CN111090547A - Data backup processing method and device - Google Patents

Data backup processing method and device Download PDF

Info

Publication number
CN111090547A
CN111090547A CN201911351209.1A CN201911351209A CN111090547A CN 111090547 A CN111090547 A CN 111090547A CN 201911351209 A CN201911351209 A CN 201911351209A CN 111090547 A CN111090547 A CN 111090547A
Authority
CN
China
Prior art keywords
data
target backup
backup devices
authentication
devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911351209.1A
Other languages
Chinese (zh)
Inventor
冷国强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN201911351209.1A priority Critical patent/CN111090547A/en
Publication of CN111090547A publication Critical patent/CN111090547A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1456Hardware arrangements for backup
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The invention provides a data backup processing method and a data backup processing device, wherein the method comprises the following steps: receiving a trigger instruction for starting a data backup function, and initiating a search device instruction for searching backup devices according to the trigger instruction; receiving a response message sent by one or more target backup devices, wherein the response message carries the IP addresses of the one or more target backup devices; establishing connection with the one or more target backup devices according to the IP address; performing device authentication with the one or more target backup devices through the established connection; after the authentication is passed, the data is backed up to the one or more target backup devices, so that the problem that the backup data is limited in the device itself in a data partition backup or multi-region backup mode in the related technology and the data is lost if the device is damaged or abnormal can be solved, and the low-cost one-master multi-backup data backup system is realized.

Description

Data backup processing method and device
Technical Field
The invention relates to the field of video monitoring, in particular to a data backup processing method and device.
Background
When a user uses a plurality of devices to complete the requirements of the user, more important data can be generated, the data is often only stored in the device which generates the data, and once the device which generates the data is abnormal, the important data cannot be retrieved.
In the related art, a buffer pool and a tape library are respectively divided into a plurality of first storage units and second storage units, and data are written into the first storage units; and after all the data are written into the first storage unit, migrating the data to a corresponding second storage unit in the tape library. The data backup management scheme separates the index area from the data storage area, facilitates data management, improves storage and retrieval efficiency by caching index data in the buffer pool, realizes data backup by using a tape library, and reduces management cost.
The above data backup method is realized by means of data partition backup or multi-region backup, and data loss is caused if the device is damaged or abnormal.
In the related art, a solution is not provided for the problem that backup data is limited to the device itself by means of data partition backup or multi-region backup, and data is lost if the device is damaged or abnormal.
Disclosure of Invention
The embodiment of the invention provides a data backup processing method and device, which at least solve the problem that in the related art, backup data is limited in a device by means of data partition backup or multi-region backup, and the data is lost if the device is damaged or abnormal.
According to an embodiment of the present invention, there is provided a data backup processing method including:
receiving a trigger instruction for starting a data backup function, and initiating a search device instruction for searching backup devices according to the trigger instruction;
receiving a response message sent by one or more target backup devices, wherein the response message carries the IP addresses of the one or more target backup devices;
establishing connection with the one or more target backup devices according to the IP address;
performing device authentication with the one or more target backup devices through the established connection;
and after the authentication is passed, backing up the data to the one or more target backup devices.
Optionally, performing device authentication with the one or more target backup devices through the established connection includes:
receiving accounts and passwords of the one or more target backup devices input through interactive operation;
verifying the account number and the password of the one or more target backup devices;
determining that authentication with the one or more target backup devices passes in the event of verification passing;
in the event that the verification fails, determining that authentication with the one or more target backup devices fails.
Optionally, performing device authentication with the one or more target backup devices through the established connection includes:
sending a certificate to the one or more target backup devices, wherein the certificate carries a public key;
receiving a character string generated by the one or more target backup devices after the certificate is verified to be successful;
signing the character string according to a private key corresponding to the public key to obtain a signed character string;
sending the signed character string to the one or more target backup devices;
receiving an authentication success message returned after the one or more target backup devices use the public key to check the signed character string, and determining that the character string obtained after checking is the same as the generated character string, or determining that the authentication obtained after checking is different from the generated character string, and then returning authentication failure;
determining that the one or more target backup devices pass the authentication according to the authentication success message; or
And determining that the authentication with the one or more target backup devices fails according to the authentication failure message.
Optionally, performing device authentication with the one or more target backup devices through the established connection includes:
receiving a certificate sent by the one or more target backup devices, wherein the certificate carries a public key;
sending a character string generated after the certificate is verified to be successful to the one or more target backup devices;
receiving the one or more target backup devices signing the character string according to a private key corresponding to the public key to obtain a signed character string;
using the public key to verify the signed character string;
determining that the one or more target backup devices pass the authentication under the condition that the character string obtained after the signature verification is the same as the generated character string;
and determining that the one or more target backup devices are not authenticated under the condition that the character string obtained after the signature verification is different from the generated character string.
Optionally, backing up the data to the one or more target backup devices comprises:
establishing a Transport Layer Security (TLS) channel with the one or more target backup devices, and backing up the data carrying the retrieval identifier to a backup database of the one or more target backup devices through the TLS channel; or
And encrypting the data in an encryption mode negotiated with the one or more target backup devices in advance, and sending the encrypted data to the one or more target backup devices.
Optionally, after backing up the data into the one or more target backup devices, the method further comprises:
receiving data of the one or more target backup devices, wherein the data carries retrieval identifiers;
storing data of the one or more target backup devices in a backup database.
Optionally, after storing the data of the one or more target backup devices in the backup database, the method further comprises:
and searching the data of the one or more target backup devices from the backup database according to the retrieval identification.
According to another embodiment of the present invention, there is also provided a data backup processing apparatus including:
the first receiving module is used for receiving a trigger instruction for starting a data backup function and initiating a searching device instruction for searching backup devices according to the trigger instruction;
a second receiving module, configured to receive a response message sent by one or more target backup devices, where the response message carries IP addresses of the one or more target backup devices;
the connection establishing module is used for establishing connection with the one or more target backup devices according to the IP address;
the authentication module is used for performing equipment authentication with the one or more target backup equipment through the established connection;
and the backup module is used for backing up the data to the one or more target backup devices after the authentication is passed.
Optionally, the authentication module comprises:
the first receiving submodule is used for receiving the account numbers and the passwords of the one or more target backup devices input through interactive operation;
the verification sub-module is used for verifying the account number and the password of the one or more target backup devices;
a first determining sub-module, configured to determine that authentication with the one or more target backup apparatuses passes if the verification passes;
and the second determining sub-module is used for determining that the authentication with the one or more target backup devices is not passed under the condition that the verification is not passed.
Optionally, the authentication module comprises:
the first sending submodule is used for sending a certificate to the one or more target backup devices, wherein the certificate carries a public key;
a second receiving submodule, configured to receive a character string generated by the one or more target backup devices after the one or more target backup devices successfully verify the certificate;
the signature submodule is used for signing the character string according to a private key corresponding to the public key to obtain a signed character string;
the second sending submodule is used for sending the signed character string to the one or more target backup devices;
a third receiving submodule, configured to receive an authentication success message returned after determining that the signed character string is the same as the generated character string after signature verification is performed by the one or more target backup devices using the public key, or an authentication failure returned after determining that the signed character string is different from the generated character string;
a third determining sub-module, configured to determine that the authentication with the one or more target backup devices passes according to the authentication success message; or
And the fourth determining submodule is used for determining that the authentication with the one or more target backup devices fails according to the authentication failure message.
Optionally, the authentication module comprises:
a fourth receiving submodule, configured to receive a certificate sent by the one or more target backup devices, where the certificate carries a public key;
the third sending submodule is used for sending the character string generated after the certificate is verified to be successful to the one or more target backup devices;
the fifth receiving submodule is used for receiving the one or more target backup devices to sign the character string according to the private key corresponding to the public key to obtain the signed character string;
the signature verification sub-module is used for verifying the signature of the signed character string by using the public key;
a fifth determining submodule, configured to determine that the one or more target backup devices pass authentication when the character string obtained after signature verification is the same as the generated character string;
and the sixth determining sub-module is used for determining that the one or more target backup devices fail to be authenticated under the condition that the character string obtained after signature verification is different from the generated character string.
Optionally, the backup module includes:
the backup submodule is used for establishing a TLS channel with the one or more target backup devices, and backing up the data carrying the retrieval identifier to a backup database of the one or more target backup devices through the TLS channel; or
And the fourth sending submodule is used for encrypting the data in an encryption mode negotiated with the one or more target backup devices in advance and sending the encrypted data to the one or more target backup devices.
Optionally, the apparatus further comprises:
a third receiving module, configured to receive data of the one or more target backup devices, where the data carries a retrieval identifier;
and the storage module is used for storing the data of the one or more target backup devices into a backup database.
Optionally, the apparatus further comprises:
and the searching module is used for searching the data of the one or more target backup devices from the backup database according to the retrieval identification.
According to a further embodiment of the present invention, a computer-readable storage medium is also provided, in which a computer program is stored, wherein the computer program is configured to perform the steps of any of the above-described method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the invention, a trigger instruction for starting a data backup function is received, and a searching device instruction for searching backup devices is initiated according to the trigger instruction; receiving a response message sent by one or more target backup devices, wherein the response message carries the IP addresses of the one or more target backup devices; establishing connection with the one or more target backup devices according to the IP address; performing device authentication with the one or more target backup devices through the established connection; after the authentication is passed, the data is backed up to the one or more target backup devices, so that the problem that the backup data is limited to the devices in the related art by means of data partition backup or multi-region backup, and if the devices are damaged or abnormal, the data is lost can be solved, the data generated by one device in the networking system is backed up to other devices in the system, and the low-cost one-master multi-backup data backup system is realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware structure of a mobile terminal of a data backup processing method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data backup processing method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a process for backing up data according to an embodiment of the invention;
fig. 4 is a block diagram of a data backup processing device according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking a mobile terminal as an example, fig. 1 is a hardware structure block diagram of a mobile terminal of a data backup processing method according to an embodiment of the present invention, as shown in fig. 1, a mobile terminal 10 may include one or more processors 102 (only one is shown in fig. 1) (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), and a memory 104 for storing data, and optionally, the mobile terminal may further include a transmission device 106 for a communication function and an input/output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program of application software and a module, such as a computer program corresponding to the message receiving method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In this embodiment, a data backup processing method operating in the mobile terminal or the network architecture is provided, and fig. 2 is a flowchart of a data backup processing method according to an embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, receiving a trigger instruction for starting a data backup function, and initiating a search device instruction for searching backup devices according to the trigger instruction;
specifically, the user may trigger the data backup function by a predetermined key or a control key, and the search device instruction may be transmitted to the plurality of devices in a broadcast manner.
Step S204, receiving a response message sent by one or more target backup devices, wherein the response message carries the IP addresses of the one or more target backup devices;
and after receiving the search device instruction, the target backup device returns a response message, and the response message carries the IP address, so that the connection is established through the IP address.
Step S206, establishing connection with the one or more target backup devices according to the IP address;
step S208, performing equipment authentication with the one or more target backup equipment through the established connection;
the local terminal device may verify whether the target backup device is trusted, or the target backup device may verify whether the local terminal device is trusted, or both.
And step S210, after the authentication is passed, backing up the data to the one or more target backup devices.
Further, the step S210 may specifically include: establishing a TLS channel with the one or more target backup devices, and backing up the data carrying the retrieval identifier to a backup database of the one or more target backup devices through the TLS channel; or encrypting the data in an encryption mode negotiated with the one or more target backup devices in advance, and sending the encrypted data to the one or more target backup devices.
Through the steps S202 to S210, the problem that backup data is limited to the device itself in a manner of data partition backup or multi-partition backup in the related art, and if the device is damaged or abnormal, data loss will be caused can be solved, and data generated by a certain device in the networking system is backed up to other devices in the system, so that a low-cost, one-master multi-backup data backup system is realized.
In an optional embodiment, the authentication may be performed through an account and a password, and the step S208 may specifically include: receiving accounts and passwords of the one or more target backup devices input through interactive operation; verifying the account number and the password of the one or more target backup devices; determining that authentication with the one or more target backup devices passes in the event of verification passing; in the event that the verification fails, determining that authentication with the one or more target backup devices fails.
In another alternative embodiment, the step S208 of sending the certificate to the target backup device for authentication may include: sending a certificate to the one or more target backup devices, wherein the certificate carries a public key; receiving a character string generated by the one or more target backup devices after the certificate is verified to be successful; signing the character string according to a private key corresponding to the public key to obtain a signed character string; sending the signed character string to the one or more target backup devices; receiving an authentication success message returned after the one or more target backup devices use the public key to check the signed character string, and determining that the character string obtained after checking is the same as the generated character string, or determining that the authentication obtained after checking is different from the generated character string, and then returning authentication failure; determining that the one or more target backup devices pass the authentication according to the authentication success message; or determining that the authentication with the one or more target backup devices fails according to the authentication failure message.
In yet another alternative embodiment, the step S208 of authenticating whether the target backup device is trusted may include: receiving a certificate sent by the one or more target backup devices, wherein the certificate carries a public key; sending a character string generated after the certificate is verified to be successful to the one or more target backup devices; receiving the one or more target backup devices signing the character string according to a private key corresponding to the public key to obtain a signed character string; using the public key to verify the signed character string; determining that the one or more target backup devices pass the authentication under the condition that the character string obtained after the signature verification is the same as the generated character string; and determining that the one or more target backup devices are not authenticated under the condition that the character string obtained after the signature verification is different from the generated character string.
In the embodiment of the present invention, after backing up data to the one or more target backup devices, receiving data of the one or more target backup devices, where the data carries a retrieval identifier; storing data of the one or more target backup devices in a backup database.
In the embodiment of the present invention, after the data of the one or more target backup devices is stored in the backup database, the data of the one or more target backup devices is searched from the backup database according to the retrieval identifier.
When a user meets the self requirement in a networking system using a plurality of devices, the data generated by a certain device in the networking system can be backed up to other devices in the system, so that the low-cost one-master multi-backup data backup system is realized. The method mainly comprises two parts of backup data synchronization and backup data searching.
Fig. 3 is a schematic diagram of a data backup process according to an embodiment of the present invention, and as shown in fig. 3, the data backup process includes: the backup data synchronization is not limited to the one-to-one mode, and may be a one-to-many mode, that is, a user may backup data of a certain device to a plurality of devices, and for convenience of description, the one-to-one mode is described below. The device 1 is a device containing backup data, and the device 2 is a device storing backup data, and specifically includes:
s301, a user selects a data backup function to trigger searching, and the device 1 initiates device searching operation, so that the user can conveniently select a device for storing backup data;
s302, the searching module 11 of the device 1 obtains response information of the device 2, wherein the response information includes necessary communication information, such as an IP address and the like;
s303, selecting the equipment 2 needing to store backup data by a user;
s304, the authentication module 12 of the device 1 initiates authentication to confirm that the device 2 is a trusted device;
s305, after the authentication is passed, synchronizing the authentication information to the data synchronization module 13 of the equipment 1;
s306, the data synchronization module 13 of the device 1 establishes safe connection with the device 2 to ensure confidentiality and integrity of data transmission;
s307, the data synchronization module 13 of the device 1 acquires the data to be backed up selected by the user;
s308, the data synchronization module 13 of the device 1 synchronizes the acquired backup data and the retrieval identifier of the backup data to the data receiving module 22 of the device 2, and the corresponding backup data can be accurately searched from the device 2 through the identifier;
s309, the data receiving module 22 of the device 2 synchronizes the received backup data and the retrieval identification to the data storing module 21 of the device 2.
The process of searching backup data comprises the following steps: the device 2 is a device for storing backup data, and a user logs in the device 2 and selects a function of searching the backup data; and searching for backup data according to the retrieval identifier, and obtaining the backup data by a user.
If the device 1 backs up the data of the device 2, the device may log in to obtain the data.
According to the embodiment of the invention, complex network equipment does not need to be deployed, data backup is realized when the service requirements of users are met, and the user cost is reduced on the premise of ensuring the availability of data. The data backup is not limited to the equipment which generates the data, and the mutual backup of the data between the equipment is realized in the existing networking system of the user. Data backup and storage are realized by mutual backup of data in the networking system, and the usability of user data is improved. And realizing the trusted backup storage of the data through the trusted equipment selected by the user and the authentication between the data backup equipment. The reliable and safe backup storage of the data is realized by establishing the safe connection between the data backups. The user can select the backup data to backup, and the user can operate independently and flexibly.
According to another embodiment of the present invention, there is also provided a data backup processing apparatus, and fig. 4 is a block diagram of the data backup processing apparatus according to the embodiment of the present invention, as shown in fig. 4, including:
a first receiving module 42, configured to receive a trigger instruction for starting a data backup function, and initiate a search device instruction for searching a backup device according to the trigger instruction;
a second receiving module 44, configured to receive a response message sent by one or more target backup devices, where the response message carries IP addresses of the one or more target backup devices;
a connection establishing module 46, configured to establish a connection with the one or more target backup devices according to the IP address;
an authentication module 48, configured to perform device authentication with the one or more target backup devices through the established connection;
a backup module 410 for backing up data to the one or more target backup devices after the authentication is passed.
Optionally, the authentication module 48 comprises:
the first receiving submodule is used for receiving the account numbers and the passwords of the one or more target backup devices input through interactive operation;
the verification sub-module is used for verifying the account number and the password of the one or more target backup devices;
a first determining sub-module, configured to determine that authentication with the one or more target backup apparatuses passes if the verification passes;
and the second determining sub-module is used for determining that the authentication with the one or more target backup devices is not passed under the condition that the verification is not passed.
Optionally, the authentication module 48 comprises:
the first sending submodule is used for sending a certificate to the one or more target backup devices, wherein the certificate carries a public key;
a second receiving submodule, configured to receive a character string generated by the one or more target backup devices after the one or more target backup devices successfully verify the certificate;
the signature submodule is used for signing the character string according to a private key corresponding to the public key to obtain a signed character string;
the second sending submodule is used for sending the signed character string to the one or more target backup devices;
a third receiving submodule, configured to receive an authentication success message returned after determining that the signed character string is the same as the generated character string after signature verification is performed by the one or more target backup devices using the public key, or an authentication failure returned after determining that the signed character string is different from the generated character string;
a third determining sub-module, configured to determine that the authentication with the one or more target backup devices passes according to the authentication success message; or
And the fourth determining submodule is used for determining that the authentication with the one or more target backup devices fails according to the authentication failure message.
Optionally, the authentication module 48 comprises:
a fourth receiving submodule, configured to receive a certificate sent by the one or more target backup devices, where the certificate carries a public key;
the third sending submodule is used for sending the character string generated after the certificate is verified to be successful to the one or more target backup devices;
the fifth receiving submodule is used for receiving the one or more target backup devices to sign the character string according to the private key corresponding to the public key to obtain the signed character string;
the signature verification sub-module is used for verifying the signature of the signed character string by using the public key;
a fifth determining submodule, configured to determine that the one or more target backup devices pass authentication when the character string obtained after signature verification is the same as the generated character string;
and the sixth determining sub-module is used for determining that the one or more target backup devices fail to be authenticated under the condition that the character string obtained after signature verification is different from the generated character string.
Optionally, the backup module 410 includes:
the backup submodule is used for establishing a TLS channel with the one or more target backup devices, and backing up the data carrying the retrieval identifier to a backup database of the one or more target backup devices through the TLS channel; or
And the fourth sending submodule is used for encrypting the data in an encryption mode negotiated with the one or more target backup devices in advance and sending the encrypted data to the one or more target backup devices.
Optionally, the apparatus further comprises:
a third receiving module, configured to receive data of the one or more target backup devices, where the data carries a retrieval identifier;
and the storage module is used for storing the data of the one or more target backup devices into a backup database.
Optionally, the apparatus further comprises:
and the searching module is used for searching the data of the one or more target backup devices from the backup database according to the retrieval identification.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Embodiments of the present invention also provide a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, receiving a trigger instruction for starting a data backup function, and initiating a search device instruction for searching backup devices according to the trigger instruction;
s2, receiving a response message sent by one or more target backup devices, where the response message carries IP addresses of the one or more target backup devices;
s3, establishing connection with the one or more target backup devices according to the IP address;
s4, performing device authentication with the one or more target backup devices through the established connection;
and S5, after the authentication is passed, backing up the data to the one or more target backup devices.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, receiving a trigger instruction for starting a data backup function, and initiating a search device instruction for searching backup devices according to the trigger instruction;
s2, receiving a response message sent by one or more target backup devices, where the response message carries IP addresses of the one or more target backup devices;
s3, establishing connection with the one or more target backup devices according to the IP address;
s4, performing device authentication with the one or more target backup devices through the established connection;
and S5, after the authentication is passed, backing up the data to the one or more target backup devices.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data backup processing method, comprising:
receiving a trigger instruction for starting a data backup function, and initiating a search device instruction for searching backup devices according to the trigger instruction;
receiving a response message sent by one or more target backup devices, wherein the response message carries the IP addresses of the one or more target backup devices;
establishing connection with the one or more target backup devices according to the IP address;
performing device authentication with the one or more target backup devices through the established connection;
and after the authentication is passed, backing up the data to the one or more target backup devices.
2. The method of claim 1, wherein performing device authentication with the one or more target backup devices over the established connection comprises:
receiving accounts and passwords of the one or more target backup devices input through interactive operation;
verifying the account number and the password of the one or more target backup devices;
determining that authentication with the one or more target backup devices passes in the event of verification passing;
in the event that the verification fails, determining that authentication with the one or more target backup devices fails.
3. The method of claim 1, wherein performing device authentication with the one or more target backup devices over the established connection comprises:
sending a certificate to the one or more target backup devices, wherein the certificate carries a public key;
receiving a character string generated by the one or more target backup devices after the certificate is verified to be successful;
signing the character string according to a private key corresponding to the public key to obtain a signed character string;
sending the signed character string to the one or more target backup devices;
receiving an authentication success message returned after the one or more target backup devices use the public key to check the signed character string, and determining that the character string obtained after checking is the same as the generated character string, or determining that the authentication obtained after checking is different from the generated character string, and then returning authentication failure;
determining that the one or more target backup devices pass the authentication according to the authentication success message; or
And determining that the authentication with the one or more target backup devices fails according to the authentication failure message.
4. The method of claim 1, wherein performing device authentication with the one or more target backup devices over the established connection comprises:
receiving a certificate sent by the one or more target backup devices, wherein the certificate carries a public key;
sending a character string generated after the certificate is verified to be successful to the one or more target backup devices;
receiving the one or more target backup devices signing the character string according to a private key corresponding to the public key to obtain a signed character string;
using the public key to verify the signed character string;
determining that the one or more target backup devices pass the authentication under the condition that the character string obtained after the signature verification is the same as the generated character string;
and determining that the one or more target backup devices are not authenticated under the condition that the character string obtained after the signature verification is different from the generated character string.
5. The method of claim 1, wherein backing up data to the one or more target backup devices comprises:
establishing a security transport layer protocol (TLS) channel with the one or more target backup devices, and backing up the data carrying the retrieval identifier to a backup database of the one or more target backup devices through the TLS channel; or
And encrypting the data in an encryption mode negotiated with the one or more target backup devices in advance, and sending the encrypted data to the one or more target backup devices.
6. The method of any of claims 1 to 5, wherein after backing up data into the one or more target backup devices, the method further comprises:
receiving data of the one or more target backup devices, wherein the data carries retrieval identifiers;
storing data of the one or more target backup devices in a backup database.
7. The method of claim 6, wherein after storing the data of the one or more target backup devices in a backup database, the method further comprises:
and searching the data of the one or more target backup devices from the backup database according to the retrieval identification.
8. A data backup processing apparatus, comprising:
the first receiving module is used for receiving a trigger instruction for starting a data backup function and initiating a searching device instruction for searching backup devices according to the trigger instruction;
a second receiving module, configured to receive a response message sent by one or more target backup devices, where the response message carries IP addresses of the one or more target backup devices;
the connection establishing module is used for establishing connection with the one or more target backup devices according to the IP address;
the authentication module is used for performing equipment authentication with the one or more target backup equipment through the established connection;
and the backup module is used for backing up the data to the one or more target backup devices after the authentication is passed.
9. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to carry out the method of any one of claims 1 to 7 when executed.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 7.
CN201911351209.1A 2019-12-24 2019-12-24 Data backup processing method and device Pending CN111090547A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911351209.1A CN111090547A (en) 2019-12-24 2019-12-24 Data backup processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911351209.1A CN111090547A (en) 2019-12-24 2019-12-24 Data backup processing method and device

Publications (1)

Publication Number Publication Date
CN111090547A true CN111090547A (en) 2020-05-01

Family

ID=70398282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911351209.1A Pending CN111090547A (en) 2019-12-24 2019-12-24 Data backup processing method and device

Country Status (1)

Country Link
CN (1) CN111090547A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714169A (en) * 2009-12-01 2010-05-26 广州从兴电子开发有限公司 Method and system for transmitting data on multiple nodes
CN103067282A (en) * 2012-12-28 2013-04-24 华为技术有限公司 Data backup method, device and system
US8805790B1 (en) * 2013-03-21 2014-08-12 Nextbit Systems Inc. Backing up audio and video files across mobile devices of a user
CN106502827A (en) * 2016-10-19 2017-03-15 广东欧珀移动通信有限公司 A kind of data back up method and equipment
CN106648978A (en) * 2016-12-05 2017-05-10 上海斐讯数据通信技术有限公司 Mobile terminal based on DLNA (Digital Living Network Alliance) and data backup system and method
CN106776124A (en) * 2016-11-25 2017-05-31 腾讯科技(深圳)有限公司 Data back up method and device
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101714169A (en) * 2009-12-01 2010-05-26 广州从兴电子开发有限公司 Method and system for transmitting data on multiple nodes
CN103067282A (en) * 2012-12-28 2013-04-24 华为技术有限公司 Data backup method, device and system
US8805790B1 (en) * 2013-03-21 2014-08-12 Nextbit Systems Inc. Backing up audio and video files across mobile devices of a user
CN106502827A (en) * 2016-10-19 2017-03-15 广东欧珀移动通信有限公司 A kind of data back up method and equipment
CN106776124A (en) * 2016-11-25 2017-05-31 腾讯科技(深圳)有限公司 Data back up method and device
CN106648978A (en) * 2016-12-05 2017-05-10 上海斐讯数据通信技术有限公司 Mobile terminal based on DLNA (Digital Living Network Alliance) and data backup system and method
CN110519062A (en) * 2019-09-19 2019-11-29 腾讯科技(深圳)有限公司 Identity identifying method, Verification System and storage medium based on block chain

Similar Documents

Publication Publication Date Title
US20200329020A1 (en) Method for dynamic encryption and signing, terminal, and server
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
CN101258505B (en) Secure software updates
JP2020064668A (en) Network connection automatization
CN113421097B (en) Data processing method and device, computer equipment and storage medium
CN109471865A (en) A kind of off-line data management method, system, server and storage medium
WO2014032612A1 (en) Method, device, server, system, and apparatus for preventing information leakage
CN105656875A (en) Main stream connection building method and device based on MPTCP (Multi-Path Transmission Control Protocol)
CN111918274B (en) Code number configuration and management method and device, electronic equipment and readable storage medium
CN110602108B (en) Data communication method, device, equipment and storage medium based on block chain network
US11652632B2 (en) Contextual automated device onboarding
CN110958119A (en) Identity verification method and device
CN109729000B (en) Instant messaging method and device
CN112804354B (en) Method and device for data transmission across chains, computer equipment and storage medium
CN109213901A (en) A kind of method of data synchronization, device, equipment and the medium of block chain
WO2017005163A1 (en) Wireless communication-based security authentication device
CN111132305A (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN105704133A (en) Method, terminal and server for data synchronism
CN115334508A (en) Satellite short message communication method integrating authentication and encryption
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN114239072A (en) Block chain node management method and block chain network
CN104883682A (en) WIFI hotspot connecting and selecting method, communication terminal and system
CN108418679B (en) Method and device for processing secret key under multiple data centers and electronic equipment
CN110602693B (en) Networking method and equipment of wireless network
CN105515773A (en) Portable device, user device, and data interaction method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination