CN113641662B - Credit database migration verification method - Google Patents

Credit database migration verification method Download PDF

Info

Publication number
CN113641662B
CN113641662B CN202111208087.8A CN202111208087A CN113641662B CN 113641662 B CN113641662 B CN 113641662B CN 202111208087 A CN202111208087 A CN 202111208087A CN 113641662 B CN113641662 B CN 113641662B
Authority
CN
China
Prior art keywords
data
migration
database
node
creation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111208087.8A
Other languages
Chinese (zh)
Other versions
CN113641662A (en
Inventor
曾维仲
林宁
宋京
刘艺彬
陈孚
区旸
区奕宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China ComService Construction Co Ltd
Original Assignee
China ComService Construction Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China ComService Construction Co Ltd filed Critical China ComService Construction Co Ltd
Priority to CN202111208087.8A priority Critical patent/CN113641662B/en
Publication of CN113641662A publication Critical patent/CN113641662A/en
Application granted granted Critical
Publication of CN113641662B publication Critical patent/CN113641662B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/214Database migration support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for verifying the migration of a trusted database, which relates to the technical field of computers, wherein a first migration node, a second migration node and a third migration node are respectively arranged in a transition path, the first migration nodes on all the migration paths are communicated, the second migration nodes on all the migration paths are communicated, the third migration nodes on all the migration paths are communicated, then in the process of migrating data, when the data reaches the first migration node, the second migration node or the third migration node, the data is backed up and verified, when the data is missing, the migration nodes on other migration paths are reselected, thereby ensuring the smooth migration of the data, the data is verified by the migration paths, and when the data is missing, the migration paths are immediately replaced, thereby ensuring the smooth migration of the data, meanwhile, the defect that the data can be found to have missing condition after the data is migrated can be avoided.

Description

Credit database migration verification method
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a trust and creation database migration and verification method.
Background
With the great development of enterprises, when the existing database cannot meet the requirement of business development, the requirement of database migration exists, namely, data is transferred from the original database to a new database. Wherein, the original database and the new database may be located in two machine rooms in different regions. In the process of data migration, because the service is continuous, that is, there are no storage requests of new data and no reading requests of data in the database, the data generated by the service also needs to be migrated from the old database to the new database during the period;
in the prior art, data loss often occurs during migration of a database, so that the integrity of the data cannot be guaranteed, and the data loss can be found only after the data migration is performed, so that the data cannot be retrieved.
Disclosure of Invention
The invention aims to provide a trust and creation database migration and verification method.
The purpose of the invention can be realized by the following technical scheme: a trust and creation database migration checking method comprises the following steps:
the method comprises the following steps: reading all data in the information creating database, acquiring basic information of the data, and setting a data tag for each piece of data;
step two: processing the read data, encrypting the trusted database by an MD5 algorithm, and generating a first encryption value;
step three: selecting a migration path and a target database, and implementing blocking protection on the selected migration path;
step four: in the data migration process, the migrated data is verified, then the complete migration of the data is completed, and the migrated data is encrypted through the MD5 algorithm, so that a second encryption value is obtained.
Further, the process of reading the basic information of all the data in the creation database comprises: setting a data label library, creating a plurality of data labels in the data label library, and setting a retrieval serial number according to each data label; reading all data in the information creating database, and endowing the data with corresponding data labels according to the characteristics of each data; establishing a credit creation database corresponding to the data tag according to the data tag, and importing the data into the corresponding credit creation database through the retrieval serial number; and marking the credit creation database with saturated capacity, and acquiring the size of each data in the credit creation database.
Further, the process of processing the read data includes: marking the size of each data in the credit creation database with saturated capacity, and calculating to obtain the total value of all data sizes in the credit creation database; and reading the size of the credit creation database, and comparing the size of the credit creation database with the total value of all data sizes in the credit creation database to obtain a data tolerance value.
Furthermore, the capacity of the information creating database is a fixed value, and when the number of data in the information creating database does not reach saturation, a plurality of filling data streams are generated in the information creating database, and the number of the filling data streams is recorded, so that the number of data in the information creating database reaches saturation.
Further, the process of encrypting the trusted database by the MD5 algorithm includes: marking the credit creation databases in the credit creation database, and acquiring the retrieval serial number of each credit creation database; generating a first binary code group according to the retrieval serial number of the credit database; marking each data in the innovation database, and randomly generating an independent code; generating a second binary code group according to the data tolerance value of the credit creation data sub-database; and generating a first encryption code group according to the first binary code group, the second binary code group and the independent codes, then generating a first encryption value, and binding the first encryption value and the first encryption code group.
Further, the process of blocking and protecting the migration path includes: selecting all corresponding migration paths according to the data labels of the information creation database, and marking the selected migration paths; respectively setting a first migration node, a second migration node and a third migration node in each migration path; communicating the first migration nodes on all migration paths, communicating the second migration nodes on all migration paths, and communicating the third migration nodes on all migration paths; and implementing unidirectional blocking protection on all the first migration node, the second migration node and the third migration node.
Further, the migration process of the data is as follows: the data in the original trust creation database is backed up, the backed-up trust creation database is marked as first backup data, and then the data in the original trust creation database is migrated to a first migration node; after the data in the original trust creation database reaches the first migration node, verifying the data in the first migration node, after the verification is successful, removing the first backup data, simultaneously backing up the data in the original trust creation database in the first migration node to generate second backup data, and then migrating the data in the original trust creation database to the second migration node; after the data in the original trust creation database reaches the second migration node, verifying the data in the second migration node, after the verification is successful, removing the second backup data, simultaneously backing up the data in the original trust creation database in the second migration node to generate third backup data, and then migrating the data in the original trust creation database to the third migration node; and after the data in the original trust creation database reaches the third migration node, verifying the data in the third migration node, clearing the third backup data after the verification is successful, and then migrating the data in the original trust creation database to the target database.
Further, the process of verifying the data includes: marking all the credit creation databases arriving at the first migration node, and obtaining corresponding retrieval serial numbers; matching the obtained retrieval serial number with the retrieval serial numbers corresponding to all the credit creation data sub-databases in the first backup data, and judging whether the credit creation data sub-databases are missing or not; when the information creating database is not missing, all the information creating database is migrated to a second migration node; and when the created data sub-database is missing, judging that the data is missing in the migration process, clearing all the data in the first migration node, and reselecting the migration path.
Further, after the data are migrated into the target database, encrypting the data in the target database through an MD5 algorithm, wherein the encryption process is consistent with the process of encrypting the trusted database, obtaining a second encryption value, comparing whether the first encryption value is consistent with the second encryption value, when the first encryption value is consistent with the second encryption value, indicating that the data are completely migrated, and when the first encryption value is greater than the second encryption value, indicating that the data are missing in the data migration process; and when the first encryption value is smaller than the second encryption value, judging that illegal data enter in the data migration process, verifying and checking independent codes of each piece of data to determine the position of the illegal data, and clearing the illegal data.
The invention has the beneficial effects that: by respectively setting a first migration node, a second migration node and a third migration node in the migration path, the first migration nodes on all migration paths are communicated, the second migration nodes on all migration paths are communicated, the third migration nodes on all migration paths are communicated, then, in the process of data migration, when the data arrives in the first migration node, the second migration node or the third migration node, the data is backed up and checked, when the data is missing, the migration nodes on other migration paths are reselected, thereby ensuring the smooth migration of data, checking the data in the migration path, and immediately replacing the migration path when the data is missing, therefore, smooth migration of the data is guaranteed, and the defect that the data is lost after the data is migrated can be avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic block diagram of a trust and creation database migration and verification method.
Detailed Description
As shown in fig. 1, a trust creation database migration verification method includes the following steps:
the method comprises the following steps: reading all data in the information creating database, acquiring basic information of the data, and setting a data tag for each piece of data;
step two: processing the read data, encrypting the trusted database by an MD5 algorithm, and generating a first encryption value;
step three: selecting a migration path and a target database, and implementing blocking protection on the selected migration path;
step four: in the data migration process, the migrated data is verified, then the complete migration of the data is completed, and the migrated data is encrypted through the MD5 algorithm, so that a second encryption value is obtained.
It should be further noted that, in the implementation process, the specific process of reading the basic information of all the data in the creation database includes the following steps:
step S1: setting a data label library, creating a plurality of data labels in the data label library, and setting a retrieval serial number according to each data label; it is further noted that, in the implementation process, the data tag includes a base tag, an encryption tag, an urgency tag, and compressed data;
step S2: reading all data in the information creating database, and endowing the data with corresponding data labels according to the characteristics of each data;
step S3: establishing a credit creation database corresponding to the data tag according to the data tag, and importing the data into the corresponding credit creation database through the retrieval serial number; it should be further noted that, in the specific implementation process, the capacity in the creation database is fixed, that is, the number of data that can be accommodated by the creation database is fixed, and after the data is imported into the creation database and the capacity of the creation database reaches saturation, a creation database corresponding to the data tag is established again, and the creation database with the saturated capacity is sealed;
step S4: and marking the credit creation database with saturated capacity, and acquiring the size of each data in the credit creation database.
It should be further explained that, in the specific implementation process, after the data in the creation database is read, the read data is processed, and the specific processing process includes the following steps:
step C1: marking the size of each data in the credit creation database with saturated capacity, and calculating to obtain the total value of all data sizes in the credit creation database;
step C2: reading the size of the credit creation database, and comparing the size of the credit creation database with the total value of all data sizes in the credit creation database to obtain a data tolerance value;
step C3: marking the data tolerance value and the data quantity in the credit creation data sub-library, and then encrypting through an MD5 algorithm;
it should be further noted that, in the specific implementation process, the capacity of the creation data sub-library is a fixed value, and when the number of data in the creation data sub-library does not reach saturation, a plurality of padding data streams are generated in the creation data sub-library, and the number of the padding data streams is recorded, so that the number of data in the creation data sub-library reaches saturation, and the size of each padding data stream is consistent.
The process of encrypting the trusted database by the MD5 algorithm specifically comprises the following steps:
step M1: marking the credit creation databases in the credit creation database, and acquiring the retrieval serial number of each credit creation database;
step M2: generating a first binary code group according to the retrieval serial number of the credit database;
step M3: marking each data in the innovation database, and randomly generating an independent code; it should be further noted that, in the specific implementation process, uniqueness exists between each independent code, and the independent codes may be numbers, letters, or a combination of numbers and letters, and when the independent codes are numbers, they are not 00; when the credit database contains the filling data stream, the independent codes of the filling data stream are 00;
step M4: generating a second binary code group according to the data tolerance value of the credit creation data sub-database;
step M5: and taking the first binary code group as the start and the second binary code group as the end, randomly sequencing the independent codes between the first binary code group and the second binary code group to obtain a first encryption code group, generating a first encryption value, and binding the first encryption value and the first encryption code group to finish the encryption of the trusted data bank.
It should be further explained that, in the specific implementation process, after the data in each innovation database is encrypted, a corresponding migration path is selected according to the data tag corresponding to the innovation database, and in the data migration process, blocking protection is performed on the migration path, and the specific process includes the following steps:
step Q1: selecting all corresponding migration paths according to the data labels of the information creation database, and marking the selected migration paths;
step Q2: respectively setting a first migration node, a second migration node and a third migration node in each migration path;
step Q3: communicating the first migration nodes on all migration paths, communicating the second migration nodes on all migration paths, and communicating the third migration nodes on all migration paths;
step Q4: and implementing unidirectional blocking protection on all the first migration node, the second migration node and the third migration node.
It should be further explained that, in the specific implementation process, the specific contents of the unidirectional blocking protection are as follows: data in the trusted database needs to sequentially pass through a first migration node, a second migration node and a third migration node in a migration path, and the specific migration process of the data is as follows:
step Y1: the data in the original trust creation database is backed up, the backed-up trust creation database is marked as first backup data, and then the data in the original trust creation database is migrated to a first migration node;
step Y2: after the data in the original information creation database reaches the first migration node, the data is verified in the first migration node, and the specific verification process comprises the following steps:
step Y21: marking all the credit creation databases arriving at the first migration node, and obtaining corresponding retrieval serial numbers;
step Y22: matching the obtained retrieval serial number with the retrieval serial numbers corresponding to all the credit creation data sub-databases in the first backup data, and judging whether the credit creation data sub-databases are missing or not;
step Y23: when the information creating database is not missing, all the information creating database is migrated to a second migration node; when the trusted data sub-database is missing, judging that the data is missing in the migration process, clearing all the data in the first migration node, and reselecting a migration path;
step Y3: after the verification is successful, the first backup data is removed, meanwhile, the data in the original message creation database is backed up in the first migration node to generate second backup data, and then the data in the original message creation database is migrated to the second migration node;
step Y4: after the data in the original trust database reach the second migration node, verifying the data in the second migration node, wherein the verification process is the steps Y21-Y23;
step Y5: after the verification is successful, the second backup data is removed, meanwhile, the data in the original message creation database is backed up in the second migration node to generate third backup data, and then the data in the original message creation database is migrated to the third migration node;
step Y6: after the data in the original trust database reaches the third migration node, verifying the data in the third migration node, wherein the verification process is the steps Y21-Y23;
step Y7: and after the verification is successful, clearing the third backup data, and then migrating the data in the original information and creation database to the target database.
It should be further explained that, when the created database is located in the second migration node and there is no deletion, all created databases are migrated to the third migration node; when the credit creation database is missing, judging that the data is missing in the migration process, clearing all the data in the second migration node, and sending the data in the original credit creation database in the first migration node to the second migration node on the other migration path;
when the credit creation database is located in the third migration node and is not missing, migrating all the credit creation databases to the target database; and when the original trust database in the second migration node is lost, judging that the data is lost in the migration process, clearing all the data in the third migration node, and sending the data in the original trust database in the second migration node to the third migration node on the other migration path.
In a specific implementation process, after data are migrated into a target database, encrypting the data in the target database through an MD5 algorithm, wherein the encryption process is consistent with the encryption process of the trusted database, obtaining a second encryption value, comparing whether a first encryption value is consistent with the second encryption value, when the first encryption value is consistent with the second encryption value, indicating that the data are completely migrated, and when the first encryption value is greater than the second encryption value, indicating that data are missing in the data migration process; and when the first encryption value is smaller than the second encryption value, judging that illegal data enter in the data migration process, verifying and checking independent codes of each piece of data to determine the position of the illegal data, and clearing the illegal data.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and there may be other divisions when the actual implementation is performed; the modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the method of the embodiment.
Finally, it should be noted that the above examples are only intended to illustrate the technical process of the present invention and not to limit the same, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical process of the present invention without departing from the spirit and scope of the technical process of the present invention.

Claims (4)

1. A trust and creation database migration verification method is characterized by comprising the following steps:
the method comprises the following steps: reading all data in the information creating database, acquiring basic information of the data, and setting a data tag for each piece of data;
step two: processing the read data, encrypting the trusted database by an MD5 algorithm, and generating a first encryption value;
step three: selecting a migration path and a target database, and implementing blocking protection on the selected migration path;
step four: in the data migration process, verifying the migrated data, then completing the complete migration of the data, and encrypting the migrated data through an MD5 algorithm to obtain a second encryption value;
the process of encrypting the trusted database by the MD5 algorithm comprises the following steps: marking the credit creation databases in the credit creation database, and acquiring the retrieval serial number of each credit creation database; generating a first binary code group according to the retrieval serial number of the credit database; marking each data in the innovation database, and randomly generating an independent code; generating a second binary code group according to the data tolerance value of the credit creation data sub-database; generating a first encryption code group according to the first binary code group, the second binary code group and the independent codes, then generating a first encryption value, and binding the first encryption value and the first encryption code group;
the process of blocking and protecting the migration path comprises the following steps: selecting all corresponding migration paths according to the data labels of the information creation database, and marking the selected migration paths; respectively setting a first migration node, a second migration node and a third migration node in each migration path; communicating the first migration nodes on all migration paths, communicating the second migration nodes on all migration paths, and communicating the third migration nodes on all migration paths; unidirectional blocking protection is carried out on all the first migration node, the second migration node and the third migration node;
the migration process of the data is as follows: the data in the original trust creation database is backed up, the backed-up trust creation database is marked as first backup data, and then the data in the original trust creation database is migrated to a first migration node; after the data in the original trust database reaches the first migration node, the data is verified in the first migration node, after the verification is successful, the first backup data is removed, meanwhile, second backup data is generated in the first migration node, and then the data in the original trust database is migrated to the second migration node; after the data in the original trust database reaches the second migration node, the data is verified in the second migration node, after the verification is successful, the second backup data is removed, meanwhile, third backup data is generated in the second migration node, and then the data in the original trust database is migrated to the third migration node; after the data in the original trust creation database reaches the third migration node, the data is verified in the third migration node, after the verification is successful, the third backup data is removed, and then the data in the original trust creation database is migrated to the target database;
the process of verifying the data comprises the following steps: marking all the credit creation databases arriving at the first migration node, and obtaining corresponding retrieval serial numbers; matching the obtained retrieval serial number with the retrieval serial numbers corresponding to all the credit creation data sub-databases in the first backup data, and judging whether the credit creation data sub-databases are missing or not; when the information creating database is not missing, all the information creating database is migrated to a second migration node; when the trusted data sub-database is missing, judging that the data is missing in the migration process, clearing all the data in the first migration node, and reselecting a migration path;
and after the data are migrated into the target database, encrypting the data in the target database through an MD5 algorithm to obtain a second encrypted value, and comparing whether the first encrypted value is consistent with the second encrypted value.
2. The method for verifying the migration of the trusted database as claimed in claim 1, wherein the step of reading the basic information of all the data in the trusted database comprises: setting a data label library, creating a plurality of data labels in the data label library, and setting a retrieval serial number according to each data label; reading all data in the information creating database, and endowing the data with corresponding data labels according to the characteristics of each data; establishing a credit creation database corresponding to the data tag according to the data tag, and importing the data into the corresponding credit creation database through the retrieval serial number; and marking the credit creation database with saturated capacity, and acquiring the size of each data in the credit creation database.
3. The trust and creation database migration verification method according to claim 1, wherein the process of processing the read data comprises: marking the size of each data in the credit creation database with saturated capacity, and calculating to obtain the total value of all data sizes in the credit creation database; and reading the size of the credit creation database, and comparing the size of the credit creation database with the total value of all data sizes in the credit creation database to obtain a data tolerance value.
4. The method for verifying the migration of the trusted database according to claim 3, wherein the capacity of the trusted database is a fixed value, and when the amount of data in the trusted database is not saturated, a plurality of padding data streams are generated in the trusted database, and the amount of the padding data streams is recorded, so that the amount of data in the trusted database is saturated.
CN202111208087.8A 2021-10-18 2021-10-18 Credit database migration verification method Active CN113641662B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111208087.8A CN113641662B (en) 2021-10-18 2021-10-18 Credit database migration verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111208087.8A CN113641662B (en) 2021-10-18 2021-10-18 Credit database migration verification method

Publications (2)

Publication Number Publication Date
CN113641662A CN113641662A (en) 2021-11-12
CN113641662B true CN113641662B (en) 2022-02-11

Family

ID=78427214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111208087.8A Active CN113641662B (en) 2021-10-18 2021-10-18 Credit database migration verification method

Country Status (1)

Country Link
CN (1) CN113641662B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324592A (en) * 2013-06-24 2013-09-25 华为技术有限公司 Data migration control method, data migration method and data migration device
CN105872053A (en) * 2016-03-30 2016-08-17 中国联合网络通信集团有限公司 Data migration method and system
CN106682534A (en) * 2017-01-23 2017-05-17 郑州云海信息技术有限公司 Method and device for verifying data integrity in data migration process
CN111104392A (en) * 2019-12-12 2020-05-05 京东数字科技控股有限公司 Database migration method and device, electronic equipment and storage medium
CN113392090A (en) * 2021-06-29 2021-09-14 未鲲(上海)科技服务有限公司 Data verification method, device, equipment and medium based on database migration

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324592A (en) * 2013-06-24 2013-09-25 华为技术有限公司 Data migration control method, data migration method and data migration device
CN105872053A (en) * 2016-03-30 2016-08-17 中国联合网络通信集团有限公司 Data migration method and system
CN106682534A (en) * 2017-01-23 2017-05-17 郑州云海信息技术有限公司 Method and device for verifying data integrity in data migration process
CN111104392A (en) * 2019-12-12 2020-05-05 京东数字科技控股有限公司 Database migration method and device, electronic equipment and storage medium
CN113392090A (en) * 2021-06-29 2021-09-14 未鲲(上海)科技服务有限公司 Data verification method, device, equipment and medium based on database migration

Also Published As

Publication number Publication date
CN113641662A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
CN102932336B (en) Terminal iidentification method and apparatus
CN102930230B (en) Computing equipment identification method and device
CN103034564B (en) Data disaster tolerance drilling method, data disaster tolerance practice device and system
US11321431B2 (en) Data processing, watermark embedding and watermark extraction
CN111415254B (en) IP derivative digital asset method and system based on blockchain communication
CN106951345A (en) A kind of conformance test method and device of magnetic disk of virtual machine data
CN108683502A (en) A kind of digital signature authentication method, medium and equipment
CN110018924A (en) A kind of file damage preventing method based on block chain and correcting and eleting codes
CN113377401A (en) Method and tool for packaging version file of embedded device
CN105302665A (en) Improved copy-on-write snapshot method and system
CN114860745B (en) Database expansion method based on artificial intelligence and related equipment
CN110232080B (en) Rapid retrieval method based on block chain
CN108733516A (en) Cloudy secure storage dynamic equilibrium backup method and system
CN102402470A (en) Method and device for automatically correcting error of program of flash memory and repairing program of flash memory
CN105678190A (en) Data storage auditing system
CN100386737C (en) Data recovery technique based on packet structure
CN111163126A (en) Remote backup recovery method based on Ceph distributed storage
CN113641662B (en) Credit database migration verification method
CN102624545A (en) Data backup method, data backup device, data recovery method and data recovery device of network management system
CN114218176A (en) Cross-platform data secure sharing and exchanging method
CN106294017B (en) A kind of information security back-up method
CN110555682B (en) Multi-channel implementation method based on alliance chain
CN108280097A (en) A kind of fault handling method and device of Database Systems
CN113821820B (en) Method, device, medium and equipment for encrypting and decrypting resources in splitting mode
CN109582646A (en) A kind of redundancy and restoration methods and system for file declustering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant