CN109302391B - Security data uploading method and device and client - Google Patents

Security data uploading method and device and client Download PDF

Info

Publication number
CN109302391B
CN109302391B CN201811108451.1A CN201811108451A CN109302391B CN 109302391 B CN109302391 B CN 109302391B CN 201811108451 A CN201811108451 A CN 201811108451A CN 109302391 B CN109302391 B CN 109302391B
Authority
CN
China
Prior art keywords
data
uploading
security data
video
target node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811108451.1A
Other languages
Chinese (zh)
Other versions
CN109302391A (en
Inventor
许序标
熊红令
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201811108451.1A priority Critical patent/CN109302391B/en
Publication of CN109302391A publication Critical patent/CN109302391A/en
Priority to PCT/CN2019/103773 priority patent/WO2020057351A1/en
Application granted granted Critical
Publication of CN109302391B publication Critical patent/CN109302391B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/04Protocols for data compression, e.g. ROHC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the technical field of data uploading, in particular to a security data uploading method and device and a client. The security data uploading method is applied to the client. The security data uploading method comprises the following steps: when an abnormal condition is detected, determining an additional storage platform which is used for receiving security data and is bound with a client; judging whether the geographical position of the additional storage platform is located in the pervasive area or not according to the pervasive area of the abnormal condition; if so, uploading the security data to a target node, wherein the target node is a node which is not located in a pervasive area and is authorized by an additional storage platform to store the data; and if not, uploading the security data to an additional storage platform. Therefore, the security data uploading reliability can be improved, and the security data can be reliably ensured.

Description

Security data uploading method and device and client
Technical Field
The invention relates to the technical field of data uploading, in particular to a security data uploading method and device and a client.
Background
In order to prevent the security data from being lost, the local server needs to upload the security data to the cloud server, however, the physical distance between the cloud server and the local server is not long, and even the cloud server and the local server are all arranged in the same building. However, when some abnormal situations such as sudden disasters occur, the cloud server is also damaged, so that the security data cannot be effectively protected.
Disclosure of Invention
An object of an embodiment of the present invention is to provide a security data uploading method and apparatus, and a client, which can improve the security data uploading reliability to reliably ensure the security of the security data.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides a security data uploading method, which is applied to a client, and includes:
when an abnormal condition is detected, determining an additional storage platform which is used for receiving security data and is bound with the client;
judging whether the geographical position of the additional storage platform is located in the pervasive area according to the pervasive area of the abnormal condition;
if so, uploading the security data to a target node, wherein the target node is a node which is not located in the pervasive area and the additional storage platform authorizes to store data;
and if not, uploading the security data to the additional storage platform.
Optionally, the security data includes several types of data with different priorities;
the uploading the security data to a target node comprises:
detecting the remaining available storage capacity of the target node;
judging whether the size of the security data is larger than the remaining available storage capacity of the target node or not;
if the priority of the various types of data in the security data is larger than the priority of the various types of data in the security data, uploading the various types of data in the security data to the target node;
and if the security data is smaller than the preset threshold value, uploading the security data to the target node.
Optionally, the security data includes primary data, secondary data and tertiary data, the priority of the primary data is higher than that of the secondary data, and the priority of the secondary data is higher than that of the tertiary data;
the uploading various types of data in the security data to the target node according to the priorities of the various types of data in the security data comprises the following steps:
uploading the primary data to the target node;
after the primary data are detected to be uploaded completely, uploading the secondary data to the target node;
and after the secondary data are detected to be completely uploaded, uploading the tertiary data to the target node.
Optionally, the security data is video data, and a plurality of target nodes are provided;
the uploading the security data to a target node comprises:
according to the video playing time sequence, the video data is divided into N video segments M with equal capacityiWherein N is a positive integer greater than 1, i is a positive integer, and i ∈ N, let MiThe video clip has a file start tag value of i-1, MthiThe file end point mark value of the video segments is i, wherein when the file end point mark value of one video segment is equal to the file start mark value of another video segment, the one video segment is continuously arranged in front of the another video segment according to the video playing time sequence;
and uploading the N video clips to a target node.
Optionally, the uploading the N video segments to the target node in a distributed manner includes:
encrypting each of the video clips;
and uploading the N encrypted video clips to a target node.
Optionally, the distributing and uploading the N encrypted video segments to the target node includes:
compressing each encrypted video segment to obtain a compressed packet;
and uploading the N compressed packets to a target node in a distributed mode.
In a second aspect, an embodiment of the present invention provides a security data uploading apparatus, which is applied to a client, and includes:
the determining module is used for determining an additional storage platform which is used for receiving security data and is bound with the client when an abnormal condition is detected;
the judging module is used for judging whether the geographical position of the additional storage platform is located in the pervasive area according to the pervasive area of the abnormal condition;
the first uploading module is used for uploading the security data to a target node if the security data is available, wherein the target node is a node which is not located in the pervasive area and the additional storage platform authorizes to store the data;
and the second uploading module is used for uploading the security data to the additional storage platform if the security data is not uploaded to the additional storage platform.
Optionally, the security data is video data;
the first uploading module is specifically configured to:
according to the video playing time sequence, the video data is divided into N video segments M with equal capacityiWherein N is a positive integer greater than 1, i is a positive integer, and i ∈ N, let MiThe video clip has a file start tag value of i-1, MthiThe file end point mark value of the video segments is i, wherein when the file end point mark value of one video segment is equal to the file start mark value of another video segment, the one video segment is continuously arranged in front of the another video segment according to the video playing time sequence;
and uploading the N video clips to a target node.
Optionally, the first upload module is further specifically configured to:
encrypting each of the video clips;
and uploading the N encrypted video clips to a target node.
In a third aspect, an embodiment of the present invention provides a client, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the security data uploading methods.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium storing computer-executable instructions for causing a client to execute any one of the security data uploading methods.
In a fifth aspect, an embodiment of the present invention provides a computer program product, where the computer program product includes a computer program stored on a non-volatile computer-readable storage medium, and the computer program includes program instructions, when executed by a client, cause the client to execute any one of the security data uploading methods.
In the security data uploading method and device and the client provided by the embodiments of the present invention, first, when an abnormal condition is detected, an additional storage platform for receiving the security data and binding with the client is determined. Secondly, judging whether the geographical position of the additional storage platform is located in the pervasive area according to the pervasive area of the abnormal condition. Thirdly, if so, uploading the security data to a target node, wherein the target node is a node which is not located in a pervasive area and is authorized by an additional storage platform to store the data; and if not, uploading the security data to an additional storage platform. Therefore, the security data uploading reliability can be improved, and the security data can be reliably ensured.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a schematic structural diagram of a security data uploading system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a security data uploading method provided in an embodiment of the present invention;
FIG. 3 is a diagram illustrating a method for splitting a video file according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a security data uploading device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a client according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The security data uploading method provided by the embodiment of the invention can be executed in any suitable type of client with computing capability, such as a server, a desktop computer, a smart phone, a tablet computer and other electronic products. The server may be a physical server or a logical server formed by virtualizing a plurality of physical servers. The server may also be a server cluster formed by a plurality of servers capable of communicating with each other, and each functional module may be respectively distributed on each server in the server cluster.
The security data uploading device of the embodiment of the invention can be used as a software system and independently arranged in the client, and also can be used as one of the functional modules integrated in the processor to execute the security data uploading method of the embodiment of the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a security data uploading system according to an embodiment of the present invention. As shown in fig. 1, the security data uploading system 100 includes: camera 11, client 12, cloud server 13, and authorization server 14.
The camera 11 is installed in a predetermined area for capturing video data. It can be understood that the camera 11 is fixedly installed in the preset area according to a preset rule, and the preset area is covered as completely as possible. For example, the high-definition cameras are arranged on the wall surface, the ground surface, the roof or the object surface of the preset area by combining the specific structure, the shielding and the like of the preset area.
In order to improve the shooting angle and the shooting range of the camera 11, reduce the arrangement of the camera 11 and reduce the system cost, a mode of combining the camera 11 and a multi-dimensional rotating motor can be adopted to capture high-definition video frame images in real time in a preset area. Of course, the integrated camera 11 may be selected to replace a combination mode of the multi-dimensional rotating motor and the camera 11, for example, a hemispherical all-in-one machine, a rapid spherical all-in-one machine, an integrated high-definition camera combined with a pan-tilt, or an all-in-one machine with a built-in lens, and the above all-in-one machine may realize automatic focusing. Preferably, a high-definition camera having a waterproof function, a small size, a high resolution, a long life, and a general communication interface is selected.
The client 12 is configured to receive video data collected by the camera 11, upload the video data to the cloud server 13, and store and backup the video data in the cloud server 13.
In this embodiment, the client 12 may bind the cloud server 13 in advance, and after the user logs in the client 12, the user may upload the video data to the cloud server 13 through the client 12.
The authorization server 14 is authorized and authenticated by the cloud server 13, and is configured to receive the video data sent by the cloud server 13, so as to further backup and store the video data. Generally, only when an abnormal condition occurs in the surrounding environment of the cloud server 13, the cloud server 13 side can send the video data to the authorization server 14.
Here, the cloud server 13 and the authorization server 14 may be a physical server or a logical server formed by virtualizing a plurality of physical servers. The server may also be a server cluster formed by a plurality of servers capable of communicating with each other, and each functional module may be respectively distributed on each server in the server cluster.
Referring to fig. 2, fig. 2 is a schematic flowchart of a security data uploading method according to an embodiment of the present invention, where the security data uploading method S200 is applied to a client. As shown in fig. 2, the security data uploading method S200 includes:
s21, when an abnormal condition is detected, determining an additional storage platform which is used for receiving security data and is bound with the client;
in this embodiment, the abnormal condition is various factors affecting the stability of the stored data of the additional storage platform, such as fire, earthquake, flood, etc. The security data comprises video data, sensor data acquired by various security sensors and the like. The additional storage platform is a storage platform for binding and uploading security data for the client, for example, the additional storage platform may be a cloud server.
For example, a user may send a trigger instruction to the client, where the trigger instruction includes a region over which the abnormal condition exists (fire coverage, earthquake coverage, flood coverage, etc.), and the client may detect the abnormal condition according to the trigger instruction. For another example, the client may capture information associated with the additional storage platform by using a crawler technology on the internet, and extract an abnormal condition associated with the additional storage platform from the information.
S22, judging whether the geographical position of the additional storage platform is located in the pervasive area according to the pervasive area of the abnormal condition;
s23, if yes, uploading the security data to a target node, wherein the target node is a node which is not located in a pervasive area and is authorized by an additional storage platform to store the data;
and S24, if not, uploading the security data to an additional storage platform.
In this embodiment, the target node includes an authorization server or an authorization client.
When the abnormal condition is a fire, an earthquake, a flood and the like, the client predicts the spread area of the abnormal condition. After predicting the pervasive area of the abnormal situation, the client judges whether the geographic position of the additional storage platform is located in the pervasive area so as to execute the subsequent steps.
Therefore, the security data uploading reliability can be improved, and the security data can be reliably ensured.
In some embodiments, the security data includes several classes of data of different priorities. When the client uploads the security data to the target node, firstly, the client detects the remaining available storage capacity of the target node; secondly, the client judges whether the size of the security data is larger than the remaining available storage capacity of the target node, if so, the client uploads various types of data in the security data to the target node according to the priority of the various types of data in the security data, for example, the security data comprises primary data, secondary data and tertiary data, the priority of the primary data is higher than that of the secondary data, and the priority of the secondary data is higher than that of the tertiary data. When the client uploads various data in the security data to the target node according to the priority of the various data in the security data, firstly, the client uploads primary data to the target node; secondly, after the primary data are detected to be uploaded completely, the client uploads secondary data to a target node; and thirdly, after the secondary data are detected to be completely uploaded, the client uploads the tertiary data to the target node. And if the size of the security data is smaller than the remaining available storage capacity of the target node, the client uploads the security data to the target node.
By the method, important data can be guaranteed to be stored preferentially, and some important data are prevented from being lost.
In some embodiments, the security data is video data, and the number of target nodes is multiple. When the client uploads the security data to the target node, firstly, the video data is divided into N video segments M with equal capacity according to the video playing time sequencei. Secondly, uploading the N video clips to the target node.
Wherein N is a positive integer greater than 1, i is a positive integer, and i belongs to N, let MiThe video clip has a file start tag value of i-1, MthiAnd the file ending point marker value of the video segments is i, wherein when the file ending point marker value of one video segment is equal to the file starting marker value of the other video segment, one video segment is continuously arranged in front of the other video segment according to the video playing time sequence. For example, referring to FIG. 3, a complete video file is divided into 5 video segments, i.e., N is 5, each video segment has the same capacity, and the first video segment M1Has a file start flag value of 0 and a file end flag value of 1. Second video segment M2Has a file start flag value of 1 and a file end flag value of 2. Third video segment M3Has a file start marker value of 2 and a file end point marker value of 3. Fourth video segment M4Has a file start flag value of 3 and a file end flag value of 4. Fifth video segment M5Has a file start flag value of 4 and a file end flag value of 5.
When the client end downloads each video segment from each target node and synthesizes each video segment, the client end detects whether the file end point mark value of one video segment is equal to the file start mark value of another video segment, if so, one video segment is continuously arranged in front of another video segment according to the video playing time sequence, namely, the first video segment M1Arranged in a second video segment M2In front of the vehicle.
In this way, it is possible to more efficiently synthesize individual video clips.
In some embodiments, when the client uploads the N video clip distributions to the target node, in order to prevent the video clips from being leaked, the client encrypts each video clip and uploads the N encrypted video clip distributions to the target node.
In order to reduce the storage pressure of the target node, when the client side uploads the N encrypted video segments to the target node in a distributed manner, the client side compresses each encrypted video segment to obtain a compressed packet. Secondly, the client side uploads the N compressed packets to the target node in a distributed mode.
It should be noted that, in the foregoing embodiments, a certain order does not necessarily exist between the foregoing steps, and it can be understood by those skilled in the art from the description of the embodiments of the present invention that, in different embodiments, the foregoing steps may have different execution orders, that is, may be executed in parallel, may also be executed in an exchange manner, and the like.
As another aspect of the embodiments of the present invention, an embodiment of the present invention provides a security data uploading device, which is applied to a client. The security data uploading device can be used as one software function unit, the security data uploading device comprises a plurality of instructions, the instructions are stored in the memory, the processor can access the memory and call the instructions to execute, and therefore the security data uploading method is completed.
Referring to fig. 4, the security data uploading device 400 includes: the device comprises a determining module 41, a judging module 42, a first uploading module 43 and a second uploading module 44.
The determining module 41 is configured to determine, when an abnormal condition is detected, an additional storage platform that is used for receiving security data and is bound to the client;
the judging module 42 is configured to judge whether the geographic location of the additional storage platform is located in a pervasive area according to the pervasive area of the abnormal condition;
the first uploading module 43 is configured to upload the security data to a target node if the security data is valid, where the target node is a node that is not located in the pervasive area and where the additional storage platform authorizes to store data;
and the second uploading module 44 is used for uploading the security data to the additional storage platform if the security data is not uploaded to the additional storage platform.
Therefore, the security data uploading reliability can be improved, and the security data can be reliably ensured.
In some embodiments, the security data is video data. The first uploading module 43 is specifically configured to: according to the video playing time sequence, the video data is divided into N video segments M with equal capacityiWherein N is a positive integer greater than 1, i is a positive integer, and i ∈ N, let MiThe video clip has a file start tag value of i-1, MthiThe file end point mark value of the video segments is i, wherein when the file end point mark value of one video segment is equal to the file start mark value of another video segment, the one video segment is continuously arranged in front of the another video segment according to the video playing time sequence; and uploading the N video clips to a target node.
In some embodiments, the first uploading module 43 is further specifically configured to: encrypting each of the video clips; and uploading the N encrypted video clips to a target node.
It should be noted that the security data uploading device can execute the security data uploading method provided by the embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method. Technical details that are not described in detail in the embodiment of the security video backup device based on the block chain may be referred to the security data uploading method provided by the embodiment of the present invention.
As yet another aspect of the embodiment of the present invention, an embodiment of the present invention provides a client. As shown in fig. 5, the client 500 includes: one or more processors 51 and memory 52. In fig. 5, one processor 51 is taken as an example.
The processor 51 and the memory 52 may be connected by a bus or other means, such as the bus connection in fig. 5.
The memory 52 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the security data uploading method in the embodiment of the present invention. The processor 51 executes various functional applications and data processing of the security data uploading device by running the nonvolatile software program, instructions and modules stored in the memory 52, that is, the functions of the security data uploading method of the above method embodiment and the modules of the above device embodiment are realized.
The memory 52 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 52 may optionally include memory located remotely from the processor 51, and these remote memories may be connected to the processor 51 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules are stored in the memory 52, and when executed by the one or more processors 51, perform the security data uploading method in any of the above method embodiments, for example, perform the steps of fig. 2 described above; the functions of the various modules described in fig. 4 may also be implemented.
Embodiments of the present invention further provide a non-volatile computer storage medium, where the computer storage medium stores computer-executable instructions, which are executed by one or more processors, for example, one processor 51 in fig. 5, and enable the one or more processors to perform the security data uploading method in any of the method embodiments, for example, perform the above-described steps of performing the above-described steps shown in fig. 2; the functions of the various modules described in fig. 4 may also be implemented.
The above-described embodiments of the apparatus or device are merely illustrative, wherein the unit modules described as separate parts may or may not be physically separate, and the parts displayed as module units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network module units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the technical solutions mentioned above may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute the method according to each embodiment or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A security data uploading method is applied to a client side and is characterized by comprising the following steps:
after a client acquires a trigger instruction of a pervasive area including abnormal conditions or acquires abnormal conditions associated with an additional storage platform, determining the additional storage platform which is used for receiving security data and is bound with the client, wherein the abnormal conditions include factors influencing the stability of the stored data of the additional storage platform;
judging whether the geographical position of the additional storage platform is located in the pervasive area according to the pervasive area of the abnormal condition;
if so, uploading the security data to a target node, wherein the target node is a node which is not located in the pervasive area and the additional storage platform authorizes to store data;
and if not, uploading the security data to the additional storage platform.
2. The method of claim 1, wherein the security data comprises several classes of data of different priorities;
the uploading the security data to a target node comprises:
detecting the remaining available storage capacity of the target node;
judging whether the size of the security data is larger than the remaining available storage capacity of the target node or not;
if the priority of the various types of data in the security data is larger than the priority of the various types of data in the security data, uploading the various types of data in the security data to the target node;
and if the security data is smaller than the preset threshold value, uploading the security data to the target node.
3. The method of claim 2, wherein the security data comprises primary data, secondary data, and tertiary data, the primary data having a higher priority than the secondary data, the secondary data having a higher priority than the tertiary data;
the uploading various types of data in the security data to the target node according to the priorities of the various types of data in the security data comprises the following steps:
uploading the primary data to the target node;
after the primary data are detected to be uploaded completely, uploading the secondary data to the target node;
and after the secondary data are detected to be completely uploaded, uploading the tertiary data to the target node.
4. The method according to claim 1, wherein the security data is video data, and the number of the target nodes is multiple;
the uploading the security data to a target node comprises:
according to the video playing time sequence, the video data is divided into N video segments M with equal capacityiWherein N is a positive integer greater than 1, i is a positive integer, and i ∈ N, let MiThe video clip has a file start tag value of i-1, MthiThe file end point mark value of the video segments is i, wherein when the file end point mark value of one video segment is equal to the file start mark value of another video segment, the one video segment is continuously arranged in front of the another video segment according to the video playing time sequence;
and uploading the N video clips to a target node.
5. The method of claim 4, wherein the uploading the distribution of the N video segments to a target node comprises:
encrypting each of the video clips;
and uploading the N encrypted video clips to a target node.
6. The method of claim 5, wherein the uploading the encrypted N video clips to the destination node comprises:
compressing each encrypted video segment to obtain a compressed packet;
and uploading the N compressed packets to a target node in a distributed mode.
7. The utility model provides a security protection data upload device, is applied to the customer end, its characterized in that includes:
the system comprises a determining module, a storage module and a processing module, wherein the determining module is used for determining an additional storage platform which is used for receiving security data and is bound with a client and determining the additional storage platform which is used for receiving the security data and is bound with the client after a client acquires a trigger instruction of a pervasive area including abnormal conditions or acquires the abnormal conditions associated with the additional storage platform, and the abnormal conditions include factors which influence the stability of the storage data of the additional storage platform;
the judging module is used for judging whether the geographical position of the additional storage platform is located in the pervasive area according to the pervasive area of the abnormal condition;
the first uploading module is used for uploading the security data to a target node if the security data is available, wherein the target node is a node which is not located in the pervasive area and the additional storage platform authorizes to store the data;
and the second uploading module is used for uploading the security data to the additional storage platform if the security data is not uploaded to the additional storage platform.
8. The device of claim 7, wherein the security data is video data;
the first uploading module is specifically configured to:
according to the video playing time sequence, the video data is cut into volumesN video segments M of equal sizeiWherein N is a positive integer greater than 1, i is a positive integer, and i ∈ N, let MiThe video clip has a file start tag value of i-1, MthiThe file end point mark value of the video segments is i, wherein when the file end point mark value of one video segment is equal to the file start mark value of another video segment, the one video segment is continuously arranged in front of the another video segment according to the video playing time sequence;
and uploading the N video clips to a target node.
9. The apparatus of claim 8, wherein the first upload module is further specifically configured to:
encrypting each of the video clips;
and uploading the N encrypted video clips to a target node.
10. A client, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the security data upload method of any of claims 1 to 6.
CN201811108451.1A 2018-09-21 2018-09-21 Security data uploading method and device and client Active CN109302391B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811108451.1A CN109302391B (en) 2018-09-21 2018-09-21 Security data uploading method and device and client
PCT/CN2019/103773 WO2020057351A1 (en) 2018-09-21 2019-08-30 Secured data uploading method and device, and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811108451.1A CN109302391B (en) 2018-09-21 2018-09-21 Security data uploading method and device and client

Publications (2)

Publication Number Publication Date
CN109302391A CN109302391A (en) 2019-02-01
CN109302391B true CN109302391B (en) 2021-03-02

Family

ID=65163739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811108451.1A Active CN109302391B (en) 2018-09-21 2018-09-21 Security data uploading method and device and client

Country Status (2)

Country Link
CN (1) CN109302391B (en)
WO (1) WO2020057351A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302391B (en) * 2018-09-21 2021-03-02 深圳市九洲电器有限公司 Security data uploading method and device and client

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316274A (en) * 2008-05-12 2008-12-03 华中科技大学 Data disaster tolerance system suitable for WAN
CN101651710A (en) * 2009-09-21 2010-02-17 北京工业大学 Disaster-tolerant backup method based on P2P
CN105577836A (en) * 2016-02-17 2016-05-11 中山大学 Data processing method of wearable device and wearable device
CN107422980A (en) * 2016-05-24 2017-12-01 上海共联通信信息发展有限公司 Internet of Things data document storage system and its data file storage method

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963642A (en) * 1996-12-30 1999-10-05 Goldstein; Benjamin D. Method and apparatus for secure storage of data
US20110313974A1 (en) * 2010-06-17 2011-12-22 Computer Associates Think, Inc. Prioritized data backup
TW201301024A (en) * 2011-06-23 2013-01-01 Aten Int Co Ltd Active server monitoring apparatus and active server monitoring method
CN102752404B (en) * 2012-07-25 2015-02-18 高旭磊 Novel backup method and system for disaster recovery
CN103559000B (en) * 2013-11-21 2016-03-09 中国电子科技集团公司第十五研究所 A kind of massive image data moving method towards quality and system
EP3143525A1 (en) * 2014-05-13 2017-03-22 Cloud Crowding Corp. Distributed secure data storage and transmission of streaming media content
CN105701623A (en) * 2016-02-26 2016-06-22 北京元心科技有限公司 Method and server for automatically generating polling task aiming at safety risks
CN106506623B (en) * 2016-10-25 2019-08-13 Oppo广东移动通信有限公司 A kind of data transmission method and equipment
CN106776126A (en) * 2016-11-30 2017-05-31 郑州云海信息技术有限公司 A kind of disaster tolerance system and method
CN109302391B (en) * 2018-09-21 2021-03-02 深圳市九洲电器有限公司 Security data uploading method and device and client

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101316274A (en) * 2008-05-12 2008-12-03 华中科技大学 Data disaster tolerance system suitable for WAN
CN101651710A (en) * 2009-09-21 2010-02-17 北京工业大学 Disaster-tolerant backup method based on P2P
CN105577836A (en) * 2016-02-17 2016-05-11 中山大学 Data processing method of wearable device and wearable device
CN107422980A (en) * 2016-05-24 2017-12-01 上海共联通信信息发展有限公司 Internet of Things data document storage system and its data file storage method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"IMS网络AGCF异地容灾机制";李杨,王龙龙,李文策;《计算机与网络》;20180615;第44卷(第11期);62-64页 *

Also Published As

Publication number Publication date
WO2020057351A1 (en) 2020-03-26
CN109302391A (en) 2019-02-01

Similar Documents

Publication Publication Date Title
KR102072095B1 (en) Identity authentication methods, devices, and systems
WO2016207899A1 (en) System and method for secured capturing and authenticating of video clips
CN105812660A (en) Video processing method based on geographic position
CN108733797B (en) File processing method and related device
CN109655075A (en) Unmanned vehicle localization method and equipment
AU2019295577B2 (en) Security architecture for a real-time remote vehicle monitoring system
CN111368615A (en) Violation building early warning method and device and electronic equipment
CN109302391B (en) Security data uploading method and device and client
CN110248089B (en) Image transmission method, system and terminal equipment
CN110874185A (en) Data storage method and storage device
CN109783663B (en) Archiving method and device
KR101897987B1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN103561212A (en) Camera system
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN113329171A (en) Video processing method, device, equipment and storage medium
US11755758B1 (en) System and method for evaluating data files
CN204242323U (en) Movable perimeter defense device
CN110832870A (en) Data processing method and equipment and pass-through glasses
US10609030B1 (en) Systems and methods for identifying untrusted devices in peer-to-peer communication
CN113271439B (en) Construction site safety monitoring configuration processing method and system
CN110798656A (en) Method, device, medium and equipment for processing monitoring video file
US20220032950A1 (en) Execution Sequence Integrity Parameter Monitoring System
CN114338214A (en) Risk control method and system
US11360871B1 (en) Automatic optimization and hardening of application images
CN108897639B (en) File processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant