CN112861195B - Data storage protection system for out-of-order storage and storage method thereof - Google Patents

Data storage protection system for out-of-order storage and storage method thereof Download PDF

Info

Publication number
CN112861195B
CN112861195B CN202110272626.8A CN202110272626A CN112861195B CN 112861195 B CN112861195 B CN 112861195B CN 202110272626 A CN202110272626 A CN 202110272626A CN 112861195 B CN112861195 B CN 112861195B
Authority
CN
China
Prior art keywords
module
data
electrically connected
block
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110272626.8A
Other languages
Chinese (zh)
Other versions
CN112861195A (en
Inventor
张曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110272626.8A priority Critical patent/CN112861195B/en
Publication of CN112861195A publication Critical patent/CN112861195A/en
Application granted granted Critical
Publication of CN112861195B publication Critical patent/CN112861195B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data storage protection system for out-of-order storage and a storage method thereof, the system comprises a data storage library and a data input module, the data input module is electrically connected with the data storage library, a transition storage space is electrically connected between the data input module and the data storage library, the transition storage space comprises a data opening module, a blocking marking module, a line limiting transmission module, a marking identification module, a first feedback module and a cutting module, and the data opening module, the blocking marking module and the line limiting transmission module are respectively electrically connected with the transition storage space. In the data storage process, the data firstly enter the transitional storage space, then the average division detection module is used for determining the positions of all average division points of the data which are divided into corresponding block numbers, then the truncation module is used for truncating the positions where the marked data are located, and then the single block of data is randomly stored in each unit storage block, so that the data are stored in disorder, and the stored data are protected.

Description

Data storage protection system for out-of-order storage and storage method thereof
Technical Field
The invention relates to the technical field of data storage systems, in particular to a data storage protection system for out-of-order storage and a storage method thereof.
Background
The data storage is an indispensable part of the current internet world, and mainly stores data edited and created by a user in corresponding virtual storage spaces or storage hardware, and in order to protect the data, the storage spaces are also provided with protection systems for protecting the data.
The common data storage protection system has the following defects: after general data is stored in a corresponding virtual space, a common protection means is to set a password for the current storage space, and the password is required to be input when the storage space is opened, but because of rapid development of network technology, the simple password protection is easy to crack, and once the password protection is cracked, the data in the storage space can be easily stolen.
Disclosure of Invention
The invention aims to provide a data storage protection system for out-of-order storage and a storage method thereof, so as to solve the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions: the data storage protection system for out-of-order storage comprises a data storage library, a data input module, a data opening module, a blocking marking module, a line limiting transmission module, a marking identification module, a first feedback module and a cutting module, wherein the data input module is electrically connected with the data storage library, a transition storage space is electrically connected between the data input module and the data storage library, the data storage protection system further comprises a data opening module, a blocking marking module, a line limiting transmission module, a marking identification module, a first feedback module and a cutting module, the data opening module, the blocking marking module and the line limiting transmission module are respectively electrically connected with the transition storage space, the line limiting transmission module is electrically connected between the transition storage space and the data storage library and is used for limiting the size of data transmitted in unit time, the block marking module comprises marking data, a copying module, an average detection module, a second feedback module and a mark embedding module, the average detection module is electrically connected with the transition storage space, and the average detection module is used for calculating and detecting average division points of data transmitted into the transition storage space into corresponding block numbers; the second feedback module is electrically connected to the equipartition detection module, the replication module is electrically connected to the marking data, meanwhile, the replication module is electrically connected to the second feedback module, the marking embedding module is electrically connected to the output end of the replication module, and the marking embedding module is used for embedding the marking data into the data equipartition point; the tag identification module is electrically connected to the limited-travel transmission module, the cut-off module is electrically connected with the output end of the limited-line transmission module, the truncation module is used for truncating the data; the first feedback module is electrically connected between the cut-off module and the mark recognition module, the data storage library comprises a unit storage block, a random selection module, a database port and a data detection module, the random selection module comprises a mobile module, an access module and a random stopping module, the access module is electrically connected with all the unit storage blocks, the mobile module and the random stopping module are electrically connected to the access module, and the data detection module is electrically connected between the database port and the random stopping module.
Preferably, the data storage library is electrically connected with a real-time refreshing arrangement system, the real-time refreshing arrangement system comprises a name ordering module, a word library, an extraction module I, a real-time naming module and a circulation starting module, all the unit storage blocks of the name ordering module are electrically connected, each unit storage block is electrically connected with one real-time naming module, the extraction module I is electrically connected between the word library and the real-time naming module, the circulation starting module is electrically connected to the real-time naming module, the real-time naming module extracts a word from the word library through the extraction module I, then the connected unit storage blocks are named by the word, and the name ordering module continuously reorders the unit storage blocks.
Preferably, the word stock is electrically connected with a network data synchronization module, and the network data synchronization module enables the word stock to be updated synchronously with words on the network through a network.
Preferably, a key setting system is arranged at a port of the data storage library, the key setting system comprises a sequential embedding module, a virtual input keyboard, a language library, an input frame I, a reading module, a triggering module II, a clearing module I, a network transmission module, a user mobile phone application and a prompting module, the virtual input keyboard is electrically connected with the language library, the input frame I is electrically connected with an output end of the virtual input keyboard, the virtual input keyboard inputs a corresponding number of passwords in the input frame I, the reading module is electrically connected between the input frame I and the sequential embedding module, the sequential embedding module is electrically connected with a transmission channel between the data storage library and the intercepting module, the triggering module II enables the reading module to read password strings in the input frame I, the sequential embedding module is used for embedding the literal symbols formed by the password strings into each piece of the intercepted independent block data one by one in sequence, the clearing module I is electrically connected between the reading module and the input frame I, the clearing module I is used for clearing the password strings in the input frame I, the triggering module II is electrically connected with the reading module I and the triggering module I is electrically connected with the network transmission module to the user mobile phone application and prompting module to the user mobile phone.
Preferably, the first input frame is electrically connected with a backup module, the backup module is used for automatically backing up the password string input in the first input frame, the backup module is electrically connected with a countdown zero-clearing module, the countdown zero-clearing module clears the password string in the backup module after a period of countdown, and the backup module is electrically connected with the second trigger module.
Preferably, the data storage library is electrically connected with a data unlocking library, the data unlocking library comprises a second input frame, a confirmation module, a sorting rule input module, a sorting integration module, a first trigger module, a data pasting board, a second cleaning module, a third feedback module and a second extraction module, the sorting integration module comprises a rule sorting module, a data connection module and an output module, the output module is electrically connected with the data pasting board, and the data pasting board is used for pasting and placing out-of-order block data extracted from the data storage library; the data connection module is used for integrating the data connection of the blocks, the output end of the ordering rule input module is electrically connected with the ordering rule input module, the input frame II is electrically connected with the ordering rule input module, the ordering rule input module is used for inputting the set password string into the ordering rule input module, the confirmation module is electrically connected with the input frame II, the extraction module II and the removal module II are electrically connected with the data sticking board, the third feedback module is electrically connected between the removal module II and the extraction module II, and the removal module II is used for clearing the data sticking board.
Preferably, the size detection module is electrically connected to the transition storage space, the calculation module is electrically connected to the size detection module, the adjustment module is electrically connected between the calculation module and the limited-line transmission module, the size detection module is used for detecting the size of the whole data uploaded to the transition storage space, the calculation module is used for calculating the size of each piece of data after the whole data is divided into a set number of blocks, and the adjustment module is used for adjusting the size of the single-time transmission data of the limited-line transmission module to be the size of the current data single block.
A storage method of a data storage protection system for out-of-order storage comprises the following specific steps:
Firstly, inputting a corresponding number of passwords in an input frame I through a virtual input keyboard before uploading data into a data storage library, wherein the passwords can be any text symbol contained in a language library, then starting a reading module through a triggering module II, the reading module reads a password string in the input frame I to prepare for embedding data, meanwhile, the reading module triggers a clearing module I after running, the clearing module I clears the password string in the input frame I to avoid being stolen by a person, and when the password is cleared, a network transmission module timely sends the password string to a user mobile phone application through a network, and a prompt module prompts a user to check, so that the password only exists in a user mobile client, and when the acquired data needs to be decrypted, the password input on the user mobile phone application is compared again;
The second step is to upload the data to be saved through the data input module, the data firstly enter the transition storage space, then the average division detection module calculates and detects the average division points of the data in the transition storage space into corresponding block numbers, then the second feedback module feeds back signals to the copying module, the copying module copies the marked data into corresponding parts, the mark embedding module embeds the marked data into the corresponding division points of the data, then when the marked data is transmitted through the limited line transmission module after being marked by the marked data blocks, each time one marked data is sensed along with the whole uploaded data to pass through the limited line transmission module, the first feedback module triggers the cutting module, the cutting module cuts the positions of the marked data, the marked data is equally divided into a plurality of independent block data, when the data of the independent blocks cut into a plurality of pieces passes through the limited transmission module one by one, the limited transmission module transmits the cut-off data to a database port, in the process, the mobile module enables the access module to be randomly moved and switched and connected with the unit storage blocks at different positions, when the data detection module detects that the data passes, a feedback signal is sent to the random stopping module, the random stopping module enables the access module to stay at the position of the unit storage block connected with the real-time switch, thus the single independent block data transmitted at present is transmitted into the unit storage block connected at present, then the mobile module enables the access module to randomly move and switch the unit storage block connected with the different positions again, thus the cut-off data is randomly stored in the unit storage block at the different positions, so that a thief cannot correctly read the data, the stored data is protected;
The third step of the circulation starting module enables the real-time naming module to run repeatedly, the real-time naming module extracts a word from the word stock through the extracting module, then the connected unit storage blocks are named by the word, so that all the unit storage blocks continuously change different names, the name ordering module enables all the unit storage blocks to be ordered according to the initial sequence of the real-time names, so that all the unit storage block ordering is continuously refreshed, and the difficulty of data cracking and recombination is increased;
Fourthly, when data are required to be extracted, the block data which are arranged in disorder in the data storage library are pasted on the data pasting board, then the password strings stored in the user mobile phone application are input into the input frame II, the password strings in the input frame II are confirmed through the confirmation module, the password strings are input into the rule ordering module through the ordering rule input module, the rule ordering module orders the disorder block data embedded with the single literal symbol of the password strings according to the book order of the literal symbol of the password strings, the correct order is obtained, meanwhile, the data connection module enables the block data to be connected together, so that complete data are obtained, the complete data are output on the data pasting board through the output module, then a user can extract the complete data through the extraction module II, and the clearing module II is triggered through the third feedback module after the extraction is completed, and the clearing module II is used for clearing the data pasting board.
Compared with the prior art, the invention has the beneficial effects that:
1. The method comprises the steps of firstly entering a transitional storage space, determining the positions of all the equal division points of data which are equally divided into corresponding block numbers by means of an equal division detection module, embedding the marked data into all the equal division points of the data by a marked embedding module, identifying the positions of the equal division points of the data marks by a marked identification module when the data are transmitted by a limited transmission module, cutting off the positions of the marked data by a cut-off module, uniformly dividing the marked data into a plurality of independent block data, transmitting the independent block data to a database port by the limited transmission module, randomly moving and switching by an access module in the process, connecting with the unit storage blocks at different positions, randomly stopping moving by means of a random stopping module, so that the access module is randomly connected with one unit storage block position, and transmitting the data, thereby enabling the cut-off data to be stored in the unit storage blocks at different positions, and realizing protection of the stored data;
2. The real-time naming module continuously renames the connected unit storage blocks, so that all the unit storage blocks continuously convert different names, and the name ordering module orders all the unit storage blocks according to the initial sequence of the real-time names, so that all the unit storage block ordering is continuously refreshed, and the difficulty of data cracking and reorganizing is increased;
3. Before uploading data into a data storage library, inputting a corresponding number of passwords through a virtual input keyboard, embedding a set password string into each block of truncated independent block data one by one through a sequential embedding module, automatically clearing the positions of the input password strings after use, and timely transmitting the password string into a user mobile phone application through a network by a network transmission module to ensure that the passwords only exist at a user mobile client, and when the data are required to be obtained through cracking, re-contrasting the password input on the user mobile phone application;
4. The invention has the advantages that the sequence embedding module is used for embedding the character symbols formed by the set password strings into each block of truncated independent block data one by one according to the sequence, when the mobile phone is unlocked, the password strings stored in the mobile phone application of the user are input into the data unlocking library, then the password strings are input into the rule ordering module through the ordering rule input module, then the rule ordering module is used for ordering the disordered block data embedded with the single character symbol of the password strings according to the book sequence of the character symbols of the password strings, so as to obtain the correct sequence, and meanwhile, the data linking module is used for integrating the data of the blocks to obtain complete data, so that the unlocking of the data is realized and the data is reused.
Drawings
FIG. 1 is a schematic diagram of an out-of-order data storage protection system according to the present invention;
FIG. 2 is a schematic diagram illustrating the composition of a block marking module in an out-of-order data storage protection system according to the present invention;
FIG. 3 is a schematic diagram illustrating the composition of a data store in an out-of-order data storage protection system according to the present invention;
FIG. 4 is a schematic diagram illustrating a real-time refresh arrangement system in an out-of-order data storage protection system according to the present invention;
FIG. 5 is a schematic diagram illustrating a key configuration system in an out-of-order data storage protection system according to the present invention;
FIG. 6 is a schematic diagram illustrating the composition of a data unlocking library in a data storage protection system for out-of-order storage according to the present invention;
FIG. 7 is a schematic diagram illustrating a sequence integrating module in a data storage protection system for out-of-order storage according to the present invention.
In the figure: 1. a data store; 2. a data input module; 3. a transition storage space; 4. a block marking module; 5. a tag identification module; 6. a first feedback module; 7. a cutting module; 8. a data unlocking library; 9. sequentially embedding modules; 10. a key setting system; 11. a computing module; 12. an adjustment module; 13. a size detection module; 14. a data opening module; 15. a limited-line transmission module; 16. the equipartition detection module; 17. a second feedback module; 18. a replication module; 19. marking data; 20. a mark embedding module; 21. a real-time refreshing arrangement system; 22. a unit memory block; 23. a mobile module; 24. a random selection module; 25. an access module; 26. a random stopping module; 27. a data detection module; 28. a database port; 29. a network data synchronization module; 30. a word stock; 31. extracting a first module; 32. a real-time naming module; 33. a circulation starting module; 34. a name ordering module; 35. a language library; 36. a virtual input keyboard; 37. a first cleaning module; 38. an input box I; 39. a reading module; 40. a second trigger module; 41. a network transmission module; 42. a user mobile phone is applied; 43. a confirmation module; 44. an input box II; 45. a sorting rule input module; 46. a sequencing integration module; 47. triggering a first module; 48. a data sticking board; 49. a rule ordering module; 50. a data linking module; 51. an output module; 52. a second cleaning module; 53. an extraction module II; 54. a third feedback module; 55. a prompting module; 56. a backup module; 57. and a countdown zero clearing module.
Description of the embodiments
The following description of the embodiments of the present invention will be made with reference to the accompanying drawings, in which it is evident that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-7, the present invention provides a technical solution: the data storage protection system for out-of-order storage comprises a data storage library 1 and a data input module 2, wherein the data input module 2 is electrically connected with the data storage library 1, the data input module 2 is used for transmitting data to be stored in the data storage library 1, a transition storage space 3 is electrically connected between the data input module 2 and the data storage library 1, the data storage protection system further comprises a data opening module 14, a blocking marking module 4, a limiting transmission module 15, a marking identification module 5, a first feedback module 6 and a cutting module 7, the data opening module 14, the blocking marking module 4 and the limiting transmission module 15 are respectively electrically connected with the transition storage space 3, and the data opening module 14 is used for opening data transmitted into the transition storage space 3; the line limiting transmission module 15 is electrically connected between the transition storage space 3 and the data storage library 1, the line limiting transmission module 15 is used for limiting the size of data transmitted in unit time, the block marking module 4 comprises marking data 19, a copying module 18, an average detecting module 16, a second feedback module 17 and a mark embedding module 20, the average detecting module 16 is electrically connected with the transition storage space 3, and the average detecting module 16 is used for calculating and detecting an average division point of the data transmitted into the transition storage space 3 into corresponding block numbers; the second feedback module 17 is electrically connected to the output end of the equipartition detection module 16, the replication module 18 is electrically connected to the marking data 19, meanwhile, the replication module 18 is electrically connected to the second feedback module 17, the marking embedding module 20 is electrically connected to the output end of the replication module 18, when the equipartition detection module 16 calculates and detects that the data transmitted into the transition storage space 3 is averagely divided into the average division points of the corresponding block numbers, a signal is fed back to the replication module 18 through the second feedback module 17, the replication module 18 replicates the marking data 19 into the corresponding parts, and then the marking embedding module 20 embeds the data at each average division point; the mark recognition module 5 is electrically connected with the limit transmission module 15, and the mark recognition module 5 is used for recognizing mark data 19; the cut-off module 7 is electrically connected to the output end of the line limiting transmission module 15, the first feedback module 6 is electrically connected between the cut-off module 7 and the mark recognition module 5, when the data marked by the mark data 19 in blocks is transmitted by the line limiting transmission module 15, each time one mark data 19 passes through the line limiting transmission module 15, the mark recognition module 5 generates induction and triggers the cut-off module 7 by the first feedback module 6, the cut-off module 7 cuts off the position of the mark data 19, and the marked data is equally divided into a plurality of independent block data; the data storage library 1 comprises a unit storage block 22, a random selection module 24, a database port 28 and a data detection module 27, wherein the unit storage block 22 is divided into a plurality of unit storage blocks, and each unit storage block 22 is used for storing a block of cut independent block data; the random selection module 24 comprises a mobile module 23, an access module 25 and a random stopping module 26, wherein the access module 25 is electrically connected with all the unit storage blocks 22, the mobile module 23 and the random stopping module 26 are electrically connected to the access module 25, a database port 28 is electrically connected with the access module 25, a data detection module 27 is electrically connected between the database port 28 and the random stopping module 26, the database port 28 is electrically connected with the limited transmission module 15, when the data of the cut-off independent blocks passes through the limited transmission module 15 one by one, the limited transmission module 15 transmits the cut-off data to the database port 28, the mobile module 23 enables the access module 25 to randomly move and switch with the unit storage blocks 22 at different positions in the process, when the data detection module 27 detects that the data passes through the random stopping module 26, a feedback signal is fed back to the position of the unit storage block 22 connected with the random stopping module 26, thus the currently transmitted single independent block data is transmitted into the currently connected unit storage block 22, and then the mobile module 23 enables the cut-off data to be read from the different positions of the random switching unit storage blocks 22 again, so that the data cannot be read from the same position of the unit storage blocks at different positions in the random switching positions, and the data cannot be read by the personnel.
The data storage library 1 is electrically connected with a real-time refreshing arrangement system 21, the real-time refreshing arrangement system 21 comprises a name ordering module 34, a word library 30, an extraction module I31, a real-time naming module 32 and a circulation starting module 33, all unit storage blocks 22 of the name ordering module 34 are electrically connected, each unit storage block 22 is electrically connected with one real-time naming module 32, the extraction module I31 is electrically connected between the word library 30 and the real-time naming module 32, the circulation starting module 33 is electrically connected with the real-time naming module 32, the circulation starting module 33 enables the real-time naming module 32 to repeatedly operate, the real-time naming module 32 extracts a word from the word library 30 through the extraction module I31, then the connected unit storage blocks 22 are named by the word, so that all unit storage blocks 22 are continuously transformed with different names, and the name ordering module 34 enables all unit storage blocks 22 to be ordered according to the alphabetical order of the real-time names, so that all unit storage blocks 22 are continuously refreshed, and the difficulty of data cracking recombination is increased.
The word stock 30 is electrically connected with a network data synchronization module 29, and the network data synchronization module 29 enables the word stock 30 to be updated synchronously with words on the network through the network, so that the vocabulary in the word stock 30 is ensured to be large enough and new enough.
The key setting system 10 is arranged at the port of the data storage library 1, the key setting system 10 comprises a sequential embedding module 9, a virtual input keyboard 36, a language library 35, an input frame I38, a reading module 39, a triggering module II 40, a clearing module I37, a network transmission module 41, a user mobile phone application 42 and a prompt module 55, the virtual input keyboard 36 is electrically connected with the language library 35, the input frame I38 is electrically connected with the output end of the virtual input keyboard 36, the reading module 39 is electrically connected between the input frame I38 and the sequential embedding module 9, the sequential embedding module 9 is electrically connected with a transmission channel between the data storage library 1 and the cutting module 7, the clearing module I37 is electrically connected between the reading module 39 and the input frame I38, the triggering module II 40 is electrically connected with the reading module 39, the network transmission module 41 is connected between the input frame I38 and the user mobile phone application 42 through a network, the prompt module 55 is electrically connected to the user mobile phone application 42, before uploading data to the data storage library 1, a corresponding number of passwords are input in the input box one 38 through the virtual input keyboard 36, the passwords can be any text symbol contained in the language library 35, then the trigger module two 40 starts the read module 39, the read module 39 reads the text string in the input box one 38, then the sequential embedding module 9 embeds the text symbol formed by the text string into each cut-off block of independent data one by one in sequence, the read module 39 operates, the clear module one 37 is triggered, the clear module one 37 clears the text string in the input box one 38 to avoid being stolen, while the clear is performed, the network transmission module 41 timely sends the text string to the user mobile phone application 42 through the network, and the prompt module 55 prompts the user to view, this ensures that the password is only present at the user's mobile client and is re-entered against the password on the user's mobile application 42 when the acquired data needs to be hacked.
The first input frame 38 is electrically connected with the backup module 56, the backup module 56 is electrically connected with the countdown zero clearing module 57, the backup module 56 is electrically connected with the second trigger module 40, when the second trigger module 40 is started, the backup module 56 automatically backs up the password strings input in the first input frame 38, so that the problem of network signals is avoided, the password strings cleared in the first input frame 38 are not sent to the user mobile phone application 42 and are not remembered by the user to cause loss, the countdown zero clearing module 57 clears the password strings in the backup module 56 after countdown for a period of time, and the user can copy the password strings in the backup module 56 in time.
The data storage library 1 is electrically connected with a data unlocking library 8, the data unlocking library 8 comprises a second input frame 44, a confirmation module 43, a sorting rule input module 45, a sorting integration module 46, a first trigger module 47, a second data pasting board 48, a cleaning module 52, a third feedback module 54 and a second extraction module 53, the sorting integration module 46 comprises a rule sorting module 49, a data linking module 50 and an output module 51, the output module 51 is electrically connected with the data pasting board 48, and the data pasting board 48 is used for pasting and placing out-of-order block data extracted from the data storage library 1; the rule ordering module 49 and the data linking module 50 are electrically connected with the output module 51 together, the output end of the rule inputting module 45 is electrically connected with the rule ordering module 49, the input frame two 44 is electrically connected with the input end of the rule inputting module 45, the confirming module 43 is electrically connected with the input frame two 44, the extracting module two 53 and the clearing module two 52 are electrically connected with the data pasting board 48, the third feedback module 54 is electrically connected between the clearing module two 52 and the extracting module two 53, the block data which are arranged in disorder in the data storage library 1 are pasted on the data pasting board 48, then the password strings stored in the user mobile phone application 42 are input into the input frame two 44, and confirmed by the confirming module 43, the password strings in the input frame two 44 are input into the rule ordering module 49 through the ordering rule inputting module 45, then the rule ordering module 49 orders the disorder block data embedded with the single word symbols of the password strings according to the word sequences of the password strings, meanwhile the data linking module 50 enables the block data to be connected together, the block data are stored together, the password strings stored in the data pasting board 48 are cleared by the output module 53, and the data pasting board 48 can be cleared by the second output module 52, and the data pasting module 52 is triggered by the data pasting module 52.
The transition storage space 3 is electrically connected with a size detection module 13, the size detection module 13 is electrically connected with a calculation module 11, an adjustment module 12 is electrically connected between the calculation module 11 and a line limiting transmission module 15, the size detection module 13 is used for detecting the size of the whole block of data uploaded into the transition storage space 3, then the calculation module 11 calculates the size of each block of data after dividing the whole block of data into a set number of blocks, and then the adjustment module 12 is used for adjusting the single transmission data size of the line limiting transmission module 15 to be the size of the current data single block, so that the line limiting transmission module 15 cannot transmit the overlarge data block of the single block.
A storage method of a data storage protection system for out-of-order storage comprises the following specific steps:
Firstly, before uploading data into a data storage library 1, inputting a corresponding number of passwords in an input frame I38 through a virtual input keyboard 36, wherein the password composition can be any character symbol contained in a language library 35, then starting a reading module 39 through a triggering module II 40, the reading module 39 reads a password string in the input frame I38, meanwhile, the reading module 39 triggers a clearing module I37 after running, the clearing module I37 clears the password string in the input frame I38 to avoid being stolen by a person, while clearing, a network transmission module 41 timely sends the password string to a user mobile phone application 42 through a network, and a prompting module 55 prompts a user to check, so that the password only exists in a user mobile client, and when the acquired data is required to be cracked, the password input on the user mobile phone application 42 is compared again;
In the second step, the data to be saved is uploaded through the data input module 2, the data firstly enters the transitional storage space 3, then the average detection module 16 calculates and detects that the data in the transitional storage space 3 is averagely divided into each average division point of the corresponding block number, then the second feedback module 17 feeds back a signal to the replication module 18, the replication module 18 replicates the marked data 19 into the corresponding number of parts, the mark embedding module 20 embeds the marked data 19 into each average division point of the data, then the marked data after being marked by the mark embedding module 20 is transmitted through the limited transmission module 15, each time one marked data 19 is transmitted through the limited transmission module 15 along with the whole uploaded data, the mark identification module 5 generates induction to trigger the cutting module 7 through the first feedback module 6, the cutting module 7 cuts off the position where the marked data 19 is located, the marked data is averagely divided into a plurality of independent block data, when the data of the independent blocks cut into a plurality passes through the line limiting transmission module 15 one by one, the line limiting transmission module 15 transmits the cut-off data to the database port 28, the mobile module 23 in the process enables the access module 25 to randomly move and switch and connect with the unit storage blocks 22 at different positions, when the data detection module 27 detects that the data passes through, the feedback signal is fed back to the random stopping module 26, the random stopping module 26 enables the access module 25 to stay at the position of the unit storage block 22 connected with the real-time switch, the single independent block data transmitted at present is transmitted into the unit storage block 22 connected at present, then the mobile module 23 again enables the access module 25 to randomly move and switch the unit storage block 22 connected with the different positions, so that the cut-off data is stored in the unit storage block 22 at different positions in disorder, the data cannot be read correctly by the thief, so that the stored data is protected;
the third step of the circulation starting module 33 makes the real-time naming module 32 run repeatedly, the real-time naming module 32 extracts a word from the word stock 30 through the first extracting module 31, then makes the connected unit storage blocks 22 named by the word, so that all the unit storage blocks 22 continuously change different names, and the name ordering module 34 makes all the unit storage blocks 22 ordered according to the initial sequence of the real-time names, so that all the unit storage blocks 22 ordered are continuously refreshed, and the difficulty of data cracking and reorganizing is increased;
When the data is required to be extracted, as the sequential embedding module 9 has embedded the text symbols formed by the set password strings into each piece of truncated independent block data one by one according to the sequence, when unlocking, the block data which are arranged in disorder in the data storage library 1 are pasted on the data pasting board 48, then the password strings stored in the user mobile phone application 42 are input into the input frame II 44, and confirmed by the confirmation module 43, the password strings in the input frame II 44 are input into the rule ordering module 49 through the ordering rule input module 45, then the rule ordering module 49 orders the disorder block data which are embedded with the single text symbols of the password strings according to the sequence of the text symbols of the password strings, so as to obtain the correct sequence, meanwhile, the data connection module 50 integrates the data connection of the blocks, so as to obtain one complete data, then the complete data are output on the data pasting board 48 through the output module 51, then the user can extract through the extraction module II 53, and the third feedback module 54 triggers the clearing module II 52 after the extraction is completed, and the clearing module II 52 is used for clearing the data pasting board 48.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. A data storage protection system for out-of-order storage, comprising a data storage library (1) and a data input module (2), characterized in that: the data input module (2) is electrically connected with the data storage library (1), a transition storage space (3) is electrically connected between the data input module (2) and the data storage library (1), the data storage protection system further comprises a data opening module (14), a block marking module (4), a line limiting transmission module (15), a marking identification module (5), a first feedback module (6) and a cut-off module (7), the data opening module (14), the block marking module (4) and the line limiting transmission module (15) are electrically connected with the transition storage space (3), the data opening module (14) is used for opening data transmitted into the transition storage space (3), the line limiting transmission module (15) is electrically connected between the transition storage space (3) and the data storage library (1), the block marking module (4) comprises marking data (19), a copy module (18), a uniform detection module (16), a second feedback module (17) and a uniform detection module (20) which are used for limiting the size of data transmitted in unit time, the block marking module (4) comprises a marking data (16), the uniform detection module (17) and the uniform detection module (20) is electrically connected with the transition storage space (3), the average division detection module (16) is used for calculating and detecting average division points of data transmitted into the transition storage space (3) into corresponding block numbers; the second feedback module (17) is electrically connected to the average detection module (16), the replication module (18) is electrically connected to the marking data (19), the replication module (18) is electrically connected to the second feedback module (17), the marking embedding module (20) is electrically connected to the replication module (18), and the marking embedding module (20) is used for embedding the marking data (19) into a data average point; after the average division detection module (16) calculates and detects that the data transmitted into the transition storage space (3) is equally divided into average division points of corresponding block numbers, a second feedback module (17) feeds back signals to the copying module (18), the copying module (18) copies the marked data (19) into corresponding parts, and then the marked data are embedded into the data at each average division point by the marked embedding module (20); the mark identification module (5) is electrically connected with the limit transmission module (15), the interception module (7) is electrically connected with the output end of the limit transmission module (15), and the interception module (7) is used for intercepting data; the first feedback module (6) is electrically connected between the interception module (7) and the mark recognition module (5), when the data marked by the mark data (19) in a blocking way is transmitted by the line limiting transmission module (15), each time one mark data (19) passes through the line limiting transmission module (15), the mark recognition module (5) generates induction and triggers the interception module (7) by the first feedback module (6), and the interception module (7) intercepts the position of the mark data (19) so as to lead the marked data to be equally divided into a plurality of independent block data; the data storage library (1) comprises a unit storage block (22), a random selection module (24), a database port (28) and a data detection module (27), wherein the random selection module (24) comprises a mobile module (23), an access module (25) and a random stopping module (26), the access module (25) is electrically connected with all the unit storage blocks (22), the mobile module (23) and the random stopping module (26) are electrically connected with the access module (25), and the data detection module (27) is electrically connected between the database port (28) and the random stopping module (26); when the data detection module (27) detects that the data passes, a signal is fed back to the random stopping module (26), the random stopping module (26) enables the access module (25) to stay at the position of the unit storage block (22) connected with the random stopping module in a real-time switching mode, so that single independent block data transmitted at present are transmitted into the unit storage block (22) connected at present, then the mobile module (23) enables the access module (25) to randomly move and switch the unit storage block (22) connected with different positions again, cut-off data are stored in the unit storage block (22) at different positions in an unordered mode, data cannot be read correctly by a thief, and protection of the stored data is achieved.
2. An out-of-order stored data storage protection system according to claim 1, wherein: the data storage library (1) is electrically connected with a real-time refreshing arrangement system (21), the real-time refreshing arrangement system (21) comprises a name ordering module (34), a word library (30), an extraction module I (31), a real-time naming module (32) and a circulation starting module (33), all the unit storage blocks (22) of the name ordering module (34) are electrically connected with one real-time naming module (32), the extraction module I (31) is electrically connected between the word library (30) and the real-time naming module (32), the circulation starting module (33) is electrically connected to the real-time naming module (32), the real-time naming module (32) extracts a word from the word library (30) through the extraction module I (31), then the connected unit storage blocks (22) are enabled to be named by the word, and the unit storage blocks (22) are continuously reordered by the name ordering module (34).
3. An out-of-order stored data storage protection system according to claim 2, wherein: the word stock (30) is electrically connected with a network data synchronization module (29), and the network data synchronization module (29) enables the word stock (30) to be updated synchronously with words on the network through the network.
4. A data storage protection system for out-of-order storage as claimed in claim 3 wherein: a key setting system (10) is arranged at a port of the data storage library (1), the key setting system (10) comprises a sequential embedding module (9), a virtual input keyboard (36), a language library (35), an input frame I (38), a reading module (39), a triggering module II (40), a clearing module I (37), a network transmission module (41), a user mobile phone application (42) and a prompting module (55), the virtual input keyboard (36) is electrically connected with the language library (35), the input frame I (38) is electrically connected at an output end of the virtual input keyboard (36), the virtual input keyboard (36) inputs a corresponding number of passwords in the input frame I (38), the reading module (39) is electrically connected between the input frame I (38) and the sequential embedding module (9), the sequential embedding module (9) is electrically connected with a transmission channel between the data storage library (1) and the cutting module (7), the triggering module II (40) enables the reading module (39) to read the passwords in the input frame I (38) and cut-off the serial strings of the passwords in the sequential embedding module (9) into each block of the text string one by one block, the first cleaning module (37) is electrically connected between the reading module (39) and the first input frame (38), the first cleaning module (37) is used for clearing a password string in the first input frame (38), the second triggering module (40) is electrically connected to the reading module (39), the network transmission module (41) is connected between the first input frame (38) and the user mobile phone application (42) through a network, the prompting module (55) is electrically connected to the user mobile phone application (42), the network transmission module (41) is used for sending the password string into the user mobile phone application (42) through a network, and the prompting module (55) prompts a user to check.
5. An out-of-order stored data storage protection system according to claim 4, wherein: the input frame I (38) is electrically connected with a backup module (56), the backup module (56) is used for automatically backing up the password string input in the input frame I (38), the backup module (56) is electrically connected with a countdown zero clearing module (57), the countdown zero clearing module (57) clears the password string in the backup module (56) after a period of countdown, and the backup module (56) is electrically connected with the trigger module II (40).
6. An out-of-order stored data storage protection system according to claim 5, wherein: the data storage library (1) is electrically connected with a data unlocking library (8), the data unlocking library (8) comprises a second input frame (44), a confirmation module (43), a sorting rule input module (45), a sorting integration module (46), a first trigger module (47), a data sticking board (48), a second clearing module (52), a third feedback module (54) and a second extraction module (53), the sorting integration module (46) comprises a rule sorting module (49), a data linking module (50) and an output module (51), the output module (51) is electrically connected with the data sticking board (48), and the data sticking board (48) is used for sticking and placing out-of-order block data extracted from the data storage library (1); the rule ordering module (49) and the data linking module (50) are electrically connected with the output module (51) together, the rule ordering module (49) is used for ordering the disorder block data embedded with the single literal symbol of the password string according to the book order of the literal symbol of the password string, the data linking module (50) is used for integrating the data connection of the blocks, the ordering rule input module (45) output end is electrically connected with the rule ordering module (49), the input box II (44) is electrically connected with the input end of the ordering rule input module (45), the ordering rule input module (45) is used for inputting the set password string into the rule ordering module (49), the confirmation module (43) is electrically connected with the input box II (44), the extraction module II (53) and the removal module II (52) are electrically connected with the data pasting board (48), the third feedback module (54) is electrically connected between the removal module II (52) and the extraction module II (53), the data of the disorder block 1 is stored in the memory (42) by the confirmation module (43) and the user data is pasted in the confirmation module (42) through the input box II, the password strings in the second input frame (44) are input into a rule ordering module (49) through an ordering rule input module (45), then the rule ordering module (49) orders disorder block data embedded with single literal symbols of the password strings according to the book orders of the literal symbols of the password strings to obtain a correct order, meanwhile, a data linking module (50) enables the data connection of the blocks to be integrated together to obtain complete data, the complete data are output on a data sticking board (48) through an output module (51), then a user can extract the complete data through an extraction module II (53), and a third feedback module (54) triggers a clearing module II (52) after the extraction module II (53) completes extraction, and the clearing module II (52) is used for clearing the data sticking board (48).
7. An out-of-order stored data storage protection system according to claim 6, wherein: the transition storage space (3) is electrically connected with a size detection module (13), the size detection module (13) is electrically connected with a calculation module (11), the calculation module (11) and an adjustment module (12) are electrically connected between the line limiting transmission module (15), the size detection module (13) is used for detecting the size of the whole data uploaded into the transition storage space (3), the calculation module (11) is used for calculating the size of each piece of data after the whole data is divided into a set number of blocks, and the adjustment module (12) is used for adjusting the single transmission data size of the line limiting transmission module (15) to be the size of the current data single block.
8. The method for storing an out-of-order stored data storage protection system according to claim 7, comprising the specific steps of:
Firstly, inputting a corresponding number of passwords in an input frame I (38) through a virtual input keyboard (36) before uploading data into a data storage library (1), wherein the passwords can be any character symbol contained in a language library (35), then starting a reading module (39) through a triggering module II (40), reading a password string in the input frame I (38) by the reading module (39) to prepare for embedding data, triggering a clearing module I (37) after the reading module (39) operates, clearing the password string in the input frame I (38) by the clearing module I (37), avoiding being stolen by a person, sending the password string to a user mobile phone application (42) through a network in time when clearing, and prompting a user to check by a prompting module (55), so that the password exists only in a mobile client of the user, and the password input on the user mobile phone application (42) is in contrast again when the data is required to be decoded;
The second step is to upload the data to be saved through the data input module (2), the data is firstly in the transition storage space (3), then the average detection module (16) calculates and detects each average division point of the data in the transition storage space (3) to be divided into corresponding block numbers, then the second feedback module (17) feeds back signals to the copying module (18), the copying module (18) copies the marked data (19) to corresponding numbers, the mark embedding module (20) embeds the marked data at each average division point, then the marked data (19) is transmitted through the limited line transmission module (15), each time one marked data (19) is sensed as the whole uploaded data passes through the limited line transmission module (15), the first feedback module (6) triggers the cut-off module (7), the cut-off module (7) cuts off the marked data (19) at the position to be divided into a plurality of independent block data, the cut-off data is divided into a plurality of independent block data, when the marked data passes through the limited line transmission module (15) and the marked data is connected with the detection module (25) one by one, the data is switched to the detection module (27) at the position of the detection module (25) when the data is not connected with the detection module (25) one by one, the method comprises the steps that a signal is fed back to a random stopping module (26), the random stopping module (26) enables an access module (25) to stay at the position of a unit storage block (22) connected with real-time switching, so that single independent block data transmitted currently are transmitted into the unit storage block (22) connected currently, then a moving module (23) enables the access module (25) to randomly move and switch the unit storage block (22) connected with different positions again, cut-off data are stored in the unit storage block (22) at different positions in an out-of-order mode, and theft personnel cannot read the data correctly to protect the stored data;
The third step of the circulation starting module (33) enables the real-time naming module (32) to run repeatedly, the real-time naming module (32) extracts a word from the word stock (30) through the first extracting module (31), then the connected unit storage blocks (22) are enabled to be named by the word, so that all the unit storage blocks (22) continuously change different names, and the name ordering module (34) enables all the unit storage blocks (22) to be ordered according to the initial sequence of the real-time names, so that all the unit storage blocks (22) are ordered to be refreshed continuously, and the difficulty of data cracking and recombination is increased;
And fourthly, when data is required to be extracted, as the sequential embedding module (9) is used for embedding the text symbols formed by the set password strings into each piece of independent block data one by one in sequence, when unlocking is carried out, the block data which are arranged in disorder in the data storage library (1) are only required to be pasted on the data pasting board (48), then the password strings stored in the user mobile phone application (42) are input into the input box II (44), and confirmed by the confirmation module (43), the password strings in the input box II (44) are input into the rule ordering module (49) through the ordering rule input module (45), then the rule ordering module (49) is used for ordering the disorder block data which are embedded with the single text symbols of the password strings according to the sequence of the text symbols of the password strings, so that the correct sequence is obtained, meanwhile, the data connection module (50) is used for integrating the block data connection together, so that one complete data is obtained, then the complete data are output on the data pasting board (48), then a user can extract the password strings through the extraction module II (53) and clear the extraction module II (52), and the data can be cleared through the extraction module II (53) and the extraction module (52).
CN202110272626.8A 2021-03-13 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof Active CN112861195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110272626.8A CN112861195B (en) 2021-03-13 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110272626.8A CN112861195B (en) 2021-03-13 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof

Publications (2)

Publication Number Publication Date
CN112861195A CN112861195A (en) 2021-05-28
CN112861195B true CN112861195B (en) 2024-05-03

Family

ID=75994383

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110272626.8A Active CN112861195B (en) 2021-03-13 2021-03-13 Data storage protection system for out-of-order storage and storage method thereof

Country Status (1)

Country Link
CN (1) CN112861195B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842054A (en) * 2005-03-31 2006-10-04 华为技术有限公司 Stimulant data packet transmission out-of-order method and device
CN106997394A (en) * 2017-04-12 2017-08-01 成都四方伟业软件股份有限公司 A kind of out of order arrival processing method and system of data
CN109948347A (en) * 2017-12-21 2019-06-28 中移(杭州)信息技术有限公司 A kind of date storage method and device, server and readable storage medium storing program for executing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223667A1 (en) * 2009-02-27 2010-09-02 International Business Machines Corporation Apparatus, system, and method for start-up authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842054A (en) * 2005-03-31 2006-10-04 华为技术有限公司 Stimulant data packet transmission out-of-order method and device
CN106997394A (en) * 2017-04-12 2017-08-01 成都四方伟业软件股份有限公司 A kind of out of order arrival processing method and system of data
CN109948347A (en) * 2017-12-21 2019-06-28 中移(杭州)信息技术有限公司 A kind of date storage method and device, server and readable storage medium storing program for executing

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于差异数据的块级数据库备份系统;李自尊;胡晓勤;周文瑾;邓亮;;四川大学学报(自然科学版)(第04期);全文 *

Also Published As

Publication number Publication date
CN112861195A (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN101054868B (en) Method and apparatus for copying key
CN103150517B (en) Concerning security matters e-file stores archive method, user right and opening of documents permission match method of calibration
CN110197085B (en) Document anti-tampering method based on fabric alliance chain
WO2004086171A3 (en) Methods and apparatus for facilitating a transaction
FI20011277A (en) Select data for synchronization
CN110032476A (en) A kind of file storage intelligent backup system based on big data
GB2377308A (en) Facilitating a transaction in electronic commerce
MXPA02000185A (en) Method and system for searching classified advertising.
WO2005084235A3 (en) A method and apparatus for searching large databases via limited query symbol sets
CN111666540B (en) Copyright storage and authentication method based on block chain and digital signature
CN108595545A (en) Accounting file intelligent management and intelligent management system
CN112699987A (en) Method and system for monitoring work task by using lock
CN112861195B (en) Data storage protection system for out-of-order storage and storage method thereof
CN103996035A (en) Passenger security check identity certification product
WO2004059532A3 (en) Data retrieval method and apparatus
MXPA02007837A (en) Paperless records in aircraft maintenance.
CN110427498A (en) Storage method, device, storage equipment and the storage medium of media information
SG151105A1 (en) System, method and user interface providing customized document portfolio management
WO2001093104A3 (en) System and method for retrieving data from a database using a data management system
CN111093100A (en) Video tracing method based on block chain
CN110991358A (en) Text comparison method and device based on block chain
CN110288494A (en) A kind of trade-mark administration automated system
CN104573573A (en) Data protection system and method for mobile storage
US7784091B2 (en) Data processing system
CN205541157U (en) Borrow computer management system of books

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant