CN109284203A - Secure data backup method and secure data backup system - Google Patents

Secure data backup method and secure data backup system Download PDF

Info

Publication number
CN109284203A
CN109284203A CN201811003811.1A CN201811003811A CN109284203A CN 109284203 A CN109284203 A CN 109284203A CN 201811003811 A CN201811003811 A CN 201811003811A CN 109284203 A CN109284203 A CN 109284203A
Authority
CN
China
Prior art keywords
file
mobile terminal
transmission
packing
backup device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811003811.1A
Other languages
Chinese (zh)
Inventor
徐红胜
杜国威
朱少杰
周佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Everest Mobile Communication Co Ltd
Original Assignee
Beijing Everest Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Everest Mobile Communication Co Ltd filed Critical Beijing Everest Mobile Communication Co Ltd
Priority to CN201811003811.1A priority Critical patent/CN109284203A/en
Publication of CN109284203A publication Critical patent/CN109284203A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The invention discloses a kind of secure data backup method and secure data backup systems, wherein, this method comprises: when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out authentication, meanwhile backup device obtains the end message of mobile terminal and carries out terminal authentication;When authentication and terminal authentication pass through, allow the data backup in mobile terminal to backup device, and/or mobile terminal is allowed to read the data in backup device.The present invention not only needs the verifying by subscriber identity information, and need verifying by mobile terminal end message, it just can permit the data in mobile terminal reading backup device, or the data in permission backup device backup mobile terminal, therefore, both the Information Security for having improved mobile terminal and backup device also improves user experience degree.

Description

Secure data backup method and secure data backup system
Technical field
The present invention relates to data safety backup technical field more particularly to a kind of secure data backup method and secure datas Standby system.
Background technique
Intelligent mobile terminal is more more and more universal, and people are increasingly dependent on mobile terminal (such as mobile phone), and a variety of data are all deposited It is stored in mobile terminal.When the capacity of memory device in mobile terminal is inadequate, need using external backup device to mobile terminal Interior data are backed up, it is however generally that, the data backed up in this manner belong to private data, and therefore, user is general It is not intended to other people to know the data information in the backup device.
But after existing backup device stores the data of some mobile terminal, with other mobile terminals or operation When terminal (for example: desktop computer, projector etc.) establishes connection, other mobile terminals or operating terminal can also read backup Data information in device causes the leakage of the data information in backup device, so that there are data safety performance is poor and user The problem of usage experience difference.
Summary of the invention
It is existing to solve the purpose of the present invention is to provide a kind of secure data backup method and secure data backup system Backup device, data safety performance is poor, causes the technical problem of user experience difference.
To solve the above-mentioned problems, the present invention provides a kind of secure data backup methods comprising following steps:
When detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out identity and tests Card, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication;
When authentication and terminal authentication pass through, allow the data backup in mobile terminal to backup device, and/or Mobile terminal is allowed to read the data in backup device.
As a further improvement of the present invention, backup device obtains the step of subscriber identity information, comprising:
Backup device receives the subscriber identity information of user's input;
Or, mobile terminal receives the subscriber identity information of user's input, and subscriber identity information is sent to backup device.
As a further improvement of the present invention, it before detecting the step of backup device and mobile terminal establish connection, also wraps It includes:
Backup device judges whether to connect for the first time with mobile terminal;
When backup device is connect for the first time with mobile terminal, backup device obtains subscriber identity information and is stored, meanwhile, it is standby Part device obtains the end message of mobile terminal and is stored.
As a further improvement of the present invention, secure data backup method further include:
When mobile terminal receives unbundlings instruction, unbundlings instruction is sent to backup device by mobile terminal;
Backup device deletion is corresponding with unbundlings instruction have been stored subscriber identity information and has stored end message.
As a further improvement of the present invention, allow after the step of the data backup in mobile terminal to backup device, Further include:
When mobile terminal receives file backup request, the packing that mobile terminal calculates at least two test files adds transmission Speed and direct transmission speed;
Mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to direct transmission speed At least one first drafts test file, and at least one first is drafted file size in test file the smallest first and drafted The file size of test file is as file propagation threshold;It is packaged plus passes at least two test files or, mobile terminal determines Defeated speed be greater than direct transmission speed at least one second draft test file, and at least one second is drafted into test file Middle file size maximum second drafts the file size of test file as file propagation threshold;
The file destination size of acquisition for mobile terminal file to be transmitted;
Mobile terminal carries out the first transmission file that file size in file to be transmitted is greater than file propagation threshold direct Transmission passes after being packaged the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold It is defeated.
As a further improvement of the present invention, file size in file to be transmitted is greater than file propagation threshold by mobile terminal First transmission file directly transmitted, by file size in file to be transmitted less than or equal to file propagation threshold second The step of transmission file is transmitted after being packaged, comprising:
Mobile terminal is packaged one or more second and transmits file, beating while file transmission is transmitted in carry out first After packet one or more second transmits file completion, the second transmission file of the packing is transmitted.
As a further improvement of the present invention, file size in file to be transmitted is greater than file propagation threshold by mobile terminal First transmission file directly transmitted, by file size in file to be transmitted less than or equal to file propagation threshold second The step of transmission file is transmitted after being packaged, comprising:
While mobile terminal transmission the first transmission file, packing processing is carried out to the second transmission file, obtains the i-th packing File, i=1;
Mobile terminal detects whether there is the second transmission file for not carrying out being packaged processing;Packing processing is not carried out when existing Second transmission file when, transmit the i-th packaging file while, to do not carry out be packaged processing second transmission file be packaged Processing, obtains i+1 packaging file;I++ repeats current procedures, until the second all transmission files carries out at packing Reason, and the packaging file being packed into is transmitted.
As a further improvement of the present invention, while the first transmission of mobile terminal transmission file, to the second transmission file The step of carrying out packing processing, obtaining 1 packaging file, comprising:
First file total amount of the first all transmission file of acquisition for mobile terminal, the first of detection the first transmission file pass The packing speed of defeated speed and detection the second transmission file;
The first packing amount is calculated according to the first file total amount, the first transmission speed and packing speed in mobile terminal;
While mobile terminal transmission the first transmission file, the second transmission file of the first packing amount is carried out at packing Reason, obtains the 1st packaging file.
As a further improvement of the present invention, while transmitting the i-th packaging file, do not carry out being packaged processing second is passed The step of defeated file carries out packing processing, obtains i+1 packaging file, comprising:
Second transmission speed of the i-th packaging file of acquisition for mobile terminal;
The second packing amount is calculated according to the first packing amount, the second transmission speed and packing speed in mobile terminal;
The second transmission for not carrying out being packaged processing while mobile terminal transmits the i-th packaging file, to the second packing amount File carries out packing processing, obtains i+1 packaging file.
As a further improvement of the present invention, file size in file to be transmitted is less than or equal to file propagation threshold After the step of second transmission file is transmitted after being packaged, further includes:
Second after mobile terminal transmission is packaged transmits file to backup device;
When backup device receives the second transmission file after the packing, decompression obtains the second transmission file and deletes the packing The second transmission file afterwards.
As a further improvement of the present invention, in packing process using the public key in mobile terminal to the second transmission file into Row encryption is decrypted in decompression procedure using packaging file of the private key in backup device to the second transmission file, Public key and private key are key pair.
As a further improvement of the present invention, file size in file to be transmitted is less than or equal to file propagation threshold After the step of second transmission file is transmitted after being packaged, further includes:
Backup lists of documents in acquisition for mobile terminal backup device, and obtain and be backed up lists of documents in mobile terminal;
Acquisition for mobile terminal has backed up lists of documents and the comparison result for being backed up lists of documents, and according to comparison result into Row incremental backup operations.
To solve the above-mentioned problems, the present invention also provides a kind of secure data backup systems comprising mobile terminal and Backup device, mobile terminal and backup device carry out information exchange, realize above-mentioned safe transmission of data backup method.
Compared with prior art, the present invention not only needs the verifying by subscriber identity information, but also needs to pass through movement The verifying of terminal information just can permit the data in mobile terminal reading backup device, or backup device allowed to back up movement Therefore data in terminal had both improved the Information Security of mobile terminal and backup device, and had also improved user experience Degree.
Detailed description of the invention
Fig. 1 is the flow diagram of secure data backup method one embodiment of the present invention;
Fig. 2 is the flow diagram of second embodiment of secure data backup method of the present invention
Fig. 3 is the flow diagram of secure data backup method third embodiment of the present invention;
Fig. 4 is the flow diagram of the 4th embodiment of secure data backup method of the present invention;
Fig. 5 is that file transmits test result schematic diagram in secure data backup method of the present invention;
Fig. 6 is the stream for directly transmitting in secure data backup method of the present invention with being packaged transmission combination process one embodiment Journey schematic diagram;
Fig. 7 is the process signal of first transmission file transmission flow one embodiment in secure data backup method of the present invention Figure;
Fig. 8 is the process signal of second transmission file transmission flow one embodiment in secure data backup method of the present invention Figure;
Fig. 9 is the flow diagram of the 5th embodiment of secure data backup method of the present invention;
Figure 10 is the flow diagram of the 6th embodiment of secure data backup method of the present invention;
Figure 11 is the functional block diagram of secure data backup system one embodiment of the present invention;
Figure 12 is the functional block diagram of second embodiment of secure data backup system of the present invention;
Figure 13 is the functional block diagram of secure data backup system third embodiment of the present invention;
Figure 14 is the functional block diagram of the 4th embodiment of secure data backup system of the present invention;
Figure 15 is the function of document transmission module one embodiment of mobile terminal in secure data backup system of the present invention Module diagram;
Figure 16 is the functional block diagram of the 5th embodiment of secure data backup system of the present invention;
Figure 17 is the functional block diagram of the 6th embodiment of secure data backup system of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, is clearly and completely retouched to the technical solution in embodiment It states, similar reference numerals represent similar component in attached drawing.Obviously, will be described below embodiment is only the present invention one Divide embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of creative work.
Fig. 1 illustrates one embodiment of secure data backup method of the present invention.It in the present embodiment, as shown in Figure 1, should Secure data backup method includes the following steps:
Step S1, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
Specifically, when backup device and mobile terminal establish connection, backup device obtains subscriber identity information, and judges the user Whether identity information matches with default authentication information, when subscriber identity information is matched with default authentication information, then Show through authentication, meanwhile, backup device obtains the end message of mobile terminal, and judge the end message whether with it is default Terminal authentication information matches then show to pass through terminal authentication when end message and default terminal authentication information matches.
In the present embodiment, backup device obtains the mode of subscriber identity information, can both be obtained by backup device itself, Can be by acquisition for mobile terminal subscriber identity information, and subscriber identity information is sent to backup device.
1, backup device obtains subscriber identity information
For the technical solution of the present embodiment detailed further, to this by taking fingerprint key obtains subscriber identity information as an example Case is described in detail.
Specifically, backup device is equipped with fingerprint key, which receives the finger print information of user's input, and this is referred to Line information is as subscriber identity information.
2, acquisition for mobile terminal subscriber identity information
For the technical solution of the present embodiment detailed further, to this by taking fingerprint key obtains subscriber identity information as an example Case is described in detail.
Specifically, mobile terminal is equipped with fingerprint key, which receives the finger print information of user's input, and should Finger print information is sent to the backup device, and the backup device is using the finger print information as subscriber identity information.
It is to be appreciated that backup device obtains subscriber identity information using other devices or other modes in addition to fingerprint key Technical solution, also within the protection scope of the present embodiment.
Further, in the present embodiment, the end message in the present embodiment includes a variety of, for detailed further The technical solution of embodiment is described in detail this case for No. SN of mobile terminal.
Specifically, when backup device and mobile terminal establish connection, backup device obtains No. SN of mobile terminal, is made with this No. SN Terminal authentication operation is carried out for end message.
It should be noted that being believed in addition to No. SN of mobile terminal using the other identifier information of mobile terminal as terminal Breath, also within the protection scope of the present embodiment.
Step S2 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up Device, and/or mobile terminal is allowed to read the data in backup device.
The present embodiment not only needs the verifying by subscriber identity information, but also needs through mobile terminal end message Verifying only uses the mobile terminal by terminal authentication by the user of authentication, just can permit mobile terminal reading Data in backup device, or allow the data in backup device backup mobile terminal, it is verified by double-point information, both improves movement The Information Security of terminal and backup device also improves user experience degree.
Fig. 2 illustrates one embodiment of secure data backup method of the present invention.In the present embodiment, the secure data is standby Part method includes the following steps:
Step S10, backup device judge whether to connect for the first time with mobile terminal;When backup device is connect for the first time with mobile terminal When, execute step S11.When backup device with mobile terminal is non-connect for the first time when, execute step S12.
In the present embodiment, the judgement that is connected for the first time operates automatically, and is carried out automatically according to judging result different Operation, to improve automatic performance.
Step S11, backup device obtain subscriber identity information and are stored, meanwhile, backup device obtains the end of mobile terminal Client information is simultaneously stored.
It should be noted that in order to further enhance the security performance of terminal and backup device, before executing step S11, Further include:
Backup device judges whether to get authorized order, when getting authorized order, executes step S11.When having not been obtained When to authorized order, it is not responding to the communication connection request of current backup device and mobile terminal.
It should be noted that there are many modes of backup device acquisition authorized order, either being obtained by backup device itself It takes, is also possible to through acquisition for mobile terminal authorized order.
Specifically, for the technical solution of the present embodiment detailed further, by taking fingerprint key as an example, this case is carried out detailed It describes in detail bright.
1, backup device obtains authorized order
Specifically, backup device is equipped with fingerprint key, which receives the finger print information of user's input, judge that this refers to Whether line information matches with preset fingerprint verification information, when finger print information is matched with preset fingerprint verification information, generates authorization Instruction.
2, acquisition for mobile terminal authorized order
Specifically, mobile terminal is equipped with fingerprint key, which receives the finger print information of user's input, and judgement should Whether finger print information matches with preset fingerprint verification information, and when finger print information is matched with preset fingerprint verification information, generation is awarded Power instruction, and the authorized order is sent to backup device.
Step S12, backup device obtain subscriber identity information and carry out authentication, meanwhile, backup device obtains mobile terminal End message and carry out terminal authentication.
In the present embodiment, step S12 is similar with above-mentioned steps S1, therefore, repeats no more.
Step S13 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S13 is similar with above-mentioned steps S2, therefore, repeats no more.
Fig. 3 illustrates one embodiment of secure data backup method of the present invention.In the present embodiment, the secure data is standby Part method includes the following steps:
Step S20, when mobile terminal receives unbundlings instruction, unbundlings instruction is sent to backup device by mobile terminal.
Step S21, backup device deletion is corresponding with unbundlings instruction have been stored subscriber identity information and has stored end message.
The present embodiment can release the binding of any one backup device and mobile terminal according to the demand of user, thus into one Step improves user experience degree.
Fig. 4-Fig. 8 illustrates one embodiment of secure data backup method of the present invention.Referring to fig. 4, in the present embodiment, The secure data backup method includes the following steps:
Step S30, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
In the present embodiment, step S30 is similar with step S1, and therefore, details are not described herein.
Step S31 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S31 is similar with step S2, and therefore, details are not described herein.
Step S32, when mobile terminal receives file backup request, mobile terminal calculates beating at least two test files Packet plus transmission speed and direct transmission speed.
In the present embodiment, which can be the test file of user preset, such as: the 10 of 1K-10K A test file is also possible to randomly selected at least two files of different sizes from file to be transmitted, preferably selects text Part size is less than the file of nK (for example: n < 10) as test file.
Further, in this embodiment packing plus the calculation of transmission speed can be with are as follows: assuming that a nK is (for example: n =2) file, packing time are As, and the time transmitted after packing is Bs, then the packing of this document adds transmission speed to be nK/ (A+ B)。
Specifically, calculating the packing plus the mode of transmission speed and direct transmission speed of at least two test files are as follows: meter The packing for calculating the different test file of at least two file sizes adds transmission speed and direct transmission speed.Wherein, it calculates at least The packing of the test file of two different file sizes plus the mode of transmission speed and direct transmission speed are as follows: at least calculating M The packing of first test file plus the packing of transmission speed and direct transmission speed and M the second test files add transmission speed and Direct transmission speed.Such as: being packaged while at least calculating 5 1K files and add transmission speed and direct transmission speed and at least 5 It is packaged while a 2K file plus transmission speed and direct transmission speed, the present embodiment passes through the test file of multiple same sizes It determines to be packaged and adds transmission speed and direct transmission speed, improve the accuracy for being packaged and adding transmission speed and direct transmission speed.
Step S33, mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to directly biography At least one of defeated speed first drafts test file, and first to draft file size in test file the smallest by least one First drafts the file size of test file as file propagation threshold;Or, mobile terminal determines at least two test files It is packaged plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and at least one second is drafted File size maximum second drafts the file size of test file as file propagation threshold in test file.
In the present embodiment, referring to Fig. 5, the writing speed and reading speed of file are passed with the increase of file size Increase, when file size is smaller, writing speed and reading speed can be smaller, and when file size is larger, writing speed and Reading speed can also increase with it, until tending towards stability.Therefore, if being transmitted again after small documents being packaged, it can subtract I/O operation number in few document transmission process, can also promote writing speed and reading speed.
For technical solution of the present invention detailed further, it is assumed that there are 6 surveys of 0.5K, 0.8K, 1K, 2K, 3K, 4K File is tried, above-mentioned 6 test files are carried out to be packaged the calculating for adding transmission speed and direct transmission speed, wherein 0.5K, The packing of tri- files of 0.8K, 1K adds transmission speed to be greater than direct transmission speed, and therefore, this case can determine that 1K is passed as file Multiple files of the file size in file to be transmitted less than or equal to 1K transmit again after compression is packaged by defeated threshold value.Into One step, the packing of 2K, 3K, 4K add transmission speed to be less than or equal to direct transmission speed, and therefore, this case can also determine that 2K makees For file propagation threshold, multiple files of the file size in file to be transmitted less than or equal to 2K are carried out after compression is packaged again Transmission.
Step S34, the file destination size of acquisition for mobile terminal file to be transmitted.
File size in file to be transmitted is greater than the first transmission file of file propagation threshold by step S35, mobile terminal It is directly transmitted, after the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold is packaged It is transmitted.
On the basis of the above embodiments, in other embodiments, step S35 can be with are as follows: mobile terminal is passed in carry out first It while defeated file transmits, is packaged one or more second and transmits file, transmit file in packing one or more second and complete Later, the second transmission file of the packing is transmitted.
In the present embodiment, the present embodiment can be carried out according to the type of the second transmission file or the difference of storage location Classifying packing processing, and then after decompression processing, the file solution of same type or same storage location is depressed into same position, reduces Document classification deposit operation after decompression, to further improve user experience.Specifically, the present embodiment can will be located Disposable packing compression is carried out in multiple second transmission files in same bottom document folder, for second in different files Transmission file carries out the processing of packing respectively.
The present embodiment adds transmission speed to be greater than direct transmission speed using the packing of the lesser file of file size, and file is big The packing of small biggish file plus transmission speed are less than the characteristic of direct transmission speed, when receiving file backup request, lead to The packing for testing, calculating and comparing at least two test files plus the speed of transmission speed and direct transmission speed are crossed, determines text Part propagation threshold, and then transmission file is divided into directly transmission class and is packaged transmission class.Therefore, one will be packaged in transmission class Or it is multiple second transmission files carry out packing processing after transmitted, both reduced the I/O operation number in document transmission process, Also the transmission time of file is shortened, to both improve the data throughput of terminal, also improves file transfer rate.This Outside, the present embodiment is packaged processing the second transmission file, further shortens all to be passed while file is transmitted in transmission first The transmission time of defeated file, and then further improve file transfer rate.
On the basis of the above embodiments, in other embodiments, referring to Fig. 6, step S35 includes:
Step S350 while file is transmitted in mobile terminal transmission first, carries out packing processing to the second transmission file, obtains To the i-th packaging file, i=1.
Specifically, on the basis of the present embodiment, in other embodiments, referring to Fig. 7, step S350 includes:
Step S3500, the first file total amount of the first all transmission file of acquisition for mobile terminal, detection the first transmission text First transmission speed of part and the packing speed of detection the second transmission file.
Step S3501, mobile terminal are calculated first according to the first file total amount, the first transmission speed and packing speed Packing amount.
Step S3502, while mobile terminal transmission the first transmission file, to the second of the first packing amount the transmission file into Row packing processing, obtains the 1st packaging file.
For technical solution of the present invention detailed further, it is assumed that it is all first transmission files the first file total amount be AMB, the first transmission speed of the first transmission file are XMB/s, and the packing speed of the second transmission file is YMB/s, then transmits the While one transmission file, the maximum packing amount of the second transmission file is B.Wherein, B=(A/X) * Y.
The present embodiment completes beating for the second transmission file of the first packing amount while being transmitted the first transmission file Packet processing, avoids when being transmitted the first transmission file, and the packing processing of the second transmission file is not completed, so that subsequent The case where no file is transmitted sending, and then further improve file transfer rate.
Step S351, mobile terminal detect whether there is the second transmission file for not carrying out being packaged processing;When exist not into When row is packaged the second transmission file of processing, step S352 is executed.When there is no the second transmission files for not carrying out being packaged processing When, execute step S353.
Step S352 while transmitting the i-th packaging file, is packaged the second transmission file for not carrying out being packaged processing Processing, obtains i+1 packaging file;I++ executes step S351.
On the basis of the above embodiments, in other embodiments, referring to Fig. 8, step S352, comprising:
Step S3520, the second transmission speed of the i-th packaging file of acquisition for mobile terminal.
Step S3521, mobile terminal are calculated second dozen according to the first packing amount, the second transmission speed and packing speed Bao Liang.
Step S3522 does not carry out packing processing to the second packing amount while mobile terminal transmits the i-th packaging file Second transmission file carry out packing processing, obtain i+1 packaging file.
For technical solution of the present invention detailed further, it is assumed that the file size of the i-th packaging file be D MB, i-th Second transmission speed of packaging file is Z MB/s, and the packing speed of the second transmission file is YMB/s, then transmits i-th and be packaged text While part, the maximum packing amount of the second transmission file is E.Wherein, E=(D/Z) * Y.
The present embodiment completes beating for the i+1 packaging file of the second packing amount while being transmitted the i-th packaging file Packet processing, avoids when being transmitted the i-th packaging file, and the packing processing of remaining second transmission file is not completed, with The case where causing subsequent no packaging file to be transmitted, and then further improve file transfer rate.
Step S353 transmits the i-th packaging file.
The present invention is packaged processing the second transmission file, and transmission packaging file while file is transmitted in transmission first While, it is packaged the remaining second transmission file of processing, further shortens the transmission time of institute's available for transmission file, thus into One step improves the file transfer rate of terminal.
Fig. 9 illustrates one embodiment of secure data backup method of the present invention.Referring to Fig. 9, in the present embodiment, the peace Full data back up method includes the following steps:
Step S40, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
In the present embodiment, step S40 is similar with step S30, and therefore, details are not described herein.
Step S41 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S41 is similar with step S31, and therefore, details are not described herein.
Step S42, when mobile terminal receives file backup request, mobile terminal calculates beating at least two test files Packet plus transmission speed and direct transmission speed.
In the present embodiment, step S42 is similar with step S32, and therefore, details are not described herein.
Step S43, mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to directly biography At least one of defeated speed first drafts test file, and first to draft file size in test file the smallest by least one First drafts the file size of test file as file propagation threshold;Or, mobile terminal determines at least two test files It is packaged plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and at least one second is drafted File size maximum second drafts the file size of test file as file propagation threshold in test file.
In the present embodiment, step S43 is similar with step S33, and therefore, details are not described herein.
Step S44, the file destination size of acquisition for mobile terminal file to be transmitted.
In the present embodiment, step S44 is similar with step S34, and therefore, details are not described herein.
File size in file to be transmitted is greater than the first transmission file of file propagation threshold by step S45, mobile terminal It is directly transmitted, after the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold is packaged It is transmitted.
In the present embodiment, step S45 is similar with step S35, and therefore, details are not described herein.
In the present embodiment, the second transmission file is carried out at encryption using the public key in mobile terminal in packing process Reason.
Step S46, second after mobile terminal transmission is packaged transmits file to backup device.
Step S47, when backup device receives the second transmission file after the packing, decompression obtains the second transmission file and deletes Except the second transmission file after the packing.
In the present embodiment, it is carried out in decompression procedure using packaging file of the private key in backup device to the second transmission file Decryption processing, public key and private key are the key pair to match.Further, it should be noted that backup device can be USB flash disk, shifting The storage backup device such as dynamic terminal.
The present embodiment is automatically deleted packaging file, saves memory space, Jin Erti after backup device decompresses packaging file It is efficient storage has been risen.In addition, being backed up on the backup device of not exclusive pairing this embodiment avoids private data, privacy is caused The leakage of data content, to improve data safety performance.
Figure 10 illustrates one embodiment of secure data backup method of the present invention.It, in the present embodiment, should referring to Figure 10 Secure data backup method includes the following steps:
Step S50, when detecting that backup device and mobile terminal establish connection, backup device obtains subscriber identity information and carries out Authentication, meanwhile, backup device obtains the end message of mobile terminal and carries out terminal authentication.
In the present embodiment, step S50 is similar with step S30, and therefore, details are not described herein.
Step S51 allows the data backup in mobile terminal when authentication and terminal authentication pass through to backing up Device, and/or mobile terminal is allowed to read the data in backup device.
In the present embodiment, step S51 is similar with step S31, and therefore, details are not described herein.
Step S52, when mobile terminal receives file backup request, mobile terminal calculates beating at least two test files Packet plus transmission speed and direct transmission speed.
In the present embodiment, step S52 is similar with step S32, and therefore, details are not described herein.
Step S53, mobile terminal, which determines to be packaged at least two test files, adds transmission speed to be less than or equal to directly biography At least one of defeated speed first drafts test file, and first to draft file size in test file the smallest by least one First drafts the file size of test file as file propagation threshold;Or, mobile terminal determines at least two test files It is packaged plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and at least one second is drafted File size maximum second drafts the file size of test file as file propagation threshold in test file.
In the present embodiment, step S53 is similar with step S33, and therefore, details are not described herein.
Step S54, the file destination size of acquisition for mobile terminal file to be transmitted.
In the present embodiment, step S54 is similar with step S34, and therefore, details are not described herein.
File size in file to be transmitted is greater than the first transmission file of file propagation threshold by step S55, mobile terminal It is directly transmitted, after the second transmission file that file size in file to be transmitted is less than or equal to file propagation threshold is packaged It is transmitted.
In the present embodiment, step S55 is similar with step S35, and therefore, details are not described herein.
Step S56, the backup lists of documents in acquisition for mobile terminal backup device, and obtain and be backed up text in mobile terminal Part inventory.
Step S57, acquisition for mobile terminal have backed up lists of documents and the comparison result for being backed up lists of documents, and according to than Relatively result carries out incremental backup operations.
The present embodiment according to backed up lists of documents and be backed up lists of documents comparison result carry out incremental backup operations, The data volume transmitted needed for reducing, and then further improve transmission rate.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present application constitutes any limit It is fixed.
Figure 11 illustrates one embodiment of secure data backup system of the present invention.Referring to Figure 11, the secure data backup System includes mobile terminal 2 and backup device 1, wherein the backup device 1 includes authentication module 10 and control module 11.
Wherein, authentication module 10 when for detecting that backup device 1 and mobile terminal 2 establish connection, obtain user identity letter Authentication is ceased and carries out, meanwhile, it obtains the end message of mobile terminal 2 and carries out terminal authentication;Control module 11, for working as When authentication and terminal authentication pass through, allow the data backup in mobile terminal 2 to backup device 1, and/or allow to move Terminal 2 reads the data in backup device 1.
On the basis of the above embodiments, in other embodiments, backup device 1 receives the subscriber identity information of user's input; Or, mobile terminal 2 receives the subscriber identity information of user's input, and subscriber identity information is sent to backup device 1.
On the basis of the above embodiments, in other embodiments, referring to Figure 12, which further includes judgment module 20 With memory module 21.
Wherein, judgment module 20 are connect for judging whether with mobile terminal 2 for the first time;Memory module 21, for when backup When device 1 is connect for the first time with mobile terminal 2, obtains subscriber identity information and stored, meanwhile, obtain the terminal of mobile terminal 2 Information is simultaneously stored.
On the basis of the above embodiments, in other embodiments, referring to Figure 13, which further includes receiving module 30 With removing module 31.
Receiving module 30, for receiving the unbundlings that mobile terminal 2 is sent and referring to when mobile terminal 2 receives unbundlings instruction It enables;Removing module 31 corresponding with instruction is unbinded stored subscriber identity information and has stored end message for deleting.
On the basis of the above embodiments, in other embodiments, referring to Figure 14, which includes that speed calculates mould Block 40, threshold value confirmation module 41, file size obtain module 42 and document transmission module 43.
Wherein, speed calculation module 40 calculate beating at least two test files when for receiving file backup request Packet plus transmission speed and direct transmission speed;Threshold value confirmation module 41 is packaged plus is passed at least two test files for determining Defeated speed be less than or equal to direct transmission speed at least one first draft test file, and at least one first is drafted into survey File size the smallest first drafts the file size of test file as file propagation threshold in examination file;Or, determining at least It is packaged in two test files plus transmission speed is greater than at least one of direct transmission speed and second drafts test file, and is near It drafts file size in test file maximum second for few one second and drafts the file size of test file as file transmission Threshold value;File size obtains module 42, for obtaining the file destination size of file to be transmitted;Document transmission module 43, is used for The first transmission file that file size in file to be transmitted is greater than file propagation threshold is directly transmitted, by file to be transmitted The second transmission file that middle file size is less than or equal to file propagation threshold is transmitted after being packaged.
On the basis of the above embodiments, in other embodiments, document transmission module 43 is also used to transmit in carry out first It while file transmits, is packaged one or more second and transmits file, transmit file in packing one or more second and complete it Afterwards, the second transmission file of the packing is transmitted.
On the basis of the above embodiments, in other embodiments, referring to Figure 15, this document transmission module 43 includes directly passing Defeated submodule 430 and circulation are packaged transmission submodule 431.
Wherein, submodule 430 is directly transmitted, while being used for transmission the first transmission file, the second transmission file is carried out Packing processing, obtains the i-th packaging file, i=1;It is packaged transmission submodule 431, for detecting whether in the presence of not carrying out at packing Second transmission file of reason;When there is the second transmission file for not carrying out being packaged processing, while transmitting the i-th packaging file, Packing processing is carried out to the second transmission file for not carrying out being packaged processing, obtains i+1 packaging file;I++ repeats this dozen Packet transmission submodule 431 until the second all transmission files carries out packing processing, and the packaging file being packed into is carried out Transmission.
Further, on the basis of the above embodiments, in other embodiments, referring to Figure 15, this directly transmits submodule 430 include parameter acquiring unit 4300, the first packing amount computing unit 4301 and the first transmission plus packaged unit 4302.
Wherein, parameter acquiring unit 4300, for obtaining the first file total amount of all first transmission files, detection the First transmission speed of one transmission file and the packing speed of detection the second transmission file;First packing amount computing unit 4301, for the first packing amount to be calculated according to the first file total amount, the first transmission speed and packing speed;First transmission adds Packaged unit 4302 while being used for transmission the first transmission file, carries out at packing the second transmission file of the first packing amount Reason, obtains the 1st packaging file.
Further, on the basis of the above embodiments, in other embodiments, referring to Figure 15, which is packaged transmission Module 431 includes transmission speed acquiring unit 4310, the second packing amount computing unit 4311 and the second transmission plus packaged unit 4312。
Wherein, transmission speed acquiring unit 4310, for obtaining the second transmission speed of the i-th packaging file;Second is packaged Computing unit 4311 is measured, for the second packing amount to be calculated according to the first packing amount, the second transmission speed and packing speed;The Two transmission plus packaged unit 4312, while being used for transmission the i-th packaging file, to the second packing amount do not carry out be packaged processing Second transmission file carries out packing processing, obtains i+1 packaging file.
On the basis of the above embodiments, in other embodiments, referring to Figure 15, which further includes decompression processing module 50;This document transmission module 43 is also used to transmit the second transmission file after being packaged to backup device 1;Decompression processing module 50 is used When receiving the second transmission file after the packing, decompression obtains the second transmission file and deletes the second transmission after the packing File.
On the basis of the above embodiments, in other embodiments, using the public key in mobile terminal 2 to the in packing process Two transmission files are encrypted, using the private key in backup device 1 to the packaging file of the second transmission file in decompression procedure It is decrypted, public key and private key are key pair.
On the basis of the above embodiments, in other embodiments, referring to Figure 16, which further includes that lists of documents obtain Modulus block 60 and incremental backup module 61.
Wherein, lists of documents obtain module 60, for obtaining the backup lists of documents in backup device 1, and obtain movement Lists of documents are backed up in terminal 2;Incremental backup module 61 lists of documents and is backed up lists of documents for obtaining to have backed up Comparison result, and incremental backup operations are carried out according to comparison result.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of secure data backup system is divided into different functional unit or module, with Complete all or part of function described above.Each functional unit in embodiment, module can integrate single in a processing In member, it is also possible to each unit and physically exists alone, can also be integrated in one unit with two or more units, on It states integrated unit both and can take the form of hardware realization, can also realize in the form of software functional units.In addition, each Functional unit, module specific name be also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.On The specific work process for stating unit in device, module, can refer to corresponding processes in the foregoing method embodiment, no longer superfluous herein It states.
The specific embodiment of invention is described in detail above, but it is only used as example, the present invention is not intended to limit With specific embodiments described above.For a person skilled in the art, any equivalent modifications that the invention is carried out Or substitute also all among scope of the invention, therefore, the made equalization in the case where not departing from the spirit and principles in the present invention range Transformation and modification, improvement etc., all should be contained within the scope of the invention.

Claims (13)

1. a kind of secure data backup method, which is characterized in that it includes the following steps:
When detecting that backup device and mobile terminal establish connection, the backup device obtains subscriber identity information and carries out identity and tests Card, meanwhile, the backup device obtains the end message of the mobile terminal and carries out terminal authentication;
When authentication and terminal authentication pass through, allow the data backup in the mobile terminal to the backup device, And/or the mobile terminal is allowed to read the data in the backup device.
2. secure data backup method according to claim 1, which is characterized in that the backup device obtains user identity letter The step of breath, comprising:
The backup device receives the subscriber identity information of user's input;
Or, the mobile terminal receives the subscriber identity information of user's input, and the subscriber identity information is sent to described Backup device.
3. secure data backup method according to claim 1, which is characterized in that described to detect backup device and movement eventually Before the step of connection is established at end, further includes:
The backup device judges whether to connect for the first time with the mobile terminal;
When the backup device is connect for the first time with the mobile terminal, the backup device obtains subscriber identity information and is deposited Storage, meanwhile, the backup device obtains the end message of the mobile terminal and is stored.
4. secure data backup method according to claim 1, which is characterized in that the secure data backup method is also wrapped It includes:
When the mobile terminal receives unbundlings instruction, unbundlings instruction is sent to the backup by the mobile terminal Device;
The backup device deletion is corresponding with the unbundlings instruction have been stored subscriber identity information and has stored end message.
5. secure data backup method according to claim 1, which is characterized in that described allow will be in the mobile terminal Data backup to the backup device the step of after, further includes:
When the mobile terminal receives file backup request, the packing that the mobile terminal calculates at least two test files adds Transmission speed and direct transmission speed;
It is described straight that the mobile terminal determines that packing described at least two test file plus transmission speed are less than or equal to At least one for connecing transmission speed first drafts test file, and by it is described at least one first to draft file in test file big Small the smallest first drafts the file size of test file as file propagation threshold;Or, described in the mobile terminal is determining extremely It is packaged described in few two test files plus transmission speed is greater than at least one of the direct transmission speed and second drafts test File, and by it is described at least one second draft file size in test file maximum second draft test file file it is big It is small to be used as file propagation threshold;
The file destination size of the acquisition for mobile terminal file to be transmitted;
File size in the file to be transmitted is greater than the first transmission file of the file propagation threshold by the mobile terminal It is directly transmitted, file size in the file to be transmitted is less than or equal to the second transmission text of the file propagation threshold Part is transmitted after being packaged.
6. secure data backup method according to claim 5, which is characterized in that the mobile terminal will be described to be transmitted The first transmission file that file size is greater than the file propagation threshold in file is directly transmitted, by the file to be transmitted The step of the second transmission file that middle file size is less than or equal to the file propagation threshold is transmitted after being packaged, comprising:
The mobile terminal is packaged one or more second and transmits file, beating while file transmission is transmitted in carry out first After packet one or more second transmits file completion, the second transmission file of the packing is transmitted.
7. secure data backup method according to claim 5, which is characterized in that the mobile terminal will be described to be transmitted The first transmission file that file size is greater than the file propagation threshold in file is directly transmitted, by the file to be transmitted The step of the second transmission file that middle file size is less than or equal to the file propagation threshold is transmitted after being packaged, comprising:
While file is transmitted in the mobile terminal transmission described first, packing processing is carried out to the second transmission file, is obtained To the i-th packaging file, i=1;
The mobile terminal detects whether there is the second transmission file for not carrying out being packaged processing;Packing processing is not carried out when existing Second transmission file when, transmit i-th packaging file while, to it is described do not carry out be packaged processing second transmission file Packing processing is carried out, i+1 packaging file is obtained;I++ repeats current procedures, until all second transmission files into Row packing processing, and the packaging file being packed into is transmitted.
8. secure data backup method according to claim 7, which is characterized in that the mobile terminal transmission described first While transmitting file, the step of carrying out packing processing to the second transmission file, obtain 1 packaging file, comprising:
The of first file total amount of the first all transmission file of the acquisition for mobile terminal, detection the first transmission file The packing speed of one transmission speed and detection the second transmission file;
The mobile terminal is calculated according to the first file total amount, first transmission speed and the packing speed One packing amount;
While file is transmitted in the mobile terminal transmission described first, the second transmission file of the first packing amount is carried out Packing processing, obtains the 1st packaging file.
9. secure data backup method according to claim 8, which is characterized in that transmission i-th packaging file While, packing processing is carried out to the second transmission file for not carrying out being packaged processing, obtains the step of i+1 packaging file Suddenly, comprising:
Second transmission speed of the i-th packaging file described in the acquisition for mobile terminal;
The mobile terminal is calculated second according to the first packing amount, second transmission speed and the packing speed Packing amount;
While the mobile terminal transmits the i-th packaging file, to do not carry out packing processing second of the second packing amount Transmission file carries out packing processing, obtains i+1 packaging file.
10. secure data backup method according to claim 5, which is characterized in that it is described will be in the file to be transmitted After the step of the second transmission file that file size is less than or equal to the file propagation threshold is transmitted after being packaged, also wrap It includes:
Second after the mobile terminal transmission is packaged transmits file to backup device;
When the backup device receives the second transmission file after the packing, decompression obtains the second transmission file and deletes the packing The second transmission file afterwards.
11. secure data backup method according to claim 10, which is characterized in that use the movement in packing process The second transmission file is encrypted in public key in terminal, using the private key pair in the backup device in decompression procedure The packaging file of the second transmission file is decrypted, and the public key and the private key are key pair.
12. secure data backup method according to claim 5, which is characterized in that it is described will be in the file to be transmitted After the step of the second transmission file that file size is less than or equal to the file propagation threshold is transmitted after being packaged, also wrap It includes:
Backup lists of documents in the acquisition for mobile terminal backup device, and obtain that be backed up file in the mobile terminal clear It is single;
Lists of documents and the comparison result for being backed up lists of documents are backed up described in the acquisition for mobile terminal, and according to institute It states comparison result and carries out incremental backup operations.
13. a kind of secure data backup system, which is characterized in that it includes mobile terminal and backup device, the mobile terminal with The backup device carries out information exchange, realizes safe transmission of data backup method described in one of claim 1-12.
CN201811003811.1A 2018-08-30 2018-08-30 Secure data backup method and secure data backup system Pending CN109284203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811003811.1A CN109284203A (en) 2018-08-30 2018-08-30 Secure data backup method and secure data backup system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811003811.1A CN109284203A (en) 2018-08-30 2018-08-30 Secure data backup method and secure data backup system

Publications (1)

Publication Number Publication Date
CN109284203A true CN109284203A (en) 2019-01-29

Family

ID=65183190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811003811.1A Pending CN109284203A (en) 2018-08-30 2018-08-30 Secure data backup method and secure data backup system

Country Status (1)

Country Link
CN (1) CN109284203A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274607A (en) * 2020-01-20 2020-06-12 福建奇点时空数字科技有限公司 Mobile application data privacy protection method based on virtual machine

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805372A (en) * 2005-12-30 2006-07-19 赵颜 Method for providing device and data security service for wireless mobile terminal users
CN101132557A (en) * 2007-09-28 2008-02-27 赵颜 Method providing equipment and data safety service for mobile phone users
US20080163336A1 (en) * 2006-08-18 2008-07-03 Huawei Technologies Co., Ltd. Method and system for backing up and restoring license
CN102238223A (en) * 2010-05-06 2011-11-09 清华大学 Networked personal data management method for mobile device
CN108881454A (en) * 2018-06-28 2018-11-23 北京珠穆朗玛移动通信有限公司 Document transmission method, mobile terminal and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805372A (en) * 2005-12-30 2006-07-19 赵颜 Method for providing device and data security service for wireless mobile terminal users
US20080163336A1 (en) * 2006-08-18 2008-07-03 Huawei Technologies Co., Ltd. Method and system for backing up and restoring license
US20150143539A1 (en) * 2006-08-18 2015-05-21 Huawei Technologies Co., Ltd. Method and System for Backing Up and Restoring License
CN101132557A (en) * 2007-09-28 2008-02-27 赵颜 Method providing equipment and data safety service for mobile phone users
CN102238223A (en) * 2010-05-06 2011-11-09 清华大学 Networked personal data management method for mobile device
CN108881454A (en) * 2018-06-28 2018-11-23 北京珠穆朗玛移动通信有限公司 Document transmission method, mobile terminal and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DOMINIK LEIBENGER等: "Triviback: A Storage-Efficient Secure Backup System", 《2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN)》, 16 November 2017 (2017-11-16), pages 435 - 443 *
应飞: "电脑系统快速备份与恢复的几种方法", 《中国制造业信息化》, 1 April 2009 (2009-04-01), pages 64 - 66 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274607A (en) * 2020-01-20 2020-06-12 福建奇点时空数字科技有限公司 Mobile application data privacy protection method based on virtual machine

Similar Documents

Publication Publication Date Title
CN112153085B (en) Data processing method, node and block chain system
CN105024986B (en) The methods, devices and systems that account number logs in
US20090298468A1 (en) System and method for deleting data in a communication device
CN109831487A (en) Fragmented file verification method and terminal equipment
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN110351089A (en) A kind of data signature authentication method and device
CN110167192B (en) Bluetooth connection management method and device, electronic equipment and non-transient storage medium
CN106101091A (en) The method and apparatus that inter-terminal data processes
CN108881454A (en) Document transmission method, mobile terminal and storage medium
CN110363017A (en) Mix the data safety sharing method and system based on client encryption under cloud environment
CN107733639A (en) Key management method, device and readable storage medium storing program for executing
CN109729000A (en) A kind of instant communicating method and device
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN106101188B (en) A kind of data processing method of network cloud USB flash disk
CN110334531A (en) Management method, host node, system, storage medium and the device of virtual machine key
CN109284203A (en) Secure data backup method and secure data backup system
CN107645474A (en) Log in the method for open platform and log in the device of open platform
CN108200059A (en) Document transmission method, device, equipment and computer readable storage medium
CN109189606A (en) Data back up method, system and storage medium
CN109640277A (en) SMS processing and device applied to usim card
CN112702731B (en) SIM card information transmission method and device, computer equipment and storage medium
CN108966206A (en) Data traffic sharing method, device, terminal and storage medium
CN109408572A (en) Mass data processing method based on SB frame and Bloom filter
CN105975624B (en) A kind of data transmission method, equipment and system
CN106998355A (en) Data transmission method, electronic equipment and the data transmission system of electric room

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination