CN112866415A - Data backup private cloud storage and downloading method - Google Patents
Data backup private cloud storage and downloading method Download PDFInfo
- Publication number
- CN112866415A CN112866415A CN202110208543.2A CN202110208543A CN112866415A CN 112866415 A CN112866415 A CN 112866415A CN 202110208543 A CN202110208543 A CN 202110208543A CN 112866415 A CN112866415 A CN 112866415A
- Authority
- CN
- China
- Prior art keywords
- file
- cloud storage
- client
- private cloud
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to the field of data security and information communication, in particular to a data backup private cloud storage and downloading method, which comprises the following security management stages: establishing an authorized access user by using a private cloud storage management terminal, and setting information such as a default file storage path, disk space usage, network transmission rate and the like of the user; and a file transmission stage: the client accesses the cloud storage management terminal through the authorized user name and password, exchanges to obtain the access token of the server terminal, and uploads the file to the target private cloud storage after being fragmented; and a file storage stage: after the client transmits the file fragments, the client informs a private cloud storage server of sequentially merging and restoring the file fragment information into an original file, and consistency check is performed; and (3) file downloading: the client side carries the Access token to initiate a downloading request to the specified file, the cloud storage server side conducts security verification and returns a specific file downloading address of the client side, and the client side downloads the file through the address.
Description
Technical Field
The invention relates to the field of data security and information communication, in particular to a data backup private cloud storage and downloading method.
Background
Private cloud storage is constructed by enterprises or individuals independently, and provides corresponding storage service and quality of service (QoS) only for limited users through various different types of storage devices in a collaborative network.
Compared with traditional storage and public cloud storage, the private cloud storage has the following advantages: 1. the data can be uniformly stored and efficiently managed; 2. the storage space is easy to expand and convenient to upgrade; 3. the internal and external networks are separated, and the safety is high.
Disclosure of Invention
The invention aims to solve the problems in the background art and provides a data backup private cloud storage and downloading method.
The technical purpose of the invention is realized by the following technical scheme:
a data backup private cloud storage and downloading method comprises the following stages:
and a safety management stage: establishing an authorized access user by using a private cloud storage management terminal, and setting information such as a default file storage path, disk space usage, network transmission rate and the like of the user;
and a file transmission stage: the client accesses the cloud storage management terminal through the authorized user name and password, exchanges to obtain the access token of the server terminal, and uploads the file to the target private cloud storage after being fragmented;
and a file storage stage: after the client transmits the file fragments, the client informs a private cloud storage server of sequentially merging and restoring the file fragment information into an original file, and consistency check is performed;
and (3) file downloading: the client side carries the Access token to initiate a downloading request to the specified file, the cloud storage server side conducts security verification and returns a specific file downloading address of the client side, and the client side downloads the file through the address.
Preferably, the security management stage includes the specific steps of:
an administrator user logs in a private cloud storage server to perform authorization setting on a common user, and the method comprises the following steps: creating an authorized user, authorizing access to an IP address (black and white list), specifying a file storage path, distributing the usage of disk space, configuring the transmission rate of a network and the validity period of an access token;
the server side regularly corrects the disk space occupied by the user according to the management plan (a storage plan task, an automatic deletion plan and a data synchronization plan) of the service system, and gives a prompt when the storage space is not enough to finish the current storage operation;
and thirdly, providing a regular automatic deletion scheme, and regularly cleaning the redundant data on the private cloud storage according to the set deletion time limit and the reserved backup times.
Preferably, the file transmission stage includes the specific steps of:
the method comprises the steps that firstly, a client accesses a private cloud storage server through a legally authorized user name and a password encrypted based on a state secret 4(SM 4);
and the server side performs verification by combining the IP black-and-white list setting, and returns the Access token information with the preset validity to the client side after the verification is passed.
The client records the Access token and the validity period returned by the server to obtain authorization; and in the next access, if the validity period of the Access token is over, repeating the step one to obtain the authorization again.
Secondly, the client analyzes the physical memory quantity of the current computer and judges the size of the file to be uploaded, and the fragmentation rule is as follows: the size of the file fragment is the unit M/2048 of the physical memory.
And according to the number of the file fragments, circularly performing file fragment transmission in the second step, wherein: in the transmission process, the fragmented data stream carries the Access token and the Hash value of the fragmented file to be uploaded uniformly.
And thirdly, after the file transmission is finished, informing the private cloud storage server side to merge and organize the fragmented files, and uploading file characteristic information, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragmented HASH value.
Preferably, the file storage stage includes the specific steps of:
after receiving a client fragmented file transmission request, a server judges authorization information and disk space occupation information of a user;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if the verification is successful, reading the data stream transmitted by the fragment file, and recording the data stream into a disk in a binary file mode;
and secondly, after receiving the client file transmission completion request, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating the HASH value of the merged file, and returning corresponding file characteristic information to the client;
and thirdly, the server records the file characteristic information into a database, if the file is a ZIP compressed file, file information in a compressed package is analyzed (the ZIP file is opened in a file stream mode, and file information solidified in the ZIP is read and contains a file name, a CRC (cyclic redundancy check) value, the size of the file before and after compression and a modification date), and the database recording operation is independently carried out.
Preferably, the file downloading stage includes the specific steps of:
firstly, a client carries Access token and file name information to be downloaded, and initiates a downloading request to a private cloud storage server;
and secondly, the private cloud storage server retrieves the file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists. If yes, generating a specified download URL, wherein the URL contains an encrypted download file valid timestamp (timestamp);
if the file is the file in the ZIP compression package, performing decompression and extraction operation on the single file of the compression package, and storing the single file of the compression package into a temporary directory to wait for downloading;
and thirdly, the client accesses the downloading URL to download the file, the server decrypts the corresponding URL after receiving the downloading request, and if the decryption is successful and the downloading is within the validity period, the file information is sent in a byte stream mode.
In summary, the invention solves the problems of low security and poor manageability of the traditional file management technology. And through a private cloud storage technology, performing unified management on internal users and computer disk resources. Meanwhile, the online single file extraction and downloading method of the ZIP compressed package solves the problem that the whole compressed package needs to be downloaded to obtain a certain single file in the compressed package in the traditional compressed package downloading process, and effectively saves the downloading time and bandwidth resources.
Detailed Description
The following specific examples are given by way of illustration only and not by way of limitation, and it will be apparent to those skilled in the art from this disclosure that various changes and modifications can be made in the examples without inventive faculty, and yet still be protected by the scope of the claims.
The present invention will be described in detail with reference to examples.
Example 1:
a data backup private cloud storage and downloading method comprises the following stages:
and a safety management stage: the method comprises the following steps of using a private cloud storage management terminal to establish an authorized access user and setting information such as a default file storage path, disk space usage, network transmission rate and the like of the user, wherein the specific steps are as follows:
an administrator user logs in a private cloud storage server to perform authorization setting on a common user, and the method comprises the following steps: creating an authorized user, authorizing access to an IP address (black and white list), specifying a file storage path, distributing the usage of disk space, configuring the transmission rate of a network and the validity period of an access token;
the server side regularly corrects the disk space occupied by the user according to the management plan (a storage plan task, an automatic deletion plan and a data synchronization plan) of the service system, and gives a prompt when the storage space is not enough to finish the current storage operation;
and thirdly, providing a regular automatic deletion scheme, and regularly cleaning the redundant data on the private cloud storage according to the set deletion time limit and the reserved backup times.
And a file transmission stage: the client accesses the cloud storage management terminal through the authorized user name and password, exchanges to obtain the access token of the server terminal, and uploads the file to the target private cloud storage after being fragmented, and the specific steps are as follows:
the method comprises the steps that firstly, a client accesses a private cloud storage server through a legally authorized user name and a password encrypted based on a state secret 4(SM 4);
and the server side performs verification by combining the IP black-and-white list setting, and returns the Access token information with the preset validity to the client side after the verification is passed.
The client records the Access token and the validity period returned by the server to obtain authorization; and in the next access, if the validity period of the Access token is over, repeating the step one to obtain the authorization again.
Secondly, the client analyzes the physical memory quantity of the current computer and judges the size of the file to be uploaded, and the fragmentation rule is as follows: the size of the file fragment is the unit M/2048 of the physical memory.
And according to the number of the file fragments, circularly performing file fragment transmission in the second step, wherein: in the transmission process, the fragmented data stream carries the Access token and the Hash value of the fragmented file to be uploaded uniformly.
And thirdly, after the file transmission is finished, informing the private cloud storage server side to merge and organize the fragmented files, and uploading file characteristic information, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragmented HASH value.
And a file storage stage: after the client finishes file fragment transmission, the client informs a private cloud storage server to sequentially merge and restore file fragment information into an original file, and consistency check is performed, wherein the method specifically comprises the following steps:
after receiving a client fragmented file transmission request, a server judges authorization information and disk space occupation information of a user;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if the verification is successful, reading the data stream transmitted by the fragment file, and recording the data stream into a disk in a binary file mode;
and secondly, after receiving the client file transmission completion request, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating the HASH value of the merged file, and returning corresponding file characteristic information to the client;
and thirdly, the server records the file characteristic information into a database, if the file is a ZIP compressed file, file information in a compressed package is analyzed (the ZIP file is opened in a file stream mode, and file information solidified in the ZIP is read and contains a file name, a CRC (cyclic redundancy check) value, the size of the file before and after compression and a modification date), and the database recording operation is independently carried out.
And (3) file downloading: the client side carries an Access token to initiate a download request for a specified file, the cloud storage server side performs security verification and returns a specific file download address of the client side, and the client side downloads the file through the address, and the specific steps are as follows:
firstly, a client carries Access token and file name information to be downloaded, and initiates a downloading request to a private cloud storage server;
and secondly, the private cloud storage server retrieves the file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists. If yes, generating a specified download URL, wherein the URL contains an encrypted download file valid timestamp (timestamp);
if the file is the file in the ZIP compression package, performing decompression and extraction operation on the single file of the compression package, and storing the single file of the compression package into a temporary directory to wait for downloading;
and thirdly, the client accesses the downloading URL to download the file, the server decrypts the corresponding URL after receiving the downloading request, and if the decryption is successful and the downloading is within the validity period, the file information is sent in a byte stream mode.
Claims (5)
1. A data backup private cloud storage and downloading method is characterized by comprising the following stages:
and a safety management stage: establishing an authorized access user by using a private cloud storage management terminal, and setting information such as a default file storage path, disk space usage, network transmission rate and the like of the user;
and a file transmission stage: the client accesses the cloud storage management terminal through the authorized user name and password, exchanges to obtain the access token of the server terminal, and uploads the file to the target private cloud storage after being fragmented;
and a file storage stage: after the client transmits the file fragments, the client informs a private cloud storage server of sequentially merging and restoring the file fragment information into an original file, and consistency check is performed;
and (3) file downloading: the client side carries the Access token to initiate a downloading request to the specified file, the cloud storage server side conducts security verification and returns a specific file downloading address of the client side, and the client side downloads the file through the address.
2. The data backup private cloud storage and download method according to claim 1, wherein the security management stage comprises the specific steps of:
an administrator user logs in a private cloud storage server to perform authorization setting on a common user, and the method comprises the following steps: creating an authorized user, authorizing access to an IP address (black and white list), specifying a file storage path, distributing the usage of disk space, configuring the transmission rate of a network and the validity period of an access token;
the server side regularly corrects the disk space occupied by the user according to the management plan (a storage plan task, an automatic deletion plan and a data synchronization plan) of the service system, and gives a prompt when the storage space is not enough to finish the current storage operation;
and thirdly, providing a regular automatic deletion scheme, and regularly cleaning the redundant data on the private cloud storage according to the set deletion time limit and the reserved backup times.
3. The data backup private cloud storage and download method according to claim 1, wherein the file transfer phase comprises the specific steps of:
the method comprises the steps that firstly, a client accesses a private cloud storage server through a legally authorized user name and a password encrypted based on a state secret 4(SM 4);
and the server side performs verification by combining the IP black-and-white list setting, and returns the Access token information with the preset validity to the client side after the verification is passed.
The client records the Access token and the validity period returned by the server to obtain authorization; and in the next access, if the validity period of the Access token is over, repeating the step one to obtain the authorization again.
Secondly, the client analyzes the physical memory quantity of the current computer and judges the size of the file to be uploaded, and the fragmentation rule is as follows: the size of the file fragment is the unit M/2048 of the physical memory.
And according to the number of the file fragments, circularly performing file fragment transmission in the second step, wherein: in the transmission process, the fragmented data stream carries the Access token and the Hash value of the fragmented file to be uploaded uniformly.
And thirdly, after the file transmission is finished, informing the private cloud storage server side to merge and organize the fragmented files, and uploading file characteristic information, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragmented HASH value.
4. The data backup private cloud storage and download method according to claim 1, wherein the file storage stage comprises the specific steps of:
after receiving a client fragmented file transmission request, a server judges authorization information and disk space occupation information of a user;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if the verification is successful, reading the data stream transmitted by the fragment file, and recording the data stream into a disk in a binary file mode;
and secondly, after receiving the client file transmission completion request, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating the HASH value of the merged file, and returning corresponding file characteristic information to the client;
and thirdly, the server records the file characteristic information into a database, if the file is a ZIP compressed file, file information in a compressed package is analyzed (the ZIP file is opened in a file stream mode, and file information solidified in the ZIP is read and contains a file name, a CRC (cyclic redundancy check) value, the size of the file before and after compression and a modification date), and the database recording operation is independently carried out.
5. The data backup private cloud storage and download method according to claim 1, wherein the file download phase comprises the specific steps of:
firstly, a client carries Access token and file name information to be downloaded, and initiates a downloading request to a private cloud storage server;
and secondly, the private cloud storage server retrieves the file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists. If yes, generating a specified download URL, wherein the URL contains an encrypted download file valid timestamp (timestamp);
if the file is the file in the ZIP compression package, performing decompression and extraction operation on the single file of the compression package, and storing the single file of the compression package into a temporary directory to wait for downloading;
and thirdly, the client accesses the downloading URL to download the file, the server decrypts the corresponding URL after receiving the downloading request, and if the decryption is successful and the downloading is within the validity period, the file information is sent in a byte stream mode.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110208543.2A CN112866415B (en) | 2021-02-24 | 2021-02-24 | Data backup private cloud storage and downloading method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110208543.2A CN112866415B (en) | 2021-02-24 | 2021-02-24 | Data backup private cloud storage and downloading method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112866415A true CN112866415A (en) | 2021-05-28 |
CN112866415B CN112866415B (en) | 2023-07-28 |
Family
ID=75991201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110208543.2A Active CN112866415B (en) | 2021-02-24 | 2021-02-24 | Data backup private cloud storage and downloading method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112866415B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726838A (en) * | 2021-06-17 | 2021-11-30 | 武汉理工数字传播工程有限公司 | File transmission method, device, equipment and storage medium |
CN114239081A (en) * | 2022-02-25 | 2022-03-25 | 华中科技大学同济医学院附属协和医院 | Business certificate processing method, system and electronic equipment |
CN114268463A (en) * | 2021-11-30 | 2022-04-01 | 重庆长安汽车股份有限公司 | Data security transmission method based on cloud storage |
CN115086306A (en) * | 2022-08-18 | 2022-09-20 | 天津市天河计算机技术有限公司 | Data transmission method and device, electronic equipment and storage medium |
CN115757328A (en) * | 2022-11-15 | 2023-03-07 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN116074128A (en) * | 2023-04-04 | 2023-05-05 | 北京久安世纪科技有限公司 | SFTP (Small form-factor pluggable) authorization method and system based on portable operation and maintenance gateway |
CN116827637A (en) * | 2023-06-29 | 2023-09-29 | 四川中屹互联信息技术有限公司 | Canvas-based data encryption transmission method, system, equipment and medium |
CN116991633A (en) * | 2023-08-29 | 2023-11-03 | 北京星汉博纳医药科技有限公司 | Data backup processing method, device and equipment |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
CN105930233A (en) * | 2016-05-19 | 2016-09-07 | 北京春鸿企业管理咨询有限公司 | Method and system for automatically backing up data of specified public cloud account |
CN106341371A (en) * | 2015-07-08 | 2017-01-18 | 杭州奕锐电子有限公司 | Cloud storage data encryption method and cloud storage system |
CN107332939A (en) * | 2017-09-02 | 2017-11-07 | 刘兴丹 | It is a kind of to pass through the cloud storage method that is locally stored, device |
CN107786526A (en) * | 2016-08-31 | 2018-03-09 | 北京优朋普乐科技有限公司 | Anti-stealing link method, client and server system |
CN108076148A (en) * | 2017-12-15 | 2018-05-25 | 成都链网络科技有限公司 | Storage system based on block chain |
CN111507481A (en) * | 2020-04-17 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Federated learning system |
CN111709038A (en) * | 2020-05-07 | 2020-09-25 | 北京中科凡语科技有限公司 | File encryption and decryption method, distributed storage system, equipment and storage medium |
KR102179497B1 (en) * | 2020-04-13 | 2020-11-17 | 주식회사 한국정보보호경영연구소 | System for Data Storing and Managing based on Multi-cloud and Driving method thereof |
CN112114849A (en) * | 2020-09-23 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Resource updating method and device |
CN112166588A (en) * | 2019-02-19 | 2021-01-01 | 甲骨文国际公司 | Tenant replication bootstrapping for multi-tenant identity cloud services |
-
2021
- 2021-02-24 CN CN202110208543.2A patent/CN112866415B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023027A (en) * | 2014-06-18 | 2014-09-03 | 西安电子科技大学 | Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph |
CN106341371A (en) * | 2015-07-08 | 2017-01-18 | 杭州奕锐电子有限公司 | Cloud storage data encryption method and cloud storage system |
CN105930233A (en) * | 2016-05-19 | 2016-09-07 | 北京春鸿企业管理咨询有限公司 | Method and system for automatically backing up data of specified public cloud account |
CN107786526A (en) * | 2016-08-31 | 2018-03-09 | 北京优朋普乐科技有限公司 | Anti-stealing link method, client and server system |
CN107332939A (en) * | 2017-09-02 | 2017-11-07 | 刘兴丹 | It is a kind of to pass through the cloud storage method that is locally stored, device |
CN108076148A (en) * | 2017-12-15 | 2018-05-25 | 成都链网络科技有限公司 | Storage system based on block chain |
CN112166588A (en) * | 2019-02-19 | 2021-01-01 | 甲骨文国际公司 | Tenant replication bootstrapping for multi-tenant identity cloud services |
KR102179497B1 (en) * | 2020-04-13 | 2020-11-17 | 주식회사 한국정보보호경영연구소 | System for Data Storing and Managing based on Multi-cloud and Driving method thereof |
CN111507481A (en) * | 2020-04-17 | 2020-08-07 | 腾讯科技(深圳)有限公司 | Federated learning system |
CN111709038A (en) * | 2020-05-07 | 2020-09-25 | 北京中科凡语科技有限公司 | File encryption and decryption method, distributed storage system, equipment and storage medium |
CN112114849A (en) * | 2020-09-23 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Resource updating method and device |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726838B (en) * | 2021-06-17 | 2023-09-19 | 武汉理工数字传播工程有限公司 | File transmission method, device, equipment and storage medium |
CN113726838A (en) * | 2021-06-17 | 2021-11-30 | 武汉理工数字传播工程有限公司 | File transmission method, device, equipment and storage medium |
CN114268463A (en) * | 2021-11-30 | 2022-04-01 | 重庆长安汽车股份有限公司 | Data security transmission method based on cloud storage |
CN114239081A (en) * | 2022-02-25 | 2022-03-25 | 华中科技大学同济医学院附属协和医院 | Business certificate processing method, system and electronic equipment |
CN115086306A (en) * | 2022-08-18 | 2022-09-20 | 天津市天河计算机技术有限公司 | Data transmission method and device, electronic equipment and storage medium |
CN115086306B (en) * | 2022-08-18 | 2022-11-18 | 天津市天河计算机技术有限公司 | Data transmission method and device, electronic equipment and storage medium |
CN115757328A (en) * | 2022-11-15 | 2023-03-07 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN115757328B (en) * | 2022-11-15 | 2023-06-27 | 百润红科技有限公司 | Data storage method and storage management system based on cloud platform |
CN116074128A (en) * | 2023-04-04 | 2023-05-05 | 北京久安世纪科技有限公司 | SFTP (Small form-factor pluggable) authorization method and system based on portable operation and maintenance gateway |
CN116827637A (en) * | 2023-06-29 | 2023-09-29 | 四川中屹互联信息技术有限公司 | Canvas-based data encryption transmission method, system, equipment and medium |
CN116827637B (en) * | 2023-06-29 | 2024-03-19 | 四川中屹互联信息技术有限公司 | Canvas-based data encryption transmission method, system, equipment and medium |
CN116991633A (en) * | 2023-08-29 | 2023-11-03 | 北京星汉博纳医药科技有限公司 | Data backup processing method, device and equipment |
CN116991633B (en) * | 2023-08-29 | 2024-05-31 | 北京星汉博纳医药科技有限公司 | Data backup processing method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN112866415B (en) | 2023-07-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112866415A (en) | Data backup private cloud storage and downloading method | |
JP7044881B2 (en) | Distributed storage methods and equipment, computer equipment and storage media | |
US8874908B2 (en) | Process for storing data on a central server | |
US20210256114A1 (en) | Over-The-Air Upgrade Method and Related Apparatus | |
WO2015175411A1 (en) | Distributed secure data storage and transmission of streaming media content | |
CN104603740A (en) | Archival data identification | |
CN110635906B (en) | Key management method and device for distributed block storage system | |
CN106341371A (en) | Cloud storage data encryption method and cloud storage system | |
EP3716580B1 (en) | Cloud file transfers using cloud file descriptors | |
US20200082068A1 (en) | Security of paired storage drives | |
CN113273163A (en) | File uploading method, file downloading method and file management device | |
CN113766012A (en) | Method and system for distributed rapid encryption distribution and transmission of electronic bidding document | |
EP1632943B1 (en) | Method of preventing multimedia copy | |
CN115412568A (en) | Distributed data transmission method, device and system | |
US20050076057A1 (en) | Method and system for transferring video and audio files to portable computing devices | |
US20050076214A1 (en) | Method and system for file downloads to portable computing devices | |
CN112560095A (en) | Secret key updating method for cloud storage and implementation method for cloud data auditing system | |
CN109413200B (en) | Resource import method, client, MES and electronic equipment | |
WO2008108874A2 (en) | System and method for verifying user and provider information for data delivery | |
CN114389878A (en) | Block chain fragmentation method and block chain network system | |
CN110958285B (en) | Data storage system based on block chain | |
CN114374706B (en) | Content security management method based on distributed architecture | |
CN115544170B (en) | Data hosting method and device based on block chain, electronic equipment and medium | |
CN112491787B (en) | Method and equipment for safety management of user data | |
CN114401278B (en) | Cross-platform transmission method, system, equipment and storage medium for Line App data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |