CN109587276A - A kind of data back up method, system and associated component - Google Patents

A kind of data back up method, system and associated component Download PDF

Info

Publication number
CN109587276A
CN109587276A CN201910027661.6A CN201910027661A CN109587276A CN 109587276 A CN109587276 A CN 109587276A CN 201910027661 A CN201910027661 A CN 201910027661A CN 109587276 A CN109587276 A CN 109587276A
Authority
CN
China
Prior art keywords
data
backup
user
encryption keys
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910027661.6A
Other languages
Chinese (zh)
Inventor
常立鑫
张亮轩
张锋
张一锋
范贵甫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute
Original Assignee
Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute filed Critical Zhongchao Credit Card Industry Development Co Ltd Hangzhou Blockchain Technology Research Institute
Priority to CN201910027661.6A priority Critical patent/CN109587276A/en
Publication of CN109587276A publication Critical patent/CN109587276A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

This application discloses a kind of data back up method, the data back up method includes backup request being sent to cloud server according to the backup instruction, so that the cloud server returns to the first encryption keys when receiving backup instruction;First encryption keys are transmitted to man-machine interface, and determine first user answer of the user to first encryption keys;The first user answer is converted into standard seed key according to preset rules;Backup Data is obtained using standard seed key encryption target data, and uploads the Backup Data to the cloud server.The application can realize the carrying out safety backup of data under the premise of reducing user's memory cost.Disclosed herein as well is a kind of data backup system, a kind of computer readable storage medium and a kind of electronic equipment, have the above beneficial effect.

Description

A kind of data back up method, system and associated component
Technical field
This application involves technical field of data storage, in particular to a kind of data back up method, system, a kind of computer can Read storage medium and a kind of electronic equipment.
Background technique
With the development of information technology, there are the data of magnanimity to generate all the time in the world, and loss of data may Huge loss is caused, therefore data backup becomes an important developing direction in current data storage technology.
The scheme that data back up method generally uses simple encryption cloud to back up in the prior art, is encrypted close by user setting Target data is backed up to cloud server by code after encryption, and Crypted password is protected using user's brain memory or other modes It deposits.But in the above prior art user for the ease of memory shorter symmetric cryptography password, therefore basis can be generally set The encryption key digit that Crypted password generates is also shorter.Fact that reduces the keys of progress required for computer Brute Force Quantity is attempted, and the safety of encryption method is greatly reduced.And if the longer symmetric cryptography password of user setting, it is most of User can not remember, and need to save symmetric cryptography password using tool, then increase the cost that user saves symmetric cryptography password. User is after solving the problems, such as target data backup by cloud backup, it is also necessary to solve the problems, such as symmetric cryptography password backup again.
Therefore, how under the premise of reducing user's memory cost, realize that the carrying out safety backup of data is those skilled in the art The current technical issues that need to address of member.
Summary of the invention
The purpose of the application is to provide a kind of data back up method, system, a kind of computer readable storage medium and one kind Electronic equipment can realize the carrying out safety backup of data under the premise of reducing user's memory cost.
In order to solve the above technical problems, the application provides a kind of data back up method, which includes:
When receiving backup instruction, backup request is sent to cloud server according to the backup instruction, so as to described Cloud server returns to the first encryption keys;
First encryption keys are transmitted to man-machine interface, and determine user to first encryption keys First user's answer;
The first user answer is converted into standard seed key according to preset rules;
Backup Data is obtained using standard seed key encryption target data, and uploads institute to the cloud server State Backup Data.
Optionally, described the first user answer is converted into standard seed key according to preset rules to include:
Concatenation is executed to all first user answers according to preset order and obtains kind of a substring;
Hash operation is executed to described kind of substring and obtains the cryptographic Hash of described kind of substring, and by the cryptographic Hash As the standard seed key.
Optionally, obtaining Backup Data using standard seed key encryption target data includes:
The target data, which is encrypted, using the standard seed key by 256 aes algorithms obtains the Backup Data.
Optionally, further includes:
When receiving data recovery instruction, restores instruction according to the data and tested to cloud server transmission identity Information and recovery request are demonstrate,proved, so that the cloud server returns after determining that authentication passes through according to the authentication information Return the corresponding data packet of the recovery request.
Optionally, after receiving the corresponding data packet of the recovery request, further includes:
Parse that the data packet obtains target Backup Data and corresponding second Crypted password of the target Backup Data is asked Topic;
Second encryption keys are transmitted to the man-machine interface, and determine the user to second encryption The second user answer of cryptographic problem;
The second user answer is converted into target seed key according to the preset rules;
The target Backup Data is decrypted using the target seed key to complete data recovery operation.
Optionally, before obtaining Backup Data using standard seed key encryption target data, further includes:
The target data stored in secure storage module is transferred according to the data backup command.
Optionally, when the Backup Data is uploaded to the cloud server, further includes:
First encryption keys are uploaded to the cloud server, so as to described in cloud server record The corresponding relationship of first encryption keys and the Backup Data.
Present invention also provides a kind of data backup system, which includes:
Communication module, for when receiving data backup command, according to the data backup command to cloud server Backup request is sent, so that the cloud server returns to the first encryption keys;
Answer determining module for first encryption keys to be transmitted to man-machine interface, and determines user to institute State first user's answer of the first encryption keys;
Seed key generation module, it is close for the first user answer to be converted to standard seed according to preset rules Key;
Backup module, for obtaining Backup Data using standard seed key encryption target data, and to the cloud Server is held to upload the Backup Data.
Present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the computer Program realizes the step of above-mentioned data back up method executes when executing.
Present invention also provides a kind of electronic equipment, including memory and processor, calculating is stored in the memory Machine program, the processor realize the step that above-mentioned data back up method executes when calling the computer program in the memory Suddenly.
This application provides a kind of data back up method, including when receiving backup instruction, according to the backup instruction Backup request is sent to cloud server, so that the cloud server returns to the first encryption keys;Described first is added Close cryptographic problem is transmitted to man-machine interface, and determines first user answer of the user to first encryption keys;According to The first user answer is converted to standard seed key by preset rules;Target data is encrypted using the standard seed key Backup Data is obtained, and uploads the Backup Data to the cloud server.
The application sends backup request to cloud server to receive cloud server before carrying out data backup, first The first encryption keys returned.It, will when user inputs corresponding first user answer according to the first encryption keys First user's answer is converted to standard seed key according to preset rules, to encrypt target data simultaneously using standard seed key Execute Backup Data upload operation.It is the corresponding standard species of first user's answer as used in the ciphering process of target data Sub-key rather than first user's answer, therefore the safety of Backup Data can greatly be promoted.When needing to Backup Data When being decrypted, user is only needed to repeatedly input first user's answer, being based further on preset rules, to be converted to standard seed close Key completes decryption oprerations.Data back up method provided by the present application remembers the standard seed for encrypting target data without user Key, it is only necessary to memory can be converted into first user's answer of standard seed key, and since first user's answer is logical Often it is shorter and be independently filled in by user, therefore the data backup scenario of the application convenient for user remember the first user answer Case.In summary, the application can realize the carrying out safety backup of data under the premise of reducing user's memory cost.The application is same When additionally provide a kind of data backup system, a kind of computer readable storage medium and a kind of electronic equipment, have above-mentioned beneficial Effect, details are not described herein.
Detailed description of the invention
In ord to more clearly illustrate embodiments of the present application, attached drawing needed in the embodiment will be done simply below It introduces, it should be apparent that, the drawings in the following description are only some examples of the present application, for ordinary skill people For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of data back up method provided by the embodiment of the present application;
Fig. 2 is the flow chart of another kind data back up method provided by the embodiment of the present application;
Fig. 3 is a kind of flow chart of data reconstruction method provided by the embodiment of the present application;
Fig. 4 is the schematic illustration of the data backup of block chain wallet in practical application;
Fig. 5 is the schematic illustration that the data of block chain wallet in practical application are restored;
Fig. 6 is the flow chart of data backup process in practical application;
Fig. 7 is the flow chart of data backup restoration process in practical application;
Fig. 8 is a kind of structural schematic diagram of data backup system provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Instantly common data back up method mainly includes following several forms:
(1) hardware backup scheme: target data is stored in the hardware devices such as smart card, is saved using physics mode standby Part.(2) web online backup scheme: target data is stored to providing the online server admin of web.(3) simple encryption cloud Backup scenario: target data is backed up to cloud server after encryption by user setting Crypted password.Crypted password is using use Family brain memory or other modes save.(4) distributed key Managed Solution: using the dispersion of the data such as Shamir secret sharing scheme Target data is divided into multiple shares and stored to different storage locations by technology.
The guarantee of hardware backup scheme, safety is not stolen from the medium of record target data, but there are smart cards The risk that equal hardware devices are stolen by physics mode.Since user needs properly to save the media such as paper, hardware with physics mode, than Safety cabinet is such as deposited in, there are the costs of certain management data backup.If do not saved properly, lost there are physics Risk.Web online backup scheme stores target data to server admin in plain text, therefore provides the service of web online service Quotient can usurp private key, and there are the credit risks of web online service quotient, and there is also the risk that server is attacked, safety is low. In the backup scenario of simple encryption cloud, user setting Crypted password, Crypted password algorithmically generates encryption key, and symmetric cryptography is close Key is for encryption data and decryption encryption data, and there are the security risks that symmetric cryptographic key length is inadequate, and preservation pair Claim the security risks and availability issue of encryption key.(1) in the cipher modes such as the AES generallyd use, for encryption Symmetric cryptography password is user's self-setting.For convenient for memory, shorter symmetric cryptography password can be generally arranged in user, therefore The encryption key digit generated according to Crypted password is also shorter.Fact that reduces progress required for computer Brute Force Number of keys is attempted, and the safety of AES encryption method is greatly reduced.Even if taking plus the methods of salt automatic enhancing key being strong Degree, play the role of it is also extremely limited because plus salt algorithm it is relatively fixed, also be easy by add salt software conversed analysis obtain Add salt data.(2) but if the longer symmetric cryptography password of user setting, then most users can not be remembered, and need using work Tool saves symmetric cryptography password, then increases the cost that user saves symmetric cryptography password.User is backing up solution mesh by cloud After marking data backup problem, it is also necessary to solve the problems, such as symmetric cryptography password backup again, and impracticable.(3) symmetric cryptography password There is also the risks lost and be stolen for itself.The Shamir secret sharing scheme that distributed key key managing project uses etc. is close Key dispersion technology needs user to find multiple storage locations and backs up.When using cloud storage mode, application software is needed to dock Multiple cloud storage service devices, docking cost is relative to only needing the cost of single cloud storage service device higher.
Based on above-mentioned many disadvantages existing in the prior art, the application provides new data by following embodiment Backup scenario can be realized under the premise of reducing user's memory cost, realize the carrying out safety backup of data.
Below referring to Figure 1, Fig. 1 is a kind of flow chart of data back up method provided by the embodiment of the present application.
Specific steps may include:
S101: when receiving backup instruction, backup request is sent to cloud server according to backup instruction, so as to cloud Server returns to the first encryption keys;
Wherein, the subject of implementation of the present embodiment can (such as video jukebox software, cloud disk store software, area for application software Block chain wallet software or social software etc.), it is also possible to run the terminal device of the application software.Default before this step and deposits In the operation for issuing backup instruction, which can be what user issued, be also possible to run the terminal of the application software Equipment according to predetermined period issue to realize the periodic backups of target data.
On the basis of receiving data backup command, this step is directly sent out according to data backup command to cloud server Send backup request.Cloud server is also known as cloud backup server, is a kind of for backing up the clothes of the data of storage application software Business device, in order to guarantee that the safety of Backup Data needs to carry out cryptographic operation to Backup Data.In the prior art, after the encryption Backup Data key by user setting, inconvenient user's memory if key is excessively complicated, if the too simple nothing of password The safety of method guarantee Backup Data.
The present embodiment default, cloud server can apply the end of the software after receiving backup request to operation End equipment returns to the first encryption keys.The detailed process that cloud server executes relevant operation can be with are as follows: when receiving end When the backup request that end equipment is sent, N number of problem is selected to send back end as the first encryption keys from issue database End equipment.There may be multiple candidate problems in issue database, and N number of candidate problem can be randomly selected.In issue database Candidate problem the problems such as may include name class problem, personal story class problem and address class problem.
S102: the first encryption keys are transmitted to man-machine interface, and determine user to the first encryption keys First user's answer;
Wherein, after receiving the first encryption keys, the first all encryption keys can be transmitted to Man-machine interface is shown, so that user replies according to the first encryption keys.It should be noted that in the present embodiment The first encryption keys mentioned can be the subjective questions for needing user to be answered according to oneself personal experience.
It should be noted that the first encryption keys that this step is shown in man-machine interface are cloud server transmission Whole issue, when user answers, user can choose the first encryption keys of preset quantity and answer.It can be man-machine Relative program is arranged in interface, so that the number for the first encryption keys only answered in user is greater than or equal to preset quantity When just allow user submit answer.The present embodiment default, user user after answering the first encryption keys, which will do it, to be answered Case is submitted.
When detecting that user submits answer, that is, it can determine that the answer that user submits is user to the first encryption keys First user's answer.It can also be deposited while this step determines first user's answer as a kind of feasible embodiment In the corresponding relationship for determining every one first user's answer Yu every one first encryption keys.
Illustrate the operating process of S101 and S102: when the terminal device for running certain application software receives data backup When instruction, backup request is sent to cloud server according to data backup command.Cloud server receive backup request it Terminal device is sent to from A, B, C, D tetra- candidate problems of issue database random selection as the first encryption keys afterwards. Terminal device shows first encryption keys A, B, C, D to man-machine interface, so that user replies.Assuming that this backup Process requirements at least 2 the first encryption keys are answered, therefore user can choose tri- problems of A, B, C and answer Multiple, answer is respectively a, b and c, and answer is submitted in selection after user replies.Terminal device can determine that a, b and c are user to the First user's answer of one encryption keys.
Further instruction, first user's answer more longer more inconvenient user's memory are needed, therefore the present embodiment can To limit the byte number of first user answer of the user to the first encryption keys, the byte number of every one first user's answer is needed Being less than or be equal to predetermined word joint number, (e.g., Chinese character number of words is less than 6, and English alphabet number is less than 20).
S103: first user's answer is converted into standard seed key according to preset rules;
Wherein, on the basis of determining first user's answer, this step is intended to according to preset rules that byte number is shorter First user's answer is converted to relatively long standard seed key.The byte number of default standard seed key is much larger than the herein The byte number of one user's answer.Specifically, this step is to summarize first all user's answers to carry out default rule again together Then corresponding conversion operation obtains standard seed key.
This step does not limit the conversion process using any rule first user's answer of realization to standard seed key, such as The conversion of standard seed key is realized by modes such as cryptographic Hash calculating, symmetric encipherment algorithms.
S104: Backup Data is obtained using standard seed key encryption target data, and uploads and backs up to cloud server Data.
Wherein, the purpose of this step is to be encrypted to obtain Backup Data using standard seed key pair target data. It should be noted that embodiment and directly being encrypted to target data without using first user's answer, but first is used to use The standard seed key that family answer is converted to is encrypted, since the byte number of standard seed key is answered much larger than the first user Case, and the conversion operation of preset rules makes standard seed key have complete randomness, and Backup Data can be made to have pole High safety.This step does not limit target data specifically, target data can be any in application software or Appoint the combination of several data.
After obtaining Backup Data, Backup Data can be uploaded to cloud server, to be stored.As one Kind preferred embodiment, can also be corresponding to cloud server first user's answer of upload while uploading Backup Data Problem serial number corresponding to the first encryption keys, to record Backup Data, problem serial number to cloud server and to step on Record the incidence relation between the user account three of the application software.It should be noted that every one first encryption keys are all The problem serial number for thering is it uniquely to correspond to.After obtaining Backup Data using standard seed key encryption target data, in order to mention The safety for rising data, can delete standard seed key and the first customer problem.
The present embodiment sends backup request to cloud server to receive cloud service before carrying out data backup, first The first encryption keys that device returns.When user inputs corresponding first user answer according to the first encryption keys, First user's answer is converted into standard seed key according to preset rules, to encrypt target data using standard seed key And execute Backup Data upload operation.It is the corresponding standard of first user's answer as used in the ciphering process of target data Seed key rather than first user's answer, therefore the safety of Backup Data can greatly be promoted.When needs are to backup number When according to being decrypted, only needing user to repeatedly input first user's answer, being based further on preset rules and be converted to standard seed Key completes decryption oprerations.Data back up method provided in this embodiment remembers the standard for encrypting target data without user Seed key, it is only necessary to memory can be converted into first user's answer of standard seed key, and since the first user answers Case is usually shorter and is independently to be filled in by user, therefore the data backup scenario of the present embodiment is used convenient for user's memory first Family answer.In summary, the application can realize the carrying out safety backup of data under the premise of reducing user's memory cost.
Fig. 2 is referred to below, and Fig. 2 is the flow chart of another kind data back up method provided by the embodiment of the present application, tool Body step may include:
S201: when receiving backup instruction, backup request is sent to cloud server according to backup instruction, so as to cloud Server returns to the first encryption keys;
S202: the first encryption keys are transmitted to man-machine interface, and determine user to the first encryption keys First user's answer;
S203: concatenation is executed to all first user answers according to preset order and obtains kind of a substring;
S204: Hash operation is executed to kind of substring and obtains the cryptographic Hash of kind of substring, and using cryptographic Hash as mark Quasispecies sub-key.
Wherein, above-mentioned steps can be spliced first all user's answers to obtain kind of a substring first, then right Kind substring executes Hash operation and obtains standard seed key.
S205: encrypting target data using standard seed key by 256 aes algorithms and obtain Backup Data, and to cloud Server is held to upload Backup Data.
Wherein, AES (Advanced Encryption Standard) algorithm is also known as Advanced Encryption Standardalgorithm.
There may also be the target data stored in secure storage module is transferred according to data backup command before S205 Operation.When Backup Data is uploaded to cloud server, the first encryption keys can be uploaded to cloud server, So as to the corresponding relationship of cloud server record the first encryption keys and Backup Data.
Fig. 3 is referred to below, and Fig. 3 is a kind of flow chart of data reconstruction method provided by the embodiment of the present application, specifically Step may include:
S301: when receiving data recovery instruction, restore instruction according to data and send authentication to cloud server Information and recovery request, so that cloud server returns to recovery request after determining that authentication passes through according to authentication information Corresponding data packet.
S302: parsing data packet obtains target Backup Data and corresponding second encryption keys of target Backup Data;
S303: the second encryption keys are transmitted to man-machine interface, and determine user to the second encryption keys Second user answer;
S304: second user answer is converted into target seed key according to preset rules;
S305: target Backup Data is decrypted using target seed key to complete data recovery operation.
The present embodiment is related to Data Recovery Process, establishes the basis in the data back up method of Fig. 1 or Fig. 2 corresponding embodiment Upper implementation, executing subject can be consistent in Fig. 1 or Fig. 2 embodiment, are application software, are also possible to run the terminal of application software Equipment.Authentication information and extensive is sent to the cloud server of storage Backup Data first after receiving data and restoring instruction Multiple request.Authentication information refers to that the corresponding user of verifying application software is used to prove the information of oneself identity, may include short Identifying code, biological information etc. are believed, herein without specifically limiting.When cloud server determines according to authentication information After subscriber authentication passes through, the corresponding data packet of recovery request is returned to terminal device.Recovery request is defaulted in the present embodiment In there are active user's account, cloud server can according to the Backup Data kept in advance, problem serial number and log in this and answer The corresponding data packet of active user's account is determined with the incidence relation between the user account three of software, it can be in the data packet Including target Backup Data and corresponding second encryption keys of target Backup Data.
It should be noted that being shown by the second encryption keys to man-machine interface in the present embodiment, Yong Huxu Answer the second whole encryption keys.After determining user to the second user answer of the second encryption keys, All second user answers can be converted in the same way according to the preset rules as described in Fig. 1 embodiment Target seed password.
If determining second user answer is identical as the answer that user when backup target data inputs in the present embodiment, The target seed password obtained at this time then can be with successful decryption target Backup Data, to complete data recovery operation.Conversely, such as The second user answer that fruit determines in the present embodiment and the answer that user when backup target data inputs be not identical, then at this time Obtained target seed password can not then decrypt target Backup Data, data recovery operation failure.
It is understood that can store the number of targets of multiple application software users in the cloud server of the present embodiment According to, therefore the target Backup Data returned in cloud server in the present embodiment not necessarily Fig. 1 corresponding embodiment description is standby Part data, therefore the first encryption keys mentioned in the second encryption keys in the present embodiment and Fig. 1 corresponding embodiment It can not be identical.
The operating process for illustrating above-mentioned backup and recovery below with reference to the embodiment in practical application scene, refers to Fig. 4, Fig. 4 are the schematic illustration of the data backup of block chain wallet in practical application, refer to Fig. 5, and Fig. 5 is in practical application The schematic illustration that the data of block chain wallet are restored.
With the development that block chain is applied, block chain wallet software with its manage the basic functions of the data such as private key for user at In order to which user uses the important tool of block chain.The data of wallet management include private key, all kinds of signature messages etc..In most of areas In block chain account, private key represents unique control to account.In the blocks chain technical solution such as stator channel, both parties' Message of signing has the effect of account status on more new block chain.In the application of the blocks chains such as DID (distributed identity code), Message of signing has the important function for proving block chain account owner's identity information.Therefore, purse data once loses meaning Loss of the user to account control and related right, purse data backup become using block chain wallet important function Energy.
Block chain purse data backup method in the prior art is the scheme backed up using simple encryption cloud, by user Crypted password is set, purse data is backed up into cloud server after encryption, Crypted password using user's brain memory or Other modes save.But that shorter symmetric cryptography can generally be arranged is close for the ease of memory by user in the above prior art Code, thus it is also shorter according to the encryption key digit that Crypted password generates.Fact that reduces needed for computer Brute Force The number of keys to be carried out is attempted, and the safety of encryption method is greatly reduced.And if the longer symmetric cryptography of user setting Password, then most users can not be remembered, and need to save symmetric cryptography password using tool, then increase user and save symmetrical add The cost of password.User is after solving the problems, such as purse data backup by cloud backup, it is also necessary to solve symmetric cryptography password again The problem of backup.
Embodiment process in this practical application scene is as follows:
Cloud server is also known as cloud backup server, is mainly used for providing the encryption of the purse data based on user account Backup data store, and encryption keys record is provided, to assist terminal block chain wallet to complete purse data (this implementation The purse data of block chain wallet in example is equivalent to the target data in Fig. 1 and Fig. 2 embodiment) encryption and decryption.Cloud service May include with lower module in device: encrypted backup data memory module, encryption keys memory module, account information manage mould Block, subscriber authentication module, service request processing module and communication module.
Backup data store module is for storing encrypted backup data.Encryption keys memory module is for storing user Encryption keys.The encrypted backup data and encryption keys that account information management module is used to record account and be stored Relationship, be equivalent to the index of encrypted backup data and encryption keys.Subscriber authentication module takes for authentication-access cloud The user identity of business device.Service request processing module is used for the service request sent according to user, to other module calls data And it handles.Communication module is used to be communicated with the terminal device of operation block chain wallet software.
Running in the terminal device of block chain wallet software (that is, a kind of application software) may include with lower module: terminal Block chain wallet backup module, backup module and secure storage module.Wherein, terminal block chain wallet backup module is for providing The encryption and decryption functions of purse data and the upload downloading of encrypted backup data.Backup module includes encryption and decryption submodule, communication Submodule: encryption and decryption submodule is used for the Crypted password encryption and decryption encrypted backup data according to input;Communicate submodule be used for and Cloud server communication.Backup module is located in block chain wallet application software.Secure storage module is for storing private key, signature The important purse data such as message.
One, register flow path
Before carrying out purse data backup, there is registration backup services business process in the present embodiment.
Registration backup services business is that user beyond the clouds open user account, obtain backup services permission by backup server Business, detailed process include:
(1) cloud backup server provides user the operation pages network address for opening backup services business, the offer of network address Form is not limited to provide in the form of access buttons entrance, network in wallet application software publish etc..
(2) user's opening operation page, the form for opening the page are not limited to wallet application software and embed the H5 page, Yong Huzhi Energy computer equipment browser opens the mode of web page.
(3) user carries out user account registration in operation pages.
The mode registered is verified as phone number and is registered, i.e., server sends identifying code to user's specified mobile phone number, is used Family inputs identifying code to verify use of the user to the phone number.
Further, cloud backup server can increase the acquisition and storage to user biological feature.Affiliated biology is special Sign includes but is not limited to facial image.
(4) after user completes registration, cloud backup server account information management module will record the account information of user. In the present embodiment, user account can be mark with phone number.
Two, backup process
After registration is completed and logged in, user can carry out backup traffic, refer to Fig. 6, and Fig. 6 is data in practical application The flow chart of backup process, detailed process may include:
(1) user initiates backup request to cloud backup server.Backup request is sent by communication submodule, communication module It receives, the processing of service request processing module.
(2) service request processing module database out of module transfers alternative encryption keys (i.e. Fig. 1 embodiment mentions The first encryption keys arrived), it is sent through communication module to block chain wallet application software.
(3) user is selecting some problem as encryption keys from alternative encryption keys.Several packets It includes but is not limited to 3.
(4) (the first user that i.e. Fig. 1 embodiment is mentioned answers for the answer of user setting encryption keys, i.e. Crypted password Case).
The mode of user setting encryption keys answer, including but not limited to user are set with personal true experience for foundation Set plaintext answer.This system recommended user is with personal true experience for according to setting.User setting encryption keys answer Format, including but not limited to 16 system character strings.Cloud server first can carry out authentication to user, so as to cloud clothes Business device record user identity and the Backup Data corresponding relationship.
(5) Crypted password that encryption and decryption submodule is inputted according to user is converted to seed key (i.e. Fig. 1 by preset rules The standard seed key that embodiment is mentioned).
Preset rules are that the Crypted password of some problem is first spliced into one section of kind substring.Again by one section of seed character String carries out the cryptographic Hash that Hash operation generates one section of kind substring.The cryptographic Hash is Crypted password.Above-mentioned connecting method It is including but not limited to one section of character string according to the multiple encryption keys answers of encryption keys sequential concatenation.Above-mentioned Kazakhstan Uncommon mathematical algorithm includes but is not limited to SHA256 algorithm.Above-mentioned cryptographic Hash is 64 16 system character strings.
(6) encryption and decryption submodule transfers the purse data of secure storage module storage.
(7) encryption and decryption submodule seed key encrypts purse data according to Encryption Algorithm, generates encrypted backup data (this " Backup Data " mentioned in " encrypted backup data " i.e. Fig. 1 and Fig. 2 embodiment at place).
Above-mentioned Encryption Algorithm includes but is not limited to 256 aes algorithms.Above-mentioned Encryption Algorithm includes but is not limited to use What cloud backup server disclosed announcement in such a way that network is announced etc. is recommended to use Encryption Algorithm.According to cloud backup server The algorithm of recommendation, then cloud backup server is without re-recording the Encryption Algorithm that user takes.
(8) encryption keys that encrypted backup data, user select are transmitted to cloud through communication submodule, communication module Backup server.
(9) cloud backup server stores the encryption keys that encrypted backup data, user select respectively to backup Data memory module, encryption keys memory module.And in account information management module records encrypted backup data, Yong Huxuan Incidence relation between the encryption keys selected, user account, so far backup traffic is completed.
In above-mentioned process, Crypted password is arranged according to encryption keys in user.Cloud server first carries out body to user Part verifying, so that cloud server records user identity and the Backup Data corresponding relationship encryption and decryption submodule according to set turn Change rule and Crypted password be converted into seed key, and purse data is encrypted by set Encryption Algorithm according to seed key, with Family intellectual computing device locally generates encrypted backup data.Encrypted backup data backup is stored to cloud to back up and be taken by communication module Business device, the user account of backup server is associated beyond the clouds with user, completes purse data backup.Crypted password is that user sets It sets, is the character string of the formats such as 16 system character strings in data format, is and encryption keys phase in data meaning Corresponding encryption keys answer, cannot be directly used to encryption data.Seed key is the rule conversion according to Encryption Algorithm The character string of the formats such as the binary system that Crypted password generates.
Three, restore process
After completing backup traffic, user can carry out restoring purse data business, refer to Fig. 7, and Fig. 7 is in practical application The flow chart of data backup restoration process, detailed process may include:
(1) user initiates to request to cloud backup server.Backup request is sent by communication submodule, and communication module connects It receives, the processing of service request processing module.
(2) cloud backup server verifies user identity.Used verification mode includes the verifying of phone number identifying code. Further, if user acquires biological characteristic in registration, biological characteristic must be acquired again and compares active user's biology Whether feature and the associated biological characteristic of the user account of storage are consistent.
(3) if user's checking passes through, block chain wallet application software downloads encrypted backup number to cloud backup server According to, with the encryption keys of the encrypted backup data correlation.
(4) user inputs the answer of encryption keys, i.e. backup Crypted password.
(5) Crypted password is converted to seed key by established rule by encryption and decryption submodule.
(6) encryption and decryption submodule decrypts encrypted backup data by Encryption Algorithm with seed key.
(7) if user's input Crypted password is correct, successful decryption so far restores purse data business and completes.
The safety that above-described embodiment can be such that encrypted backup data anti-violence cracks greatly improves, the reason is as follows that: (1) add Close Backup Data itself reaches algorithm and designs highest safety, since seed key is according to 64 16 system text string generations 256 strings of binary characters, therefore reached the maximum key digit of 256 AES encryption algorithms, it may have complete random Property, therefore reach algorithm and design highest safety.The limited setting since user remembers of traditional simple encryption backup mode Crypted password digit is insufficient, and the Crypted password of user setting does not often have randomness, is unable to reach algorithm design highest Safety, safety is also below this programme.(2) there is Crypted password anti-violence economically to crack safety, cloud backup Server can combine Brute Force by attempting all Crypted password answers.With 3 encryption keys of user setting, 2 Crypted password is about name, for 1 Crypted password is about mailing address.According to conservative estimation, China's difference name with it is difference logical A possibility that combination of row address, reaches 2.4*10^27, consumes electricity 0.237J, electricity price by 1G hash operation of progress per second 0.77 yuan/kilowatt hour calculates, and the expectation expense of Brute Force is about 120,000,000,000 RMB, and there is no the possibility that is cracked.Cloud is standby Part server can also crack encrypted backup number by way of guessing Crypted password, such as be believed according to phone number user account Breath is clue, obtains user's real name information and other relevant informations with illegal way.But compared in backup server beyond the clouds The snugly Brute Force encryption data that can be carried out, which increase cloud backup services to crack the difficulty of encryption data and illegal A possibility that behavior exposure.Since downloading encrypted backup data need to carry out subscriber authentication, prevent from knowing that user adds The third party of password clue obtains encrypted backup data, enhances safety.
In above-mentioned process, user can be downloaded according to the user account of backup server beyond the clouds from cloud backup server Encrypted backup data.After user downloads, the answer of encryption keys, Crypted password are inputted.Encryption and decryption submodule according to Crypted password is converted to seed key by set transformation rule, and according to seed key by set Encryption Algorithm decryption encryption wallet Data locally generate Backup Data in user's intellectual computing device, complete purse data and restore.Further, above-mentioned encryption Cryptographic problem includes but is not limited to personal information problem related to user, name of the answer to associate in user's social relationships, Mailing address of user's experience of life etc. is used as answer type.Further, standby using the answer of encryption keys as starting The Crypted password of part cryptographic operation.Further, above-mentioned set Encryption Algorithm includes but is not limited to 256 aes algorithms.Into one Step ground, affiliated cloud backup server not only back up encrypted backup data, are also backed up encryption keys, and and user account Associated record.Further, user needs to back up taking by cloud before cloud backup server downloading encrypted backup data The subscriber authentication of business device.Including but not limited to verified according to information such as subscriber phone number, faces.
The cost that above-described embodiment can also be such that user management purse data backs up substantially reduces, the reason is as follows that: (1) user The cost for remembering Crypted password reduces.Because user, according to setting Crypted password, does not need especially according to personal true experience The complicated random Crypted password of memory, therefore remember difficulty and substantially reduce.Even if the of short duration forgetting Crypted password of user, original encryption Password can not be given for change after forgeing, and the life record that user still can really undergo according to individual in this programme gives Crypted password for change. (2) paper money packet and hardware wallet are compared, purse data backs up backup server beyond the clouds, the fiber crops without physical management Backup Data It is tired, the risk that also do not lose physically.Even if user, which loses the phone numbers such as SIM card, uses equipment, can also lead in China It crosses mobile phone number real name to give for change, user does not lose the user account of cloud backup server, and the risk for losing Backup Data is big It is big to reduce.
Fig. 8 is referred to, Fig. 8 is a kind of structural schematic diagram of data backup system provided by the embodiment of the present application;
The system may include:
Communication module 100, for being sent out to cloud server according to data backup command when receiving data backup command Backup request is sent, so that cloud server returns to the first encryption keys;
Answer determining module 200 for the first encryption keys to be transmitted to man-machine interface, and determines user to first First user's answer of encryption keys;
Seed key generation module 300, for first user's answer to be converted to standard seed key according to preset rules;
Backup module 400, for obtaining Backup Data using standard seed key encryption target data, and to cloud service Device uploads Backup Data.
The present embodiment sends backup request to cloud server to receive cloud service before carrying out data backup, first The first encryption keys that device returns.When user inputs corresponding first user answer according to the first encryption keys, First user's answer is converted into standard seed key according to preset rules, to encrypt target data using standard seed key And execute Backup Data upload operation.It is the corresponding standard of first user's answer as used in the ciphering process of target data Seed key rather than first user's answer, therefore the safety of Backup Data can greatly be promoted.When needs are to backup number When according to being decrypted, only needing user to repeatedly input first user's answer, being based further on preset rules and be converted to standard seed Key completes decryption oprerations.Data back up method provided in this embodiment remembers the standard for encrypting target data without user Seed key, it is only necessary to memory can be converted into first user's answer of standard seed key, and since the first user answers Case is usually shorter and is independently to be filled in by user, therefore the data backup scenario of the present embodiment is used convenient for user's memory first Family answer.In summary, the application can realize the carrying out safety backup of data under the premise of reducing user's memory cost.
Further, seed key generation module 300 includes:
Concatenation unit obtains seed character using concatenation is executed to all first user answers according to preset order String;
Computing unit obtains the cryptographic Hash of kind of substring using a Hash operation is executed to kind of substring, and by Hash Value is used as standard seed key.
Further, backup module 400 includes:
Encryption unit obtains backup number for encrypting target data using standard seed key by 256 aes algorithms According to;
Data uploading unit, for uploading Backup Data to cloud server.
Further, the data backup system further include:
Data recovery request module, for restoring instruction according to data and being taken to cloud when receiving data recovery instruction Business device sends authentication information and recovery request, so that cloud server is determining that authentication is logical according to authentication information Later the corresponding data packet of recovery request is returned.
Further, the data backup system further include:
Parsing module, for parsing, data packet obtains target Backup Data and corresponding second encryption of target Backup Data is close Code problem;
Validation Answer Key obtains module, for the second encryption keys to be transmitted to man-machine interface, and determines user to the The second user answer of two encryption keys;
Conversion module, for second user answer to be converted to target seed key according to preset rules;
Data recovery module, for restoring behaviour using target seed key decryption target Backup Data to complete data Make.
Further, the data backup system further include:
Data acquisition module, for transferring the target data stored in secure storage module according to data backup command.
Further, the data backup system further include:
Corresponding relationship uploading module, for when Backup Data is uploaded to cloud server, the first Crypted password to be asked Topic is uploaded to cloud server, so as to the corresponding relationship of cloud server record the first encryption keys and Backup Data.
Since the embodiment of components of system as directed is corresponded to each other with the embodiment of method part, the embodiment of components of system as directed is asked Referring to the description of the embodiment of method part, wouldn't repeat here.
Present invention also provides a kind of computer readable storage mediums, have computer program thereon, the computer program It is performed and step provided by above-described embodiment may be implemented.The storage medium may include: USB flash disk, mobile hard disk, read-only deposit Reservoir (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or The various media that can store program code such as CD.
Present invention also provides a kind of electronic equipment, may include memory and processor, have meter in the memory Calculation machine program may be implemented provided by above-described embodiment when the processor calls the computer program in the memory Step.Certain electronic equipment can also include various network interfaces, the components such as power supply.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For system disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle, also Can to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application It is interior.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.Under the situation not limited more, the element limited by sentence "including a ..." is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.

Claims (10)

1. a kind of data back up method characterized by comprising
When receiving backup instruction, backup request is sent to cloud server according to the backup instruction, so as to the cloud Server returns to the first encryption keys;
First encryption keys are transmitted to man-machine interface, and determine user to the of first encryption keys One user's answer;
The first user answer is converted into standard seed key according to preset rules;
Backup Data is obtained using standard seed key encryption target data, and described standby to cloud server upload Part data.
2. data back up method according to claim 1, which is characterized in that it is described according to preset rules by first user Answer is converted to standard seed key
Concatenation is executed to all first user answers according to preset order and obtains kind of a substring;
Hash operation is executed to described kind of substring and obtains the cryptographic Hash of described kind of substring, and using the cryptographic Hash as The standard seed key.
3. data back up method according to claim 1, which is characterized in that encrypt number of targets using the standard seed key Include according to Backup Data is obtained:
The target data, which is encrypted, using the standard seed key by 256 aes algorithms obtains the Backup Data.
4. data back up method according to claim 1, which is characterized in that further include:
When receiving data recovery instruction, restores instruction according to the data and believe to cloud server transmission authentication Breath and recovery request, so that the cloud server returns to institute after determining that authentication passes through according to the authentication information State the corresponding data packet of recovery request.
5. data back up method according to claim 4, which is characterized in that receiving the corresponding data of the recovery request After packet, further includes:
It parses the data packet and obtains target Backup Data and corresponding second encryption keys of the target Backup Data;
Second encryption keys are transmitted to the man-machine interface, and determine the user to second Crypted password The second user answer of problem;
The second user answer is converted into target seed key according to the preset rules;
The target Backup Data is decrypted using the target seed key to complete data recovery operation.
6. data back up method according to claim 1, which is characterized in that encrypting target using the standard seed key Data obtain before Backup Data, further includes:
The target data stored in secure storage module is transferred according to the data backup command.
7. according to claim 1 to any one of 6 data back up method, which is characterized in that uploaded by the Backup Data When to the cloud server, further includes:
First encryption keys are uploaded to the cloud server, so that the cloud server records described first The corresponding relationship of encryption keys and the Backup Data.
8. a kind of data backup system characterized by comprising
Communication module, for being sent to cloud server according to the data backup command when receiving data backup command Backup request, so that the cloud server returns to the first encryption keys;
Answer determining module for first encryption keys to be transmitted to man-machine interface, and determines user to described the First user's answer of one encryption keys;
Seed key generation module, for the first user answer to be converted to standard seed key according to preset rules;
Backup module for obtaining Backup Data using standard seed key encryption target data, and takes to the cloud Business device uploads the Backup Data.
9. a kind of electronic equipment characterized by comprising
Memory, for storing computer program;
Processor, realizing the data back up method as described in any one of claim 1 to 7 when for executing the computer program Step.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the step of the data back up method as described in any one of claim 1 to 7 when the computer program is executed by processor Suddenly.
CN201910027661.6A 2019-01-11 2019-01-11 A kind of data back up method, system and associated component Pending CN109587276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910027661.6A CN109587276A (en) 2019-01-11 2019-01-11 A kind of data back up method, system and associated component

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910027661.6A CN109587276A (en) 2019-01-11 2019-01-11 A kind of data back up method, system and associated component

Publications (1)

Publication Number Publication Date
CN109587276A true CN109587276A (en) 2019-04-05

Family

ID=65916263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910027661.6A Pending CN109587276A (en) 2019-01-11 2019-01-11 A kind of data back up method, system and associated component

Country Status (1)

Country Link
CN (1) CN109587276A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535643A (en) * 2019-09-09 2019-12-03 飞天诚信科技股份有限公司 A kind of method and system for preventing resetting password to be stolen
CN110690957A (en) * 2019-10-18 2020-01-14 如般量子科技有限公司 Anti-quantum-computation private key backup, loss reporting and recovery method and system based on alliance chain and implicit certificate
CN112052469A (en) * 2020-09-10 2020-12-08 鹏元征信有限公司 Encryption method, decryption method, storage medium and terminal equipment
CN112395132A (en) * 2020-11-13 2021-02-23 苏州元核云技术有限公司 Method, system and computer storage medium for file backup
CN112445654A (en) * 2020-11-30 2021-03-05 北京数码视讯技术有限公司 Data processing system and method
WO2021081675A1 (en) * 2019-10-31 2021-05-06 Zeu Crypto Networks Inc. System and method for blockchain based backup and recovery
CN116204357A (en) * 2023-04-27 2023-06-02 深圳市优博生活科技有限公司 Mobile phone terminal data backup method and system based on hong Monte-go system
CN116432199A (en) * 2023-03-03 2023-07-14 安超云软件有限公司 Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422033A (en) * 2001-11-29 2003-06-04 财团法人资讯工业策进会 Personal information secrety keeping method
CN101145911A (en) * 2007-10-30 2008-03-19 江汉大学 Identity authentication method with privacy protection and password retrieval function
CN102521539A (en) * 2011-12-08 2012-06-27 广东步步高电子工业有限公司 Reliable password protection method of mobile device
CN103107989A (en) * 2012-11-20 2013-05-15 高剑青 Cryptosystem based on multi-hash values
CN103514408A (en) * 2012-06-25 2014-01-15 国基电子(上海)有限公司 Mobile device and authentication method for having access to data of mobile device
CN103780379A (en) * 2012-10-19 2014-05-07 阿里巴巴集团控股有限公司 Password encryption method and system, and cryptographic check method and system
CN105426775A (en) * 2015-11-09 2016-03-23 北京联合大学 Method and system for protecting information security of smartphone
US9641328B1 (en) * 2014-03-10 2017-05-02 Ionu Security, Inc. Generation of public-private key pairs
CN106686008A (en) * 2017-03-03 2017-05-17 腾讯科技(深圳)有限公司 Information storage method and information storage device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422033A (en) * 2001-11-29 2003-06-04 财团法人资讯工业策进会 Personal information secrety keeping method
CN101145911A (en) * 2007-10-30 2008-03-19 江汉大学 Identity authentication method with privacy protection and password retrieval function
CN102521539A (en) * 2011-12-08 2012-06-27 广东步步高电子工业有限公司 Reliable password protection method of mobile device
CN103514408A (en) * 2012-06-25 2014-01-15 国基电子(上海)有限公司 Mobile device and authentication method for having access to data of mobile device
CN103780379A (en) * 2012-10-19 2014-05-07 阿里巴巴集团控股有限公司 Password encryption method and system, and cryptographic check method and system
CN103107989A (en) * 2012-11-20 2013-05-15 高剑青 Cryptosystem based on multi-hash values
US9641328B1 (en) * 2014-03-10 2017-05-02 Ionu Security, Inc. Generation of public-private key pairs
CN105426775A (en) * 2015-11-09 2016-03-23 北京联合大学 Method and system for protecting information security of smartphone
CN106686008A (en) * 2017-03-03 2017-05-17 腾讯科技(深圳)有限公司 Information storage method and information storage device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535643A (en) * 2019-09-09 2019-12-03 飞天诚信科技股份有限公司 A kind of method and system for preventing resetting password to be stolen
CN110690957A (en) * 2019-10-18 2020-01-14 如般量子科技有限公司 Anti-quantum-computation private key backup, loss reporting and recovery method and system based on alliance chain and implicit certificate
CN110690957B (en) * 2019-10-18 2023-03-07 如般量子科技有限公司 Anti-quantum computing private key backup, loss report and recovery method and system
WO2021081675A1 (en) * 2019-10-31 2021-05-06 Zeu Crypto Networks Inc. System and method for blockchain based backup and recovery
CN112052469A (en) * 2020-09-10 2020-12-08 鹏元征信有限公司 Encryption method, decryption method, storage medium and terminal equipment
CN112395132A (en) * 2020-11-13 2021-02-23 苏州元核云技术有限公司 Method, system and computer storage medium for file backup
CN112445654A (en) * 2020-11-30 2021-03-05 北京数码视讯技术有限公司 Data processing system and method
CN116432199A (en) * 2023-03-03 2023-07-14 安超云软件有限公司 Cloud platform remote data backup method, cloud platform remote data recovery method and electronic equipment
CN116204357A (en) * 2023-04-27 2023-06-02 深圳市优博生活科技有限公司 Mobile phone terminal data backup method and system based on hong Monte-go system
CN116204357B (en) * 2023-04-27 2023-08-04 深圳市优博生活科技有限公司 Mobile phone terminal data backup method and system based on hong Monte-go system

Similar Documents

Publication Publication Date Title
CN109587276A (en) A kind of data back up method, system and associated component
CN108418680B (en) Block chain key recovery method and medium based on secure multi-party computing technology
CN111191286B (en) HyperLegger Fabric block chain private data storage and access system and method thereof
CN104753917B (en) Key management system and method based on ID
US7809948B2 (en) Cellular telephone device having authenticating capability
CN100432889C (en) System and method providing disconnected authentication
CN111787530B (en) Block chain digital identity management method based on SIM card
KR20230157929A (en) Transfer cryptocurrency from a remote access restricted wallet
US6529886B1 (en) Authenticating method for an access and/or payment control system
CN109151053A (en) Anti- quantum calculation cloud storage method and system based on public asymmetric key pond
CN111476572B (en) Block chain-based data processing method, device, storage medium and equipment
CN105103488A (en) Policy enforcement with associated data
CN102782694A (en) Transaction auditing for data security devices
CN110138754B (en) Multi-cloud-end information processing system and resource sharing method thereof
AU2020100734A4 (en) Systems and methods for secure digital file sharing and authenticating
CN113674077A (en) Consumption credit risk prevention method, system, equipment and storage medium
CN105022966A (en) Database data encryption and decryption method and system
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
CN110380859A (en) Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system
Yu et al. Veridedup: A verifiable cloud data deduplication scheme with integrity and duplication proof
CN113014394B (en) Electronic data certification method and system based on alliance chain
GB2530084A (en) Key usage detection
KR20230063640A (en) Method and system for managing decentralized data using attribute-based encryption
US7841525B1 (en) Digital ticketing system and method
CN113726515B (en) UKEY-based key processing method, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190405

RJ01 Rejection of invention patent application after publication