CN113342575A - Database data remote backup method and device based on real-time encryption - Google Patents

Database data remote backup method and device based on real-time encryption Download PDF

Info

Publication number
CN113342575A
CN113342575A CN202110686325.XA CN202110686325A CN113342575A CN 113342575 A CN113342575 A CN 113342575A CN 202110686325 A CN202110686325 A CN 202110686325A CN 113342575 A CN113342575 A CN 113342575A
Authority
CN
China
Prior art keywords
data
backup
backed
database
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110686325.XA
Other languages
Chinese (zh)
Other versions
CN113342575B (en
Inventor
杨海滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hulianxianfeng Technology Co ltd
Original Assignee
Shenzhen Hulianxianfeng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hulianxianfeng Technology Co ltd filed Critical Shenzhen Hulianxianfeng Technology Co ltd
Priority to CN202110686325.XA priority Critical patent/CN113342575B/en
Publication of CN113342575A publication Critical patent/CN113342575A/en
Application granted granted Critical
Publication of CN113342575B publication Critical patent/CN113342575B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a database data remote backup method and a device based on real-time encryption, wherein the method comprises the following steps: monitoring the database, and judging whether the database has data to be backed up to obtain a data monitoring judgment result; acquiring data to be backed up, and encrypting the data to be backed up to obtain encrypted backup data; establishing communication connection between the database and the backup device according to the data monitoring and judging result, and transmitting the encrypted backup data to the backup device through the communication connection; the backup device receives the encrypted backup data, conducts encryption check on the encrypted backup data to obtain a data check result, and completes database data backup according to the data check result. According to the invention, the data in the database is backed up to the mobile hard disk without manual operation, so that the labor can be saved in the backup process, and the backup data is encrypted in real time, so that the data backup efficiency is improved, and the safety of the backup data can be improved.

Description

Database data remote backup method and device based on real-time encryption
Technical Field
The invention relates to the technical field of databases, in particular to a database data remote backup method and device based on real-time encryption.
Background
Database (Database) is a warehouse for organizing, storing and managing data according to a data structure, wherein the Database relates to a lot of data and contains a lot of important information, once the Database is lost or damaged, immeasurable loss is caused, and the consequences are not imaginable, so that the Database data needs to be backed up in time, and the Database can still be restored through the backup data when the Database is lost or damaged, thereby avoiding affecting the normal use of the Database data.
At present, in the prior art scheme, a mobile hard disk is often used for backup storage for database data, but in this way, manpower is usually required to be invested for operation, not only is the manpower consumed, but also the time consumed during backup is long, and malicious tampering is easily caused in the backup process.
Disclosure of Invention
The present invention aims to provide a database data remote backup method and device based on real-time encryption, so as to solve the problems proposed in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: a database data remote backup method based on real-time encryption comprises the following steps:
monitoring a database, judging whether data to be backed up exist in the database or not, and obtaining a data monitoring judgment result;
acquiring data to be backed up according to the data monitoring and judging result, and encrypting the data to be backed up to obtain encrypted backup data;
establishing communication connection between the database and a backup device according to the data monitoring and judging result, and transmitting the encrypted backup data to the backup device through communication connection;
and the backup device receives the encrypted backup data, performs encryption inspection on the encrypted backup data to obtain a data inspection result, and completes database data backup according to the data inspection result.
Further, the remote database data backup method further comprises the steps of setting a backup plan, and carrying out communication transmission according to the set backup plan when the data are transmitted to the backup device through communication connection; the backup plan includes: the data to be backed up are transmitted and backed up according to the time interval by setting the time interval, and the backup data are transmitted and backed up when the size of the backup data reaches the preset size of the backup data by setting the size threshold of the backup data.
Further, acquiring data to be backed up according to the data monitoring and judging result includes:
sending a data acquisition request instruction according to the data monitoring and judging result; when the data monitoring and judging result shows that the data to be backed up exists, generating a data acquisition request instruction and sending the data acquisition request instruction;
obtaining a data log of the database according to the data acquisition request instruction, and determining data to be backed up in the database according to the data log; wherein, the determining the data to be backed up in the database according to the data log comprises:
extracting database data modification information from the data log;
Di={Wi}-{Bk|max(sim(wi,bk))}
in the above formula, DiIndicating data to be backed up in the i-th data modification information, WiRepresenting the modified data information of the ith data, BkRepresents the kth data information in the database, max represents the maximum function, sim (w)i,bk) Similarity between the mark information of the ith data modification information and the mark information of the kth data information in the database;
determining data R to be backed up by combining the newly added data information;
R={Di,{tj}}
wherein, tjIndicating the j-th added data information.
Further, when the data to be backed up is encrypted, an MD5 encryption algorithm is used for encryption, where the MD5 encryption algorithm includes:
preprocessing the data to be backed up; determining the length of target information, performing information expansion on the data to be backed up according to the length of the target information, and expanding the data to be backed up into first processing data to be backed up with the length of the target information;
acquiring the length module value of the data to be backed up, representing the length module value of the data to be backed up in a 64-bit binary form, and attaching the length module value to the end of the first processing data to be backed up to obtain second processing data to be backed up;
performing blocking processing on the second processing data to be backed up to obtain grouped data; the second processing data to be backed up is grouped into a plurality of sub data units with the length of 512 bits, the sub data units are sequentially stored in a plurality of registers, and the number of the sub data units in each register is the same;
setting variable parameters; setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set;
and performing loop iteration operation according to the variable parameters: copying the variable parameters into new variables, and performing nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter;
and combining the data of the result of the loop iteration operation with the data in the register to obtain encrypted backup data.
Further, performing encryption verification on the encrypted backup data to obtain a data verification result, and completing the database data backup according to the backup result, including:
performing MD5 verification on the encrypted backup data, and performing hash operation on the encrypted backup data to obtain verification data;
comparing the data information in the test data and the encrypted backup data to obtain a data test result; the method comprises the following steps:
calculating a judgment value of the inspection data according to the following formula;
Figure BDA0003124834360000041
in the above formula, Y is the judgment value of the inspection data, PhRepresents the h-th sub-data, Q, of the inspection datahH sub-data representing data information in the encrypted backup data, s representing the number of words;
determining a data inspection result according to the judgment value;
Figure BDA0003124834360000042
wherein, L is a data inspection result, M represents that the data information in the inspection data is consistent with that in the encrypted backup data, N represents that the data information in the inspection data is inconsistent with that in the encrypted backup data, and sgn is a sign function;
and when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing the data backup of the database, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for carrying out the backup again.
A remote database data backup device based on real-time encryption comprises: the system comprises a data monitoring module, a data processing module, a communication transmission module and a backup checking module;
the data monitoring module is used for monitoring the database, judging whether data to be backed up exist or not and obtaining a data monitoring judgment result;
the data processing module is used for acquiring data to be backed up according to the data monitoring and judging result and encrypting the data to be backed up to obtain encrypted backup data;
the communication transmission module is used for establishing communication connection between the database and a backup device according to the data monitoring and judging result and transmitting the encrypted backup data to the backup device;
and the backup checking module is used for carrying out encryption checking on the backup encrypted data after the backup device receives the backup data to obtain a data checking result, and finishing database data backup according to the data checking result.
Further, the remote database data backup device further comprises a backup plan making module;
the backup plan making module is used for setting a backup plan so that the communication transmission module carries out communication transmission according to the backup plan when transmitting the encrypted backup data to the backup device; the backup plan includes: the data to be backed up are transmitted and backed up according to the time interval by setting the time interval, and the backup data are transmitted and backed up when the size of the backup data reaches the preset size of the backup data by setting the size threshold of the backup data.
Further, the data processing module includes a data obtaining unit and a data encrypting unit, where the data obtaining unit, when obtaining the data to be backed up, includes: an instruction generation small unit and an instruction execution small unit;
the command generation small unit is used for generating a data acquisition request command according to the data monitoring and judging result and sending the data acquisition request command;
and the instruction execution small unit is used for acquiring the data log of the database according to the data acquisition request instruction and determining the data to be backed up in the database according to the data log.
Further, when the data processing module performs encryption processing on the data to be backed up, an MD5 encryption algorithm is used for encryption; the data processing module comprises: the device comprises a first processing unit, a second processing unit, a grouping and blocking unit, a parameter setting unit, a loop iteration unit and an encryption output unit;
the first processing unit is used for preprocessing the data to be backed up; determining the length of target information, performing information expansion on the data to be backed up according to the length of the target information, and expanding the data to be backed up into first processing data to be backed up with the length of the target information;
the second processing unit is configured to obtain a length modulus of the data to be backed up, represent the length modulus of the data to be backed up in a 64-bit binary form, and attach the length modulus to the end of the first processing data to be backed up to obtain second processing data to be backed up;
the grouping and blocking unit is used for carrying out blocking processing on the second processing data to be backed up to obtain grouping data; the second processing data to be backed up is grouped into a plurality of sub data units with the length of 512 bits, the sub data units are sequentially stored in a plurality of registers, and the number of the sub data units in each register is the same;
the parameter setting unit is used for setting variable parameters; setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set;
the loop iteration unit is used for performing loop iteration operation according to the variable parameters: copying the variable parameters into new variables, and performing nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter;
and the encryption output unit is used for combining the data of the result of the loop iteration operation with the data in the register to obtain encrypted backup data.
Further, the backup verification module includes: the device comprises a check data calculation unit, a backup result confirmation unit and a backup result execution unit;
the verification data calculation unit is used for performing MD5 verification on the encrypted backup data, and performing hash operation on the encrypted backup data to obtain verification data;
the backup result confirmation unit is used for comparing the data information in the check data and the encrypted backup data to obtain a data check result;
the backup result execution unit is used for finishing database data backup according to the data inspection result; and when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing the data backup of the database, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for carrying out the backup again. Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a schematic diagram illustrating steps of a remote database data backup method according to the present invention;
FIG. 2 is a schematic structural diagram of a remote database data backup method according to the present invention;
fig. 3 is a schematic structural diagram of a remote database data backup method according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
As shown in fig. 1, an embodiment of the present invention provides a database data remote backup method based on real-time encryption, including:
monitoring a database, judging whether data to be backed up exist in the database or not, and obtaining a data monitoring judgment result;
acquiring data to be backed up according to the data monitoring and judging result, and encrypting the data to be backed up to obtain encrypted backup data;
step three, establishing communication connection between the database and a backup device according to the data monitoring and judging result, and transmitting the encrypted backup data to the backup device through communication connection;
and step four, the backup device receives the encrypted backup data, performs encryption inspection on the encrypted backup data to obtain a data inspection result, and completes database data backup according to the data inspection result.
When the technical scheme is used for carrying out remote backup on database data, the database is monitored firstly, whether the data to be backed up exists in the monitoring data of the database is judged, and a data monitoring judgment result is obtained; acquiring data to be backed up according to the data monitoring and judging result, acquiring the data to be backed up when the monitoring and judging result indicates that the data to be backed up exists, and encrypting the acquired data to be backed up so as to obtain encrypted backup data; establishing communication connection between the database and the backup device according to the data monitoring and judging result, establishing communication connection between the database and the backup device when the data monitoring and judging result indicates that data backup is required, and otherwise, keeping the communication connection between the database and the backup device in a disconnected state; transmitting the encrypted backup data to the backup device through communication connection between the database and the backup device; and after the backup device receives the encrypted backup data, carrying out encryption inspection on the encrypted backup data, inspecting whether the data to be backed up is tampered or not so as to obtain a data inspection result, and finishing database data backup when the data inspection result is that the data to be backed up is not tampered.
According to the technical scheme, the change of the data in the database can be found in time by monitoring the database, and the newly added data in the database can be backed up in time, so that a large amount of time is not required to be specially consumed to realize backup when the data in the database is backed up, the backup time is short when only the newly added data is backed up each time, the loss caused by accidents such as data loss or damage of the database can be reduced, and the loss prevention rate of the data in the database is further improved. The backup data is encrypted and then transmitted, so that malicious tampering by a person can be effectively avoided, and the safety of the database data backup process is improved. In addition, the remote backup method for the database data does not need manual operation, and can automatically complete database data backup according to the monitoring data obtained by the monitoring database when the preset conditions are met as long as the preset conditions are set, so that the method not only saves labor, but also is reliable and not easy to make mistakes.
In one embodiment provided by the invention, the remote database data backup method further comprises the steps of setting a backup plan, and carrying out communication transmission according to the set backup plan when the backup plan is transmitted to a backup device through communication connection; the backup plan includes: the data to be backed up are transmitted and backed up according to the time interval by setting the time interval, and the backup data are transmitted and backed up when the size of the backup data reaches the preset size of the backup data by setting the size threshold of the backup data.
The technical proposal can also set a backup plan in advance when the data is transmitted to the backup device through the communication connection between the database and the backup device; when communication connection between the database and the backup device is established according to the data monitoring and judging result, a backup plan is made for backing up the data to be backed up, and the backup plan comprises the following steps: the method comprises the steps of enabling data to be backed up to be transmitted and backed up according to time intervals by setting time intervals, enabling the backup data to be transmitted and backed up only when the size of the backup data reaches the size of preset backup data by setting a threshold value of the size of the backup data, and the like. When the backup plan is set, one of the backup plans can be selected as the backup plan to transmit the data to be backed up. When the time interval is set so that the data to be backed up is transmitted and backed up according to the time interval, transmission judgment is carried out on the data to be backed up, if the time interval for carrying out data backup for the last time meets the set time interval, the data to be backed up is transmitted through communication connection, and if the time interval for carrying out data backup for the last time does not meet the set time interval, all the data to be backed up acquired in the time interval are transmitted through communication connection after meeting the set time interval. When the backup data reach the preset backup data size through setting the backup data size threshold value, the transmission backup is carried out, the size of the data to be backed up is calculated, the size of the data to be backed up is obtained, then the size of the data to be backed up and the set backup data size are judged, and when the size of the data to be backed up is not smaller than the set backup data size, the data to be backed up is transmitted through communication connection.
According to the technical scheme, the backup plan is set, so that the data to be backed up can be transmitted and backed up according to the backup plan after the communication connection between the database and the backup device is established, the data of the database can be stably and orderly backed up, the backup plan is not limited to one type, the backup style is enriched, the data backup mode of the database is more flexible, and multiple choices are provided.
In an embodiment provided by the present invention, acquiring data to be backed up according to the data monitoring and determining result includes:
sending a data acquisition request instruction according to the data monitoring and judging result; when the data monitoring and judging result shows that the data to be backed up exists, generating a data acquisition request instruction and sending the data acquisition request instruction;
obtaining a data log of the database according to the data acquisition request instruction, and determining data to be backed up in the database according to the data log; wherein, the determining the data to be backed up in the database according to the data log comprises:
extracting database data modification information from the data log;
Di={Wi}-{Bk|max(sim(wi,bk))}
in the above formula, DiIndicating data to be backed up in the i-th data modification information, WiRepresenting the modified data information of the ith data, BkRepresents the kth data information in the database, max represents the maximum function, sim (w)i,bk) Similarity between the mark information of the ith data modification information and the mark information of the kth data information in the database;
determining data R to be backed up by combining the newly added data information;
R={Di,{tj}}
wherein, tjIndicating the j-th added data information.
According to the technical scheme, when data to be backed up is acquired according to a data monitoring judgment result, firstly, a data acquisition request instruction is sent according to the data monitoring judgment result; when the data monitoring and judging result is that the data to be backed up exists, generating a data acquisition request instruction and sending the data acquisition request instruction; then, obtaining a data log of the database according to the data acquisition request instruction, obtaining data to be backed up in the database according to the data log, and when determining the data to be backed up in the database according to the data log, firstly, determining the data to be backed up in the data log according to a formula Di={Wi}-{Bk|max(sim(wi,bk) In the database) determines data modification information in the database; and determining the data to be backed up by combining the information of the newly added data.
According to the technical scheme, the data log of the database is obtained according to the data acquisition request instruction, and then the newly added data is called in the database according to the data log, so that the newly added data can be found quickly, and the efficiency of obtaining the data to be backed up can be improved. In addition, when the data to be backed up in the data modification information is determined, the data change of the modified data set and the data change of the data set before modification can be efficiently obtained in the form of a data set, and then the data can be backed up only aiming at the changed data part, so that the backup workload is effectively reduced, and the backup efficiency is improved.
In an embodiment provided by the present invention, when the data to be backed up is encrypted, an MD5 encryption algorithm is used for encryption, where the MD5 encryption algorithm includes:
preprocessing the data to be backed up; determining the length of target information, performing information expansion on the data to be backed up according to the length of the target information, and expanding the data to be backed up into first processing data to be backed up with the length of the target information;
acquiring the length module value of the data to be backed up, representing the length module value of the data to be backed up in a 64-bit binary form, and attaching the length module value to the end of the first processing data to be backed up to obtain second processing data to be backed up;
performing blocking processing on the second processing data to be backed up to obtain grouped data; the second processing data to be backed up is grouped into a plurality of sub data units with the length of 512 bits, the sub data units are sequentially stored in a plurality of registers, and the number of the sub data units in each register is the same;
setting variable parameters; setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set;
and performing loop iteration operation according to the variable parameters: copying the variable parameters into new variables, and performing nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter;
and combining the data of the result of the loop iteration operation with the data in the register to obtain encrypted backup data.
According to the technical scheme, when data to be backed up is encrypted, the encrypted backup data is obtained after being encrypted through an MD5 algorithm, when the data to be backed up is encrypted through an MD5 encryption algorithm, firstly, the target information length is determined, information expansion is carried out on the data to be backed up according to the target information length, and the data to be backed up is expanded into first processing data to be backed up with the target information length; then, acquiring a length module value of the data to be backed up, representing the length module value of the data to be backed up in a 64-bit binary form, and attaching the length module value to the end of the first processing data to be backed up to obtain second processing data to be backed up; then, grouping the second processing data to be backed up into a plurality of sub data units with the length of 512 bits, sequentially storing the sub data units in a plurality of registers, wherein the number of the sub data units in each register is the same, and obtaining grouped data; then, setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set; then copying the variable parameters into new variables, and carrying out nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to the nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter; and finally, combining the data of the loop iteration operation result with the data in the register to obtain encrypted backup data.
According to the technical scheme, the MD5 encryption algorithm is used for encrypting the data to be backed up, so that the safety of the data to be backed up can be improved, the data to be backed up is prevented from being tampered in the backup process, the MD5 encryption algorithm is easy to calculate, the encryption process is easier, meanwhile, the compactness is high, the data can be timely found to be tampered, the irreversibility is realized, the data cannot be cracked, and the safety of the data is improved.
In an embodiment provided by the present invention, performing encryption verification on the encrypted backup data to obtain a data verification result, and completing the database data backup according to the backup result data verification result, includes:
performing MD5 verification on the encrypted backup data, and performing hash operation on the encrypted backup data to obtain verification data;
comparing the data information in the test data and the encrypted backup data to obtain a data test result; the method comprises the following steps:
calculating a judgment value of the inspection data according to the following formula;
Figure BDA0003124834360000141
in the above formula, Y is the judgment value of the inspection data, PhRepresents the h-th sub-data, Q, of the inspection datahH sub-data representing data information in the encrypted backup data, s representing the number of words;
determining a data inspection result according to the judgment value;
Figure BDA0003124834360000142
wherein, L is a data inspection result, M represents that the data information in the inspection data is consistent with that in the encrypted backup data, N represents that the data information in the inspection data is inconsistent with that in the encrypted backup data, and sgn is a sign function;
and when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing the data backup of the database, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for carrying out the backup again.
According to the technical scheme, when the encrypted backup data is subjected to encryption inspection to obtain a data inspection result, firstly, MD5 inspection is performed on the encrypted backup data, and hash operation is performed on the encrypted backup data to obtain inspection data; then, comparing the data information in the test data and the encrypted backup data, and judging whether the data information in the test data and the encrypted backup data is consistent or not, thereby obtaining a data test result; when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing database data backup, when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for secondary backup, and when the data inspection result is obtained by comparing the data information in the inspection data and the encrypted backup data, firstly, according to a formula
Figure BDA0003124834360000143
The expressed principle calculates the judgment value of the inspection data, and then, according to the formula
Figure BDA0003124834360000144
The rules expressed determine the data verification results.
According to the technical scheme, the encrypted backup data is subjected to encryption inspection to determine that the data to be backed up is not tampered in the backup process, so that the correctness of the backup data is ensured, the MD5 is adopted to inspect and compare the inspection data of the encrypted backup data with the corresponding data information in the transmitted encrypted backup data to determine whether the backup is successful, if the data inspection result is that the data information in the inspection data and the data information in the encrypted backup data are consistent, the backup is successful, otherwise, the backup needs to be carried out again, wherein the inspection data of the encrypted backup data inevitably cause the inspection data to be different when the encrypted backup data occurs, so that the sensitivity of encryption inspection is improved, and the safety of the backup data is improved.
As shown in fig. 2, the present invention provides a remote database data backup device based on real-time encryption, which includes: the system comprises a data monitoring module, a data processing module, a communication transmission module and a backup checking module;
the data monitoring module is used for monitoring the database, judging whether data to be backed up exist or not and obtaining a data monitoring judgment result;
the data processing module is used for acquiring data to be backed up according to the data monitoring and judging result and encrypting the data to be backed up to obtain encrypted backup data;
the communication transmission module is used for establishing communication connection between the database and a backup device according to the data monitoring and judging result and transmitting the encrypted backup data to the backup device;
and the backup checking module is used for carrying out encryption checking on the backup encrypted data after the backup device receives the backup data to obtain a data checking result, and finishing database data backup according to the data checking result.
The remote database data backup device in the technical scheme comprises a data monitoring module, a data processing module, a communication transmission module and a backup checking module; firstly, monitoring a database through a data monitoring module, and judging whether data to be backed up exist in monitoring data related to the database so as to obtain a data monitoring judgment result; acquiring data to be backed up according to a data monitoring and judging result through a data processing module, acquiring the data to be backed up when the data to be backed up exists in the monitoring and judging result, and encrypting the acquired data to be backed up so as to obtain encrypted backup data; establishing communication connection between the database and the backup device according to the data monitoring and judging result through the communication transmission module, establishing the communication connection between the database and the backup device when the data monitoring and judging result indicates that data backup is needed, and otherwise, keeping the communication connection disconnection state between the database and the backup device; transmitting the encrypted backup data to the backup device through communication connection between the database and the backup device; after the backup device receives the encrypted backup data, the encrypted backup data is subjected to encryption inspection through the backup inspection module, whether the data to be backed up is tampered or not is inspected, so that a data inspection result is obtained, and when the data inspection result shows that the data to be backed up is not tampered, database data backup is completed.
According to the technical scheme, the change of the data in the database can be found in time by monitoring the database, and the newly added data in the database can be backed up in time, so that a large amount of time is not required to be specially consumed to realize backup when the data in the database is backed up, the backup time consumption is short when only the newly added data is backed up each time, the loss caused by accidents such as data loss or damage of the database can be reduced, and the loss prevention rate of the data in the database is further improved. The backup data is encrypted and then transmitted, so that malicious tampering by a person can be effectively avoided, and the safety of the database data backup process is improved. In addition, the remote backup method for the database data does not need manual operation, and can automatically complete database data backup according to the monitoring data obtained by the monitoring database when the preset conditions are met as long as the preset conditions are set, so that the method not only saves labor, but also is reliable and not easy to make mistakes.
As shown in fig. 3, in an embodiment provided by the present invention, the database data remote backup apparatus further includes a backup plan making module;
the backup plan making module is used for setting a backup plan so that the communication transmission module carries out communication transmission according to the backup plan when transmitting the encrypted backup data to the backup device; the backup plan includes: the data to be backed up are transmitted and backed up according to the time interval by setting the time interval, and the backup data are transmitted and backed up when the size of the backup data reaches the preset size of the backup data by setting the size threshold of the backup data.
The database data remote backup device of the technical scheme also comprises a backup plan making module; and setting a backup plan through a backup plan making module, so that the communication transmission module performs communication transmission according to the backup plan when transmitting the encrypted backup data to a backup device.
According to the technical scheme, the backup plan is set, so that the data to be backed up can be transmitted and backed up according to the backup plan after the communication connection between the database and the backup device is established, the data of the database can be stably and orderly backed up, the backup plan is not limited to one type, the backup style is enriched, the data backup mode of the database is more flexible, and multiple choices are provided.
In an embodiment provided by the present invention, the data processing module includes a data obtaining unit and a data encrypting unit, where the data obtaining unit, when obtaining data to be backed up, includes: an instruction generation small unit and an instruction execution small unit;
the command generation small unit is used for generating a data acquisition request command according to the data monitoring and judging result and sending the data acquisition request command;
and the instruction execution small unit is used for acquiring the data log of the database according to the data acquisition request instruction and determining the data to be backed up in the database according to the data log.
The data processing module in the above technical solution includes a data obtaining unit and a data encrypting unit, where the data obtaining unit, when obtaining data to be backed up, includes: an instruction generation small unit and an instruction execution small unit; generating a data acquisition request instruction according to the data monitoring and judging result through the instruction generating small unit and sending the data acquisition request instruction; obtaining a data log of a database according to a data acquisition request instruction through an instruction execution small unit, obtaining data to be backed up in the database according to the data log, and when determining the data to be backed up in the database according to the data log, firstly, passing through Di={Wi}-{Bk|max(sim(wi,bk) ) } extracting database data modification information in the data log, wherein DiIndicating data to be backed up in the i-th data modification information, WiRepresenting the modified data information of the ith data, BkRepresenting said dataThe kth data information in the library, max, represents the maximum function, sim (w)i,bk) Similarity between the mark information of the ith data modification information and the mark information of the kth data information in the database; then by R ═ Di,{tjDetermining data to be backed up by combining with newly added data information, wherein R represents backup data, tjIndicating the j-th added data information.
According to the technical scheme, the data log of the database is obtained according to the data acquisition request instruction, and then the newly added data is called in the database according to the data log, so that the newly added data can be found quickly, and the efficiency of obtaining the data to be backed up can be improved. In addition, when the data to be backed up in the data modification information is determined, the data change of the modified data set and the data change of the data set before modification can be efficiently obtained in the form of a data set, and then the data can be backed up only aiming at the changed data part, so that the backup workload is effectively reduced, and the backup efficiency is improved.
In an embodiment provided by the present invention, when the data processing module performs encryption processing on the data to be backed up, an MD5 encryption algorithm is used for encryption; the data processing module comprises: the device comprises a first processing unit, a second processing unit, a grouping and blocking unit, a parameter setting unit, a loop iteration unit and an encryption output unit;
the first processing unit is used for preprocessing the data to be backed up; determining the length of target information, performing information expansion on the data to be backed up according to the length of the target information, and expanding the data to be backed up into first processing data to be backed up with the length of the target information;
the second processing unit is configured to obtain a length modulus of the data to be backed up, represent the length modulus of the data to be backed up in a 64-bit binary form, and attach the length modulus to the end of the first processing data to be backed up to obtain second processing data to be backed up;
the grouping and blocking unit is used for carrying out blocking processing on the second processing data to be backed up to obtain grouping data; the second processing data to be backed up is grouped into a plurality of sub data units with the length of 512 bits, the sub data units are sequentially stored in a plurality of registers, and the number of the sub data units in each register is the same;
the parameter setting unit is used for setting variable parameters; setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set;
the loop iteration unit is used for performing loop iteration operation according to the variable parameters: copying the variable parameters into new variables, and performing nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter;
and the encryption output unit is used for combining the data of the result of the loop iteration operation with the data in the register to obtain encrypted backup data.
When the data processing module according to the above technical solution performs encryption processing on the data to be backed up, the data processing module performs encryption by using an MD5 encryption algorithm, and includes: when the data processing module adopts an MD5 encryption algorithm to encrypt, firstly, the data to be backed up is expanded by the processing unit to the target information length; then, the expanded data to be backed up is encrypted by an encryption unit by utilizing a Hash algorithm, so that initial encrypted data is obtained; then the initial encrypted data is divided into a plurality of initial encrypted data blocks by a block dividing unit; and finally, circularly iterating a plurality of initial encrypted data blocks through a circulating unit to obtain encrypted backup data, copying variables in the initial encrypted data blocks into intermediate variables during circular iteration, performing nonlinear function compression operation, adding plaintext information and a constant, adding another variable, performing circular left shift operation, continuously iterating to update the value of the initial variable until the final operation result is added with the original initial variable.
According to the technical scheme, the data processing module encrypts the data to be backed up through the MD5 encryption algorithm, so that the safety of the data to be backed up can be improved, the data to be backed up is prevented from being tampered in the backup process, the MD5 encryption algorithm is easy to calculate, the encryption process is easier, meanwhile, the compactness is high, the data can be timely found to be tampered, the irreversibility is realized, the cracking cannot be realized, and the safety of the data is improved.
In an embodiment of the present invention, the backup verification module includes: the device comprises a check data calculation unit, a backup result confirmation unit and a backup result execution unit;
the verification data calculation unit is used for performing MD5 verification on the encrypted backup data, and performing hash operation on the encrypted backup data to obtain verification data;
the backup result confirmation unit is used for comparing the data information in the check data and the encrypted backup data to obtain a data check result;
the backup result execution unit is used for finishing database data backup according to the data inspection result; and when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing the data backup of the database, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for carrying out the backup again. The backup checking module of the above technical solution includes: the device comprises a check data calculation unit, a backup result confirmation unit and a backup result execution unit; performing MD5 verification on the encrypted backup data through a verification data calculation unit, and performing hash operation on the encrypted backup data to obtain verification data; comparing the data information in the check data and the encrypted backup data by a backup result confirmation unit, and judging whether the data information in the check data and the encrypted backup data are consistentThereby obtaining a data inspection result; finishing database data backup according to the data inspection result through a backup result execution unit; when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing database data backup, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for secondary backup, wherein the backup result confirmation unit firstly compares the data information in the inspection data and the encrypted backup data to obtain the data inspection result through a formula
Figure BDA0003124834360000201
Calculating a judgment value of the inspection data, in the formula, Y represents the judgment value of the inspection data, PhRepresenting the h-th sub-data, Q, of the test datahH sub data indicating data information in the encrypted backup data, s indicating the number of words; then, according to the judgment value
Figure BDA0003124834360000211
And determining a data checking result according to the expressed data checking result determining rule, wherein L is the data checking result, M is the data information in the checking data and the encrypted backup data, N is the data information in the checking data and the encrypted backup data, and sgn is a symbolic function.
The technical proposal carries out encryption inspection on the encrypted backup data through the backup inspection module so as to determine whether the data to be backed up is tampered in the backup process, thereby ensuring the correctness of the backup data, and determining whether the backup is successful by comparing the check data of the encrypted backup data with the corresponding data information in the transmitted encrypted backup data using MD5 check by the check data calculation unit, the backup result confirmation unit, and the backup result execution unit, if the data checking result is that the data information in the checking data and the encrypted backup data are consistent, the backup is successful, otherwise, the backup is required to be carried out again, the check data of the encrypted backup data inevitably cause different check data when the encrypted backup data occurs, so that the sensitivity of encryption check is improved, and the safety of the backup data is improved.
It will be understood by those skilled in the art that the first and second embodiments of the present invention are merely directed to different stages of application.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A database data remote backup method based on real-time encryption is characterized by comprising the following steps:
monitoring a database, judging whether data to be backed up exist in the database or not, and obtaining a data monitoring judgment result;
acquiring data to be backed up according to the data monitoring and judging result, and encrypting the data to be backed up to obtain encrypted backup data;
establishing communication connection between the database and a backup device according to the data monitoring and judging result, and transmitting the encrypted backup data to the backup device through communication connection;
and the backup device receives the encrypted backup data, performs encryption inspection on the encrypted backup data to obtain a data inspection result, and completes database data backup according to the data inspection result.
2. The remote database data backup method according to claim 1, further comprising setting a backup plan, and performing communication transmission according to the set backup plan when transmitting to the backup apparatus through the communication connection; the backup plan includes: the data to be backed up are transmitted and backed up according to the time interval by setting the time interval, and the backup data are transmitted and backed up when the size of the backup data reaches the preset size of the backup data by setting the size threshold of the backup data.
3. The remote database data backup method according to claim 1, wherein obtaining the data to be backed up according to the data monitoring and determining result comprises:
sending a data acquisition request instruction according to the data monitoring and judging result; when the data monitoring and judging result shows that the data to be backed up exists, generating a data acquisition request instruction and sending the data acquisition request instruction;
obtaining a data log of the database according to the data acquisition request instruction, and determining data to be backed up in the database according to the data log; wherein, the determining the data to be backed up in the database according to the data log comprises:
extracting database data modification information from the data log;
Di={Wi}-{Bk|max(sim(wi,bk))}
in the above formula, DiIndicating data to be backed up in the i-th data modification information, WiRepresenting the modified data information of the ith data, BkRepresents the kth data information in the database, max represents the maximum function, sim (w)i,bk) Similarity between the mark information of the ith data modification information and the mark information of the kth data information in the database;
determining data R to be backed up by combining the newly added data information;
R={Di,{tj}}
wherein, tjIndicates the j increaseAnd (4) data information.
4. The remote database data backup method according to claim 3, wherein, when encrypting the data to be backed up, the data to be backed up is encrypted by using an MD5 encryption algorithm; the MD5 encryption algorithm comprises the following steps:
preprocessing the data to be backed up; determining the length of target information, performing information expansion on the data to be backed up according to the length of the target information, and expanding the data to be backed up into first processing data to be backed up with the length of the target information;
acquiring the length module value of the data to be backed up, representing the length module value of the data to be backed up in a 64-bit binary form, and attaching the length module value to the end of the first processing data to be backed up to obtain second processing data to be backed up;
performing blocking processing on the second processing data to be backed up to obtain grouped data; the second processing data to be backed up is grouped into a plurality of sub data units with the length of 512 bits, the sub data units are sequentially stored in a plurality of registers, and the number of the sub data units in each register is the same;
setting variable parameters; setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set;
and performing loop iteration operation according to the variable parameters: copying the variable parameters into new variables, and performing nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter;
and combining the data of the result of the loop iteration operation with the data in the register to obtain encrypted backup data.
5. The remote database data backup method according to claim 4, wherein performing encryption verification on the encrypted backup data to obtain a data verification result, and completing the database data backup according to the backup result data verification result, comprises:
performing MD5 verification on the encrypted backup data, and performing hash operation on the encrypted backup data to obtain verification data;
comparing the data information in the test data and the encrypted backup data to obtain a data test result; the method comprises the following steps:
calculating a judgment value of the inspection data according to the following formula;
Figure FDA0003124834350000031
in the above formula, Y is the judgment value of the inspection data, PhRepresents the h-th sub-data, Q, of the inspection datahH sub-data representing data information in the encrypted backup data, s representing the number of words;
determining a data inspection result according to the judgment value;
Figure FDA0003124834350000032
wherein, L is a data inspection result, M represents that the data information in the inspection data is consistent with that in the encrypted backup data, N represents that the data information in the inspection data is inconsistent with that in the encrypted backup data, and sgn is a sign function;
and when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing the data backup of the database, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for carrying out the backup again.
6. A remote database data backup device based on real-time encryption is characterized by comprising: the system comprises a data monitoring module, a data processing module, a communication transmission module and a backup checking module;
the data monitoring module is used for monitoring the database, judging whether data to be backed up exist or not and obtaining a data monitoring judgment result;
the data processing module is used for acquiring data to be backed up according to the data monitoring and judging result and encrypting the data to be backed up to obtain encrypted backup data;
the communication transmission module is used for establishing communication connection between the database and a backup device according to the data monitoring and judging result and transmitting the encrypted backup data to the backup device;
and the backup checking module is used for carrying out encryption checking on the backup encrypted data after the backup device receives the backup data to obtain a data checking result, and finishing database data backup according to the data checking result.
7. The remote database data backup device according to claim 6, further comprising a backup planning module;
the backup plan making module is used for setting a backup plan so that the communication transmission module carries out communication transmission according to the backup plan when transmitting the encrypted backup data to the backup device; the backup plan includes: the data to be backed up are transmitted and backed up according to the time interval by setting the time interval, and the backup data are transmitted and backed up when the size of the backup data reaches the preset size of the backup data by setting the size threshold of the backup data.
8. The remote database data backup device according to claim 6, wherein the data processing module comprises a data obtaining unit and a data encryption unit, wherein the data obtaining unit, when obtaining the data to be backed up, comprises: an instruction generation small unit and an instruction execution small unit;
the command generation small unit is used for generating a data acquisition request command according to the data monitoring and judging result and sending the data acquisition request command;
the instruction execution small unit is used for obtaining a data log of the database according to the data acquisition request instruction and determining data to be backed up in the database according to the data log; and determining data to be backed up in the database according to the data log.
9. The remote database data backup device according to claim 8, wherein the data processing module encrypts the data to be backed up by using MD5 encryption algorithm when encrypting the data to be backed up; the data processing module comprises: the device comprises a first processing unit, a second processing unit, a grouping and blocking unit, a parameter setting unit, a loop iteration unit and an encryption output unit;
the first processing unit is used for preprocessing the data to be backed up; determining the length of target information, performing information expansion on the data to be backed up according to the length of the target information, and expanding the data to be backed up into first processing data to be backed up with the length of the target information;
the second processing unit is configured to obtain a length modulus of the data to be backed up, represent the length modulus of the data to be backed up in a 64-bit binary form, and attach the length modulus to the end of the first processing data to be backed up to obtain second processing data to be backed up;
the grouping and blocking unit is used for carrying out blocking processing on the second processing data to be backed up to obtain grouping data; the second processing data to be backed up is grouped into a plurality of sub data units with the length of 512 bits, the sub data units are sequentially stored in a plurality of registers, and the number of the sub data units in each register is the same;
the parameter setting unit is used for setting variable parameters; setting the variable parameters with the same number according to the number of the registers, wherein each variable parameter is different from each other but has the same length when the variable parameters are set;
the loop iteration unit is used for performing loop iteration operation according to the variable parameters: copying the variable parameters into new variables, and performing nonlinear function operation on n-1 variables in the new variables to obtain first operation data, wherein n is the number of the new variables; adding the first operational data to a new variable which is not subjected to nonlinear function operation to obtain second operational data; adding one of the new variables after the second operation data is shifted to the right, and replacing the new variable to obtain a cycle intermediate variable; outputting loop iteration operation result data according to the loop intermediate variable and the variable parameter;
and the encryption output unit is used for combining the data of the result of the loop iteration operation with the data in the register to obtain encrypted backup data.
The processing unit is used for preprocessing, performing expansion processing on the data to be backed up and expanding the data to be backed up to a target information length;
the encryption unit is used for encrypting the expanded data to be backed up by utilizing a Hash algorithm to obtain initial encrypted data;
the block unit is used for carrying out block processing on the initial encrypted data to obtain a plurality of initial encrypted data blocks;
and the circulating unit is used for performing circulating iteration in the plurality of initial encrypted data blocks to obtain encrypted backup data.
10. The remote database data backup device of claim 9, wherein said backup verification module comprises: the device comprises a check data calculation unit, a backup result confirmation unit and a backup result execution unit;
the verification data calculation unit is used for performing MD5 verification on the encrypted backup data, and performing hash operation on the encrypted backup data to obtain verification data;
the backup result confirmation unit is used for comparing the data information in the check data and the encrypted backup data to obtain a data check result;
the backup result execution unit is used for finishing database data backup according to the data inspection result; and when the data inspection result is that the data information in the inspection data is consistent with the data information in the encrypted backup data, finishing the data backup of the database, and when the data inspection result is that the data information in the inspection data is inconsistent with the data information in the encrypted backup data, reacquiring the data to be backed up for carrying out the backup again.
CN202110686325.XA 2021-06-21 2021-06-21 Database data remote backup method and device based on real-time encryption Active CN113342575B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110686325.XA CN113342575B (en) 2021-06-21 2021-06-21 Database data remote backup method and device based on real-time encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110686325.XA CN113342575B (en) 2021-06-21 2021-06-21 Database data remote backup method and device based on real-time encryption

Publications (2)

Publication Number Publication Date
CN113342575A true CN113342575A (en) 2021-09-03
CN113342575B CN113342575B (en) 2022-11-01

Family

ID=77477845

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110686325.XA Active CN113342575B (en) 2021-06-21 2021-06-21 Database data remote backup method and device based on real-time encryption

Country Status (1)

Country Link
CN (1) CN113342575B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008204036A (en) * 2007-02-19 2008-09-04 Worldsky Inc Remote backup system
CN106648974A (en) * 2016-11-16 2017-05-10 广东欧珀移动通信有限公司 Data backup method and mobile terminal
CN107454161A (en) * 2017-07-31 2017-12-08 郑州云海信息技术有限公司 A kind of data back up method and device
CN108628706A (en) * 2018-05-02 2018-10-09 北京新桥信通科技股份有限公司 Method, apparatus, system and the storage medium of data backup
CN111079720A (en) * 2020-01-20 2020-04-28 杭州英歌智达科技有限公司 Face recognition method based on cluster analysis and autonomous relearning

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008204036A (en) * 2007-02-19 2008-09-04 Worldsky Inc Remote backup system
CN106648974A (en) * 2016-11-16 2017-05-10 广东欧珀移动通信有限公司 Data backup method and mobile terminal
CN107454161A (en) * 2017-07-31 2017-12-08 郑州云海信息技术有限公司 A kind of data back up method and device
CN108628706A (en) * 2018-05-02 2018-10-09 北京新桥信通科技股份有限公司 Method, apparatus, system and the storage medium of data backup
CN111079720A (en) * 2020-01-20 2020-04-28 杭州英歌智达科技有限公司 Face recognition method based on cluster analysis and autonomous relearning

Also Published As

Publication number Publication date
CN113342575B (en) 2022-11-01

Similar Documents

Publication Publication Date Title
CN111199346B (en) Utility tunnel supervision method, device, computer equipment and storage medium
CN106874483A (en) A kind of device and method of the patterned quality of data evaluation and test based on big data technology
CN111475324A (en) Log information analysis method and device, computer equipment and storage medium
CN104216825A (en) Problem locating method and system
CN102402470A (en) Method and device for automatically correcting error of program of flash memory and repairing program of flash memory
CN118313812A (en) Electric power big data acquisition and processing method based on machine learning
CN108876363A (en) A kind of cross-border supervision reporting system based on double-strand framework block chain
CN113342575B (en) Database data remote backup method and device based on real-time encryption
CN118138352A (en) Multi-dimensional data safety transmission method and system based on Internet of things
CN116485212B (en) Safe operation management method and system for rail transit power supply equipment
CN113946492A (en) Intelligent operation and maintenance method, device, equipment and storage medium
CN117592693A (en) Power grid dispatching method, system, device, computer equipment and storage medium
CN117076886A (en) Petrochemical pipe gallery data analysis and decision system and operation method thereof
CN116737736A (en) Data consistency checking and repairing method, device, equipment, medium and product
CN116523722A (en) Environment monitoring analysis system with machine learning capability
KR101429738B1 (en) Apparatus for monitoring and controlling environment foundational facilities
CN115001700B (en) Ecological environment supervision method and system based on blockchain
CN110225047B (en) Work monitoring method and device, computer equipment and storage medium
CN114877943A (en) Ecological environment monitoring device based on block chain
CN114584370A (en) Server data interaction network security system
CN113919001A (en) Data quality verification method based on efficient Hash algorithm in cloud environment
CN112181998A (en) Railway monitoring data transmission system
CN113434851A (en) Key management method and system based on data acquisition
CN108121513B (en) A kind of data destruction method and system
CN106203099A (en) A kind of guard method of hardware supported embedded system program cue mark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant