CN107480543A - The read method and device of a kind of data - Google Patents

The read method and device of a kind of data Download PDF

Info

Publication number
CN107480543A
CN107480543A CN201710667914.7A CN201710667914A CN107480543A CN 107480543 A CN107480543 A CN 107480543A CN 201710667914 A CN201710667914 A CN 201710667914A CN 107480543 A CN107480543 A CN 107480543A
Authority
CN
China
Prior art keywords
data
reconstruct
target data
backup
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710667914.7A
Other languages
Chinese (zh)
Inventor
李子华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Youyi Si Information Technology LLC
Original Assignee
Anhui Youyi Si Information Technology LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Youyi Si Information Technology LLC filed Critical Anhui Youyi Si Information Technology LLC
Priority to CN201710667914.7A priority Critical patent/CN107480543A/en
Publication of CN107480543A publication Critical patent/CN107480543A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses a kind of read method of data and device, and applied to server, methods described includes:Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that the quantity and storage location of the first data of the target data are formed, wherein, each first data represents a part for the target data encrypted by different keys;By first data storage into multiple backups corresponding with the quantity of first data set in advance;According to the multiple backup, reconstitute data after the reconstruct of the target data;Data after the reconstruct are sent to the client.Using embodiment provided by the invention, it is intended to strengthen the security of data, avoid going wrong when digital independent.

Description

The read method and device of a kind of data
Technical field
The present invention relates to the reading technical field of data, the read method and device of more particularly to a kind of data.
Background technology
In today's society, personal and enterprise is engaged in activity via computer system more and more.These computer systems, Including special and non-dedicated computer network, various types of sensitive informations are commonly stored, file and transmitted.So as to more It can not be read via the storage of these systems and the data transmitted to be more necessary to ensure that or otherwise be endangered.
A kind of conventional solution for being used to protect computer system is to provide login and password function.But password pipe Reason has been found to be that cost is quite high, because a big chunk help desk, which calls, is directed to password question.In addition, password The security very little of offer, it is easy to for example inadequately access by heavy attack because they are typically stored in In file.
The solution of another kind protection computer system is to provide password infrastructure.In general cryptography refers to lead to Cross and transform the data into or be encrypted to unreadable form to protect data.The person that only possesses encryption key pair could by data deciphering into Available formats.Cryptography be used to identify user, such as certification, to allow access privileges, such as authorize, to create digital card Book and signature etc..A kind of popular cryptographic system is public key cryptosyst, and it uses two keys:Public key that owner both knows about and The private key that only its people or enterprise owner just know.In general, with the data of a key encryption be with another come Decryption, and two keys can not all be re-created with another.
Unfortunately, even foregoing typical common key cryptosystem is also still to be highly dependent on user to obtain security 's.For example, cryptographic system for example issues private key by the browser of user to user.Then not seasoned enough user is general should Private key stores on a hard disk drive, and the hard disk drive can usually pass through open department of computer science as such as internet System comes what is accessed by other people.On the other hand, user may be the clumsy title of the file selection comprising its private key, such as “key.”.The result of foregoing and other behavior is so that one or more key bes much more likely to suffer injury.
The content of the invention
The technical problems to be solved by the invention are to provide the read method and device of a kind of data, it is intended to strengthen data Security, avoid going wrong when digital independent.
To achieve the above object, the present invention provides following technical scheme:A kind of read method of data, applied to service Device, methods described include:
Receive the request for the reading target data that client is sent;
According to it is described request and the target data, it is determined that form the first data of the target data quantity and Storage location, wherein, each first data represents a part for the target data encrypted by different keys;
By first data storage into multiple backups corresponding with the quantity of first data set in advance;
According to the multiple backup, reconstitute data after the reconstruct of the target data;
Data after the reconstruct are sent to the client.
Optionally, before data after according to the multiple backup, reconstituting the reconstruct of the target data, the side Method also includes:
To each backup setting encryption key and decruption key in the multiple backup.
Optionally, it is described according to the multiple backup, reconstitute data after the reconstruct of the target data, including:
According to key corresponding to each backup, the data in the multiple backup are decrypted using the key;
Using the data after decryption as the data after reconstruct.
In addition, the embodiment of the present invention additionally provides a kind of reading device of data, applied to server, described device bag Include:
Receiving module, the request of the reading target data for receiving client transmission;
Determining module, for according to it is described request and the target data, it is determined that forming the first of the target data The quantity and storage location of data, wherein, each first data represents the target data encrypted by different keys A part;
Memory module, for by first data storage to set in advance corresponding with the quantity of first data In multiple backups;
Reconstructed module, for according to the multiple backup, reconstituting data after the reconstruct of the target data;
Sending module, for data after the reconstruct to be sent to the client.
Optionally, described device also includes setup module, and the setup module is specifically used for:
To each backup setting encryption key and decruption key in the multiple backup.
Optionally, the reconstructed module, including:
Deciphering module, for the key according to corresponding to each backup, using the key in the multiple backup Data are decrypted;
As module, for using the data after decryption as the data after reconstruct.
Using a kind of read method of data provided in an embodiment of the present invention, applied to server, methods described includes:Connect Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that forming the mesh The quantity and storage location of the first data of data are marked, wherein, each first data represents what is encrypted by different keys A part for the target data;By first data storage to set in advance corresponding with the quantity of first data In multiple backups;According to the multiple backup, reconstitute data after the reconstruct of the target data;By data after the reconstruct Send to the client.The first data corresponding with request are backed up, and are reconstructed according to multiple Backup Datas, will Data after reconstruct are sent to client, therefore, can strengthen the security of data, and avoid asking when digital independent Topic.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the read method of data provided in an embodiment of the present invention;
Fig. 2 is the structural representation of the reading device of data provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of invention of greater clarity, below by accompanying drawing and embodiment, to this Inventive technique scheme is further elaborated.However, it should be understood that specific embodiment described herein is only solving Technical solution of the present invention is released, is not intended to limit the invention the scope of technical scheme.
To solve prior art problem, the embodiment of the present invention provides a kind of read method and device of data, individually below It is described in detail.
Fig. 1 is that the schematic flow sheet of the read method of data provided in an embodiment of the present invention is applied to server, the side Method includes:
S101, receive the request for the reading target data that client is sent;
S102, according to the request and the target data, it is determined that forming the number of the first data of the target data Amount and storage location, wherein, each first data represents a part for the target data encrypted by different keys;
S103, by first data storage to multiple backups corresponding with the quantity of first data set in advance In;
S104, according to the multiple backup, reconstitute data after the reconstruct of the target data;
S105, data after the reconstruct are sent to the client.
In the embodiment of the present invention, client sends the request for reading target data to server, it is to be understood that target Data can be stored at least one position.Exemplary, target data is stored in 3 different positions, respectively position 1, Position 2 and position 3.And the data on each position are encrypted by different keys and the part that belongs to target data.
Then the first data corresponding on position 1, position 2 and position 3 are stored to set in advance with described the respectively In multiple backups corresponding to the quantity of one data, specifically, can be by corresponding first data on position 1, position 2 and position 3 On village's disposal site 4, position 5 and position 6.Then will be stored on position 4, position 5 and position 6 corresponding with first data Data be reconstructed, and the data after reconstruct are sent to client.
In a kind of implementation of the present invention, the target data can be reconstituted according to the multiple backup Reconstruct after before data, methods described also includes:Each backup setting encryption key in the multiple backup is conciliate Key.
Specifically, it is described according to the multiple backup, reconstitute data after the reconstruct of the target data, including:
According to key corresponding to each backup, the data in the multiple backup are decrypted using the key;
Using the data after decryption as the data after reconstruct.
In the implementation of the present invention, to each backup setting encryption key in multiple backups and it can decrypt close Key, then use corresponding to decruption key each data back up is decrypted, by the data after all decryption carry out again Structure, sent after reconstruct to client.
Using a kind of read method of data provided in an embodiment of the present invention, applied to server, methods described includes:Connect Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that forming the mesh The quantity and storage location of the first data of data are marked, wherein, each first data represents what is encrypted by different keys A part for the target data;By first data storage to set in advance corresponding with the quantity of first data In multiple backups;According to the multiple backup, reconstitute data after the reconstruct of the target data;By data after the reconstruct Send to the client.The first data corresponding with request are backed up, and are reconstructed according to multiple Backup Datas, will Data after reconstruct are sent to client, therefore, can strengthen the security of data, and avoid asking when digital independent Topic.
Referring to Fig. 2, Fig. 2 is the structural representation of the reading device of data provided in an embodiment of the present invention, applied to service Device, described device include:
Receiving module 201, the request of the reading target data for receiving client transmission;
Determining module 202, for according to the request and the target data, it is determined that forming the of the target data The quantity and storage location of one data, wherein, each first data represents the number of targets encrypted by different keys According to a part;
Memory module 203, for by first data storage to set in advance with first data quantity pair In the multiple backups answered;
Reconstructed module 204, for according to the multiple backup, reconstituting data after the reconstruct of the target data;
Sending module 205, for data after the reconstruct to be sent to the client.
Specifically, described device also includes setup module, the setup module is specifically used for:
To each backup setting encryption key and decruption key in the multiple backup.
Specifically, the reconstructed module 204, including:
Deciphering module, for the key according to corresponding to each backup, using the key in the multiple backup Data are decrypted;
As module, for using the data after decryption as the data after reconstruct.
Using a kind of reading device of data provided in an embodiment of the present invention, applied to server, described device includes:Connect Receive the request for the reading target data that client is sent;According to the request and the target data, it is determined that forming the mesh The quantity and storage location of the first data of data are marked, wherein, each first data represents what is encrypted by different keys A part for the target data;By first data storage to set in advance corresponding with the quantity of first data In multiple backups;According to the multiple backup, reconstitute data after the reconstruct of the target data;By data after the reconstruct Send to the client.The first data corresponding with request are backed up, and are reconstructed according to multiple Backup Datas, will Data after reconstruct are sent to client, therefore, can strengthen the security of data, and avoid asking when digital independent Topic.
Moreover, it will be appreciated that although the present specification is described in terms of embodiments, not each embodiment is only wrapped Containing an independent technical scheme, this narrating mode of specification is only that those skilled in the art should for clarity Using specification as an entirety, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art It is appreciated that other embodiment.

Claims (6)

1. a kind of read method of data, it is characterised in that applied to server, methods described includes:
Receive the request for the reading target data that client is sent;
According to the request and the target data, it is determined that forming quantity and the storage of the first data of the target data Position, wherein, each first data represents a part for the target data encrypted by different keys;
By first data storage into multiple backups corresponding with the quantity of first data set in advance;
According to the multiple backup, reconstitute data after the reconstruct of the target data;
Data after the reconstruct are sent to the client.
2. the read method of data according to claim 1, it is characterised in that according to the multiple backup, structure again After into the reconstruct of the target data before data, methods described also includes:
To each backup setting encryption key and decruption key in the multiple backup.
3. the read method of data according to claim 2, it is characterised in that it is described according to the multiple backup, again Data after the reconstruct of the target data are formed, including:
According to key corresponding to each backup, the data in the multiple backup are decrypted using the key;
Using the data after decryption as the data after reconstruct.
4. a kind of reading device of data, it is characterised in that applied to server, described device includes:
Receiving module, the request of the reading target data for receiving client transmission;
Determining module, for according to it is described request and the target data, it is determined that forming the first data of the target data Quantity and storage location, wherein, each first data represents the one of the target data encrypted by different keys Part;
Memory module, for by first data storage to set in advance corresponding multiple with the quantity of first data In backup;
Reconstructed module, for according to the multiple backup, reconstituting data after the reconstruct of the target data;
Sending module, for data after the reconstruct to be sent to the client.
5. the reading device of data according to claim 4, it is characterised in that described device also includes setup module, institute Setup module is stated to be specifically used for:
To each backup setting encryption key and decruption key in the multiple backup.
6. the reading device of data according to claim 5, it is characterised in that the reconstructed module, including:
Deciphering module, for the key according to corresponding to each backup, using the key to the data in the multiple backup It is decrypted;
As module, for using the data after decryption as the data after reconstruct.
CN201710667914.7A 2017-08-07 2017-08-07 The read method and device of a kind of data Pending CN107480543A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710667914.7A CN107480543A (en) 2017-08-07 2017-08-07 The read method and device of a kind of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710667914.7A CN107480543A (en) 2017-08-07 2017-08-07 The read method and device of a kind of data

Publications (1)

Publication Number Publication Date
CN107480543A true CN107480543A (en) 2017-12-15

Family

ID=60598815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710667914.7A Pending CN107480543A (en) 2017-08-07 2017-08-07 The read method and device of a kind of data

Country Status (1)

Country Link
CN (1) CN107480543A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094394A (en) * 2007-07-17 2007-12-26 中国科学院软件研究所 Method for guaranteeing safe transmission of video data, and video monitoring system
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103259762A (en) * 2012-02-16 2013-08-21 中兴通讯股份有限公司 File encryption and decryption method and system based on cloud storage
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
CN106778312A (en) * 2016-12-29 2017-05-31 昆明微图科技有限公司 The encipher-decipher method of file encryption-decryption system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094394A (en) * 2007-07-17 2007-12-26 中国科学院软件研究所 Method for guaranteeing safe transmission of video data, and video monitoring system
CN103259762A (en) * 2012-02-16 2013-08-21 中兴通讯股份有限公司 File encryption and decryption method and system based on cloud storage
CN102664928A (en) * 2012-04-01 2012-09-12 南京邮电大学 Data secure access method used for cloud storage and user terminal system
CN103607393A (en) * 2013-11-21 2014-02-26 浪潮电子信息产业股份有限公司 Data safety protection method based on data partitioning
CN106778312A (en) * 2016-12-29 2017-05-31 昆明微图科技有限公司 The encipher-decipher method of file encryption-decryption system

Similar Documents

Publication Publication Date Title
US20240126895A1 (en) Data security using request-supplied keys
CN103039057B (en) To moving medial according to the system and method protected
EP1913509B1 (en) System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system
CN103168307A (en) Method to control and limit readability of electronic documents
CN105071936A (en) Systems and methods for secure data sharing
CN103229165A (en) Systems and methods for secure remote storage
CN102457561B (en) Data access method and equipment adopting same
CN103413100A (en) File security protection system
US20210167955A1 (en) Data transmission
CN106936579A (en) Cloud storage data storage and read method based on trusted third party agency
Kim et al. Client‐Side Deduplication to Enhance Security and Reduce Communication Costs
CN112954000A (en) Privacy information management method and system based on block chain and IPFS technology
CN102868826A (en) Terminal and terminal data protection method
EP2503480A1 (en) Method and devices for secure data access and exchange
CN108701200B (en) Improved memory system
CN102761559B (en) Network security based on private data shares method and communication terminal
CN115412236A (en) Method for key management and password calculation, encryption method and device
CN105376258B (en) A method of based on encryption authorization system Backup and Restore cloud storage file object
CN107480543A (en) The read method and device of a kind of data
TWI766171B (en) Account data processing method and account data processing system
JP3501320B2 (en) Information safe storage system and method
CN111639305B (en) Block chain-based content copyright protection method and system
CN101470643B (en) Fixed hardware security unit backup and recovery method and system
CA2923438C (en) Data security using request-supplied keys
CN116781400A (en) Method, system and device for processing block chain uplink data and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171215