CN112861195A - Data storage protection system for out-of-order storage and storage method thereof - Google Patents

Data storage protection system for out-of-order storage and storage method thereof Download PDF

Info

Publication number
CN112861195A
CN112861195A CN202110272626.8A CN202110272626A CN112861195A CN 112861195 A CN112861195 A CN 112861195A CN 202110272626 A CN202110272626 A CN 202110272626A CN 112861195 A CN112861195 A CN 112861195A
Authority
CN
China
Prior art keywords
module
data
electrically connected
storage
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110272626.8A
Other languages
Chinese (zh)
Other versions
CN112861195B (en
Inventor
张曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110272626.8A priority Critical patent/CN112861195B/en
Priority claimed from CN202110272626.8A external-priority patent/CN112861195B/en
Publication of CN112861195A publication Critical patent/CN112861195A/en
Application granted granted Critical
Publication of CN112861195B publication Critical patent/CN112861195B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Abstract

The invention discloses a data storage protection system for out-of-order storage and a storage method thereof, wherein the system comprises a data storage library and a data input module, the data input module is electrically connected with the data storage library, a transition storage space is electrically connected between the data input module and the data storage library, the transition storage space comprises a data opening module, a block marking module, a restricted travel transmission module, a mark identification module, a first feedback module and a truncation module, and the data opening module, the block marking module and the restricted travel transmission module are respectively and electrically connected with the transition storage space. In the data storage process, the data is firstly stored in a transitional storage space, then the positions of all the equipartition points of the data averagely divided into the corresponding block numbers are determined by an equipartition detection module, then the positions of the marked data are cut off by a cutting module, and then the single-block data are randomly stored in all unit storage blocks, so that the disordered data storage is realized, and the stored data are protected.

Description

Data storage protection system for out-of-order storage and storage method thereof
Technical Field
The invention relates to the technical field of data storage systems, in particular to a data storage protection system for out-of-order storage and a storage method thereof.
Background
Data storage is an indispensable part in the current internet world, and mainly stores data created by editing by a user in a corresponding virtual storage space or storage hardware, and in order to protect the data, the storage space is also provided with some protection systems to protect the data.
The disadvantages of the general data storage protection system are that: after general data are stored in corresponding virtual spaces, a common protection means is to set a password for the current storage space and input the password when the storage space is opened, but as network technology develops rapidly, simple password protection is easy to crack, and once the password is cracked, the data in the storage space can be easily stolen.
Disclosure of Invention
The present invention is directed to provide an out-of-order storage data storage protection system and a storage method thereof, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a data storage protection system for out-of-order storage comprises a data storage library and a data input module, wherein the data input module is electrically connected with the data storage library, a transition storage space is electrically connected between the data input module and the data storage library and comprises a data opening module, a block marking module, a line limiting transmission module, a mark identification module, a first feedback module and a truncation module, the data opening module, the block marking module and the line limiting transmission module are respectively and electrically connected with the transition storage space, the line limiting transmission module is electrically connected between the transition storage space and the data storage library and is used for limiting the size of data transmitted in unit time, and the block marking module comprises mark data, a copying module, an average division detection module, a second feedback module and a mark embedding module, the measuring and calculating module is electrically connected with the transitional storage space, and the equipartition detecting module is used for calculating and detecting equipartition points for averagely dividing data transmitted into the transitional storage space into corresponding blocks; the second feedback module is electrically connected to the equipartition detection module, the copying module is electrically connected to the mark data and the second feedback module, the mark embedding module is electrically connected to the output end of the copying module, and the mark embedding module is used for embedding the mark data into the data equipartition point; the mark identification module is electrically connected with the line-limiting transmission module, the truncation module is electrically connected with the output end of the line-limiting transmission module, and the truncation module is used for truncating data; the first feedback module is electrically connected between the truncation module and the tag identification module, the data storage library comprises unit memory blocks, a random selection module, a database port and a data detection module, the random selection module comprises a mobile module, an access module and a random stop module, the access module is electrically connected with all the unit memory blocks, the mobile module and the random stop module are electrically connected on the access module, and the data detection module is electrically connected between the database port and the random stop module.
Preferably, the data storage library is electrically connected with a real-time refreshing arrangement system, the real-time refreshing arrangement system includes a name sorting module, a word bank, a first extraction module, a real-time naming module and a cycle starting module, all the unit storage blocks of the name sorting module are electrically connected, each unit storage block is electrically connected with one real-time naming module, the first extraction module is electrically connected between the word bank and the real-time naming module, the cycle starting module is electrically connected to the real-time naming module, the real-time naming module extracts a word from the word bank through the first extraction module, then the connected unit storage blocks are named by the word, and the name sorting module continuously reorders the unit storage blocks.
Preferably, the word stock is electrically connected with a network data synchronization module, and the network data synchronization module enables the word stock and the vocabulary on the network to be updated synchronously through the network.
Preferably, a port of the data repository is provided with a key setting system, the key setting system comprises a sequential embedding module, a virtual input keyboard, a language library, a first input frame, a reading module, a second triggering module, a first clearing module, a network transmission module, a user mobile phone application and a prompting module, the virtual input keyboard is electrically connected with the language library, the first input frame is electrically connected with an output end of the virtual input keyboard, the virtual input keyboard inputs a corresponding number of passwords in the first input frame, the reading module is electrically connected between the first input frame and the sequential embedding module, the sequential embedding module is electrically connected with a transmission channel between the data repository and the truncation module, the second triggering module enables the reading module to read the password strings in the first input frame, and the sequential embedding module sequentially embeds the text symbols formed by the password strings into each truncated independent block of data one by one, the clearing module I is electrically connected between the reading module and the input frame I, the clearing module I is used for clearing a password string in the input frame I, the triggering module II is electrically connected on the reading module, the network transmission module is connected between the input frame I and the user mobile phone application through a network, the prompting module is electrically connected on the user mobile phone application, the network transmission module is used for sending the password string to the user mobile phone application through the network, and the prompting module prompts a user to check the password string.
Preferably, the input box I is electrically connected with a backup module, the backup module is used for automatically backing up the password string input in the input box I, the backup module is electrically connected with a countdown clearing module, the countdown clearing module clears the password string in the backup module after a period of countdown, and the backup module is electrically connected with the trigger module II.
Preferably, the data storage library is electrically connected with a data unlocking library, the data unlocking library comprises a second input frame, a confirmation module, a sorting rule inputting module, a sorting integration module, a first trigger module, a data pasting board, a second clearing module, a third feedback module and a second extracting module, the sorting integration module comprises a rule sorting module, a data connection module and an output module, the output module is electrically connected with the data pasting board, and the data pasting board is used for pasting and placing disordered block data extracted from the data storage library; the rule ordering module and the data linking module are electrically connected with the output module together, the rule ordering module is used for ordering disordered block data embedded with single character symbols of the password string according to the book order of the character symbols of the password string, the data linking module is used for integrating the data connections of the blocks, the output end of the rule entering module is electrically connected with the rule ordering module, the second input frame is electrically connected with the input end of the rule entering module, the rule entering module is used for entering the set password string into the rule ordering module, the confirmation module is electrically connected with the second input frame, the second extraction module and the second clearing module are electrically connected on the data pasting board, and the third feedback module is electrically connected between the second clearing module and the second extraction module, and the second clearing module is used for clearing the data pasting board.
Preferably, the transitional storage space is electrically connected with a size detection module, the size detection module is electrically connected with a calculation module, an adjustment module is electrically connected between the calculation module and the restriction transmission module, the size detection module is used for detecting the size of the whole data uploaded to the transitional storage space, the calculation module is used for calculating the size of each block of data after the whole data is divided into a set number of blocks, and the adjustment module is used for adjusting the size of single transmission data of the restriction transmission module to the size of the current data single block.
A storage method of a data storage protection system for out-of-order storage comprises the following specific steps:
firstly, before uploading data to a data storage library, inputting a corresponding number of passwords in an input frame I through a virtual input keyboard, wherein the passwords form any character symbol contained in the language library, then starting a reading module through a triggering module II, reading password strings in the input frame I by the reading module to prepare for data embedding work, simultaneously triggering a clearing module I after the reading module operates, clearing the password strings in the input frame I by the clearing module I to avoid stealing by people, sending the password strings to a user mobile phone application through a network by a network transmission module in time while clearing, and prompting the user to check by a prompting module, so that the passwords are only in a user mobile client side, and the passwords input on the user mobile phone application again when the data needs to be decoded and obtained;
secondly, uploading data to be stored through a data input module, then, the data firstly enters a transitional storage space, then, an equipartition detection module calculates and detects that the data in the transitional storage space is averagely divided into equipartition points with corresponding block numbers, then, a signal is fed back to a copying module through a second feedback module, the copying module copies the marked data into corresponding number of copies, the marked data are embedded into the equipartition points of the data through a mark embedding module, then, when the data marked by the marked data blocks are transmitted through a limit transmission module, each time when one marked data passes through the limit transmission module along with the whole uploaded data, a mark identification module generates induction and triggers a truncation module through a first feedback module, the truncation module truncates the position of the marked data, so that the marked data are averagely divided into a plurality of independent block data, and when the independent block data truncated into a plurality of blocks pass through the limit transmission module one by one, the restricted transmission module transmits the truncated data to a database port, the mobile module randomly switches the access module in the process and is connected with the unit storage blocks at different positions, when the data detection module detects that the data passes through, a signal is fed back to the random stop module, the random stop module stops the access module at the position of the unit storage block switched and connected in real time, so that the currently transmitted single independent block of data is transmitted into the currently connected unit storage block, then the mobile module randomly switches the access module to the unit storage blocks at different positions again, so that the truncated data is randomly stored in the unit storage blocks at different positions, the stolen personnel cannot correctly read the data, and the stored data is protected;
thirdly, the real-time naming module operates repeatedly through the cycle starting module, extracts a word from the word bank through the first extraction module, and then names the connected unit storage blocks with the word, so that all the unit storage blocks are changed into different names continuously, and the name sorting module sorts all the unit storage blocks according to the real-time name initial sequence, so that all the unit storage blocks are sorted and refreshed continuously, and the difficulty of data cracking and recombination is increased;
fourthly, when data needs to be extracted, the disordered data blocks arranged in the data storage library are pasted on a data pasting board, then the password strings stored in the application of the mobile phone of the user are input into the second input box, the confirmation module confirms the password strings in the second input box, the password strings in the second input box are input into the specified rule sorting module through the sorting rule input module, then the specified rule sorting module sorts the disordered data blocks embedded with the single character symbols of the password strings according to the writing order of the character symbols of the password strings to obtain the correct sequence, meanwhile, the data connection module enables the data of the blocks to be connected and integrated together to obtain complete data, the complete data are output on the data pasting board through the output module, then the user can extract the disordered data through the second extraction module, and simultaneously, the second extraction module triggers the second cleaning module through the third feedback module after extraction is completed, and the second clearing module is used for clearing the data pasting board.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention firstly enters a transitional storage space in the data storage process, then the positions of the equipartition points of the data averagely divided into the corresponding blocks are determined by an equipartition detection module, then the marked data are embedded into the equipartition points of the data by a marked embedding module, then when the data are transmitted by a restricted transmission module, the marked positions of the equipartition points of the data marks are identified by a mark identification module, then a truncation module truncates the marked positions of the data, so that the marked data are averagely divided into a plurality of independent block data and are transmitted to a database port by the restricted transmission module, and in the process, an access module randomly moves and switches and is connected with unit storage blocks at different positions, and the random stopping module randomly stops moving, so that the access module randomly connects with a certain unit storage block and transmits the data, therefore, the blocked data are stored in the unit storage blocks at different positions, so that the truncated data are stored out of order, and the stored data are protected;
2. the real-time naming module renames the connected unit memory blocks continuously, so that all the unit memory blocks change different names continuously, the name sorting module sorts all the unit memory blocks according to the real-time name initial sequence, so that all the unit memory blocks are sorted continuously for refreshing, and the difficulty of data cracking and recombination is increased;
3. before uploading data to a data storage library, a corresponding number of passwords are input through a virtual input keyboard, set password strings are embedded into each block of independent block data one by one through a sequence embedding module, the positions of the input password strings are automatically reset after being used, and a network transmission module sends the password strings to a user mobile phone application in time through a network, so that the passwords only exist in a user mobile client side, and the passwords are input in a mode of being contrasted with the user mobile phone application again when the data are required to be decoded and obtained;
4. the invention has the advantages that the sequence embedding module embeds the character symbols formed by the set password strings into each block of independent block data one by one according to the sequence, when in unlocking, the password strings stored in the mobile phone application of a user are input into the data unlocking library, then the password strings are input into the specified rule sequencing module through the sequencing rule input module, then the specified rule sequencing module sequences the disordered block data embedded with the single character symbols of the password strings according to the writing sequence of the character symbols of the password strings to obtain the correct sequence, and meanwhile, the data linking module enables the data of the blocks to be connected and integrated together to obtain complete data, so that the data unlocking and the reuse are realized.
Drawings
FIG. 1 is a schematic diagram of an out-of-order data storage protection system according to the present invention;
FIG. 2 is a schematic diagram illustrating a block marking module in the data storage protection system according to the present invention;
FIG. 3 is a schematic diagram illustrating the composition of a data repository in an out-of-order data storage protection system according to the present invention;
FIG. 4 is a schematic diagram of a real-time refresh scheduling system in an out-of-order data storage protection system according to the present invention;
FIG. 5 is a schematic diagram of a key setting system in an out-of-order storage data storage protection system according to the present invention;
FIG. 6 is a schematic diagram illustrating a data unlock library in the data storage protection system according to the present invention;
FIG. 7 is a schematic diagram illustrating a sorting and integrating module in the data storage protection system according to the invention.
In the figure: 1. a data repository; 2. a data input module; 3. a transitional storage space; 4. a block marking module; 5. a tag identification module; 6. a first feedback module; 7. a truncation module; 8. a data unlocking library; 9. sequentially embedding the modules; 10. a key setting system; 11. a calculation module; 12. an adjustment module; 13. a size detection module; 14. a data opening module; 15. a restriction transmission module; 16. an equipartition detection module; 17. a second feedback module; 18. a copy module; 19. marking the data; 20. a marker embedding module; 21. refreshing the arrangement system in real time; 22. a unit memory block; 23. a moving module; 24. a random selection module; 25. an access module; 26. a random stop module; 27. a data detection module; 28. a database port; 29. a network data synchronization module; 30. a word stock; 31. an extraction module I; 32. a real-time naming module; 33. a cycle starting module; 34. a name sorting module; 35. a language library; 36. a virtual input keyboard; 37. clearing the first module; 38. inputting a frame I; 39. a reading module; 40. a second triggering module; 41. a network transmission module; 42. a user mobile phone application; 43. a confirmation module; 44. inputting a second frame; 45. a sorting rule input module; 46. a sorting integration module; 47. a first trigger module; 48. a data pasting board; 49. a rule ordering module is specified; 50. a data linking module; 51. an output module; 52. a second clearing module; 53. an extraction module II; 54. a third feedback module; 55. a prompt module; 56. a backup module; 57. and a countdown zero clearing module.
Detailed Description
The technical solutions in the embodiments of the present invention will be described in detail below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-7, the present invention provides a technical solution: a data storage protection system for out-of-order storage comprises a data storage library 1 and a data input module 2, wherein the data input module 2 is electrically connected with the data storage library 1, the data input module 2 is used for transmitting data to be stored in the data storage library 1, a transition storage space 3 is electrically connected between the data input module 2 and the data storage library 1, the transition storage space 3 comprises a data opening module 14, a block marking module 4, a line limiting transmission module 15, a mark identification module 5, a first feedback module 6 and a truncation module 7, the data opening module 14, the block marking module 4 and the line limiting transmission module 15 are respectively and electrically connected with the transition storage space 3, and the data opening module 14 is used for opening the data transmitted into the transition storage space 3; the restricted transit transmission module 15 is electrically connected between the transition storage space 3 and the data storage library 1, the restricted transit transmission module 15 is used for limiting the size of data transmitted in unit time, the block marking module 4 comprises marking data 19, a copying module 18, an average detection module 16, a second feedback module 17 and a mark embedding module 20, the measuring and calculating module 16 is electrically connected with the transition storage space 3, and the average detection module 16 is used for calculating and detecting average division points of data transmitted to the transition storage space 3 into corresponding blocks; the second feedback module 17 is electrically connected with the output end of the measuring and calculating module 16, the copying module 18 is electrically connected with the marked data 19, meanwhile, the copying module 18 is electrically connected with the second feedback module 17, the marked embedding module 20 is electrically connected with the output end of the copying module 18, when the averaging detection module 16 calculates and detects that the data transmitted to the transitional storage space 3 is averagely divided into averaging points with corresponding block numbers, a signal is fed back to the copying module 18 through the second feedback module 17, the copying module 18 copies the marked data 19 into corresponding number of copies, and then the marked embedding module 20 embeds the marks into the averaging points of the data; the mark identification module 5 is electrically connected with the restricted line transmission module 15, and the mark identification module 5 is used for identifying mark data 19; the truncation module 7 is electrically connected to the output end of the line-limiting transmission module 15, the first feedback module 6 is electrically connected between the truncation module 7 and the mark identification module 5, when data marked by the mark data 19 in blocks is transmitted through the line-limiting transmission module 15, when one mark data 19 passes through the line-limiting transmission module 15, the mark identification module 5 generates induction and triggers the truncation module 7 through the first feedback module 6, and the truncation module 7 truncates the position of the mark data 19, so that the marked data are equally divided into a plurality of independent blocks of data; the data storage library 1 comprises a unit storage block 22, a random selection module 24, a database port 28 and a data detection module 27, wherein the unit storage block 22 is divided into a plurality of units, and each unit storage block 22 is used for storing a block of cut independent block data; the random selection module 24 includes a moving module 23, an access module 25 and a random stop module 26, the access module 25 is electrically connected to all the unit memory blocks 22, the moving module 23 and the random stop module 26 are electrically connected to the access module 25, the database port 28 is electrically connected to the access module 25, the data detection module 27 is electrically connected between the database port 28 and the random stop module 26, the database port 28 is electrically connected to the restricted transmission module 15, when the independent block data cut into a plurality of blocks passes through the restricted transmission module 15 one by one, the restricted transmission module 15 transmits the cut data to the database port 28, and the moving module 23 makes the access module 25 move randomly and switch to connect with the unit memory blocks 22 at different positions, and when the data detection module 27 detects the data passing, a feedback signal is sent to the random stop module 26, and the random stop module 26 makes the access module 25 stay at the position of the unit memory block 22 connected to the unit memory blocks in real-time switch to The position is set, so that the currently transmitted single independent block data is transmitted to the currently connected unit storage block 22, then the mobile module 23 makes the access module 25 randomly move to switch the unit storage blocks 22 connected with different positions again, so that the truncated data is randomly stored in the unit storage blocks 22 at different positions, the stolen personnel cannot correctly read the data, and the stored data is protected.
The data storage library 1 is electrically connected with a real-time refreshing arrangement system 21, the real-time refreshing arrangement system 21 comprises a name sorting module 34, a word bank 30, an extraction module I31, a real-time naming module 32 and a cycle starting module 33, all unit storage blocks 22 of the name sorting module 34 are electrically connected, each unit storage block 22 is electrically connected with the real-time naming module 32, the extraction module I31 is electrically connected between the word bank 30 and the real-time naming module 32, the cycle starting module 33 is electrically connected to the real-time naming module 32, the cycle starting module 33 enables the real-time naming module 32 to repeatedly operate, the real-time naming module 32 extracts a word from the word bank 30 through the extraction module I31, then the connected unit storage blocks 22 are named with the word, so that all the unit storage blocks 22 are changed into different names, and the name sorting module 34 enables all the unit storage blocks 22 to be sorted according to the real-time initial sequence of the names, therefore, all the unit memory blocks 22 are continuously refreshed in sequence, and the difficulty of data cracking and reorganization is increased.
The word bank 30 is electrically connected with a network data synchronization module 29, and the network data synchronization module 29 enables the word bank 30 to be updated synchronously with words on the network through the network, so that the amount of the words in the word bank 30 is ensured to be large enough and new enough.
A port of the data repository 1 is provided with a key setting system 10, the key setting system 10 comprises a sequential embedding module 9, a virtual input keyboard 36, a language library 35, a first input box 38, a reading module 39, a second triggering module 40, a first clearing module 37, a network transmission module 41, a user mobile phone application 42 and a prompting module 55, the virtual input keyboard 36 is electrically connected with the language library 35, the first input box 38 is electrically connected with the output end of the virtual input keyboard 36, the reading module 39 is electrically connected between the first input box 38 and the sequential embedding module 9, the sequential embedding module 9 is electrically connected with a transmission channel between the data repository 1 and the truncation module 7, the first clearing module 37 is electrically connected between the reading module 39 and the first input box 38, the second triggering module 40 is electrically connected on the reading module 39, the network transmission module 41 is connected between the first input box 38 and the user mobile phone application 42 through a network, the prompt module 55 is electrically connected to the user mobile phone application 42, before uploading data to the data repository 1, a corresponding number of passwords are input in the first input box 38 through the virtual input keyboard 36, the passwords form any character symbols contained in the language library 35, the reading module 39 is started through the second trigger module 40, the password string in the first input box 38 is read by the reading module 39, the character symbols formed by the password string are sequentially embedded into each block of independent block data one by one through the sequential embedding module 9, the first clear module 37 is triggered after the reading module 39 operates, the first clear module 37 clears the password string in the first input box 38 to avoid being stolen by people, the network transmission module 41 timely sends the password string to the user mobile phone application 42 through the network while clearing the zero, and the prompt module 55 prompts the user to check, this ensures that the password is only present at the user's mobile client, and the password input on the user's mobile application 42 is re-referenced when the acquired data needs to be decrypted.
The input frame I38 is electrically connected with a backup module 56, the backup module 56 is electrically connected with a countdown clear module 57, the backup module 56 is electrically connected with the trigger module II 40, when the trigger module II 40 is started, the backup module 56 automatically backs up the password string input in the input frame I38, and therefore the problem that the password string cleared in the input frame I38 is not sent to the mobile phone application 42 of the user and the user does not remember the password string and loses the password string is avoided, the countdown clear module 57 clears the password string in the backup module 56 after a period of countdown, and the user can copy the password string in the backup module 56 in time.
The data storage library 1 is electrically connected with a data unlocking library 8, the data unlocking library 8 comprises a second input box 44, a confirmation module 43, a sorting rule recording module 45, a sorting integration module 46, a first trigger module 47, a data pasting board 48, a second clearing module 52, a third feedback module 54 and a second extraction module 53, the sorting integration module 46 comprises a rule sorting module 49, a data connection module 50 and an output module 51, the output module 51 is electrically connected with the data pasting board 48, and the data pasting board 48 is used for pasting and placing disorder block data extracted from the data storage library 1; the rule-defining ordering module 49 and the data linking module 50 are electrically connected with the output module 51 together, the output end of the rule-defining entering module 45 is electrically connected with the rule-defining ordering module 49, the input box II 44 is electrically connected with the input end of the rule-defining entering module 45, the confirming module 43 is electrically connected with the input box II 44, the extracting module II 53 and the clearing module II 52 are electrically connected with the data pasting board 48, the third feedback module 54 is electrically connected between the clearing module II 52 and the extracting module II 53, the block data which are disorderly arranged in the data storage library 1 are pasted on the data pasting board 48, then the password strings stored in the user mobile phone application 42 are input into the input box II 44 and confirmed by the confirming module 43, the password strings in the input box II 44 are input into the rule-defining ordering module 49 through the rule-defining ordering module 45, and the rule ordering module 49 aligns the single character symbols of the password strings embedded in the writing order of the password character symbols The disordered block data is sequenced to obtain a correct sequence, meanwhile, the data connection module 50 enables the data connection of the blocks to be integrated together to obtain complete data, the complete data is output on the data pasting plate 48 through the output module 51, then a user can extract the data through the second extraction module 53, the second extraction module 53 triggers the second clearing module 52 through the third feedback module 54 after extraction is completed, and the second clearing module 52 is used for clearing the data pasting plate 48.
The transition storage space 3 is electrically connected with a size detection module 13, the size detection module 13 is electrically connected with a calculation module 11, an adjusting module 12 is electrically connected between the calculation module 11 and a restriction transmission module 15, the size detection module 13 is used for detecting the size of the whole data uploaded to the transition storage space 3, then the calculation module 11 calculates the size of each block of data after the whole data is divided into a set number of blocks, then the restriction transmission module 15 is adjusted by the adjusting module 12 to adjust the size of single transmission data of the restriction transmission module 15 to the size of a current data block, and thus the restriction transmission module 15 is prevented from being incapable of transmitting a data block with an overlarge single block.
A storage method of a data storage protection system for out-of-order storage comprises the following specific steps:
firstly, before uploading data into a data repository 1, inputting a corresponding number of passwords in an input box I38 through a virtual input keyboard 36, wherein the passwords form any character symbol contained in a language library 35, then starting a reading module 39 through a triggering module II 40, reading a password string in the input box I38 by the reading module 39, triggering a clearing module I37 after the reading module 39 runs, clearing the password string in the input box I38 by the clearing module I37 to avoid being stolen by people, sending the password string to a user mobile phone application 42 through a network by a network transmission module 41 in time while clearing, and prompting a user to check by a prompting module 55, so that the password is only existed in a user mobile client, and the password input on the user mobile phone application 42 is compared again when the data needs to be decrypted;
secondly, uploading data to be stored through the data input module 2, then, the data firstly enters the transitional storage space 3, then, the equipartition detection module 16 calculates and detects that the data in the transitional storage space 3 is averagely divided into each equipartition point with the corresponding block number, then, a signal is fed back to the copying module 18 through the second feedback module 17, the copying module 18 copies the mark data 19 into the corresponding number, the mark embedding module 20 embeds the mark data into each equipartition point, then, when the data marked by the mark data 19 in blocks is transmitted through the restricted transmission module 15, each time when one mark data 19 passes through the restricted transmission module 15 along with the whole uploaded data, the mark identification module 5 generates induction and triggers the cut-off module 7 through the first feedback module 6, the cut-off module 7 cuts off the position of the mark data 19, so that the marked data are averagely divided into a plurality of independent blocks, when the independent block data cut into a plurality of blocks passes through the restricted transmission module 15 one by one, the restricted transmission module 15 transmits the cut data to the database port 28, and in the process, the moving module 23 makes the access module 25 switch randomly to connect with the unit storage blocks 22 at different positions, and when the data detection module 27 detects that the data passes through, the data feedback signal is sent to the random stopping module 26, the random stopping module 26 makes the access module 25 stay at the position of the unit storage block 22 switched and connected in real time, so that the currently transmitted single independent block data is transmitted to the currently connected unit storage block 22, then the moving module 23 makes the access module 25 switch randomly to connect with the unit storage blocks 22 at different positions again, so that the cut data is stored in the unit storage blocks 22 at different positions in disorder, and the data cannot be read correctly by a thief, the protection of the stored data is realized;
a third step, the cycle starting module 33 enables the real-time naming module 32 to operate repeatedly, the real-time naming module 32 extracts a word from the word bank 30 through the first extraction module 31, then the connected unit storage blocks 22 are named by the word, so that all the unit storage blocks 22 change different names continuously, the name sorting module 34 sorts all the unit storage blocks 22 according to the real-time initial sequence, so that all the unit storage blocks 22 are sorted and refreshed continuously, and the difficulty of data cracking and recombination is increased;
fourthly, when data needs to be extracted, as the sequence embedding module 9 embeds the literal symbols formed by the set password strings into each block of the independent block data one by one according to the sequence, when the data is unlocked, the block data which are arranged in disorder in the data storage library 1 are pasted on the data pasting board 48, then the password strings stored in the user mobile phone application 42 are input into the input frame II 44 and confirmed by the confirmation module 43, the password strings in the input frame II 44 are input into the rule sequencing module 49 by the sequencing rule input module 45, then the rule sequencing module 49 sequences the disordered block data in which the single literal symbols of the password strings are embedded according to the book sequence of the literal symbols of the password strings to obtain the correct sequence, and meanwhile, the data joining module 50 enables the data of the blocks to be connected and integrated together to obtain complete data, and then the data is output on the data pasting board 48 through the output module 51, then the user can extract the data through the second extraction module 53, meanwhile, after the second extraction module 53 finishes extraction, the second clearing module 52 is triggered through the third feedback module 54, and the second clearing module 52 is used for clearing the data pasting board 48.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. An out-of-order stored data storage protection system comprising a data storage library (1) and a data input module (2), characterized in that: the data input module (2) is electrically connected with the data storage library (1), a transition storage space (3) is electrically connected between the data input module (2) and the data storage library (1), the transition storage space (3) comprises a data opening module (14), a block marking module (4), a line limiting transmission module (15), a mark identification module (5), a first feedback module (6) and a truncation module (7), the data opening module (14), the block marking module (4) and the line limiting transmission module (15) are electrically connected with the transition storage space (3), the line limiting transmission module (15) is electrically connected between the transition storage space (3) and the data storage library (1), the line limiting transmission module (15) is used for limiting the size of data transmitted in unit time, and the block marking module (4) comprises mark data (19), The measuring and calculating module (16) is electrically connected with the transitional storage space (3), and the average detecting module (16) is used for calculating and detecting average points of data transmitted to the transitional storage space (3) and divided into corresponding blocks; the second feedback module (17) is electrically connected to the equipartition detection module (16), the copy module (18) and the mark data (19) are electrically connected to the second feedback module (17), the mark embedding module (20) is electrically connected to the copy module (18), and the mark embedding module (20) is used for embedding the mark data (19) into a data equipartition point; the mark identification module (5) is electrically connected with the restricted travel transmission module (15), the truncation module (7) is electrically connected with the output end of the restricted travel transmission module (15), and the truncation module (7) is used for truncating data; the first feedback module (6) is electrically connected between the truncation module (7) and the tag identification module (5), the data repository (1) comprises a cell memory block (22), a random selection module (24), a database port (28) and a data detection module (27), the random selection module (24) comprises a mobile module (23), an access module (25) and a random stop module (26), the access module (25) is electrically connected to all of the cell memory blocks (22), the mobile module (23) and the random stop module (26) are electrically connected to the access module (25), and the data detection module (27) is electrically connected between the database port (28) and the random stop module (26).
2. An out-of-order stored data storage protection system according to claim 1, wherein: the data storage bank (1) is electrically connected with a real-time refreshing arrangement system (21), the real-time refreshing arrangement system (21) comprises a name sorting module (34), a word bank (30), an extraction module I (31), a real-time naming module (32) and a cycle starting module (33), all the unit storage blocks (22) of the name sorting module (34) are electrically connected, each unit storage block (22) is electrically connected with one real-time naming module (32), the extraction module I (31) is electrically connected between the word bank (30) and the real-time naming module (32), the cycle starting module (33) is electrically connected to the real-time naming module (32), the real-time naming module (32) extracts one word from the word bank (30) through the extraction module I (31) and then enables the connected unit storage blocks (22) to be named with the word, the name sorting module (34) continuously reorders the unit memory blocks (22).
3. An out-of-order stored data storage protection system according to claim 2, wherein: the word stock (30) is electrically connected with a network data synchronization module (29), and the network data synchronization module (29) enables the word stock (30) and the vocabulary on the network to be updated synchronously through the network.
4. An out-of-order stored data storage protection system according to claim 1, wherein: a port of the data storage library (1) is provided with a key setting system (10), the key setting system (10) comprises a sequential embedding module (9), a virtual input keyboard (36), a language library (35), a first input frame (38), a reading module (39), a second triggering module (40), a first clearing module (37), a network transmission module (41), a user mobile phone application (42) and a prompting module (55), the virtual input keyboard (36) is electrically connected with the language library (35), the first input frame (38) is electrically connected with an output end of the virtual input keyboard (36), the virtual input keyboard (36) inputs a corresponding number of passwords in the first input frame (38), the reading module (39) is electrically connected between the first input frame (38) and the sequential embedding module (9), and the sequential embedding module (9) is electrically connected with a transmission channel between the data storage library (1) and the truncation module (7) The second trigger module (40) enables the reading module (39) to read the password strings in the first input frame (38), the sequential embedding module (9) sequentially embeds the literal symbols formed by the password strings into each block of independent block data one by one, the first clearing module (37) is electrically connected between the reading module (39) and the first input frame (38), the first clearing module (37) is used for clearing the password strings in the first input frame (38), the second trigger module (40) is electrically connected to the reading module (39), the network transmission module (41) is connected between the first input frame (38) and the user mobile phone application (42) through a network, the prompting module (55) is electrically connected to the user mobile phone application (42), and the network transmission module (41) is used for sending the password strings to the user mobile phone application (42) through the network, and a prompt module (55) prompts the user for viewing.
5. An out-of-order stored data storage protection system according to claim 4, wherein: the input box I (38) is electrically connected with a backup module (56), the backup module (56) is used for automatically backing up password strings input in the input box I (38), the backup module (56) is electrically connected with a countdown zero clearing module (57), the countdown zero clearing module (57) clears the password strings in the backup module (56) after a period of countdown, and the backup module (56) is electrically connected with the trigger module II (40).
6. An out-of-order stored data storage protection system according to claim 1, wherein: the data storage library (1) is electrically connected with a data unlocking library (8), the data unlocking library (8) comprises a second input box (44), a confirmation module (43), a sorting rule inputting module (45), a sorting integrating module (46), a first trigger module (47), a data pasting board (48), a second clearing module (52), a third feedback module (54) and a second extracting module (53), the sorting integrating module (46) comprises a rule sorting module (49), a data linking module (50) and an output module (51), the output module (51) is electrically connected with the data pasting board (48), and the data pasting board (48) is used for pasting and placing disordered block data extracted from the data storage library (1); the rule ordering module (49) and the data linking module (50) are electrically connected with the output module (51) together, the rule ordering module (49) is used for ordering the disordered block data embedded with the single literal symbols of the password string according to the book order of the literal symbols of the password string, the data linking module (50) is used for integrating the data connection of the blocks, the output end of the rule entering module (45) is electrically connected with the rule ordering module (49), the input frame II (44) is electrically connected with the input end of the rule entering module (45), the rule entering module (45) is used for entering the set password string into the rule ordering module (49), the confirming module (43) is electrically connected with the input frame II (44), the extracting module II (53) and the clearing module II (52) are electrically connected on the data pasting board (48), the third feedback module (54) is electrically connected between the second clearing module (52) and the second extracting module (53), and the second clearing module (52) is used for clearing the data pasting board (48).
7. An out-of-order stored data storage protection system according to claim 1, wherein: transition storage space (3) electricity is connected with size detection module (13), electricity is connected with calculation module (11) in size detection module (13), calculation module (11) with be connected with between restriction transmission module (15) adjustment module (12) electrically, and size detection module (13) are used for detecting out the size of uploading monoblock data in transition storage space (3), and calculation module (11) are used for calculating the size of every block of data after monoblock data divide into the settlement block number, and adjustment module (12) are used for adjusting restriction transmission module (15) single transmission data size to the size of current data monoblock.
8. The storage method of the out-of-order storage data storage protection system according to claims 1-7, comprising the following steps:
firstly, before uploading data to a data repository (1), inputting a corresponding number of passwords in an input box I (38) through a virtual input keyboard (36), wherein the passwords form any character symbol contained in a language library (35), then starting a reading module (39) through a triggering module II (40), reading the password string in the input box I (38) by the reading module (39) to prepare for embedding the data, triggering a clearing module I (37) after the reading module (39) operates, clearing the password string in the input box I (38) by the clearing module I (37) to avoid being stolen by people, and simultaneously, a network transmission module (41) timely sends the password string to a user mobile phone application (42) through a network and a prompting module (55) prompts a user to check the password so as to ensure that the password only exists in the user mobile client, when the acquired data needs to be cracked, the password input on the user mobile phone application (42) is compared again;
secondly, uploading data needing to be stored through a data input module (2), enabling the data to enter a transition storage space (3), then enabling an averaging detection module (16) to calculate and detect that the data in the transition storage space (3) are averagely divided into averaging points corresponding to the number of blocks, then enabling a second feedback module (17) to feed back signals to a copying module (18), enabling the copying module (18) to copy mark data (19) into corresponding copies, enabling the mark data to be embedded into the averaging points of the data through a mark embedding module (20), enabling the mark data (19) after being partitioned and marked to be transmitted through a line limiting transmission module (15), enabling a mark identification module (5) to generate induction and trigger a truncation module (7) through a first feedback module (6) whenever the mark data (19) pass through the line limiting transmission module (15) along with the whole uploaded data, the truncation module (7) truncates the position of the marked data (19) to enable the marked data to be evenly divided into a plurality of independent block data, when the independent block data truncated into a plurality of independent block data passes through the restricted transmission module (15) one by one, the restricted transmission module (15) transmits the truncated data to a database port (28), the moving module (23) enables the access module (25) to randomly move and switch in the process and is connected with the unit storage blocks (22) at different positions, when the data detection module (27) detects that the data passes through, a signal is fed back to the random stopping module (26), the random stopping module (26) enables the access module (25) to stay at the position of the unit storage block (22) switched and connected in real time, so that the currently transmitted single independent block data is transmitted to the currently connected unit storage block (22), and then the moving module (23) enables the access module (25) to randomly move and switch and connect the unit storage blocks at different positions The unit storage block (22) enables the truncated data to be stored in the unit storage blocks (22) at different positions out of order, so that thieves cannot read the data correctly, and the stored data are protected;
thirdly, the real-time naming module (32) is repeatedly operated by the cycle starting module (33), the real-time naming module (32) extracts a word from the word bank (30) through the extraction module I (31), and then the connected unit storage blocks (22) are named by the word, so that all the unit storage blocks (22) are continuously changed into different names, and the name sorting module (34) sorts all the unit storage blocks (22) according to the real-time initial sequence of names, so that all the unit storage blocks (22) are continuously sorted and refreshed, and the difficulty of data cracking and recombination is increased;
fourthly, when data needs to be extracted, as the sequence embedding module (9) embeds the character symbols formed by the set password strings into each block of independent block data one by one according to the sequence, when unlocking, only the block data which are arranged in disorder in the data storage library (1) are needed to be pasted on the data pasting board (48), then the password strings stored in the user mobile phone application (42) are input into the input frame II (44), and are confirmed by the confirmation module (43), the password strings in the input frame II (44) are input into the rule ordering module (49) through the ordering rule input module (45), then the rule ordering module (49) orders the disordered block data in which the single character symbols of the password strings are embedded according to the book sequence of the character symbols of the password strings to obtain the correct sequence, and simultaneously the data modules (50) enable the data of the blocks to be connected and integrated together, and obtaining complete data, outputting the complete data on the data pasting plate (48) through an output module (51), extracting the complete data through an extraction module II (53), triggering a clearing module II (52) through a third feedback module (54) after the extraction module II (53) finishes extraction, and clearing the clearing module II (52) for clearing the data pasting plate (48).
CN202110272626.8A 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof Active CN112861195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110272626.8A CN112861195B (en) 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110272626.8A CN112861195B (en) 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof

Publications (2)

Publication Number Publication Date
CN112861195A true CN112861195A (en) 2021-05-28
CN112861195B CN112861195B (en) 2024-05-03

Family

ID=

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842054A (en) * 2005-03-31 2006-10-04 华为技术有限公司 Stimulant data packet transmission out-of-order method and device
US20100223667A1 (en) * 2009-02-27 2010-09-02 International Business Machines Corporation Apparatus, system, and method for start-up authentication
CN106997394A (en) * 2017-04-12 2017-08-01 成都四方伟业软件股份有限公司 A kind of out of order arrival processing method and system of data
CN109948347A (en) * 2017-12-21 2019-06-28 中移(杭州)信息技术有限公司 A kind of date storage method and device, server and readable storage medium storing program for executing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842054A (en) * 2005-03-31 2006-10-04 华为技术有限公司 Stimulant data packet transmission out-of-order method and device
US20100223667A1 (en) * 2009-02-27 2010-09-02 International Business Machines Corporation Apparatus, system, and method for start-up authentication
CN106997394A (en) * 2017-04-12 2017-08-01 成都四方伟业软件股份有限公司 A kind of out of order arrival processing method and system of data
CN109948347A (en) * 2017-12-21 2019-06-28 中移(杭州)信息技术有限公司 A kind of date storage method and device, server and readable storage medium storing program for executing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李自尊;胡晓勤;周文瑾;邓亮;: "基于差异数据的块级数据库备份系统", 四川大学学报(自然科学版) *

Similar Documents

Publication Publication Date Title
CN201716765U (en) Wine counterfeiting tracing system based on two-dimensional bar codes
CN110874746B (en) Product traceability system based on block chain
US6694045B2 (en) Generation and verification of a digitized signature
CN103150517B (en) Concerning security matters e-file stores archive method, user right and opening of documents permission match method of calibration
CA2220414A1 (en) Positive identification system and method
CN108462692B (en) Block chain-based data tamper-proof system and method thereof
CN207052028U (en) A kind of locker
CN104851171A (en) Intelligent access control method, device and system
CN101553827B (en) Labeling method, code judging method and the information displaying of the mark treatment system of article management code, code judging system, Articla management system, article management code
CN202472960U (en) Car searching system based on two-dimensional bar codes
CN101550783A (en) Electronic coded lock and coded key
CN101430799A (en) Automatic bill outputting system, apparatus and method
MXPA02007837A (en) Paperless records in aircraft maintenance.
CN112861195A (en) Data storage protection system for out-of-order storage and storage method thereof
CN111093100A (en) Video tracing method based on block chain
CN112861195B (en) Data storage protection system for out-of-order storage and storage method thereof
US20070169193A1 (en) Data processing system
CN101256643A (en) Method for automatic generation of steel tube number
CN205541157U (en) Borrow computer management system of books
US8577090B2 (en) Biometric authentication method, authentication system, corresponding program and terminal
Smead Lessons in Energy Policy from 2021–2022
CN107958546A (en) Key cloud storage method
CN202257668U (en) Remote control intelligent managing and recognizing system of hotel fingerprint locker
CN115018522B (en) NFT (network File transfer protocol) source tracing anti-counterfeiting system based on block chain
Nguyen et al. Assigning Official National Administration Unit Code to Vietnam GADM Shapefile 2018 at Ward Level

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant