CN108829539A - Data backup, data reconstruction method and equipment - Google Patents
Data backup, data reconstruction method and equipment Download PDFInfo
- Publication number
- CN108829539A CN108829539A CN201810585520.1A CN201810585520A CN108829539A CN 108829539 A CN108829539 A CN 108829539A CN 201810585520 A CN201810585520 A CN 201810585520A CN 108829539 A CN108829539 A CN 108829539A
- Authority
- CN
- China
- Prior art keywords
- data
- terminal
- backup
- encryption
- command
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Abstract
The embodiment of the present invention provides a kind of data backup, data reconstruction method and equipment.This method includes:First terminal is treated Backup Data and is encrypted, first terminal sends data backup command to second terminal, data backup command includes the data to be backed up by encryption, data backup command backs up the data received for second terminal, and first terminal and second terminal belong to the same private group in distributed hashtable DHT network.The method of the embodiment of the present invention carries out data backup, and data encrypted transmission in backup procedure between mutual reliable terminal, has taken into account the reliability and privacy of data by belonging to same private group.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of data backups, data reconstruction method and equipment.
Background technique
User can be generated when using communication service, Internet service on the terminal devices such as mobile phone, computer
Personal data, these personal data need to obtain appropriate preservation, so that user being capable of fast quick-recovery in replacement terminal equipment.
Personal address book is a kind of important personal data, how illustrates the prior art by taking personal address book as an example below
It is backed up.After user has replaced mobile phone or resets mobile phone, it would be desirable to quickly restore address list.Often at present
Method has following several:
1) pass through subscriber identification card (Subscriber Identification Module, abbreviation:SIM) card turns
It deposits.Address list is exported to SIM card on the old handsets by user, and SIM card is inserted into new cell-phone, is then led from SIM card by address list
Enter new cell-phone.
2) pass through mobile memory unloading.For example storage card is used, address list is exported to storage on the old handsets by user
Card, is inserted into new cell-phone for storage card, then imports new cell-phone from storage card by address list.
3) pass through cloud service unloading.There are many cloud service providers to provide communication address book stored at present and restores function, user
Address list is uploaded into cloud on the old handsets, is recorded on new cell-phone from cloud download communication.
By SIM card and mobile memory unloading, although data privacy is secure, limit it is more, reliability without
Method guarantees, such as old mobile phone loses or damage, can not just export legacy data, will lead to loss of data.Turned by cloud service
Deposit data convenience and high reliablity, but personal data storage is beyond the clouds, there is the possibility read by cloud service provider, data privacy
It is difficult to ensure.
In conclusion carrying out data backup and data reconstruction method in the prior art, the reliable of data can not be combined
Property and data privacy, be not able to satisfy the demand that user restores data backup and data.
Summary of the invention
The embodiment of the present invention provides a kind of data backup, data reconstruction method and equipment, can not to solve the prior art
Combine the reliability of data and the privacy concerns of data.
In a first aspect, the embodiment of the present invention provides a kind of data back up method, including:
First terminal is treated Backup Data and is encrypted;
First terminal sends data backup command to second terminal, and data backup command includes the number to be backed up by encryption
According to data backup command backs up the data received for second terminal, and first terminal and second terminal belong to distribution
The same private group in formula Hash table DHT network.
In one possible implementation, first terminal treat Backup Data be encrypted including:
First terminal is treated Backup Data according to the terminal iidentification ID of second terminal and is encrypted, the end of second terminal
Holding ID is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, and the private key in a pair of secret keys is stored in second terminal
In, for the encryption data received to be decrypted.
In one possible implementation, the method also includes:
If the data by backup change, first terminal sends data more new command to second terminal, and data are more
New command is used for the update of the complete paired data of second terminal, and data more new command includes the type of operation and the data of update.
Second aspect, the embodiment of the present invention provide a kind of data back up method, including:
Second terminal receives the data backup command that first terminal is sent, and data backup command includes by encryption to standby
Part data, first terminal and second terminal belong to the same private group in distributed hashtable DHT network;
Second terminal is decrypted the data to be backed up by encryption according to data backup command, and will be after decryption
Data are stored in second terminal and are backed up.
In one possible implementation, the method also includes:
Second terminal receives the data more new command that first terminal is sent, and data more new command includes the type and more of operation
New data;
Second terminal is updated the data of backup according to data more new command.
The third aspect, the embodiment of the present invention provide a kind of data reconstruction method, including:
Third terminal sends data recovery request to the 4th terminal, and third terminal and the 4th terminal belong to distributed hashtable
The same private group in DHT network;
Third terminal receives the data that the 4th terminal is sent and restores instruction, and it includes by encryption to extensive that data, which restore instruction,
Complex data;
Third terminal restores to instruct according to data, completes data and restores.
In one possible implementation, data to be restored are encrypted according to the terminal iidentification ID of third terminal
, the Termination ID of third terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, the private key in a pair of secret keys
It is stored in third terminal, for the encryption data received to be decrypted.
Fourth aspect, the embodiment of the present invention provide a kind of data reconstruction method, including:
4th terminal receives the data recovery request that third terminal is sent, and third terminal and the 4th terminal belong to distributed Kazakhstan
The same private group in uncommon table DHT network;
4th terminal sends data to third terminal and restores instruction, data restore instruction and include according to data recovery request
By the data to be restored of encryption, data restore instruction and complete data recovery for third terminal.
5th aspect, the embodiment of the present invention provide a kind of data backup device, including:
Memory;
Processor;And
Computer program;
Wherein, computer program stores in memory, and is configured as being executed by processor to realize such as first aspect
With the method for any one of second aspect.
6th aspect, the embodiment of the present invention provide a kind of data recovery apparatus, including:
Memory;
Processor;And
Computer program;
Wherein, computer program stores in memory, and is configured as being executed by processor to realize such as the third aspect
With the method for any one of fourth aspect.
Data backup, data reconstruction method and equipment provided in an embodiment of the present invention, by DHT network, by a certain terminal
In data backup to belonging in each terminal of same private group with the terminal, not only ensured the privacy of data, but also
By multiple duplication, the reliability of data is improved, further by carrying out encrypted transmission, the peace of the data of raising to data
Quan Xing.In conclusion data back up method provided in an embodiment of the present invention has taken into account the privacy, reliability and safety of data
Property.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the flow chart of one embodiment of data back up method provided by the invention;
Fig. 2 is the flow chart of the another embodiment of data back up method provided by the invention;
Fig. 3 is the signaling process figure of another embodiment of data back up method provided by the invention;
Fig. 4 is the flow chart of one embodiment of data reconstruction method provided by the invention;
Fig. 5 is the flow chart of the another embodiment of data reconstruction method provided by the invention;
Fig. 6 is the signaling process figure of another embodiment of data reconstruction method provided by the invention;
Fig. 7 is the structural schematic diagram of one embodiment of data backup device provided by the invention.
Through the above attached drawings, it has been shown that the specific embodiment of the present invention will be hereinafter described in more detail.These attached drawings
It is not intended to limit the scope of the inventive concept in any manner with verbal description, but is by referring to specific embodiments
Those skilled in the art illustrate idea of the invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Term " includes " and " having " and their any deformations in description and claims of this specification, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include the other step or units intrinsic for these process, methods, product or equipment.
" first " and " second " in the present invention only plays mark action, be not understood to indicate or imply ordinal relation,
Relative importance or the quantity for implicitly indicating indicated technical characteristic." multiple " refer to two or more." and/
Or ", the incidence relation of affiliated partner is described, indicates may exist three kinds of relationships, for example, A and/or B, can indicate:Individually deposit
In A, A and B, these three situations of individualism B are existed simultaneously.It is a kind of "or" that character "/", which typicallys represent forward-backward correlation object,
Relationship.
" one embodiment " or " embodiment " mentioned in the whole text in specification of the invention means related with embodiment
A particular feature, structure, or characteristic include at least one embodiment of the application.Therefore, occur everywhere in the whole instruction
" in one embodiment " or " in one embodiment " not necessarily refer to identical embodiment.It should be noted that not rushing
In the case where prominent, the feature in embodiment and embodiment in the present invention be can be combined with each other.
It should be noted that the private group in the embodiment of the present invention is the own terminal by user, it is based on peer-to-peer network structure
It builds.Own terminal includes the one's own more terminals of user, for example, the mobile phone of user, computer and other there is networking function
Can equipment, can also include the terminal of terminal, such as spouse, parent, children of people etc. of users to trust, in same private group
Each terminal between mutually trust.How the more terminals that user is described more detail below to construct private group, i.e. private group
Building process.
Equity (Peer to Peer, referred to as:P2P) communication technology is a kind of Internet communication technology, with client/service
(Client/Server is referred to as device:C/S) or browser/server (Browser/Server, referred to as:B/S) framework is different,
P2P can make directly to establish communication between two user terminals, do not need server and carry out transfer.In the embodiment of the present invention
P2P network is realized based on distributed hashtable (Distributed Hash Table, abbreviation DHT) technology.Multiple user terminals
By DHT algorithm formed a DHT network, the present invention for DHT algorithm concrete form with no restrictions.In internet, by
In Internet protocol (Internet Protocol, the abbreviation of terminal:IP) address often changes, when a terminal can not
When knowing the address of another terminal, other side can not be just connected.DHT network is substantially an addressable network, in this network
In, each terminal is known as a node, and each node has a mark (Identity, abbreviation:ID), ID is regular length
Data, the method that different DHT networks has different distribution ID.When two nodes need to communicate, other side can be found by ID,
Data are exchanged so as to directly establish connection with other side.DHT network needs to rely on terminal node to mention for other terminal nodes
For route service, therefore the nodes are more, and accessibility is more secure.
It in one possible implementation, can be each of DHT network node, basic of distribution asymmetric cryptography
A pair of secret keys that algorithm generates, one of them is private key, and one is public key, using public key as the ID of node.It is specific asymmetric
Cryptographic algorithm can use such as RSA Algorithm or ECC algorithm, and the present invention is without limitation.
Private group is created by the 1st terminal, is then continuously added other terminals, and ultimately forming one includes multiple terminals
Private group.Its process is:
1st terminal generates a pair of secret keys according to asymmetric cryptographic algorithm, wherein private key stores in the terminal, public key
As the node ID of the terminal, DHT network is added with the ID.One title for being easy memory can also be set for the terminal, made
For the nodename of the terminal.User operates creation private group at the terminal, and the group name of private group is arranged.
2nd terminal generates a pair of secret keys according to asymmetric cryptographic algorithm, wherein private key stores in the terminal, public key
As the node ID of the terminal, DHT network is added with the ID.One title for being easy memory can also be set for the terminal, made
For the nodename of the terminal.The node ID of the 2nd terminal and nodename are sent to the 1st terminal by certain mode,
Can using such as Mobile SMS, social networks, Email, scan the two-dimensional code, user is manually entered mode and is transmitted.It will
The node ID and nodename of 2nd terminal are stored in the 1st terminal.
1st terminal by DHT network, by the node ID of the 1st terminal, nodename, private group the data such as group name
It is sent to the 2nd terminal.Before data are sent, the node ID of the 2nd terminal, i.e. public key is can be used in the 1st terminal, to pending
The data sent are encrypted.Using the mode of public key encryption data it is general there are two types of:The public affairs generated using asymmetric cryptographic algorithm
The direct encryption data of key;Or temporarily according to symmetric cryptographic algorithm, such as DES, AES, key K is generated, using K encryption data,
ID encryption K is reused, data ciphertext and the ciphertext of K are sent together.The present invention to specific cipher mode with no restrictions.2nd
The data that platform terminal deciphering receives record the information such as the group name of the node ID of the 1st terminal, nodename, private group.So far
Private group is added in 2 terminals.
Hereafter, it adopts and other terminals is added successively in a like fashion.N platform terminal generates one according to asymmetric cryptographic algorithm
To key, wherein private key stores in the terminal, node ID of the public key as the terminal, and DHT network is added with the ID.May be used also
Think that the title for being easy memory, the nodename as the terminal is arranged in the terminal.By the node ID and section of N platform terminal
Point title issues the 1st to any one in N-1 platform terminal in some way, is denoted as terminal A here.It is whole that terminal A saves N platform
Private group is added in N platform terminal by the node ID and nodename at end, terminal A.Specifically, terminal A passes through DHT network, it will be whole
It holds the node ID of A, nodename, the group name of private group, have the number such as node ID and nodename of each terminal in private group
According to being sent to N platform terminal.Data send before, the node ID of N platform terminal, i.e. public key can be used in terminal A, to data into
Row encryption.The data that N platform terminal deciphering receives record all data.
Terminal A generates an addition end command, and order parameter includes the node ID of N platform terminal, nodename, individual
The group name etc. of group.Terminal A is connected to the network existing other terminals in private group by DHT, if terminal A will add on capable of connecting
Add end command to be sent to the terminal, is encrypted before sending using the node ID of the terminal.Receive the terminal of addition end command
Ciphertext data simultaneously executes instruction.If certain terminal does not connect, it is denoted as terminal B, then terminal A will add end command and terminal B
Node ID be saved in a queue instructions to be performed of terminal A.After terminal B is online, actively connect each in private group
Whether platform terminal, inquiry have pending instruction, if any then acquisition instruction and execute.
Any terminal in private group, is denoted as terminal A, other terminal deletions in private group can be denoted as terminal C.
After deletion, terminal A generates a deletion end command, and order parameter includes node ID, nodename, the private group of terminal C
Group name etc..Terminal A is connected to the network other terminals in private group by DHT, if on capable of connecting, terminal A refers to terminal is deleted
Order is sent to the terminal, is encrypted before sending using the node ID of the terminal.It receives terminal deciphering data and executes instruction.If certain
Platform terminal B does not connect, then the ID for deleting end command and terminal B is saved in a queue instructions to be performed by terminal A.Terminal
After B is online, each terminal in private group is actively connected, whether inquiry has pending instruction, simultaneously if any then acquisition instruction
It executes.
By the above method, the same private group can be added in the own terminal possessed by user, in this way, each terminal
On can all be stored with the complete information of private group.The data communication between terminal in same private group by way of encryption into
Row, improves the safety and reliability of data.Each terminal in same private group belongs to the own terminal of same user, mentions
The high privacy of data.
Fig. 1 is the flow chart of one embodiment of data back up method provided by the invention, as shown in Figure 1, the present embodiment provides
Method may include:
Step S101, first terminal is treated Backup Data and is encrypted.
First terminal can be any one own terminal of user, and first terminal can be mobile phone, computer, number
Word broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
The data for being able to carry out backup may include the total data being stored in first terminal, such as may include:Address list, day
It goes through, picture, music, video, recording file, short message, Email etc..Data to be backed up in the present embodiment can be according to user
Demand be configured, may include partly or completely data.
In order to improve safety and reliability, encryption has been carried out for data to be backed up in the present embodiment.This implementation
Example for specific encryption mode with no restriction.
Step S102, first terminal sends data backup command to second terminal, and data backup command includes by encryption
Data to be backed up, data backup command backs up the data received for second terminal, and first terminal and second is eventually
End belongs to the same private group in distributed hashtable DHT network.
Second terminal in the present embodiment may include other all terminals in private group in addition to first terminal.Example
Such as, the private group set up for one by 5 terminals, second terminal may include 4 terminals.It is of course also possible to as needed
Only include the other parts terminal in private group in addition to first terminal.
Illustrate data back up method provided in this embodiment for backing up cell phone address book.If by mobile phone, plate
This 4 terminal devices of computer, laptop and personal digital assistant are based on one private group of DHT network construction, and 4
Terminal is online.Data to be backed up are the address book data being stored in mobile phone, i.e., first terminal is mobile phone, and second terminal can be with
Including tablet computer, laptop and personal digital assistant.Mobile phone first encrypts the address book data of itself storage,
Then data backup command is generated, which includes encrypted address book data, will be given birth to finally by DHT network
At data backup command be sent to tablet computer, laptop and personal digital assistant.Tablet computer, laptop and
Personal digital assistant is decrypted and saves after receiving data backup command, to the address book data of encryption.So far, just will
Address book data in mobile phone backs up in the multiple terminals for belonging to same private group with the mobile phone.Even if in this way, wherein certain
One terminal fault, will not lead to loss of data, by multiple duplication, further improve the reliability of data backup.And
Method provided in this embodiment is not limited by place to use and terminal room distance, convenient, flexible, for example, can be in an office
Address book data in mobile phone is backed up in the tablet computer of position at home.
It should be noted that if then first terminal can be by data backup command when a certain terminal in private group is not online
It is stored in the queue instructions to be performed of first terminal with the Termination ID.It, will according to the inquiry instruction of terminal after terminal is online
Data backup command is sent to corresponding terminal.
Data back up method provided in this embodiment, by DHT network, by the data backup in a certain terminal to the end
End belongs in each terminal of same private group, has not only ensured the privacy of data, but also by multiple duplication, improves number
According to reliability, further by data carry out encrypted transmission, the safety of the data of raising.In conclusion this implementation
The data back up method that example provides has taken into account the privacy, reliability and safety of data.
In one possible implementation, first terminal can be according to the terminal iidentification ID of second terminal to number to be backed up
According to being encrypted, the Termination ID of second terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, a pair of
Private key in key is stored in second terminal, for the encryption data received to be decrypted.
Illustrate data back up method provided in this embodiment still for backing up cell phone address book.Equally be by mobile phone,
This 4 terminal devices of tablet computer, laptop and personal digital assistant, based on one private group of DHT network construction, and
4 terminals are online.When mobile phone sends data backup command to tablet computer, according to the ID of tablet computer to address book data
It is encrypted, when mobile phone sends data backup command to laptop, according to the ID of laptop to address book data
It is encrypted, when mobile phone sends data backup command to personal digital assistant, according to the ID of personal digital assistant to address list
Data are encrypted, i.e., are encrypted according to the ID of each target terminal.Since each Termination ID is different, use different
Key is encrypted, and further improves the safety of data in data backup.
In one possible implementation, the method also includes:If the data by backup change, first
Terminal sends data more new command to second terminal, and data more new command is used for the update of the complete paired data of second terminal, data
More new command includes the type of operation and the data of update.
The personal data being stored in terminal device often change, such as user can carry out address book data
The operations such as addition, modification, deletion.Photo in mobile phone photo album can also increase after the user takes the picture.If after changing every time all
Again total data is backed up, not only will increase the burden at the network DHT, can also waste storage resource, data backup low efficiency.This reality
The case where example changes for data is applied, a kind of efficient data back up method is proposed.After data change, generate
Data more new command carries out local updating to the data of change, improves the efficiency of data backup.Operation in the present embodiment
Type includes but is not limited to:Increase, modify, delete etc..
Illustrate data back up method provided in this embodiment still for backing up cell phone address book.When user is logical in mobile phone
In news record when having created a business card, data more new command can be generated, the data including update, i.e. newly-built business card data,
It is with the type of operation, i.e., newly-increased.Without including the total data in whole mobile phone address list.Second terminal is receiving data
After more new command, only corresponding operation need to be executed according to data of the action type in instruction to update.For example, plate is electric
Brain need to only increase newly-built name the piece number in the data more new command generated after receiving newly-built business card in original Backup Data
According to improving the efficiency of data backup.
First terminal can periodically carry out data update, such as be updated as unit of day, can also be touched with event
Hair property is updated.
Data back up method provided in this embodiment, by local updating, is mentioned when the data by backup change
The high efficiency of data backup, and by updating the Backup Data being synchronized in private group in each terminal.
Fig. 2 is the flow chart of the another embodiment of data back up method provided by the invention, as shown in Fig. 2, the present embodiment mentions
The method of confession may include:
Step S201, second terminal receives the data backup command that first terminal is sent, and data backup command includes passing through
The data to be backed up of encryption, first terminal and second terminal belong to the same private group in distributed hashtable DHT network.
Step S202, second terminal is decrypted the data to be backed up by encryption according to data backup command, and will
Data after decryption, which are stored in second terminal, to be backed up.
In one possible implementation, the method also includes:Second terminal receives the data that first terminal is sent
More new command, data more new command include the type of operation and the data of update, and second terminal is according to data more new command, to standby
The data of part are updated.
On the basis of the above embodiments, the present embodiment is combined above-described embodiment.Fig. 3 is number provided by the invention
According to the signaling process figure of another embodiment of backup method.First terminal and second terminal in the present embodiment belong in DHT network
The same private group.As shown in figure 3, the data back up method that the present embodiment improves, including:
Step S301, first terminal is treated Backup Data according to second terminal ID and is encrypted.
Step S302, first terminal to second terminal send data backup command, data backup command include encryption to
Backup Data.
Step S303, second terminal completes data backup according to data backup command.
Step S304, the data by backup being stored in first terminal change.
Step S305, first terminal sends data more new command to second terminal, which includes the type and more of operation
New data.
Step S306, second terminal is updated the data of backup according to data more new command.
Data back up method provided in this embodiment, by DHT network, by the data backup in a certain terminal to the end
End belongs in each terminal of same private group, has not only ensured the privacy of data, but also by multiple duplication, improves number
According to reliability, further by data carry out encrypted transmission, the safety of the data of raising, and by backup number
When according to changing, by local updating, it is expeditiously synchronized the Backup Data in private group in each terminal.
Fig. 4 is the flow chart of one embodiment of data reconstruction method provided by the invention, as shown in figure 4, the present embodiment provides
Method may include:
Step S401, third terminal sends data recovery request to the 4th terminal, and third terminal and the 4th terminal belong to point
The same private group in cloth Hash table DHT network.
When terminal needs to restore the data by backup, data can be sent to the terminal for being stored with Backup Data and restored
Request.The case where restoring Backup Data is needed to may include, user has replaced new terminal, the loss of data in original terminal,
Factory reset such as has been carried out to terminal, has been formatted.The case where for replacement terminal, needs first before data recovery
First the terminal after replacement to be added in the former private group for carrying out data backup.Specific Adding Way can refer to aforementioned implementation
Example, details are not described herein again.
The 4th terminal in the present embodiment can be any terminal in the affiliated private group of third terminal.In the present embodiment
Data recovery request can request the data for restoring all to have backed up, can also request recovered part data.For example, ought be
When the data being backed up include cell phone address book, mobile phone photo album, mobile phone short message, it can simply request and restore mobile communication therein
Record.It may include the mark of data to be restored when requesting recovered part data, in data recovery request.
Step S402, the data that third terminal receives that the 4th terminal is sent restore instruction, and it includes passing through that data, which restore instruction,
The data to be restored of encryption.
4th terminal can be treated after the data recovery request for receiving third terminal transmission according to data recovery request
Data are replied to be encrypted.And send data to third terminal and restore instruction, it include encrypted to be restored in the instruction
Data.
Step S403, third terminal restores to instruct according to data, completes data and restores.
Third terminal decrypts data to be restored therein, and according to the data of recovery after receiving data and restoring instruction
Type carries out respective handling, completes data and restores.For example, after decryption, being conducted into mobile phone for cell phone address book data
Telephone book applications.For mobile phone photo album data, after decryption, can be conducted into Photo Browser application.
Data reconstruction method provided in this embodiment, by DHT network, can be obtained from any terminal in private group to
Restore data, complete data and restore, terminal can not obtain data in non-personal group, ensure the privacy of data.And in data
In recovery process, encrypted transmission is carried out to data to be restored, it is ensured that the safety and reliability of data.In conclusion this reality
The data reconstruction method for applying example offer has taken into account privacy, reliability and safety.
In one possible implementation, data to be restored are encrypted according to the terminal iidentification ID of third terminal
, the Termination ID of third terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, the private key in a pair of secret keys
It is stored in third terminal, for the encryption data received to be decrypted.
Fig. 5 is the flow chart of the another embodiment of data reconstruction method provided by the invention, as shown in figure 5, the present embodiment mentions
The method of confession may include:
Step S501, the 4th terminal receives the data recovery request that third terminal is sent, third terminal and the 4th terminal category
The same private group in distributed hashtable DHT network.
Step S502, the 4th terminal sends data to third terminal and restores instruction, data are restored according to data recovery request
Instruction includes the data to be restored by encryption, and data restore instruction and complete data recovery for third terminal.
On the basis of the above embodiments, the present embodiment is combined above-described embodiment.Fig. 6 is number provided by the invention
According to the signaling process figure of another embodiment of restoration methods.First terminal and second terminal in the present embodiment belong in DHT network
The same private group.As shown in fig. 6, data reconstruction method provided in this embodiment, including:
Step S601, third terminal sends data recovery request to the 4th terminal.
Step S602, the 4th terminal generates data and restores instruction, it includes warp that data, which restore instruction, according to data recovery request
Cross the data to be restored of encryption.
Step S603, the 4th terminal sends data to third terminal and restores to instruct.
Step S604, third terminal restores to instruct according to data, completes data and restores.
Data reconstruction method provided in this embodiment, by DHT network, can be obtained from any terminal in private group to
Restore data, complete data and restore, terminal can not obtain data in non-personal group, ensure the privacy of data.And in data
In recovery process, encrypted transmission is carried out to data to be restored, it is ensured that the safety and reliability of data.In conclusion this reality
The data reconstruction method for applying example offer has taken into account privacy, reliability and safety.
The embodiment of the present invention also provides a kind of data backup device, and shown in Figure 7, the embodiment of the present invention is only with Fig. 7
For be illustrated, be not offered as that present invention is limited only to this.The data backup device can be mobile phone, computer, number
Broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..Figure
7 be the structural schematic diagram of one embodiment of data backup device provided by the invention.As shown in fig. 7, data provided in this embodiment
Alternate device 70 includes:Memory 701, processor 702 and bus 703.Wherein, bus 703 is for realizing between each element
Connection.
Computer program is stored in memory 701, computer program may be implemented above-mentioned when being executed by processor 702
The technical solution of one data back up method embodiment.
Wherein, be directly or indirectly electrically connected between memory 701 and processor 702, with realize data transmission or
Interaction.It is electrically connected for example, these elements can be realized between each other by one or more of communication bus or signal wire, such as
It can be connected by bus 703.The computer program for realizing data back up method, including at least one are stored in memory 701
A software function module that can be stored in the form of software or firmware in memory 701, processor 702 are stored in by operation
Software program and module in memory 701, thereby executing various function application and data processing.
Memory 701 may be, but not limited to, and random access memory (Random Access Memory, referred to as:
RAM), read-only memory (Read Only Memory, abbreviation:ROM), programmable read only memory (Programmable
Read-Only Memory, referred to as:PROM), erasable read-only memory (Erasable Programmable Read-Only
Memory, referred to as:EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-
Only Memory, referred to as:EEPROM) etc..Wherein, memory 701 is for storing program, and processor 702 refers to receiving execution
After order, program is executed.Further, the software program in above-mentioned memory 701 and module may also include operating system, can
Including the various component softwares for management system task (such as memory management, storage equipment control, power management etc.) and/or
Driving, and can be in communication with each other with various hardware or component software, to provide the running environment of other software component.
Processor 702 can be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 702 can
To be general processor, including central processing unit (Central Processing Unit, abbreviation:CPU), network processing unit
(Network Processor, referred to as:NP) etc..It may be implemented or execute disclosed each method, the step in the embodiment of the present invention
Rapid and logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc..
It is appreciated that Fig. 7 structure be only illustrate, can also include than shown in Fig. 7 more perhaps less component or have with
Different configuration shown in Fig. 7.Each component shown in fig. 7 can use hardware and/or software realization.
The embodiment of the present invention also provides a kind of data recovery apparatus, including:Memory, processor and computer program.
Wherein, computer program stores in memory, and is configured as being executed by processor to realize any of the above-described data recovery side
The technical solution of method embodiment.Its structure is similar with data backup device shown in Fig. 7, and details are not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer
Program is executed by processor the technical solution to realize any of the above-described embodiment of the method.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, those skilled in the art should understand that:Its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of data back up method, which is characterized in that including:
First terminal is treated Backup Data and is encrypted;
The first terminal sends data backup command to second terminal, and the data backup command includes by encryption to standby
Part data, the data backup command back up the data received for the second terminal, the first terminal and
The second terminal belongs to the same private group in distributed hashtable DHT network.
2. being encrypted the method according to claim 1, wherein the first terminal treats Backup Data
Including:
The first terminal is encrypted the data to be backed up according to the terminal iidentification ID of the second terminal, described
The Termination ID of second terminal is the public key generated in a pair of secret keys according to asymmetric cryptographic algorithm, the private key in the pair of key
It is stored in the second terminal, for the encryption data received to be decrypted.
3. the method according to claim 1, wherein the method also includes:
If the data by backup change, the first terminal sends data more new command, institute to the second terminal
Update of the data more new command for the complete paired data of the second terminal is stated, the data more new command includes the type of operation
With the data of update.
4. a kind of data back up method, which is characterized in that including:
Second terminal receives the data backup command that first terminal is sent, and the data backup command includes by encryption to standby
Part data, the first terminal and the second terminal belong to the same private group in distributed hashtable DHT network;
The second terminal is decrypted the data to be backed up by encryption according to the data backup command, and will
Data after decryption are stored in the second terminal and are backed up.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The second terminal receives the data more new command that the first terminal is sent, and the data more new command includes operation
The data of type and update;
The second terminal is updated the data of backup according to the data more new command.
6. a kind of data reconstruction method, which is characterized in that including:
Third terminal sends data recovery request to the 4th terminal, and the third terminal and the 4th terminal belong to distributed Kazakhstan
The same private group in uncommon table DHT network;
The third terminal receives the data that the 4th terminal is sent and restores to instruct, and it includes by adding that the data, which restore instruction,
Close data to be restored;
The third terminal restores to instruct according to the data, completes data and restores.
7. according to the method described in claim 6, it is characterized in that, the data to be restored are the ends according to the third terminal
End mark ID is encrypted, and the Termination ID of the third terminal is the public affairs generated in a pair of secret keys according to asymmetric cryptographic algorithm
Key, the private key in the pair of key is stored in the third terminal, for the encryption data received to be decrypted.
8. a kind of data reconstruction method, which is characterized in that including:
4th terminal receives the data recovery request that third terminal is sent, and the third terminal and the 4th terminal belong to distribution
The same private group in formula Hash table DHT network;
4th terminal sends data to the third terminal and restores instruction, the data according to the data recovery request
Recovery instruction includes the data to be restored by encryption, and it is extensive for third terminal completion data that the data restore instruction
It is multiple.
9. a kind of data backup device, which is characterized in that including:
Memory;
Processor;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor to realize such as
The described in any item methods of claim 1-5.
10. a kind of data recovery apparatus, which is characterized in that including:
Memory;
Processor;And
Computer program;
Wherein, the computer program stores in the memory, and is configured as being executed by the processor to realize such as
The described in any item methods of claim 6-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810585520.1A CN108829539A (en) | 2018-06-08 | 2018-06-08 | Data backup, data reconstruction method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810585520.1A CN108829539A (en) | 2018-06-08 | 2018-06-08 | Data backup, data reconstruction method and equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108829539A true CN108829539A (en) | 2018-11-16 |
Family
ID=64144363
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810585520.1A Pending CN108829539A (en) | 2018-06-08 | 2018-06-08 | Data backup, data reconstruction method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108829539A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547203A (en) * | 2018-12-25 | 2019-03-29 | 深圳市安信认证系统有限公司 | A kind of backup method of private key, back-up device and terminal device |
CN109783275A (en) * | 2018-12-17 | 2019-05-21 | 北京春鸿科技有限公司 | The method and terminal of file backup are carried out to multiple wifi storage equipment |
CN110324395A (en) * | 2019-01-31 | 2019-10-11 | 林德(中国)叉车有限公司 | A kind of IOT device data processing method based on double-stranded chain |
CN110727546A (en) * | 2019-09-06 | 2020-01-24 | 深圳开源互联网安全技术有限公司 | Automobile data backup method and device |
CN111935697A (en) * | 2020-08-06 | 2020-11-13 | 中国联合网络通信集团有限公司 | eSIM discovery service method, discovery server and eSIM terminal |
CN112422744A (en) * | 2020-09-28 | 2021-02-26 | 深圳市修远文化创意有限公司 | Method for unlocking mobile phone, mobile phone and computer |
CN113194121A (en) * | 2021-04-15 | 2021-07-30 | 许家源 | File backup method between electronic devices |
CN115114083A (en) * | 2022-03-14 | 2022-09-27 | 重庆紫光华山智安科技有限公司 | Storage disaster tolerance method, device, equipment and medium based on video monitoring platform |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222325A (en) * | 2008-01-23 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | Wireless multi-hop network key management method based on ID |
CN101505473A (en) * | 2008-02-05 | 2009-08-12 | 华为技术有限公司 | Method and apparatus for telecommunication network user data storage management |
CN103597783A (en) * | 2011-06-03 | 2014-02-19 | 苹果公司 | System and method for secure instant messaging |
US20150006895A1 (en) * | 2009-06-01 | 2015-01-01 | Maidsafe Foundation | Distributed network system |
-
2018
- 2018-06-08 CN CN201810585520.1A patent/CN108829539A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222325A (en) * | 2008-01-23 | 2008-07-16 | 西安西电捷通无线网络通信有限公司 | Wireless multi-hop network key management method based on ID |
CN101505473A (en) * | 2008-02-05 | 2009-08-12 | 华为技术有限公司 | Method and apparatus for telecommunication network user data storage management |
US20150006895A1 (en) * | 2009-06-01 | 2015-01-01 | Maidsafe Foundation | Distributed network system |
CN103597783A (en) * | 2011-06-03 | 2014-02-19 | 苹果公司 | System and method for secure instant messaging |
Non-Patent Citations (2)
Title |
---|
李文俊 等: "《P2P备份系统的协作机制研究》", 《计算机工程与设计》 * |
杨晓元: "《现代密码学》", 28 February 2009 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109783275A (en) * | 2018-12-17 | 2019-05-21 | 北京春鸿科技有限公司 | The method and terminal of file backup are carried out to multiple wifi storage equipment |
CN109547203A (en) * | 2018-12-25 | 2019-03-29 | 深圳市安信认证系统有限公司 | A kind of backup method of private key, back-up device and terminal device |
CN110324395A (en) * | 2019-01-31 | 2019-10-11 | 林德(中国)叉车有限公司 | A kind of IOT device data processing method based on double-stranded chain |
CN110324395B (en) * | 2019-01-31 | 2022-04-19 | 林德(中国)叉车有限公司 | IOT equipment data processing method based on double heavy chains |
CN110727546A (en) * | 2019-09-06 | 2020-01-24 | 深圳开源互联网安全技术有限公司 | Automobile data backup method and device |
CN111935697A (en) * | 2020-08-06 | 2020-11-13 | 中国联合网络通信集团有限公司 | eSIM discovery service method, discovery server and eSIM terminal |
CN111935697B (en) * | 2020-08-06 | 2022-08-19 | 中国联合网络通信集团有限公司 | eSIM discovery service method, discovery server and eSIM terminal |
CN112422744A (en) * | 2020-09-28 | 2021-02-26 | 深圳市修远文化创意有限公司 | Method for unlocking mobile phone, mobile phone and computer |
CN113194121A (en) * | 2021-04-15 | 2021-07-30 | 许家源 | File backup method between electronic devices |
CN115114083A (en) * | 2022-03-14 | 2022-09-27 | 重庆紫光华山智安科技有限公司 | Storage disaster tolerance method, device, equipment and medium based on video monitoring platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108829539A (en) | Data backup, data reconstruction method and equipment | |
CN108600227B (en) | Medical data sharing method and device based on block chain | |
US11387999B2 (en) | Access to secured information | |
CN111740966B (en) | Data processing method based on block chain network and related equipment | |
CN110881063A (en) | Storage method, device, equipment and medium of private data | |
CN112686668A (en) | Alliance chain cross-chain system and method | |
CN109660534B (en) | Multi-merchant-based security authentication method and device, electronic equipment and storage medium | |
CN107172001B (en) | Control method and device of website proxy server and key proxy server | |
CN110149323B (en) | Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity | |
CN110635912A (en) | Data processing method and device | |
CN114205093B (en) | Block chain message transmission method, device, client and storage medium | |
JP6510137B2 (en) | Server and client operating method, server, and client device | |
CN113365264B (en) | Block chain wireless network data transmission method, device and system | |
CN113449322A (en) | Data sharing method and device based on block chain, electronic equipment and readable medium | |
CN110784318B (en) | Group key updating method, device, electronic equipment, storage medium and communication system | |
CN111553686A (en) | Data processing method and device, computer equipment and storage medium | |
CN110598427A (en) | Data processing method, system and storage medium | |
CN113452513B (en) | Key distribution method, device and system | |
CN113206745B (en) | Digital certificate management method and device | |
US20230247106A1 (en) | Proxy method, device, and computer-readable storage medium | |
Kim et al. | Data block management scheme based on secret sharing for HDFS | |
CN113206738A (en) | Digital certificate management method and device | |
CN113034140A (en) | Method, system, equipment and storage medium for realizing intelligent contract encryption | |
US10382211B1 (en) | Apparatus and method for automating secure email for multiple personas | |
KR20190111748A (en) | Method for generating address information used in transaction of cryptocurrency based on blockchain, electronic apparatus and computer readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181116 |