2012-09-12 | 南京邮电大学 | Data secure access method used for cloud storage and user terminal system |
CN103607393A (en) * | 2013-11-21 | 2014-02-26 | 浪潮电子信息产业股份有限公司 | Data safety protection method based on data partitioning |
CN106778312A (en) * | 2016-12-29 | 2017-05-31 | 昆明微图科技有限公司 | The encipher-decipher method of file encryption-decryption system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240126895A1 (en) | Data security using request-supplied keys | |
CN103039057B (en) | To moving medial according to the system and method protected | |
EP1913509B1 (en) | System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system | |
CN103168307A (en) | Method to control and limit readability of electronic documents | |
CN105071936A (en) | Systems and methods for secure data sharing | |
CN103229165A (en) | Systems and methods for secure remote storage | |
CN102457561B (en) | Data access method and equipment adopting same | |
CN103413100A (en) | File security protection system | |
US20210167955A1 (en) | Data transmission | |
CN106936579A (en) | Cloud storage data storage and read method based on trusted third party agency | |
Kim et al. | Client‐Side Deduplication to Enhance Security and Reduce Communication Costs | |
CN112954000A (en) | Privacy information management method and system based on block chain and IPFS technology | |
CN102868826A (en) | Terminal and terminal data protection method | |
EP2503480A1 (en) | Method and devices for secure data access and exchange | |
CN108701200B (en) | Improved memory system | |
CN102761559B (en) | Network security based on private data shares method and communication terminal | |
CN115412236A (en) | Method for key management and password calculation, encryption method and device | |
CN105376258B (en) | A method of based on encryption authorization system Backup and Restore cloud storage file object | |
CN107480543A (en) | The read method and device of a kind of data | |
TWI766171B (en) | Account data processing method and account data processing system | |
JP3501320B2 (en) | Information safe storage system and method | |
CN111639305B (en) | Block chain-based content copyright protection method and system | |
CN101470643B (en) | Fixed hardware security unit backup and recovery method and system | |
CA2923438C (en) | Data security using request-supplied keys | |
CN116781400A (en) | Method, system and device for processing block chain uplink data and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171215 |