CN112866415B - Data backup private cloud storage and downloading method - Google Patents

Data backup private cloud storage and downloading method Download PDF

Info

Publication number
CN112866415B
CN112866415B CN202110208543.2A CN202110208543A CN112866415B CN 112866415 B CN112866415 B CN 112866415B CN 202110208543 A CN202110208543 A CN 202110208543A CN 112866415 B CN112866415 B CN 112866415B
Authority
CN
China
Prior art keywords
file
client
cloud storage
private cloud
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110208543.2A
Other languages
Chinese (zh)
Other versions
CN112866415A (en
Inventor
陈继杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Taiyu Information Technology Co ltd
Original Assignee
Shanghai Taiyu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Taiyu Information Technology Co ltd filed Critical Shanghai Taiyu Information Technology Co ltd
Priority to CN202110208543.2A priority Critical patent/CN112866415B/en
Publication of CN112866415A publication Critical patent/CN112866415A/en
Application granted granted Critical
Publication of CN112866415B publication Critical patent/CN112866415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the field of data security and information communication, in particular to a data backup private cloud storage and downloading method, which comprises the following security management stages: creating an authorized access user by using a private cloud storage management end, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user; a file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges to obtain a server Access token, and uploads the fragmented file to the target private cloud storage; a file storage stage: after the client side completes the file slicing transmission, notifying the private cloud storage server side to sequentially combine and restore the file slicing information into an original file, and performing consistency verification; a file downloading stage: the client initiates a downloading request to the designated file by carrying an Access token, the cloud storage server performs security verification, and returns a specific file downloading address of the client, and the client downloads the file through the address.

Description

Data backup private cloud storage and downloading method
Technical Field
The invention relates to the field of data security and information communication, in particular to a data backup private cloud storage and downloading method.
Background
Private cloud storage is built individually by businesses or individuals, providing only limited users with corresponding storage services and quality of service (QoS) through a variety of different types of storage devices in a collaborative network.
Compared with traditional storage and public cloud storage, private cloud storage has the following advantages: 1. the data can be stored uniformly and managed efficiently; 2. the storage space is easy to expand and convenient to upgrade; 3. the separation of the inner network and the outer network is high in safety.
Disclosure of Invention
The invention aims to solve the problems in the background technology and provides a data backup private cloud storage and downloading method.
The technical aim of the invention is realized by the following technical scheme:
a data backup private cloud storage and downloading method comprises the following steps:
and a security management stage: creating an authorized access user by using a private cloud storage management end, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user;
a file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges to obtain a server Access token, and uploads the fragmented file to the target private cloud storage;
a file storage stage: after the client side completes the file slicing transmission, notifying the private cloud storage server side to sequentially combine and restore the file slicing information into an original file, and performing consistency verification;
a file downloading stage: the client initiates a downloading request to the designated file by carrying an Access token, the cloud storage server performs security verification, and returns a specific file downloading address of the client, and the client downloads the file through the address.
Preferably, the specific steps of the security management stage are as follows:
1. the administrator user logs in to the private cloud storage server to perform authorization setting on the common user, and the method comprises the following steps: creating authorized users, authorizing access to IP addresses (black lists), specifying file storage paths, allocating disk space usage, configuring network transmission rates and access token validity periods;
2. the server side corrects the disk space occupied by the user regularly according to the management plan (storage plan task, automatic deletion plan and data synchronization plan) of the service system, and gives a prompt when the storage space is insufficient to complete the current storage operation;
3. and providing a periodic automatic deletion scheme, and cleaning the redundant data on the private cloud storage periodically according to the set deletion time limit and the reserved backup times.
Preferably, the specific steps of the file transmission stage are as follows:
1. the client accesses the private cloud storage server through a legally authorized user name and a password encrypted based on national password 4 (SM 4);
and the server side is combined with IP black-and-white list setting to carry out verification, and after the verification is passed, the AccessToken information with preset time efficiency is returned to the client side.
The client records the Access token and the validity period returned by the server to obtain authorization; and when the access token is accessed next time, if the validity period of the access token is over, repeating the step one, and re-obtaining the authorization.
2. The client analyzes the physical memory quantity of the current computer, judges the size of the pre-uploaded file, and the slicing rule is as follows: file fragment size = unit M number of physical memory/2048.
And according to the number of the file fragments, carrying out file fragment transmission in the second cyclic step, wherein: in the transmission process, carrying the Access token and the Hash value of the fragmented file with the fragmented data stream to carry out unified uploading.
3. After the file transmission is completed, the private cloud storage server is informed to carry out fragment file merging organization, and file characteristic information is uploaded, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragment HASH value.
Preferably, the specific steps of the file storage stage are as follows:
1. after receiving the request of transmitting the client-side fragmented files, the server side judges the authorization information of the user and the disk space occupation information;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if verification is successful, reading the data stream transmitted by the fragmented file, and recording the data stream to a disk in a binary file mode;
2. after receiving the request for completing the file transmission of the client, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating HASH values of the combined files, and returning corresponding file characteristic information to the client;
3. and if the file is a ZIP compressed file, analyzing the file information in the compressed package (opening the ZIP file in a file stream mode, reading the solidified file information in the ZIP, wherein the solidified file information comprises a file name, a CRC (cyclic redundancy check) value, the file size before and after compression and a modification date), and independently performing database recording operation.
Preferably, the specific steps of the file downloading stage are as follows:
1. the client carries an Access token and file name information to be downloaded, and initiates a downloading request to the private cloud storage server;
2. the private cloud storage server retrieves file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists or not. If so, generating a designated download URL, wherein the URL contains an encrypted download file effective time stamp (timestamp);
if the file is a file in the ZIP compression package, performing decompression and extraction operation on the compressed package single file, and storing the compressed package single file into a temporary directory to wait for downloading;
3. the client accesses the download URL to download the file, the server decrypts the corresponding URL after receiving the download request, and if the decryption is successful and the download validity period is reached, the file information is sent in the form of byte stream.
In conclusion, the invention solves the problems of low safety and poor manageability of the traditional file management technology. And uniformly managing the internal users and the computer disk resources through a private cloud storage technology. Meanwhile, the ZIP compressed package online single file extraction and downloading method solves the problem that the whole compressed package is to be downloaded in order to obtain a certain single file in the compressed package in the traditional compressed package downloading process, and effectively saves the downloading time and bandwidth resources.
Detailed Description
The following specific examples are intended to be illustrative of the invention and are not intended to be limiting, as modifications of the invention will be apparent to those skilled in the art upon reading the specification without inventive contribution thereto, and are intended to be protected by the patent law within the scope of the appended claims.
The present invention will be described in detail with reference to examples.
Example 1:
a data backup private cloud storage and downloading method comprises the following steps:
and a security management stage: using a private cloud storage management end to create an authorized access user, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user, wherein the specific steps are as follows:
1. the administrator user logs in to the private cloud storage server to perform authorization setting on the common user, and the method comprises the following steps: creating authorized users, authorizing access to IP addresses (black lists), specifying file storage paths, allocating disk space usage, configuring network transmission rates and access token validity periods;
2. the server side corrects the disk space occupied by the user regularly according to the management plan (storage plan task, automatic deletion plan and data synchronization plan) of the service system, and gives a prompt when the storage space is insufficient to complete the current storage operation;
3. and providing a periodic automatic deletion scheme, and cleaning the redundant data on the private cloud storage periodically according to the set deletion time limit and the reserved backup times.
A file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges and obtains a server Access token, and uploads the fragmented file to the target private cloud storage, and the specific steps are as follows:
1. the client accesses the private cloud storage server through a legally authorized user name and a password encrypted based on national password 4 (SM 4);
and the server side is combined with IP black-and-white list setting to carry out verification, and after the verification is passed, the AccessToken information with preset time efficiency is returned to the client side.
The client records the Access token and the validity period returned by the server to obtain authorization; and when the access token is accessed next time, if the validity period of the access token is over, repeating the step one, and re-obtaining the authorization.
2. The client analyzes the physical memory quantity of the current computer, judges the size of the pre-uploaded file, and the slicing rule is as follows: file fragment size = unit M number of physical memory/2048.
And according to the number of the file fragments, carrying out file fragment transmission in the second cyclic step, wherein: in the transmission process, carrying the Access token and the Hash value of the fragmented file with the fragmented data stream to carry out unified uploading.
3. After the file transmission is completed, the private cloud storage server is informed to carry out fragment file merging organization, and file characteristic information is uploaded, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragment HASH value.
A file storage stage: after the client side completes the file slicing transmission, the private cloud storage server side is informed to sequentially combine and restore the file slicing information into an original file, and consistency verification is carried out, and the specific steps are as follows:
1. after receiving the request of transmitting the client-side fragmented files, the server side judges the authorization information of the user and the disk space occupation information;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if verification is successful, reading the data stream transmitted by the fragmented file, and recording the data stream to a disk in a binary file mode;
2. after receiving the request for completing the file transmission of the client, the server checks the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file. Calculating HASH values of the combined files, and returning corresponding file characteristic information to the client;
3. and if the file is a ZIP compressed file, analyzing the file information in the compressed package (opening the ZIP file in a file stream mode, reading the solidified file information in the ZIP, wherein the solidified file information comprises a file name, a CRC (cyclic redundancy check) value, the file size before and after compression and a modification date), and independently performing database recording operation.
A file downloading stage: the client initiates a downloading request to the appointed file by carrying an Access token, the cloud storage server performs security verification and returns a specific file downloading address of the client, and the client downloads the appointed file through the address, and the specific steps are as follows:
1. the client carries an Access token and file name information to be downloaded, and initiates a downloading request to the private cloud storage server;
2. the private cloud storage server retrieves file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists or not. If so, generating a designated download URL, wherein the URL contains an encrypted download file effective time stamp (timestamp);
if the file is a file in the ZIP compression package, performing decompression and extraction operation on the compressed package single file, and storing the compressed package single file into a temporary directory to wait for downloading;
3. the client accesses the download URL to download the file, the server decrypts the corresponding URL after receiving the download request, and if the decryption is successful and the download validity period is reached, the file information is sent in the form of byte stream.

Claims (1)

1. The data backup private cloud storage and downloading method is characterized by comprising the following steps of:
s1, a security management stage: creating an authorized access user by using a private cloud storage management end, and setting information such as a default file storage path, disk space consumption, network transmission rate and the like of the user; the method comprises the following specific steps:
s1-1, an administrator user logs in to a private cloud storage server, and performs authorization setting on a common user, wherein the method comprises the following steps: creating authorized users, authorizing access to the IP address black-and-white list, designating file storage paths, allocating disk space usage, configuring network transmission rate and access token validity period;
s1-2, the server side comprises the following steps according to a management plan of a service system: the method comprises the steps of storing a plan task, automatically deleting a plan and a data synchronization plan, correcting disk space occupied by a user regularly, and giving a prompt when the storage space is insufficient for completing the current storage operation;
s1-3, providing a periodic automatic deleting scheme, and periodically cleaning redundant data on the private cloud storage according to a set deleting time limit and the reserved backup times;
s2, a file transmission stage: the client accesses the cloud storage management end through the authorized user name and password, exchanges and obtains a server Access token, and uploads the fragmented file to the target private cloud storage, and the specific steps are as follows:
s2-1, the client accesses the private cloud storage server through a legally authorized user name and a password encrypted based on the national password 4;
the server side is combined with IP address black-and-white list setting to verify, and after verification, the server side returns AccessToken information with preset time efficiency to the client side;
the client records the Access token and the validity period returned by the server to obtain authorization; when accessing next time, if the valid period of the Access token is over, repeating the step S2-1, and re-obtaining authorization;
s2-2, the client analyzes the physical memory quantity of the current computer, judges the size of the pre-uploaded file, and the slicing rule is as follows: file fragment size = unit M number of physical memory/2048;
and (3) according to the number of file fragments, performing file fragment transmission in a circulating step S2-2, wherein: in the transmission process, carrying an Access token and a Hash value of a fragmented file on the fragmented data stream to be uniformly uploaded;
s2-3, after the file transmission is completed, notifying a private cloud storage server to carry out fragment file merging organization, and uploading file characteristic information, wherein the file characteristic information comprises a file name, a file size, a file HASH value and a fragment HASH value;
s3, a file storage stage: after the client side completes the file slicing transmission, the private cloud storage server side is informed to sequentially combine and restore the file slicing information into an original file, and consistency verification is carried out, and the specific steps are as follows:
s3-1, after receiving a client-side fragmented file transmission request, the server side judges authorization information of the user and disc space occupation information;
if the verification fails, the transmission is terminated, and specific error information of the client is returned;
if verification is successful, reading the data stream transmitted by the fragmented file, and recording the data stream to a disk in a binary file mode;
s3-2, after receiving a client file transmission completion request, the server checks according to the HASH value of the requested fragmented file and the HASH value of the fragmented file stored in the disk, and sequentially merges the HASH values to form an original backup file; calculating HASH values of the combined files, and returning corresponding file characteristic information to the client;
s3-3, the server records the file characteristic information into a database, if the file is a ZIP compressed file, the file information in the compressed package is analyzed, and the database recording operation is independently carried out;
s4, a file downloading stage: the client initiates a downloading request to the appointed file by carrying an Access token, the cloud storage server performs security verification and returns a specific file downloading address of the client, and the client downloads the appointed file through the address, and the specific steps are as follows:
s4-1, the client carries an Access token and file name information to be downloaded, and initiates a downloading request to the private cloud storage server;
s4-2, the private cloud storage server retrieves file characteristic information stored in the database, determines the server and path information of the file, and judges whether the file exists or not; if so, generating a designated download URL, wherein the URL contains an encrypted download file effective time stamp (timestamp);
if the file is a file in the ZIP compression package, performing decompression and extraction operation on the compressed package single file, and storing the compressed package single file into a temporary directory to wait for downloading;
s4-3, the client accesses the download URL to download the file, the server decrypts the corresponding URL after receiving the download request, and if the decryption is successful and the download validity period is reached, the file information is sent in the form of byte stream.
CN202110208543.2A 2021-02-24 2021-02-24 Data backup private cloud storage and downloading method Active CN112866415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110208543.2A CN112866415B (en) 2021-02-24 2021-02-24 Data backup private cloud storage and downloading method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110208543.2A CN112866415B (en) 2021-02-24 2021-02-24 Data backup private cloud storage and downloading method

Publications (2)

Publication Number Publication Date
CN112866415A CN112866415A (en) 2021-05-28
CN112866415B true CN112866415B (en) 2023-07-28

Family

ID=75991201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110208543.2A Active CN112866415B (en) 2021-02-24 2021-02-24 Data backup private cloud storage and downloading method

Country Status (1)

Country Link
CN (1) CN112866415B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726838B (en) * 2021-06-17 2023-09-19 武汉理工数字传播工程有限公司 File transmission method, device, equipment and storage medium
CN114268463A (en) * 2021-11-30 2022-04-01 重庆长安汽车股份有限公司 Data security transmission method based on cloud storage
CN114239081A (en) * 2022-02-25 2022-03-25 华中科技大学同济医学院附属协和医院 Business certificate processing method, system and electronic equipment
CN115086306B (en) * 2022-08-18 2022-11-18 天津市天河计算机技术有限公司 Data transmission method and device, electronic equipment and storage medium
CN115757328B (en) * 2022-11-15 2023-06-27 百润红科技有限公司 Data storage method and storage management system based on cloud platform
CN116074128A (en) * 2023-04-04 2023-05-05 北京久安世纪科技有限公司 SFTP (Small form-factor pluggable) authorization method and system based on portable operation and maintenance gateway
CN116827637B (en) * 2023-06-29 2024-03-19 四川中屹互联信息技术有限公司 Canvas-based data encryption transmission method, system, equipment and medium
CN116991633B (en) * 2023-08-29 2024-05-31 北京星汉博纳医药科技有限公司 Data backup processing method, device and equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN105930233A (en) * 2016-05-19 2016-09-07 北京春鸿企业管理咨询有限公司 Method and system for automatically backing up data of specified public cloud account
CN106341371A (en) * 2015-07-08 2017-01-18 杭州奕锐电子有限公司 Cloud storage data encryption method and cloud storage system
CN107332939A (en) * 2017-09-02 2017-11-07 刘兴丹 It is a kind of to pass through the cloud storage method that is locally stored, device
CN107786526A (en) * 2016-08-31 2018-03-09 北京优朋普乐科技有限公司 Anti-stealing link method, client and server system
CN108076148A (en) * 2017-12-15 2018-05-25 成都链网络科技有限公司 Storage system based on block chain
CN111507481A (en) * 2020-04-17 2020-08-07 腾讯科技(深圳)有限公司 Federated learning system
CN111709038A (en) * 2020-05-07 2020-09-25 北京中科凡语科技有限公司 File encryption and decryption method, distributed storage system, equipment and storage medium
KR102179497B1 (en) * 2020-04-13 2020-11-17 주식회사 한국정보보호경영연구소 System for Data Storing and Managing based on Multi-cloud and Driving method thereof
CN112114849A (en) * 2020-09-23 2020-12-22 腾讯科技(深圳)有限公司 Resource updating method and device
CN112166588A (en) * 2019-02-19 2021-01-01 甲骨文国际公司 Tenant replication bootstrapping for multi-tenant identity cloud services

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104023027A (en) * 2014-06-18 2014-09-03 西安电子科技大学 Deterministic cloud data deleting method based on sampling and fragmenting of cryptograph
CN106341371A (en) * 2015-07-08 2017-01-18 杭州奕锐电子有限公司 Cloud storage data encryption method and cloud storage system
CN105930233A (en) * 2016-05-19 2016-09-07 北京春鸿企业管理咨询有限公司 Method and system for automatically backing up data of specified public cloud account
CN107786526A (en) * 2016-08-31 2018-03-09 北京优朋普乐科技有限公司 Anti-stealing link method, client and server system
CN107332939A (en) * 2017-09-02 2017-11-07 刘兴丹 It is a kind of to pass through the cloud storage method that is locally stored, device
CN108076148A (en) * 2017-12-15 2018-05-25 成都链网络科技有限公司 Storage system based on block chain
CN112166588A (en) * 2019-02-19 2021-01-01 甲骨文国际公司 Tenant replication bootstrapping for multi-tenant identity cloud services
KR102179497B1 (en) * 2020-04-13 2020-11-17 주식회사 한국정보보호경영연구소 System for Data Storing and Managing based on Multi-cloud and Driving method thereof
CN111507481A (en) * 2020-04-17 2020-08-07 腾讯科技(深圳)有限公司 Federated learning system
CN111709038A (en) * 2020-05-07 2020-09-25 北京中科凡语科技有限公司 File encryption and decryption method, distributed storage system, equipment and storage medium
CN112114849A (en) * 2020-09-23 2020-12-22 腾讯科技(深圳)有限公司 Resource updating method and device

Also Published As

Publication number Publication date
CN112866415A (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN112866415B (en) Data backup private cloud storage and downloading method
US10387213B2 (en) Dispersed storage network secure hierarchical file directory
US10416889B2 (en) Session execution decision
US10325110B2 (en) Distributing registry information in a dispersed storage network
US9740730B2 (en) Authorizing distributed task processing in a distributed storage network
US10108484B2 (en) Detecting storage errors in a dispersed storage network
US9762395B2 (en) Adjusting a number of dispersed storage units
CN104603740B (en) Filing data identifies
US9063968B2 (en) Identifying a compromised encoded data slice
US8966194B2 (en) Processing a write request in a dispersed storage network
US20210326043A1 (en) Dynamically Adjusting Storage Resources In A Vast Storage Network
US10558581B1 (en) Systems and techniques for data recovery in a keymapless data storage system
US11928230B2 (en) Adjusting efficiency of storing data
CN111565144A (en) Data layered storage management method for instant communication tool
CN116522308A (en) Database account hosting method, device, computer equipment and storage medium
CN112613049B (en) Unified cloud storage system based on block chain and method for realizing data security
CN115694878A (en) Data transmission method, equipment and storage medium
CN114374706B (en) Content security management method based on distributed architecture
Chouhan et al. Reliable verification of distributed encoded data fragments in the cloud
CN117972649A (en) Universal software authentication method based on conventions
CN115834571A (en) File transmission method and device based on block chain
CN114448712A (en) Method and device for realizing security gateway of interplanetary file system
CN118113516A (en) Cross-platform service backup and recovery method
CN116318889A (en) Network security protection method integrating media platform
CN117997749A (en) Domestic operating system terminal domain group policy distribution method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant