CN109284203A - Secure data backup method and secure data backup system - Google Patents
Secure data backup method and secure data backup system Download PDFInfo
- Publication number
- CN109284203A CN109284203A CN201811003811.1A CN201811003811A CN109284203A CN 109284203 A CN109284203 A CN 109284203A CN 201811003811 A CN201811003811 A CN 201811003811A CN 109284203 A CN109284203 A CN 109284203A
- Authority
- CN
- China
- Prior art keywords
- file
- mobile terminal
- transmission
- packing
- backup device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 230000005540 biological transmission Effects 0.000 claims description 225
- 238000012856 packing Methods 0.000 claims description 108
- 238000012360 testing method Methods 0.000 claims description 68
- 238000012545 processing Methods 0.000 claims description 53
- 238000004806 packaging method and process Methods 0.000 claims description 50
- 230000009365 direct transmission Effects 0.000 claims description 30
- 230000006837 decompression Effects 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 11
- 238000010009 beating Methods 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 8
- 238000012217 deletion Methods 0.000 claims description 3
- 230000037430 deletion Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 15
- 230000006872 improvement Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 4
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000994 depressogenic effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Abstract
The invention discloses a kind of secure data backup method and secure data backup systems, wherein, this method comprises: when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out authentication, meanwhile backup device obtains the end message of mobile terminal and carries out terminal authentication;When authentication and terminal authentication pass through, allow the data backup in mobile terminal to backup device, and/or mobile terminal is allowed to read the data in backup device.The present invention not only needs the verifying by subscriber identity information, and need verifying by mobile terminal end message, it just can permit the data in mobile terminal reading backup device, or the data in permission backup device backup mobile terminal, therefore, both the Information Security for having improved mobile terminal and backup device also improves user experience degree.
Description
Technical field
The present invention relates to data safety backup technical field more particularly to a kind of secure data backup method and secure datas
Standby system.
Background technique
Intelligent mobile terminal is more more and more universal, and people are increasingly dependent on mobile terminal (such as mobile phone), and a variety of data are all deposited
It is stored in mobile terminal.When the capacity of memory device in mobile terminal is inadequate, need using external backup device to mobile terminal
Interior data are backed up, it is however generally that, the data backed up in this manner belong to private data, and therefore, user is general
It is not intended to other people to know the data information in the backup device.
But after existing backup device stores the data of some mobile terminal, with other mobile terminals or operation
When terminal (for example: desktop computer, projector etc.) establishes connection, other mobile terminals or operating terminal can also read backup
Data information in device causes the leakage of the data information in backup device, so that there are data safety performance is poor and user
The problem of usage experience difference.
Summary of the invention
It is existing to solve the purpose of the present invention is to provide a kind of secure data backup method and secure data backup system
Backup device, data safety performance is poor, causes the technical problem of user experience difference.
To solve the above-mentioned problems, the present invention provides a kind of secure data backup methods comprising following steps:
When detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out identity and tests
Card, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication;
When authentication and terminal authentication pass through, allow the data backup in mobile terminal to backup device, and/or
Mobile terminal is allowed to read the data in backup device.
As a further improvement of the present invention, backup device obtains the step of subscriber identity information, comprising:
Backup device receives the subscriber identity information of user's input;
Or, mobile terminal receives the subscriber identity information of user's input, and subscriber identity information is sent to backup device.
As a further improvement of the present invention, it before detecting the step of backup device and mobile terminal establish connection, also wraps
It includes:
Backup device judges whether to connect for the first time with mobile terminal;
When backup device is connect for the first time with mobile terminal, backup device obtains subscriber identity information and is stored, meanwhile, it is standby
Part device obtains the end message of mobile terminal and is stored.
As a further improvement of the present invention, secure data backup method further include:
When mobile terminal receives unbundlings instruction, unbundlings instruction is sent to backup device by mobile terminal;
Backup device deletion is corresponding with unbundlings instruction have been stored subscriber identity information and has stored end message.
As a further improvement of the present invention, allow after the step of the data backup in mobile terminal to backup device,
Further include:
When mobile terminal receives file backup request, the packing that mobile terminal calculates at least two test files adds transmission
Speed and direct transmission speed;
Mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to direct transmission speed
At least one first drafts test file, and at least one first is drafted file size in test file the smallest first and drafted
The file size of test file is as file propagation threshold;It is packaged plus passes at least two test files or, mobile terminal determines
Defeated speed be greater than direct transmission speed at least one second draft test file, and at least one second is drafted into test file
Middle file size maximum second drafts the file size of test file as file propagation threshold;
The file destination size of acquisition for mobile terminal file to be transmitted;
Mobile terminal carries out the first transmission file that file size in file to be transmitted is greater than file propagation threshold direct
Transmission passes after being packaged the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold
It is defeated.
As a further improvement of the present invention, file size in file to be transmitted is greater than file propagation threshold by mobile terminal
First transmission file directly transmitted, by file size in file to be transmitted less than or equal to file propagation threshold second
The step of transmission file is transmitted after being packaged, comprising:
Mobile terminal is packaged one or more second and transmits file, beating while file transmission is transmitted in carry out first
After packet one or more second transmits file completion, the second transmission file of the packing is transmitted.
As a further improvement of the present invention, file size in file to be transmitted is greater than file propagation threshold by mobile terminal
First transmission file directly transmitted, by file size in file to be transmitted less than or equal to file propagation threshold second
The step of transmission file is transmitted after being packaged, comprising:
While mobile terminal transmission the first transmission file, packing processing is carried out to the second transmission file, obtains the i-th packing
File, i=1;
Mobile terminal detects whether there is the second transmission file for not carrying out being packaged processing;Packing processing is not carried out when existing
Second transmission file when, transmit the i-th packaging file while, to do not carry out be packaged processing second transmission file be packaged
Processing, obtains i+1 packaging file;I++ repeats current procedures, until the second all transmission files carries out at packing
Reason, and the packaging file being packed into is transmitted.
As a further improvement of the present invention, while the first transmission of mobile terminal transmission file, to the second transmission file
The step of carrying out packing processing, obtaining 1 packaging file, comprising:
First file total amount of the first all transmission file of acquisition for mobile terminal, the first of detection the first transmission file pass
The packing speed of defeated speed and detection the second transmission file;
The first packing amount is calculated according to the first file total amount, the first transmission speed and packing speed in mobile terminal;
While mobile terminal transmission the first transmission file, the second transmission file of the first packing amount is carried out at packing
Reason, obtains the 1st packaging file.
As a further improvement of the present invention, while transmitting the i-th packaging file, do not carry out being packaged processing second is passed
The step of defeated file carries out packing processing, obtains i+1 packaging file, comprising:
Second transmission speed of the i-th packaging file of acquisition for mobile terminal;
The second packing amount is calculated according to the first packing amount, the second transmission speed and packing speed in mobile terminal;
The second transmission for not carrying out being packaged processing while mobile terminal transmits the i-th packaging file, to the second packing amount
File carries out packing processing, obtains i+1 packaging file.
As a further improvement of the present invention, file size in file to be transmitted is less than or equal to file propagation threshold
After the step of second transmission file is transmitted after being packaged, further includes:
Second after mobile terminal transmission is packaged transmits file to backup device;
When backup device receives the second transmission file after the packing, decompression obtains the second transmission file and deletes the packing
The second transmission file afterwards.
As a further improvement of the present invention, in packing process using the public key in mobile terminal to the second transmission file into
Row encryption is decrypted in decompression procedure using packaging file of the private key in backup device to the second transmission file,
Public key and private key are key pair.
As a further improvement of the present invention, file size in file to be transmitted is less than or equal to file propagation threshold
After the step of second transmission file is transmitted after being packaged, further includes:
Backup lists of documents in acquisition for mobile terminal backup device, and obtain and be backed up lists of documents in mobile terminal;
Acquisition for mobile terminal has backed up lists of documents and the comparison result for being backed up lists of documents, and according to comparison result into
Row incremental backup operations.
To solve the above-mentioned problems, the present invention also provides a kind of secure data backup systems comprising mobile terminal and
Backup device, mobile terminal and backup device carry out information exchange, realize above-mentioned safe transmission of data backup method.
Compared with prior art, the present invention not only needs the verifying by subscriber identity information, but also needs to pass through movement
The verifying of terminal information just can permit the data in mobile terminal reading backup device, or backup device allowed to back up movement
Therefore data in terminal had both improved the Information Security of mobile terminal and backup device, and had also improved user experience
Degree.
Detailed description of the invention
Fig. 1 is the flow diagram of secure data backup method one embodiment of the present invention;
Fig. 2 is the flow diagram of second embodiment of secure data backup method of the present invention
Fig. 3 is the flow diagram of secure data backup method third embodiment of the present invention;
Fig. 4 is the flow diagram of the 4th embodiment of secure data backup method of the present invention;
Fig. 5 is that file transmits test result schematic diagram in secure data backup method of the present invention;
Fig. 6 is the stream for directly transmitting in secure data backup method of the present invention with being packaged transmission combination process one embodiment
Journey schematic diagram;
Fig. 7 is the process signal of first transmission file transmission flow one embodiment in secure data backup method of the present invention
Figure;
Fig. 8 is the process signal of second transmission file transmission flow one embodiment in secure data backup method of the present invention
Figure;
Fig. 9 is the flow diagram of the 5th embodiment of secure data backup method of the present invention;
Figure 10 is the flow diagram of the 6th embodiment of secure data backup method of the present invention;
Figure 11 is the functional block diagram of secure data backup system one embodiment of the present invention;
Figure 12 is the functional block diagram of second embodiment of secure data backup system of the present invention;
Figure 13 is the functional block diagram of secure data backup system third embodiment of the present invention;
Figure 14 is the functional block diagram of the 4th embodiment of secure data backup system of the present invention;
Figure 15 is the function of document transmission module one embodiment of mobile terminal in secure data backup system of the present invention
Module diagram;
Figure 16 is the functional block diagram of the 5th embodiment of secure data backup system of the present invention;
Figure 17 is the functional block diagram of the 6th embodiment of secure data backup system of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, is clearly and completely retouched to the technical solution in embodiment
It states, similar reference numerals represent similar component in attached drawing.Obviously, will be described below embodiment is only the present invention one
Divide embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making
Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of creative work.
Fig. 1 illustrates one embodiment of secure data backup method of the present invention.It in the present embodiment, as shown in Figure 1, should
Secure data backup method includes the following steps:
Step S1, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out
Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
Specifically, when backup device and mobile terminal establish connection, backup device obtains subscriber identity information, and judges the user
Whether identity information matches with default authentication information, when subscriber identity information is matched with default authentication information, then
Show through authentication, meanwhile, backup device obtains the end message of mobile terminal, and judge the end message whether with it is default
Terminal authentication information matches then show to pass through terminal authentication when end message and default terminal authentication information matches.
In the present embodiment, backup device obtains the mode of subscriber identity information, can both be obtained by backup device itself,
Can be by acquisition for mobile terminal subscriber identity information, and subscriber identity information is sent to backup device.
1, backup device obtains subscriber identity information
For the technical solution of the present embodiment detailed further, to this by taking fingerprint key obtains subscriber identity information as an example
Case is described in detail.
Specifically, backup device is equipped with fingerprint key, which receives the finger print information of user's input, and this is referred to
Line information is as subscriber identity information.
2, acquisition for mobile terminal subscriber identity information
For the technical solution of the present embodiment detailed further, to this by taking fingerprint key obtains subscriber identity information as an example
Case is described in detail.
Specifically, mobile terminal is equipped with fingerprint key, which receives the finger print information of user's input, and should
Finger print information is sent to the backup device, and the backup device is using the finger print information as subscriber identity information.
It is to be appreciated that backup device obtains subscriber identity information using other devices or other modes in addition to fingerprint key
Technical solution, also within the protection scope of the present embodiment.
Further, in the present embodiment, the end message in the present embodiment includes a variety of, for detailed further
The technical solution of embodiment is described in detail this case for No. SN of mobile terminal.
Specifically, when backup device and mobile terminal establish connection, backup device obtains No. SN of mobile terminal, is made with this No. SN
Terminal authentication operation is carried out for end message.
It should be noted that being believed in addition to No. SN of mobile terminal using the other identifier information of mobile terminal as terminal
Breath, also within the protection scope of the present embodiment.
Step S2 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up
Device, and/or mobile terminal is allowed to read the data in backup device.
The present embodiment not only needs the verifying by subscriber identity information, but also needs through mobile terminal end message
Verifying only uses the mobile terminal by terminal authentication by the user of authentication, just can permit mobile terminal reading
Data in backup device, or allow the data in backup device backup mobile terminal, it is verified by double-point information, both improves movement
The Information Security of terminal and backup device also improves user experience degree.
Fig. 2 illustrates one embodiment of secure data backup method of the present invention.In the present embodiment, the secure data is standby
Part method includes the following steps:
Step S10, backup device judge whether to connect for the first time with mobile terminal;When backup device is connect for the first time with mobile terminal
When, execute step S11.When backup device with mobile terminal is non-connect for the first time when, execute step S12.
In the present embodiment, the judgement that is connected for the first time operates automatically, and is carried out automatically according to judging result different
Operation, to improve automatic performance.
Step S11, backup device obtain subscriber identity information and are stored, meanwhile, backup device obtains the end of mobile terminal
Client information is simultaneously stored.
It should be noted that in order to further enhance the security performance of terminal and backup device, before executing step S11,
Further include:
Backup device judges whether to get authorized order, when getting authorized order, executes step S11.When having not been obtained
When to authorized order, it is not responding to the communication connection request of current backup device and mobile terminal.
It should be noted that there are many modes of backup device acquisition authorized order, either being obtained by backup device itself
It takes, is also possible to through acquisition for mobile terminal authorized order.
Specifically, for the technical solution of the present embodiment detailed further, by taking fingerprint key as an example, this case is carried out detailed
It describes in detail bright.
1, backup device obtains authorized order
Specifically, backup device is equipped with fingerprint key, which receives the finger print information of user's input, judge that this refers to
Whether line information matches with preset fingerprint verification information, when finger print information is matched with preset fingerprint verification information, generates authorization
Instruction.
2, acquisition for mobile terminal authorized order
Specifically, mobile terminal is equipped with fingerprint key, which receives the finger print information of user's input, and judgement should
Whether finger print information matches with preset fingerprint verification information, and when finger print information is matched with preset fingerprint verification information, generation is awarded
Power instruction, and the authorized order is sent to backup device.
Step S12, backup device obtain subscriber identity information and carry out authentication, meanwhile, backup device obtains mobile terminal
End message and carry out terminal authentication.
In the present embodiment, step S12 is similar with above-mentioned steps S1, therefore, repeats no more.
Step S13 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up
Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S13 is similar with above-mentioned steps S2, therefore, repeats no more.
Fig. 3 illustrates one embodiment of secure data backup method of the present invention.In the present embodiment, the secure data is standby
Part method includes the following steps:
Step S20, when mobile terminal receives unbundlings instruction, unbundlings instruction is sent to backup device by mobile terminal.
Step S21, backup device deletion is corresponding with unbundlings instruction have been stored subscriber identity information and has stored end message.
The present embodiment can release the binding of any one backup device and mobile terminal according to the demand of user, thus into one
Step improves user experience degree.
Fig. 4-Fig. 8 illustrates one embodiment of secure data backup method of the present invention.Referring to fig. 4, in the present embodiment,
The secure data backup method includes the following steps:
Step S30, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out
Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
In the present embodiment, step S30 is similar with step S1, and therefore, details are not described herein.
Step S31 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up
Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S31 is similar with step S2, and therefore, details are not described herein.
Step S32, when mobile terminal receives file backup request, mobile terminal calculates beating at least two test files
Packet plus transmission speed and direct transmission speed.
In the present embodiment, which can be the test file of user preset, such as: the 10 of 1K-10K
A test file is also possible to randomly selected at least two files of different sizes from file to be transmitted, preferably selects text
Part size is less than the file of nK (for example: n < 10) as test file.
Further, in this embodiment packing plus the calculation of transmission speed can be with are as follows: assuming that a nK is (for example: n
=2) file, packing time are As, and the time transmitted after packing is Bs, then the packing of this document adds transmission speed to be nK/ (A+
B)。
Specifically, calculating the packing plus the mode of transmission speed and direct transmission speed of at least two test files are as follows: meter
The packing for calculating the different test file of at least two file sizes adds transmission speed and direct transmission speed.Wherein, it calculates at least
The packing of the test file of two different file sizes plus the mode of transmission speed and direct transmission speed are as follows: at least calculating M
The packing of first test file plus the packing of transmission speed and direct transmission speed and M the second test files add transmission speed and
Direct transmission speed.Such as: being packaged while at least calculating 5 1K files and add transmission speed and direct transmission speed and at least 5
It is packaged while a 2K file plus transmission speed and direct transmission speed, the present embodiment passes through the test file of multiple same sizes
It determines to be packaged and adds transmission speed and direct transmission speed, improve the accuracy for being packaged and adding transmission speed and direct transmission speed.
Step S33, mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to directly biography
At least one of defeated speed first drafts test file, and first to draft file size in test file the smallest by least one
First drafts the file size of test file as file propagation threshold;Or, mobile terminal determines at least two test files
It is packaged plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and at least one second is drafted
File size maximum second drafts the file size of test file as file propagation threshold in test file.
In the present embodiment, referring to Fig. 5, the writing speed and reading speed of file are passed with the increase of file size
Increase, when file size is smaller, writing speed and reading speed can be smaller, and when file size is larger, writing speed and
Reading speed can also increase with it, until tending towards stability.Therefore, if being transmitted again after small documents being packaged, it can subtract
I/O operation number in few document transmission process, can also promote writing speed and reading speed.
For technical solution of the present invention detailed further, it is assumed that there are 6 surveys of 0.5K, 0.8K, 1K, 2K, 3K, 4K
File is tried, above-mentioned 6 test files are carried out to be packaged the calculating for adding transmission speed and direct transmission speed, wherein 0.5K,
The packing of tri- files of 0.8K, 1K adds transmission speed to be greater than direct transmission speed, and therefore, this case can determine that 1K is passed as file
Multiple files of the file size in file to be transmitted less than or equal to 1K transmit again after compression is packaged by defeated threshold value.Into
One step, the packing of 2K, 3K, 4K add transmission speed to be less than or equal to direct transmission speed, and therefore, this case can also determine that 2K makees
For file propagation threshold, multiple files of the file size in file to be transmitted less than or equal to 2K are carried out after compression is packaged again
Transmission.
Step S34, the file destination size of acquisition for mobile terminal file to be transmitted.
File size in file to be transmitted is greater than the first transmission file of file propagation threshold by step S35, mobile terminal
It is directly transmitted, after the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold is packaged
It is transmitted.
On the basis of the above embodiments, in other embodiments, step S35 can be with are as follows: mobile terminal is passed in carry out first
It while defeated file transmits, is packaged one or more second and transmits file, transmit file in packing one or more second and complete
Later, the second transmission file of the packing is transmitted.
In the present embodiment, the present embodiment can be carried out according to the type of the second transmission file or the difference of storage location
Classifying packing processing, and then after decompression processing, the file solution of same type or same storage location is depressed into same position, reduces
Document classification deposit operation after decompression, to further improve user experience.Specifically, the present embodiment can will be located
Disposable packing compression is carried out in multiple second transmission files in same bottom document folder, for second in different files
Transmission file carries out the processing of packing respectively.
The present embodiment adds transmission speed to be greater than direct transmission speed using the packing of the lesser file of file size, and file is big
The packing of small biggish file plus transmission speed are less than the characteristic of direct transmission speed, when receiving file backup request, lead to
The packing for testing, calculating and comparing at least two test files plus the speed of transmission speed and direct transmission speed are crossed, determines text
Part propagation threshold, and then transmission file is divided into directly transmission class and is packaged transmission class.Therefore, one will be packaged in transmission class
Or it is multiple second transmission files carry out packing processing after transmitted, both reduced the I/O operation number in document transmission process,
Also the transmission time of file is shortened, to both improve the data throughput of terminal, also improves file transfer rate.This
Outside, the present embodiment is packaged processing the second transmission file, further shortens all to be passed while file is transmitted in transmission first
The transmission time of defeated file, and then further improve file transfer rate.
On the basis of the above embodiments, in other embodiments, referring to Fig. 6, step S35 includes:
Step S350 while file is transmitted in mobile terminal transmission first, carries out packing processing to the second transmission file, obtains
To the i-th packaging file, i=1.
Specifically, on the basis of the present embodiment, in other embodiments, referring to Fig. 7, step S350 includes:
Step S3500, the first file total amount of the first all transmission file of acquisition for mobile terminal, detection the first transmission text
First transmission speed of part and the packing speed of detection the second transmission file.
Step S3501, mobile terminal are calculated first according to the first file total amount, the first transmission speed and packing speed
Packing amount.
Step S3502, while mobile terminal transmission the first transmission file, to the second of the first packing amount the transmission file into
Row packing processing, obtains the 1st packaging file.
For technical solution of the present invention detailed further, it is assumed that it is all first transmission files the first file total amount be
AMB, the first transmission speed of the first transmission file are XMB/s, and the packing speed of the second transmission file is YMB/s, then transmits the
While one transmission file, the maximum packing amount of the second transmission file is B.Wherein, B=(A/X) * Y.
The present embodiment completes beating for the second transmission file of the first packing amount while being transmitted the first transmission file
Packet processing, avoids when being transmitted the first transmission file, and the packing processing of the second transmission file is not completed, so that subsequent
The case where no file is transmitted sending, and then further improve file transfer rate.
Step S351, mobile terminal detect whether there is the second transmission file for not carrying out being packaged processing;When exist not into
When row is packaged the second transmission file of processing, step S352 is executed.When there is no the second transmission files for not carrying out being packaged processing
When, execute step S353.
Step S352 while transmitting the i-th packaging file, is packaged the second transmission file for not carrying out being packaged processing
Processing, obtains i+1 packaging file;I++ executes step S351.
On the basis of the above embodiments, in other embodiments, referring to Fig. 8, step S352, comprising:
Step S3520, the second transmission speed of the i-th packaging file of acquisition for mobile terminal.
Step S3521, mobile terminal are calculated second dozen according to the first packing amount, the second transmission speed and packing speed
Bao Liang.
Step S3522 does not carry out packing processing to the second packing amount while mobile terminal transmits the i-th packaging file
Second transmission file carry out packing processing, obtain i+1 packaging file.
For technical solution of the present invention detailed further, it is assumed that the file size of the i-th packaging file be D MB, i-th
Second transmission speed of packaging file is Z MB/s, and the packing speed of the second transmission file is YMB/s, then transmits i-th and be packaged text
While part, the maximum packing amount of the second transmission file is E.Wherein, E=(D/Z) * Y.
The present embodiment completes beating for the i+1 packaging file of the second packing amount while being transmitted the i-th packaging file
Packet processing, avoids when being transmitted the i-th packaging file, and the packing processing of remaining second transmission file is not completed, with
The case where causing subsequent no packaging file to be transmitted, and then further improve file transfer rate.
Step S353 transmits the i-th packaging file.
The present invention is packaged processing the second transmission file, and transmission packaging file while file is transmitted in transmission first
While, it is packaged the remaining second transmission file of processing, further shortens the transmission time of institute's available for transmission file, thus into
One step improves the file transfer rate of terminal.
Fig. 9 illustrates one embodiment of secure data backup method of the present invention.Referring to Fig. 9, in the present embodiment, the peace
Full data back up method includes the following steps:
Step S40, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out
Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
In the present embodiment, step S40 is similar with step S30, and therefore, details are not described herein.
Step S41 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up
Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S41 is similar with step S31, and therefore, details are not described herein.
Step S42, when mobile terminal receives file backup request, mobile terminal calculates beating at least two test files
Packet plus transmission speed and direct transmission speed.
In the present embodiment, step S42 is similar with step S32, and therefore, details are not described herein.
Step S43, mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to directly biography
At least one of defeated speed first drafts test file, and first to draft file size in test file the smallest by least one
First drafts the file size of test file as file propagation threshold;Or, mobile terminal determines at least two test files
It is packaged plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and at least one second is drafted
File size maximum second drafts the file size of test file as file propagation threshold in test file.
In the present embodiment, step S43 is similar with step S33, and therefore, details are not described herein.
Step S44, the file destination size of acquisition for mobile terminal file to be transmitted.
In the present embodiment, step S44 is similar with step S34, and therefore, details are not described herein.
File size in file to be transmitted is greater than the first transmission file of file propagation threshold by step S45, mobile terminal
It is directly transmitted, after the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold is packaged
It is transmitted.
In the present embodiment, step S45 is similar with step S35, and therefore, details are not described herein.
In the present embodiment, the second transmission file is carried out at encryption using the public key in mobile terminal in packing process
Reason.
Step S46, second after mobile terminal transmission is packaged transmits file to backup device.
Step S47, when backup device receives the second transmission file after the packing, decompression obtains the second transmission file and deletes
Except the second transmission file after the packing.
In the present embodiment, it is carried out in decompression procedure using packaging file of the private key in backup device to the second transmission file
Decryption processing, public key and private key are the key pair to match.Further, it should be noted that backup device can be USB flash disk, shifting
The storage backup device such as dynamic terminal.
The present embodiment is automatically deleted packaging file, saves memory space, Jin Erti after backup device decompresses packaging file
It is efficient storage has been risen.In addition, being backed up on the backup device of not exclusive pairing this embodiment avoids private data, privacy is caused
The leakage of data content, to improve data safety performance.
Figure 10 illustrates one embodiment of secure data backup method of the present invention.It, in the present embodiment, should referring to Figure 10
Secure data backup method includes the following steps:
Step S50, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out
Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
In the present embodiment, step S50 is similar with step S30, and therefore, details are not described herein.
Step S51 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up
Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S51 is similar with step S31, and therefore, details are not described herein.
Step S52, when mobile terminal receives file backup request, mobile terminal calculates beating at least two test files
Packet plus transmission speed and direct transmission speed.
In the present embodiment, step S52 is similar with step S32, and therefore, details are not described herein.
Step S53, mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to directly biography
At least one of defeated speed first drafts test file, and first to draft file size in test file the smallest by least one
First drafts the file size of test file as file propagation threshold;Or, mobile terminal determines at least two test files
It is packaged plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and at least one second is drafted
File size maximum second drafts the file size of test file as file propagation threshold in test file.
In the present embodiment, step S53 is similar with step S33, and therefore, details are not described herein.
Step S54, the file destination size of acquisition for mobile terminal file to be transmitted.
In the present embodiment, step S54 is similar with step S34, and therefore, details are not described herein.
File size in file to be transmitted is greater than the first transmission file of file propagation threshold by step S55, mobile terminal
It is directly transmitted, after the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold is packaged
It is transmitted.
In the present embodiment, step S55 is similar with step S35, and therefore, details are not described herein.
Step S56, the backup lists of documents in acquisition for mobile terminal backup device, and obtain and be backed up text in mobile terminal
Part inventory.
Step S57, acquisition for mobile terminal have backed up lists of documents and the comparison result for being backed up lists of documents, and according to than
Relatively result carries out incremental backup operations.
The present embodiment according to backed up lists of documents and be backed up lists of documents comparison result carry out incremental backup operations,
The data volume transmitted needed for reducing, and then further improve transmission rate.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit
It is fixed.
Figure 11 illustrates one embodiment of secure data backup system of the present invention.Referring to Figure 11, the secure data backup
System includes mobile terminal 2 and backup device 1, wherein the backup device 1 includes authentication module 10 and control module 11.
Wherein, authentication module 10 when for detecting that backup device 1 and mobile terminal 2 establish connection, obtain user identity letter
Authentication is ceased and carries out, meanwhile, it obtains the end message of mobile terminal 2 and carries out terminal authentication;Control module 11, for working as
When authentication and terminal authentication pass through, allow the data backup in mobile terminal 2 to backup device 1, and/or allow to move
Terminal 2 reads the data in backup device 1.
On the basis of the above embodiments, in other embodiments, backup device 1 receives the subscriber identity information of user's input;
Or, mobile terminal 2 receives the subscriber identity information of user's input, and subscriber identity information is sent to backup device 1.
On the basis of the above embodiments, in other embodiments, referring to Figure 12, which further includes judgment module 20
With memory module 21.
Wherein, judgment module 20 are connect for judging whether with mobile terminal 2 for the first time;Memory module 21, for when backup
When device 1 is connect for the first time with mobile terminal 2, obtains subscriber identity information and stored, meanwhile, obtain the terminal of mobile terminal 2
Information is simultaneously stored.
On the basis of the above embodiments, in other embodiments, referring to Figure 13, which further includes receiving module 30
With removing module 31.
Receiving module 30, for receiving the unbundlings that mobile terminal 2 is sent and referring to when mobile terminal 2 receives unbundlings instruction
It enables;Removing module 31 corresponding with instruction is unbinded stored subscriber identity information and has stored end message for deleting.
On the basis of the above embodiments, in other embodiments, referring to Figure 14, which includes that speed calculates mould
Block 40, threshold value confirmation module 41, file size obtain module 42 and document transmission module 43.
Wherein, speed calculation module 40 calculate beating at least two test files when for receiving file backup request
Packet plus transmission speed and direct transmission speed;Threshold value confirmation module 41 is packaged plus is passed at least two test files for determining
Defeated speed be less than or equal to direct transmission speed at least one first draft test file, and at least one first is drafted into survey
File size the smallest first drafts the file size of test file as file propagation threshold in examination file;Or, determining at least
It is packaged in two test files plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and is near
It drafts file size in test file maximum second for few one second and drafts the file size of test file as file transmission
Threshold value;File size obtains module 42, for obtaining the file destination size of file to be transmitted;Document transmission module 43, is used for
The first transmission file that file size in file to be transmitted is greater than file propagation threshold is directly transmitted, by file to be transmitted
The second transmission file that middle file size is less than or equal to file propagation threshold is transmitted after being packaged.
On the basis of the above embodiments, in other embodiments, document transmission module 43 is also used to transmit in carry out first
It while file transmits, is packaged one or more second and transmits file, transmit file in packing one or more second and complete it
Afterwards, the second transmission file of the packing is transmitted.
On the basis of the above embodiments, in other embodiments, referring to Figure 15, this document transmission module 43 includes directly passing
Defeated submodule 430 and circulation are packaged transmission submodule 431.
Wherein, submodule 430 is directly transmitted, while being used for transmission the first transmission file, the second transmission file is carried out
Packing processing, obtains the i-th packaging file, i=1;It is packaged transmission submodule 431, for detecting whether in the presence of not carrying out at packing
Second transmission file of reason;When there is the second transmission file for not carrying out being packaged processing, while transmitting the i-th packaging file,
Packing processing is carried out to the second transmission file for not carrying out being packaged processing, obtains i+1 packaging file;I++ repeats this dozen
Packet transmission submodule 431 until the second all transmission files carries out packing processing, and the packaging file being packed into is carried out
Transmission.
Further, on the basis of the above embodiments, in other embodiments, referring to Figure 15, this directly transmits submodule
430 include parameter acquiring unit 4300, the first packing amount computing unit 4301 and the first transmission plus packaged unit 4302.
Wherein, parameter acquiring unit 4300, for obtaining the first file total amount of all first transmission files, detection the
First transmission speed of one transmission file and the packing speed of detection the second transmission file;First packing amount computing unit
4301, for the first packing amount to be calculated according to the first file total amount, the first transmission speed and packing speed;First transmission adds
Packaged unit 4302 while being used for transmission the first transmission file, carries out at packing the second transmission file of the first packing amount
Reason, obtains the 1st packaging file.
Further, on the basis of the above embodiments, in other embodiments, referring to Figure 15, which is packaged transmission
Module 431 includes transmission speed acquiring unit 4310, the second packing amount computing unit 4311 and the second transmission plus packaged unit
4312。
Wherein, transmission speed acquiring unit 4310, for obtaining the second transmission speed of the i-th packaging file;Second is packaged
Computing unit 4311 is measured, for the second packing amount to be calculated according to the first packing amount, the second transmission speed and packing speed;The
Two transmission plus packaged unit 4312, while being used for transmission the i-th packaging file, to the second packing amount do not carry out be packaged processing
Second transmission file carries out packing processing, obtains i+1 packaging file.
On the basis of the above embodiments, in other embodiments, referring to Figure 15, which further includes decompression processing module
50;This document transmission module 43 is also used to transmit the second transmission file after being packaged to backup device 1;Decompression processing module 50 is used
When receiving the second transmission file after the packing, decompression obtains the second transmission file and deletes the second transmission after the packing
File.
On the basis of the above embodiments, in other embodiments, using the public key in mobile terminal 2 to the in packing process
Two transmission files are encrypted, using the private key in backup device 1 to the packaging file of the second transmission file in decompression procedure
It is decrypted, public key and private key are key pair.
On the basis of the above embodiments, in other embodiments, referring to Figure 16, which further includes that lists of documents obtain
Modulus block 60 and incremental backup module 61.
Wherein, lists of documents obtain module 60, for obtaining the backup lists of documents in backup device 1, and obtain movement
Lists of documents are backed up in terminal 2;Incremental backup module 61 lists of documents and is backed up lists of documents for obtaining to have backed up
Comparison result, and incremental backup operations are carried out according to comparison result.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of secure data backup system is divided into different functional unit or module, with
Complete all or part of function described above.Each functional unit in embodiment, module can integrate single in a processing
In member, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units, on
It states integrated unit both and can take the form of hardware realization, can also realize in the form of software functional units.In addition, each
Functional unit, module specific name be also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.On
The specific work process for stating unit in device, module, can refer to corresponding processes in the foregoing method embodiment, no longer superfluous herein
It states.
The specific embodiment of invention is described in detail above, but it is only used as example, the present invention is not intended to limit
With specific embodiments described above.For a person skilled in the art, any equivalent modifications that the invention is carried out
Or substitute also all among scope of the invention, therefore, the made equalization in the case where not departing from the spirit and principles in the present invention range
Transformation and modification, improvement etc., all should be contained within the scope of the invention.
Claims (13)
1. a kind of secure data backup method, which is characterized in that it includes the following steps:
When detecting that backup device and mobile terminal establish connection, the backup device obtains subscriber identity information and carries out identity and tests
Card, meanwhile, the backup device obtains the end message of the mobile terminal and carries out terminal authentication;
When authentication and terminal authentication pass through, allow the data backup in the mobile terminal to the backup device,
And/or the mobile terminal is allowed to read the data in the backup device.
2. secure data backup method according to claim 1, which is characterized in that the backup device obtains user identity letter
The step of breath, comprising:
The backup device receives the subscriber identity information of user's input;
Or, the mobile terminal receives the subscriber identity information of user's input, and the subscriber identity information is sent to described
Backup device.
3. secure data backup method according to claim 1, which is characterized in that described to detect backup device and movement eventually
Before the step of connection is established at end, further includes:
The backup device judges whether to connect for the first time with the mobile terminal;
When the backup device is connect for the first time with the mobile terminal, the backup device obtains subscriber identity information and is deposited
Storage, meanwhile, the backup device obtains the end message of the mobile terminal and is stored.
4. secure data backup method according to claim 1, which is characterized in that the secure data backup method is also wrapped
It includes:
When the mobile terminal receives unbundlings instruction, unbundlings instruction is sent to the backup by the mobile terminal
Device;
The backup device deletion is corresponding with the unbundlings instruction have been stored subscriber identity information and has stored end message.
5. secure data backup method according to claim 1, which is characterized in that described allow will be in the mobile terminal
Data backup to the backup device the step of after, further includes:
When the mobile terminal receives file backup request, the packing that the mobile terminal calculates at least two test files adds
Transmission speed and direct transmission speed;
It is described straight that the mobile terminal determines that packing described at least two test file plus transmission speed are less than or equal to
At least one for connecing transmission speed first drafts test file, and by it is described at least one first to draft file in test file big
Small the smallest first drafts the file size of test file as file propagation threshold;Or, described in the mobile terminal is determining extremely
It is packaged described in few two test files plus transmission speed is greater than at least one of the direct transmission speed and second drafts test
File, and by it is described at least one second draft file size in test file maximum second draft test file file it is big
It is small to be used as file propagation threshold;
The file destination size of the acquisition for mobile terminal file to be transmitted;
File size in the file to be transmitted is greater than the first transmission file of the file propagation threshold by the mobile terminal
It is directly transmitted, file size in the file to be transmitted is less than or equal to the second transmission text of the file propagation threshold
Part is transmitted after being packaged.
6. secure data backup method according to claim 5, which is characterized in that the mobile terminal will be described to be transmitted
The first transmission file that file size is greater than the file propagation threshold in file is directly transmitted, by the file to be transmitted
The step of the second transmission file that middle file size is less than or equal to the file propagation threshold is transmitted after being packaged, comprising:
The mobile terminal is packaged one or more second and transmits file, beating while file transmission is transmitted in carry out first
After packet one or more second transmits file completion, the second transmission file of the packing is transmitted.
7. secure data backup method according to claim 5, which is characterized in that the mobile terminal will be described to be transmitted
The first transmission file that file size is greater than the file propagation threshold in file is directly transmitted, by the file to be transmitted
The step of the second transmission file that middle file size is less than or equal to the file propagation threshold is transmitted after being packaged, comprising:
While file is transmitted in the mobile terminal transmission described first, packing processing is carried out to the second transmission file, is obtained
To the i-th packaging file, i=1;
The mobile terminal detects whether there is the second transmission file for not carrying out being packaged processing;Packing processing is not carried out when existing
Second transmission file when, transmit i-th packaging file while, to it is described do not carry out be packaged processing second transmission file
Packing processing is carried out, i+1 packaging file is obtained;I++ repeats current procedures, until all second transmission files into
Row packing processing, and the packaging file being packed into is transmitted.
8. secure data backup method according to claim 7, which is characterized in that the mobile terminal transmission described first
While transmitting file, the step of carrying out packing processing to the second transmission file, obtain 1 packaging file, comprising:
The of first file total amount of the first all transmission file of the acquisition for mobile terminal, detection the first transmission file
The packing speed of one transmission speed and detection the second transmission file;
The mobile terminal is calculated according to the first file total amount, first transmission speed and the packing speed
One packing amount;
While file is transmitted in the mobile terminal transmission described first, the second transmission file of the first packing amount is carried out
Packing processing, obtains the 1st packaging file.
9. secure data backup method according to claim 8, which is characterized in that transmission i-th packaging file
While, packing processing is carried out to the second transmission file for not carrying out being packaged processing, obtains the step of i+1 packaging file
Suddenly, comprising:
Second transmission speed of the i-th packaging file described in the acquisition for mobile terminal;
The mobile terminal is calculated second according to the first packing amount, second transmission speed and the packing speed
Packing amount;
While the mobile terminal transmits the i-th packaging file, to do not carry out packing processing second of the second packing amount
Transmission file carries out packing processing, obtains i+1 packaging file.
10. secure data backup method according to claim 5, which is characterized in that it is described will be in the file to be transmitted
After the step of the second transmission file that file size is less than or equal to the file propagation threshold is transmitted after being packaged, also wrap
It includes:
Second after the mobile terminal transmission is packaged transmits file to backup device;
When the backup device receives the second transmission file after the packing, decompression obtains the second transmission file and deletes the packing
The second transmission file afterwards.
11. secure data backup method according to claim 10, which is characterized in that use the movement in packing process
The second transmission file is encrypted in public key in terminal, using the private key pair in the backup device in decompression procedure
The packaging file of the second transmission file is decrypted, and the public key and the private key are key pair.
12. secure data backup method according to claim 5, which is characterized in that it is described will be in the file to be transmitted
After the step of the second transmission file that file size is less than or equal to the file propagation threshold is transmitted after being packaged, also wrap
It includes:
Backup lists of documents in the acquisition for mobile terminal backup device, and obtain that be backed up file in the mobile terminal clear
It is single;
Lists of documents and the comparison result for being backed up lists of documents are backed up described in the acquisition for mobile terminal, and according to institute
It states comparison result and carries out incremental backup operations.
13. a kind of secure data backup system, which is characterized in that it includes mobile terminal and backup device, the mobile terminal with
The backup device carries out information exchange, realizes safe transmission of data backup method described in one of claim 1-12.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811003811.1A CN109284203A (en) | 2018-08-30 | 2018-08-30 | Secure data backup method and secure data backup system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811003811.1A CN109284203A (en) | 2018-08-30 | 2018-08-30 | Secure data backup method and secure data backup system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109284203A true CN109284203A (en) | 2019-01-29 |
Family
ID=65183190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811003811.1A Pending CN109284203A (en) | 2018-08-30 | 2018-08-30 | Secure data backup method and secure data backup system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109284203A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274607A (en) * | 2020-01-20 | 2020-06-12 | 福建奇点时空数字科技有限公司 | Mobile application data privacy protection method based on virtual machine |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805372A (en) * | 2005-12-30 | 2006-07-19 | 赵颜 | Method for providing device and data security service for wireless mobile terminal users |
CN101132557A (en) * | 2007-09-28 | 2008-02-27 | 赵颜 | Method providing equipment and data safety service for mobile phone users |
US20080163336A1 (en) * | 2006-08-18 | 2008-07-03 | Huawei Technologies Co., Ltd. | Method and system for backing up and restoring license |
CN102238223A (en) * | 2010-05-06 | 2011-11-09 | 清华大学 | Networked personal data management method for mobile device |
CN108881454A (en) * | 2018-06-28 | 2018-11-23 | 北京珠穆朗玛移动通信有限公司 | Document transmission method, mobile terminal and storage medium |
-
2018
- 2018-08-30 CN CN201811003811.1A patent/CN109284203A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805372A (en) * | 2005-12-30 | 2006-07-19 | 赵颜 | Method for providing device and data security service for wireless mobile terminal users |
US20080163336A1 (en) * | 2006-08-18 | 2008-07-03 | Huawei Technologies Co., Ltd. | Method and system for backing up and restoring license |
US20150143539A1 (en) * | 2006-08-18 | 2015-05-21 | Huawei Technologies Co., Ltd. | Method and System for Backing Up and Restoring License |
CN101132557A (en) * | 2007-09-28 | 2008-02-27 | 赵颜 | Method providing equipment and data safety service for mobile phone users |
CN102238223A (en) * | 2010-05-06 | 2011-11-09 | 清华大学 | Networked personal data management method for mobile device |
CN108881454A (en) * | 2018-06-28 | 2018-11-23 | 北京珠穆朗玛移动通信有限公司 | Document transmission method, mobile terminal and storage medium |
Non-Patent Citations (2)
Title |
---|
DOMINIK LEIBENGER等: "Triviback: A Storage-Efficient Secure Backup System", 《2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN)》, 16 November 2017 (2017-11-16), pages 435 - 443 * |
应飞: "电脑系统快速备份与恢复的几种方法", 《中国制造业信息化》, 1 April 2009 (2009-04-01), pages 64 - 66 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274607A (en) * | 2020-01-20 | 2020-06-12 | 福建奇点时空数字科技有限公司 | Mobile application data privacy protection method based on virtual machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112153085B (en) | Data processing method, node and block chain system | |
CN105024986B (en) | The methods, devices and systems that account number logs in | |
US20090298468A1 (en) | System and method for deleting data in a communication device | |
CN109831487A (en) | Fragmented file verification method and terminal equipment | |
CN104852925A (en) | Method for leakproof, secure storage and backup of data of mobile smart terminal | |
CN110351089A (en) | A kind of data signature authentication method and device | |
CN110167192B (en) | Bluetooth connection management method and device, electronic equipment and non-transient storage medium | |
CN106101091A (en) | The method and apparatus that inter-terminal data processes | |
CN108881454A (en) | Document transmission method, mobile terminal and storage medium | |
CN110363017A (en) | Mix the data safety sharing method and system based on client encryption under cloud environment | |
CN107733639A (en) | Key management method, device and readable storage medium storing program for executing | |
CN109729000A (en) | A kind of instant communicating method and device | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN106101188B (en) | A kind of data processing method of network cloud USB flash disk | |
CN110334531A (en) | Management method, host node, system, storage medium and the device of virtual machine key | |
CN109284203A (en) | Secure data backup method and secure data backup system | |
CN107645474A (en) | Log in the method for open platform and log in the device of open platform | |
CN108200059A (en) | Document transmission method, device, equipment and computer readable storage medium | |
CN109189606A (en) | Data back up method, system and storage medium | |
CN109640277A (en) | SMS processing and device applied to usim card | |
CN112702731B (en) | SIM card information transmission method and device, computer equipment and storage medium | |
CN108966206A (en) | Data traffic sharing method, device, terminal and storage medium | |
CN109408572A (en) | Mass data processing method based on SB frame and Bloom filter | |
CN105975624B (en) | A kind of data transmission method, equipment and system | |
CN106998355A (en) | Data transmission method, electronic equipment and the data transmission system of electric room |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |