CN108829539A - Data backup, data reconstruction method and equipment - Google Patents

Data backup, data reconstruction method and equipment Download PDF

Info

Publication number
CN108829539A
CN108829539A CN201810585520.1A CN201810585520A CN108829539A CN 108829539 A CN108829539 A CN 108829539A CN 201810585520 A CN201810585520 A CN 201810585520A CN 108829539 A CN108829539 A CN 108829539A
Authority
CN
China
Prior art keywords
data
terminal
backup
encryption
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810585520.1A
Other languages
Chinese (zh)
Inventor
仇剑书
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810585520.1A priority Critical patent/CN108829539A/en
Publication of CN108829539A publication Critical patent/CN108829539A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The embodiment of the present invention provides a kind of data backup, data reconstruction method and equipment.This method includes:First terminal is treated Backup Data and is encrypted, first terminal sends data backup command to second terminal, data backup command includes the data to be backed up by encryption, data backup command backs up the data received for second terminal, and first terminal and second terminal belong to the same private group in distributed hashtable DHT network.The method of the embodiment of the present invention carries out data backup, and data encrypted transmission in backup procedure between mutual reliable terminal, has taken into account the reliability and privacy of data by belonging to same private group.

Description

Data backup, data reconstruction method and equipment
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of data backups, data reconstruction method and equipment.
Background technique
User can be generated when using communication service, Internet service on the terminal devices such as mobile phone, computer Personal data, these personal data need to obtain appropriate preservation, so that user being capable of fast quick-recovery in replacement terminal equipment.
Personal address book is a kind of important personal data, how illustrates the prior art by taking personal address book as an example below It is backed up.After user has replaced mobile phone or resets mobile phone, it would be desirable to quickly restore address list.Often at present Method has following several:
1) pass through subscriber identification card (Subscriber Identification Module, abbreviation:SIM) card turns It deposits.Address list is exported to SIM card on the old handsets by user, and SIM card is inserted into new cell-phone, is then led from SIM card by address list Enter new cell-phone.
2) pass through mobile memory unloading.For example storage card is used, address list is exported to storage on the old handsets by user Card, is inserted into new cell-phone for storage card, then imports new cell-phone from storage card by address list.
3) pass through cloud service unloading.There are many cloud service providers to provide communication address book stored at present and restores function, user Address list is uploaded into cloud on the old handsets, is recorded on new cell-phone from cloud download communication.
By SIM card and mobile memory unloading, although data privacy is secure, limit it is more, reliability without Method guarantees, such as old mobile phone loses or damage, can not just export legacy data, will lead to loss of data.Turned by cloud service Deposit data convenience and high reliablity, but personal data storage is beyond the clouds, there is the possibility read by cloud service provider, data privacy It is difficult to ensure.
In conclusion carrying out data backup and data reconstruction method in the prior art, the reliable of data can not be combined Property and data privacy, be not able to satisfy the demand that user restores data backup and data.
Summary of the invention
The embodiment of the present invention provides a kind of data backup, data reconstruction method and equipment, can not to solve the prior art Combine the reliability of data and the privacy concerns of data.
In a first aspect, the embodiment of the present invention provides a kind of data back up method, including:
First terminal is treated Backup Data and is encrypted;
First terminal sends data backup command to second terminal, and data backup command includes the number to be backed up by encryption According to data backup command backs up the data received for second terminal, and first terminal and second terminal belong to distribution The same private group in formula Hash table DHT network.
In one possible implementation, first terminal treat Backup Data be encrypted including:
First terminal is treated Backup Data according to the terminal iidentification ID of second terminal and is encrypted, the end of second terminal Holding ID is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, and the private key in a pair of secret keys is stored in second terminal In, for the encryption data received to be decrypted.
In one possible implementation, the method also includes:
If the data by backup change, first terminal sends data more new command to second terminal, and data are more New command is used for the update of the complete paired data of second terminal, and data more new command includes the type of operation and the data of update.
Second aspect, the embodiment of the present invention provide a kind of data back up method, including:
Second terminal receives the data backup command that first terminal is sent, and data backup command includes by encryption to standby Part data, first terminal and second terminal belong to the same private group in distributed hashtable DHT network;
Second terminal is decrypted the data to be backed up by encryption according to data backup command, and will be after decryption Data are stored in second terminal and are backed up.
In one possible implementation, the method also includes:
Second terminal receives the data more new command that first terminal is sent, and data more new command includes the type and more of operation New data;
Second terminal is updated the data of backup according to data more new command.
The third aspect, the embodiment of the present invention provide a kind of data reconstruction method, including:
Third terminal sends data recovery request to the 4th terminal, and third terminal and the 4th terminal belong to distributed hashtable The same private group in DHT network;
Third terminal receives the data that the 4th terminal is sent and restores instruction, and it includes by encryption to extensive that data, which restore instruction, Complex data;
Third terminal restores to instruct according to data, completes data and restores.
In one possible implementation, data to be restored are encrypted according to the terminal iidentification ID of third terminal , the Termination ID of third terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, the private key in a pair of secret keys It is stored in third terminal, for the encryption data received to be decrypted.
Fourth aspect, the embodiment of the present invention provide a kind of data reconstruction method, including:
4th terminal receives the data recovery request that third terminal is sent, and third terminal and the 4th terminal belong to distributed Kazakhstan The same private group in uncommon table DHT network;
4th terminal sends data to third terminal and restores instruction, data restore instruction and include according to data recovery request By the data to be restored of encryption, data restore instruction and complete data recovery for third terminal.
5th aspect, the embodiment of the present invention provide a kind of data backup device, including:
Memory;
Processor;And
Computer program;
Wherein, computer program stores in memory, and is configured as being executed by processor to realize such as first aspect With the method for any one of second aspect.
6th aspect, the embodiment of the present invention provide a kind of data recovery apparatus, including:
Memory;
Processor;And
Computer program;
Wherein, computer program stores in memory, and is configured as being executed by processor to realize such as the third aspect With the method for any one of fourth aspect.
Data backup, data reconstruction method and equipment provided in an embodiment of the present invention, by DHT network, by a certain terminal In data backup to belonging in each terminal of same private group with the terminal, not only ensured the privacy of data, but also By multiple duplication, the reliability of data is improved, further by carrying out encrypted transmission, the peace of the data of raising to data Quan Xing.In conclusion data back up method provided in an embodiment of the present invention has taken into account the privacy, reliability and safety of data Property.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the flow chart of one embodiment of data back up method provided by the invention;
Fig. 2 is the flow chart of the another embodiment of data back up method provided by the invention;
Fig. 3 is the signaling process figure of another embodiment of data back up method provided by the invention;
Fig. 4 is the flow chart of one embodiment of data reconstruction method provided by the invention;
Fig. 5 is the flow chart of the another embodiment of data reconstruction method provided by the invention;
Fig. 6 is the signaling process figure of another embodiment of data reconstruction method provided by the invention;
Fig. 7 is the structural schematic diagram of one embodiment of data backup device provided by the invention.
Through the above attached drawings, it has been shown that the specific embodiment of the present invention will be hereinafter described in more detail.These attached drawings It is not intended to limit the scope of the inventive concept in any manner with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate idea of the invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Term " includes " and " having " and their any deformations in description and claims of this specification, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include the other step or units intrinsic for these process, methods, product or equipment.
" first " and " second " in the present invention only plays mark action, be not understood to indicate or imply ordinal relation, Relative importance or the quantity for implicitly indicating indicated technical characteristic." multiple " refer to two or more." and/ Or ", the incidence relation of affiliated partner is described, indicates may exist three kinds of relationships, for example, A and/or B, can indicate:Individually deposit In A, A and B, these three situations of individualism B are existed simultaneously.It is a kind of "or" that character "/", which typicallys represent forward-backward correlation object, Relationship.
" one embodiment " or " embodiment " mentioned in the whole text in specification of the invention means related with embodiment A particular feature, structure, or characteristic include at least one embodiment of the application.Therefore, occur everywhere in the whole instruction " in one embodiment " or " in one embodiment " not necessarily refer to identical embodiment.It should be noted that not rushing In the case where prominent, the feature in embodiment and embodiment in the present invention be can be combined with each other.
It should be noted that the private group in the embodiment of the present invention is the own terminal by user, it is based on peer-to-peer network structure It builds.Own terminal includes the one's own more terminals of user, for example, the mobile phone of user, computer and other there is networking function Can equipment, can also include the terminal of terminal, such as spouse, parent, children of people etc. of users to trust, in same private group Each terminal between mutually trust.How the more terminals that user is described more detail below to construct private group, i.e. private group Building process.
Equity (Peer to Peer, referred to as:P2P) communication technology is a kind of Internet communication technology, with client/service (Client/Server is referred to as device:C/S) or browser/server (Browser/Server, referred to as:B/S) framework is different, P2P can make directly to establish communication between two user terminals, do not need server and carry out transfer.In the embodiment of the present invention P2P network is realized based on distributed hashtable (Distributed Hash Table, abbreviation DHT) technology.Multiple user terminals By DHT algorithm formed a DHT network, the present invention for DHT algorithm concrete form with no restrictions.In internet, by In Internet protocol (Internet Protocol, the abbreviation of terminal:IP) address often changes, when a terminal can not When knowing the address of another terminal, other side can not be just connected.DHT network is substantially an addressable network, in this network In, each terminal is known as a node, and each node has a mark (Identity, abbreviation:ID), ID is regular length Data, the method that different DHT networks has different distribution ID.When two nodes need to communicate, other side can be found by ID, Data are exchanged so as to directly establish connection with other side.DHT network needs to rely on terminal node to mention for other terminal nodes For route service, therefore the nodes are more, and accessibility is more secure.
It in one possible implementation, can be each of DHT network node, basic of distribution asymmetric cryptography A pair of secret keys that algorithm generates, one of them is private key, and one is public key, using public key as the ID of node.It is specific asymmetric Cryptographic algorithm can use such as RSA Algorithm or ECC algorithm, and the present invention is without limitation.
Private group is created by the 1st terminal, is then continuously added other terminals, and ultimately forming one includes multiple terminals Private group.Its process is:
1st terminal generates a pair of secret keys according to asymmetric cryptographic algorithm, wherein private key stores in the terminal, public key As the node ID of the terminal, DHT network is added with the ID.One title for being easy memory can also be set for the terminal, made For the nodename of the terminal.User operates creation private group at the terminal, and the group name of private group is arranged.
2nd terminal generates a pair of secret keys according to asymmetric cryptographic algorithm, wherein private key stores in the terminal, public key As the node ID of the terminal, DHT network is added with the ID.One title for being easy memory can also be set for the terminal, made For the nodename of the terminal.The node ID of the 2nd terminal and nodename are sent to the 1st terminal by certain mode, Can using such as Mobile SMS, social networks, Email, scan the two-dimensional code, user is manually entered mode and is transmitted.It will The node ID and nodename of 2nd terminal are stored in the 1st terminal.
1st terminal by DHT network, by the node ID of the 1st terminal, nodename, private group the data such as group name It is sent to the 2nd terminal.Before data are sent, the node ID of the 2nd terminal, i.e. public key is can be used in the 1st terminal, to pending The data sent are encrypted.Using the mode of public key encryption data it is general there are two types of:The public affairs generated using asymmetric cryptographic algorithm The direct encryption data of key;Or temporarily according to symmetric cryptographic algorithm, such as DES, AES, key K is generated, using K encryption data, ID encryption K is reused, data ciphertext and the ciphertext of K are sent together.The present invention to specific cipher mode with no restrictions.2nd The data that platform terminal deciphering receives record the information such as the group name of the node ID of the 1st terminal, nodename, private group.So far Private group is added in 2 terminals.
Hereafter, it adopts and other terminals is added successively in a like fashion.N platform terminal generates one according to asymmetric cryptographic algorithm To key, wherein private key stores in the terminal, node ID of the public key as the terminal, and DHT network is added with the ID.May be used also Think that the title for being easy memory, the nodename as the terminal is arranged in the terminal.By the node ID and section of N platform terminal Point title issues the 1st to any one in N-1 platform terminal in some way, is denoted as terminal A here.It is whole that terminal A saves N platform Private group is added in N platform terminal by the node ID and nodename at end, terminal A.Specifically, terminal A passes through DHT network, it will be whole It holds the node ID of A, nodename, the group name of private group, have the number such as node ID and nodename of each terminal in private group According to being sent to N platform terminal.Data send before, the node ID of N platform terminal, i.e. public key can be used in terminal A, to data into Row encryption.The data that N platform terminal deciphering receives record all data.
Terminal A generates an addition end command, and order parameter includes the node ID of N platform terminal, nodename, individual The group name etc. of group.Terminal A is connected to the network existing other terminals in private group by DHT, if terminal A will add on capable of connecting Add end command to be sent to the terminal, is encrypted before sending using the node ID of the terminal.Receive the terminal of addition end command Ciphertext data simultaneously executes instruction.If certain terminal does not connect, it is denoted as terminal B, then terminal A will add end command and terminal B Node ID be saved in a queue instructions to be performed of terminal A.After terminal B is online, actively connect each in private group Whether platform terminal, inquiry have pending instruction, if any then acquisition instruction and execute.
Any terminal in private group, is denoted as terminal A, other terminal deletions in private group can be denoted as terminal C. After deletion, terminal A generates a deletion end command, and order parameter includes node ID, nodename, the private group of terminal C Group name etc..Terminal A is connected to the network other terminals in private group by DHT, if on capable of connecting, terminal A refers to terminal is deleted Order is sent to the terminal, is encrypted before sending using the node ID of the terminal.It receives terminal deciphering data and executes instruction.If certain Platform terminal B does not connect, then the ID for deleting end command and terminal B is saved in a queue instructions to be performed by terminal A.Terminal After B is online, each terminal in private group is actively connected, whether inquiry has pending instruction, simultaneously if any then acquisition instruction It executes.
By the above method, the same private group can be added in the own terminal possessed by user, in this way, each terminal On can all be stored with the complete information of private group.The data communication between terminal in same private group by way of encryption into Row, improves the safety and reliability of data.Each terminal in same private group belongs to the own terminal of same user, mentions The high privacy of data.
Fig. 1 is the flow chart of one embodiment of data back up method provided by the invention, as shown in Figure 1, the present embodiment provides Method may include:
Step S101, first terminal is treated Backup Data and is encrypted.
First terminal can be any one own terminal of user, and first terminal can be mobile phone, computer, number Word broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.. The data for being able to carry out backup may include the total data being stored in first terminal, such as may include:Address list, day It goes through, picture, music, video, recording file, short message, Email etc..Data to be backed up in the present embodiment can be according to user Demand be configured, may include partly or completely data.
In order to improve safety and reliability, encryption has been carried out for data to be backed up in the present embodiment.This implementation Example for specific encryption mode with no restriction.
Step S102, first terminal sends data backup command to second terminal, and data backup command includes by encryption Data to be backed up, data backup command backs up the data received for second terminal, and first terminal and second is eventually End belongs to the same private group in distributed hashtable DHT network.
Second terminal in the present embodiment may include other all terminals in private group in addition to first terminal.Example Such as, the private group set up for one by 5 terminals, second terminal may include 4 terminals.It is of course also possible to as needed Only include the other parts terminal in private group in addition to first terminal.
Illustrate data back up method provided in this embodiment for backing up cell phone address book.If by mobile phone, plate This 4 terminal devices of computer, laptop and personal digital assistant are based on one private group of DHT network construction, and 4 Terminal is online.Data to be backed up are the address book data being stored in mobile phone, i.e., first terminal is mobile phone, and second terminal can be with Including tablet computer, laptop and personal digital assistant.Mobile phone first encrypts the address book data of itself storage, Then data backup command is generated, which includes encrypted address book data, will be given birth to finally by DHT network At data backup command be sent to tablet computer, laptop and personal digital assistant.Tablet computer, laptop and Personal digital assistant is decrypted and saves after receiving data backup command, to the address book data of encryption.So far, just will Address book data in mobile phone backs up in the multiple terminals for belonging to same private group with the mobile phone.Even if in this way, wherein certain One terminal fault, will not lead to loss of data, by multiple duplication, further improve the reliability of data backup.And Method provided in this embodiment is not limited by place to use and terminal room distance, convenient, flexible, for example, can be in an office Address book data in mobile phone is backed up in the tablet computer of position at home.
It should be noted that if then first terminal can be by data backup command when a certain terminal in private group is not online It is stored in the queue instructions to be performed of first terminal with the Termination ID.It, will according to the inquiry instruction of terminal after terminal is online Data backup command is sent to corresponding terminal.
Data back up method provided in this embodiment, by DHT network, by the data backup in a certain terminal to the end End belongs in each terminal of same private group, has not only ensured the privacy of data, but also by multiple duplication, improves number According to reliability, further by data carry out encrypted transmission, the safety of the data of raising.In conclusion this implementation The data back up method that example provides has taken into account the privacy, reliability and safety of data.
In one possible implementation, first terminal can be according to the terminal iidentification ID of second terminal to number to be backed up According to being encrypted, the Termination ID of second terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, a pair of Private key in key is stored in second terminal, for the encryption data received to be decrypted.
Illustrate data back up method provided in this embodiment still for backing up cell phone address book.Equally be by mobile phone, This 4 terminal devices of tablet computer, laptop and personal digital assistant, based on one private group of DHT network construction, and 4 terminals are online.When mobile phone sends data backup command to tablet computer, according to the ID of tablet computer to address book data It is encrypted, when mobile phone sends data backup command to laptop, according to the ID of laptop to address book data It is encrypted, when mobile phone sends data backup command to personal digital assistant, according to the ID of personal digital assistant to address list Data are encrypted, i.e., are encrypted according to the ID of each target terminal.Since each Termination ID is different, use different Key is encrypted, and further improves the safety of data in data backup.
In one possible implementation, the method also includes:If the data by backup change, first Terminal sends data more new command to second terminal, and data more new command is used for the update of the complete paired data of second terminal, data More new command includes the type of operation and the data of update.
The personal data being stored in terminal device often change, such as user can carry out address book data The operations such as addition, modification, deletion.Photo in mobile phone photo album can also increase after the user takes the picture.If after changing every time all Again total data is backed up, not only will increase the burden at the network DHT, can also waste storage resource, data backup low efficiency.This reality The case where example changes for data is applied, a kind of efficient data back up method is proposed.After data change, generate Data more new command carries out local updating to the data of change, improves the efficiency of data backup.Operation in the present embodiment Type includes but is not limited to:Increase, modify, delete etc..
Illustrate data back up method provided in this embodiment still for backing up cell phone address book.When user is logical in mobile phone In news record when having created a business card, data more new command can be generated, the data including update, i.e. newly-built business card data, It is with the type of operation, i.e., newly-increased.Without including the total data in whole mobile phone address list.Second terminal is receiving data After more new command, only corresponding operation need to be executed according to data of the action type in instruction to update.For example, plate is electric Brain need to only increase newly-built name the piece number in the data more new command generated after receiving newly-built business card in original Backup Data According to improving the efficiency of data backup.
First terminal can periodically carry out data update, such as be updated as unit of day, can also be touched with event Hair property is updated.
Data back up method provided in this embodiment, by local updating, is mentioned when the data by backup change The high efficiency of data backup, and by updating the Backup Data being synchronized in private group in each terminal.
Fig. 2 is the flow chart of the another embodiment of data back up method provided by the invention, as shown in Fig. 2, the present embodiment mentions The method of confession may include:
Step S201, second terminal receives the data backup command that first terminal is sent, and data backup command includes passing through The data to be backed up of encryption, first terminal and second terminal belong to the same private group in distributed hashtable DHT network.
Step S202, second terminal is decrypted the data to be backed up by encryption according to data backup command, and will Data after decryption, which are stored in second terminal, to be backed up.
In one possible implementation, the method also includes:Second terminal receives the data that first terminal is sent More new command, data more new command include the type of operation and the data of update, and second terminal is according to data more new command, to standby The data of part are updated.
On the basis of the above embodiments, the present embodiment is combined above-described embodiment.Fig. 3 is number provided by the invention According to the signaling process figure of another embodiment of backup method.First terminal and second terminal in the present embodiment belong in DHT network The same private group.As shown in figure 3, the data back up method that the present embodiment improves, including:
Step S301, first terminal is treated Backup Data according to second terminal ID and is encrypted.
Step S302, first terminal to second terminal send data backup command, data backup command include encryption to Backup Data.
Step S303, second terminal completes data backup according to data backup command.
Step S304, the data by backup being stored in first terminal change.
Step S305, first terminal sends data more new command to second terminal, which includes the type and more of operation New data.
Step S306, second terminal is updated the data of backup according to data more new command.
Data back up method provided in this embodiment, by DHT network, by the data backup in a certain terminal to the end End belongs in each terminal of same private group, has not only ensured the privacy of data, but also by multiple duplication, improves number According to reliability, further by data carry out encrypted transmission, the safety of the data of raising, and by backup number When according to changing, by local updating, it is expeditiously synchronized the Backup Data in private group in each terminal.
Fig. 4 is the flow chart of one embodiment of data reconstruction method provided by the invention, as shown in figure 4, the present embodiment provides Method may include:
Step S401, third terminal sends data recovery request to the 4th terminal, and third terminal and the 4th terminal belong to point The same private group in cloth Hash table DHT network.
When terminal needs to restore the data by backup, data can be sent to the terminal for being stored with Backup Data and restored Request.The case where restoring Backup Data is needed to may include, user has replaced new terminal, the loss of data in original terminal, Factory reset such as has been carried out to terminal, has been formatted.The case where for replacement terminal, needs first before data recovery First the terminal after replacement to be added in the former private group for carrying out data backup.Specific Adding Way can refer to aforementioned implementation Example, details are not described herein again.
The 4th terminal in the present embodiment can be any terminal in the affiliated private group of third terminal.In the present embodiment Data recovery request can request the data for restoring all to have backed up, can also request recovered part data.For example, ought be When the data being backed up include cell phone address book, mobile phone photo album, mobile phone short message, it can simply request and restore mobile communication therein Record.It may include the mark of data to be restored when requesting recovered part data, in data recovery request.
Step S402, the data that third terminal receives that the 4th terminal is sent restore instruction, and it includes passing through that data, which restore instruction, The data to be restored of encryption.
4th terminal can be treated after the data recovery request for receiving third terminal transmission according to data recovery request Data are replied to be encrypted.And send data to third terminal and restore instruction, it include encrypted to be restored in the instruction Data.
Step S403, third terminal restores to instruct according to data, completes data and restores.
Third terminal decrypts data to be restored therein, and according to the data of recovery after receiving data and restoring instruction Type carries out respective handling, completes data and restores.For example, after decryption, being conducted into mobile phone for cell phone address book data Telephone book applications.For mobile phone photo album data, after decryption, can be conducted into Photo Browser application.
Data reconstruction method provided in this embodiment, by DHT network, can be obtained from any terminal in private group to Restore data, complete data and restore, terminal can not obtain data in non-personal group, ensure the privacy of data.And in data In recovery process, encrypted transmission is carried out to data to be restored, it is ensured that the safety and reliability of data.In conclusion this reality The data reconstruction method for applying example offer has taken into account privacy, reliability and safety.
In one possible implementation, data to be restored are encrypted according to the terminal iidentification ID of third terminal , the Termination ID of third terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, the private key in a pair of secret keys It is stored in third terminal, for the encryption data received to be decrypted.
Fig. 5 is the flow chart of the another embodiment of data reconstruction method provided by the invention, as shown in figure 5, the present embodiment mentions The method of confession may include:
Step S501, the 4th terminal receives the data recovery request that third terminal is sent, third terminal and the 4th terminal category The same private group in distributed hashtable DHT network.
Step S502, the 4th terminal sends data to third terminal and restores instruction, data are restored according to data recovery request Instruction includes the data to be restored by encryption, and data restore instruction and complete data recovery for third terminal.
On the basis of the above embodiments, the present embodiment is combined above-described embodiment.Fig. 6 is number provided by the invention According to the signaling process figure of another embodiment of restoration methods.First terminal and second terminal in the present embodiment belong in DHT network The same private group.As shown in fig. 6, data reconstruction method provided in this embodiment, including:
Step S601, third terminal sends data recovery request to the 4th terminal.
Step S602, the 4th terminal generates data and restores instruction, it includes warp that data, which restore instruction, according to data recovery request Cross the data to be restored of encryption.
Step S603, the 4th terminal sends data to third terminal and restores to instruct.
Step S604, third terminal restores to instruct according to data, completes data and restores.
Data reconstruction method provided in this embodiment, by DHT network, can be obtained from any terminal in private group to Restore data, complete data and restore, terminal can not obtain data in non-personal group, ensure the privacy of data.And in data In recovery process, encrypted transmission is carried out to data to be restored, it is ensured that the safety and reliability of data.In conclusion this reality The data reconstruction method for applying example offer has taken into account privacy, reliability and safety.
The embodiment of the present invention also provides a kind of data backup device, and shown in Figure 7, the embodiment of the present invention is only with Fig. 7 For be illustrated, be not offered as that present invention is limited only to this.The data backup device can be mobile phone, computer, number Broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..Figure 7 be the structural schematic diagram of one embodiment of data backup device provided by the invention.As shown in fig. 7, data provided in this embodiment Alternate device 70 includes:Memory 701, processor 702 and bus 703.Wherein, bus 703 is for realizing between each element Connection.
Computer program is stored in memory 701, computer program may be implemented above-mentioned when being executed by processor 702 The technical solution of one data back up method embodiment.
Wherein, be directly or indirectly electrically connected between memory 701 and processor 702, with realize data transmission or Interaction.It is electrically connected for example, these elements can be realized between each other by one or more of communication bus or signal wire, such as It can be connected by bus 703.The computer program for realizing data back up method, including at least one are stored in memory 701 A software function module that can be stored in the form of software or firmware in memory 701, processor 702 are stored in by operation Software program and module in memory 701, thereby executing various function application and data processing.
Memory 701 may be, but not limited to, and random access memory (Random Access Memory, referred to as: RAM), read-only memory (Read Only Memory, abbreviation:ROM), programmable read only memory (Programmable Read-Only Memory, referred to as:PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, referred to as:EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read- Only Memory, referred to as:EEPROM) etc..Wherein, memory 701 is for storing program, and processor 702 refers to receiving execution After order, program is executed.Further, the software program in above-mentioned memory 701 and module may also include operating system, can Including the various component softwares for management system task (such as memory management, storage equipment control, power management etc.) and/or Driving, and can be in communication with each other with various hardware or component software, to provide the running environment of other software component.
Processor 702 can be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 702 can To be general processor, including central processing unit (Central Processing Unit, abbreviation:CPU), network processing unit (Network Processor, referred to as:NP) etc..It may be implemented or execute disclosed each method, the step in the embodiment of the present invention Rapid and logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc.. It is appreciated that Fig. 7 structure be only illustrate, can also include than shown in Fig. 7 more perhaps less component or have with Different configuration shown in Fig. 7.Each component shown in fig. 7 can use hardware and/or software realization.
The embodiment of the present invention also provides a kind of data recovery apparatus, including:Memory, processor and computer program. Wherein, computer program stores in memory, and is configured as being executed by processor to realize any of the above-described data recovery side The technical solution of method embodiment.Its structure is similar with data backup device shown in Fig. 7, and details are not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer Program is executed by processor the technical solution to realize any of the above-described embodiment of the method.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, those skilled in the art should understand that:Its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of data back up method, which is characterized in that including:
First terminal is treated Backup Data and is encrypted;
The first terminal sends data backup command to second terminal, and the data backup command includes by encryption to standby Part data, the data backup command back up the data received for the second terminal, the first terminal and The second terminal belongs to the same private group in distributed hashtable DHT network.
2. being encrypted the method according to claim 1, wherein the first terminal treats Backup Data Including:
The first terminal is encrypted the data to be backed up according to the terminal iidentification ID of the second terminal, described The Termination ID of second terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, the private key in the pair of key It is stored in the second terminal, for the encryption data received to be decrypted.
3. the method according to claim 1, wherein the method also includes:
If the data by backup change, the first terminal sends data more new command, institute to the second terminal Update of the data more new command for the complete paired data of the second terminal is stated, the data more new command includes the type of operation With the data of update.
4. a kind of data back up method, which is characterized in that including:
Second terminal receives the data backup command that first terminal is sent, and the data backup command includes by encryption to standby Part data, the first terminal and the second terminal belong to the same private group in distributed hashtable DHT network;
The second terminal is decrypted the data to be backed up by encryption according to the data backup command, and will Data after decryption are stored in the second terminal and are backed up.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The second terminal receives the data more new command that the first terminal is sent, and the data more new command includes operation The data of type and update;
The second terminal is updated the data of backup according to the data more new command.
6. a kind of data reconstruction method, which is characterized in that including:
Third terminal sends data recovery request to the 4th terminal, and the third terminal and the 4th terminal belong to distributed Kazakhstan The same private group in uncommon table DHT network;
The third terminal receives the data that the 4th terminal is sent and restores to instruct, and it includes by adding that the data, which restore instruction, Close data to be restored;
The third terminal restores to instruct according to the data, completes data and restores.
7. according to the method described in claim 6, it is characterized in that, the data to be restored are the ends according to the third terminal End mark ID is encrypted, and the Termination ID of the third terminal is the public affairs generated in a pair of secret keys according to asymmetric cryptographic algorithm Key, the private key in the pair of key is stored in the third terminal, for the encryption data received to be decrypted.
8. a kind of data reconstruction method, which is characterized in that including:
4th terminal receives the data recovery request that third terminal is sent, and the third terminal and the 4th terminal belong to distribution The same private group in formula Hash table DHT network;
4th terminal sends data to the third terminal and restores instruction, the data according to the data recovery request Recovery instruction includes the data to be restored by encryption, and it is extensive for third terminal completion data that the data restore instruction It is multiple.
9. a kind of data backup device, which is characterized in that including:
Memory;
Processor;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor to realize such as The described in any item methods of claim 1-5.
10. a kind of data recovery apparatus, which is characterized in that including:
Memory;
Processor;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor to realize such as The described in any item methods of claim 6-8.
CN201810585520.1A 2018-06-08 2018-06-08 Data backup, data reconstruction method and equipment Pending CN108829539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810585520.1A CN108829539A (en) 2018-06-08 2018-06-08 Data backup, data reconstruction method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810585520.1A CN108829539A (en) 2018-06-08 2018-06-08 Data backup, data reconstruction method and equipment

Publications (1)

Publication Number Publication Date
CN108829539A true CN108829539A (en) 2018-11-16

Family

ID=64144363

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810585520.1A Pending CN108829539A (en) 2018-06-08 2018-06-08 Data backup, data reconstruction method and equipment

Country Status (1)

Country Link
CN (1) CN108829539A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547203A (en) * 2018-12-25 2019-03-29 深圳市安信认证系统有限公司 A kind of backup method of private key, back-up device and terminal device
CN109783275A (en) * 2018-12-17 2019-05-21 北京春鸿科技有限公司 The method and terminal of file backup are carried out to multiple wifi storage equipment
CN110324395A (en) * 2019-01-31 2019-10-11 林德(中国)叉车有限公司 A kind of IOT device data processing method based on double-stranded chain
CN110727546A (en) * 2019-09-06 2020-01-24 深圳开源互联网安全技术有限公司 Automobile data backup method and device
CN111935697A (en) * 2020-08-06 2020-11-13 中国联合网络通信集团有限公司 eSIM discovery service method, discovery server and eSIM terminal
CN112422744A (en) * 2020-09-28 2021-02-26 深圳市修远文化创意有限公司 Method for unlocking mobile phone, mobile phone and computer
CN113194121A (en) * 2021-04-15 2021-07-30 许家源 File backup method between electronic devices
CN115114083A (en) * 2022-03-14 2022-09-27 重庆紫光华山智安科技有限公司 Storage disaster tolerance method, device, equipment and medium based on video monitoring platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222325A (en) * 2008-01-23 2008-07-16 西安西电捷通无线网络通信有限公司 Wireless multi-hop network key management method based on ID
CN101505473A (en) * 2008-02-05 2009-08-12 华为技术有限公司 Method and apparatus for telecommunication network user data storage management
CN103597783A (en) * 2011-06-03 2014-02-19 苹果公司 System and method for secure instant messaging
US20150006895A1 (en) * 2009-06-01 2015-01-01 Maidsafe Foundation Distributed network system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222325A (en) * 2008-01-23 2008-07-16 西安西电捷通无线网络通信有限公司 Wireless multi-hop network key management method based on ID
CN101505473A (en) * 2008-02-05 2009-08-12 华为技术有限公司 Method and apparatus for telecommunication network user data storage management
US20150006895A1 (en) * 2009-06-01 2015-01-01 Maidsafe Foundation Distributed network system
CN103597783A (en) * 2011-06-03 2014-02-19 苹果公司 System and method for secure instant messaging

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李文俊 等: "《P2P备份系统的协作机制研究》", 《计算机工程与设计》 *
杨晓元: "《现代密码学》", 28 February 2009 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109783275A (en) * 2018-12-17 2019-05-21 北京春鸿科技有限公司 The method and terminal of file backup are carried out to multiple wifi storage equipment
CN109547203A (en) * 2018-12-25 2019-03-29 深圳市安信认证系统有限公司 A kind of backup method of private key, back-up device and terminal device
CN110324395A (en) * 2019-01-31 2019-10-11 林德(中国)叉车有限公司 A kind of IOT device data processing method based on double-stranded chain
CN110324395B (en) * 2019-01-31 2022-04-19 林德(中国)叉车有限公司 IOT equipment data processing method based on double heavy chains
CN110727546A (en) * 2019-09-06 2020-01-24 深圳开源互联网安全技术有限公司 Automobile data backup method and device
CN111935697A (en) * 2020-08-06 2020-11-13 中国联合网络通信集团有限公司 eSIM discovery service method, discovery server and eSIM terminal
CN111935697B (en) * 2020-08-06 2022-08-19 中国联合网络通信集团有限公司 eSIM discovery service method, discovery server and eSIM terminal
CN112422744A (en) * 2020-09-28 2021-02-26 深圳市修远文化创意有限公司 Method for unlocking mobile phone, mobile phone and computer
CN113194121A (en) * 2021-04-15 2021-07-30 许家源 File backup method between electronic devices
CN115114083A (en) * 2022-03-14 2022-09-27 重庆紫光华山智安科技有限公司 Storage disaster tolerance method, device, equipment and medium based on video monitoring platform

Similar Documents

Publication Publication Date Title
CN108829539A (en) Data backup, data reconstruction method and equipment
CN108600227B (en) Medical data sharing method and device based on block chain
US11387999B2 (en) Access to secured information
CN111740966B (en) Data processing method based on block chain network and related equipment
CN110881063A (en) Storage method, device, equipment and medium of private data
CN112686668A (en) Alliance chain cross-chain system and method
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
CN107172001B (en) Control method and device of website proxy server and key proxy server
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
CN110635912A (en) Data processing method and device
CN114205093B (en) Block chain message transmission method, device, client and storage medium
JP6510137B2 (en) Server and client operating method, server, and client device
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN113449322A (en) Data sharing method and device based on block chain, electronic equipment and readable medium
CN110784318B (en) Group key updating method, device, electronic equipment, storage medium and communication system
CN111553686A (en) Data processing method and device, computer equipment and storage medium
CN110598427A (en) Data processing method, system and storage medium
CN113452513B (en) Key distribution method, device and system
CN113206745B (en) Digital certificate management method and device
US20230247106A1 (en) Proxy method, device, and computer-readable storage medium
Kim et al. Data block management scheme based on secret sharing for HDFS
CN113206738A (en) Digital certificate management method and device
CN113034140A (en) Method, system, equipment and storage medium for realizing intelligent contract encryption
US10382211B1 (en) Apparatus and method for automating secure email for multiple personas
KR20190111748A (en) Method for generating address information used in transaction of cryptocurrency based on blockchain, electronic apparatus and computer readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116