CN113821375A - Database backup encryption method and system - Google Patents
Database backup encryption method and system Download PDFInfo
- Publication number
- CN113821375A CN113821375A CN202010999013.XA CN202010999013A CN113821375A CN 113821375 A CN113821375 A CN 113821375A CN 202010999013 A CN202010999013 A CN 202010999013A CN 113821375 A CN113821375 A CN 113821375A
- Authority
- CN
- China
- Prior art keywords
- backup
- encryption
- element list
- field distribution
- encryption element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention provides a database backup encryption method and a database backup encryption system, backup editing information of a database to be backed up is obtained according to a received backup encryption instruction of a target database to be backed up, the backup editing information is divided into a backup encryption element list and a non-backup encryption element list, then based on the distribution of the backup encryption element list and the non-backup encryption element list, first encryption field distribution corresponding to the backup encryption element list and second encryption field distribution corresponding to the non-backup encryption element list are determined, then according to the first encryption field distribution and the second encryption field distribution, a target backup encryption element replacing the non-backup encryption element list is determined from the backup encryption element list, and the backup editing information is optimized by utilizing the backup encryption element list and the target backup encryption element. Therefore, the distribution condition of the encrypted fields can be automatically and dynamically determined according to the backup editing information of the database to be backed up without the complicated interaction of a user, and the flow in the backup encryption process can be quickly positioned.
Description
Technical Field
The invention relates to the technical field of database management, in particular to a database backup encryption method and a database backup encryption system.
Background
At present, a backup encryption mode for a database to be backed up generally stores backup editing information, and then tracks and queries encryption information after finding an encryption instruction reported by a user so as to maintain a backup encryption process of the database to be backed up in a targeted manner. However, the above method often requires tedious interaction of the user, and cannot automatically and dynamically determine the distribution of the encrypted fields according to the backup editing information of the database to be backed up, so that it is difficult to quickly locate the process in the backup encryption process, which results in poor user experience.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a database backup encryption method and system, which can automatically and dynamically determine the distribution of encrypted fields according to backup editing information of a database to be backed up without complicated interaction of a user, so as to quickly locate a process in a backup encryption process.
According to an aspect of the embodiments of the present invention, there is provided a database backup encryption method, applied to a server, where the server is in communication connection with a database to be backed up, the method including:
when a backup encryption instruction for a target database to be backed up is received, acquiring backup editing information of the database to be backed up according to the backup encryption instruction, and dividing the backup editing information into a backup encryption element list and a non-backup encryption element list;
determining a first encryption field distribution corresponding to the backup encryption element list and a second encryption field distribution corresponding to the non-backup encryption element list based on the distribution of the backup encryption element list and the non-backup encryption element list;
and according to the first encryption field distribution and the second encryption field distribution, determining a target backup encryption element replacing the non-backup encryption element list from the backup encryption element list, and optimizing the backup editing information by using the backup encryption element list and the target backup encryption element to obtain optimized backup editing information and store the optimized backup editing information in a backup encryption script of the target database to be backed up.
In one possible example, the step of determining the first encryption field distribution corresponding to the backup encryption element list and the second encryption field distribution corresponding to the non-backup encryption element list based on the distributions of the backup encryption element list and the non-backup encryption element list includes:
calculating the proportion of the non-backup encryption element list in a backup editing node list of the backup editing information based on the distribution of the backup encryption element list and the non-backup encryption element list;
and when the ratio is greater than or equal to a preset threshold value, calculating the first encryption field distribution and the second encryption field distribution.
In one possible example, the method further comprises:
and when the proportion is smaller than the preset threshold value, optimizing the backup editing information by using the backup encryption element list to obtain the optimized backup editing information and storing the optimized backup editing information in a backup encryption script of the target database to be backed up.
In one possible example, the step of determining the target backup encryption element from the list of backup encryption elements to replace the list of non-backup encryption elements according to the first distribution of encryption fields and the second distribution of encryption fields includes:
obtaining an extended backup editing node of the backup encryption element list according to the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and calculating a fusion value according to the first encryption field distribution, the expanded backup editing node and the proportion, and determining the target backup encryption element replacing the non-backup encryption element list from the backup encryption element list.
In a possible example, the step of obtaining the extended backup edit node of the backup encrypted element list according to the first encrypted field distribution, the second encrypted field distribution, and the backup encrypted element list includes:
calculating the node type ratio of the first encryption field distribution, the second encryption field distribution and the backup encryption element list to obtain a backup editing node distribution map containing the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and obtaining the extended backup editing node on the backup editing node distribution map according to the intersection point of the connecting line of the first encryption field distribution and the second encryption field distribution and the backup editing node of the backup encryption element list.
According to another aspect of the embodiments of the present invention, there is provided a database backup encryption system, applied to a server, where the server is in communication connection with a database to be backed up, and the system includes:
the acquisition module is used for acquiring backup editing information of the database to be backed up according to a backup encryption instruction when the backup encryption instruction of the target database to be backed up is received, and dividing the backup editing information into a backup encryption element list and a non-backup encryption element list;
a first determining module, configured to determine, based on the distribution of the backup encryption element list and the non-backup encryption element list, a first encryption field distribution corresponding to the backup encryption element list and a second encryption field distribution corresponding to the non-backup encryption element list;
and the second determining module is used for determining a target backup encryption element replacing the non-backup encryption element list from the backup encryption element list according to the first encryption field distribution and the second encryption field distribution, optimizing the backup editing information by using the backup encryption element list and the target backup encryption element to obtain optimized backup editing information and storing the optimized backup editing information in a backup encryption script of the target database to be backed up.
According to another aspect of the embodiments of the present invention, there is provided a readable storage medium, on which a computer program is stored, which when executed by a processor can perform the steps of the database backup encryption method described above.
Compared with the prior art, the database backup encryption method and system provided by the embodiment of the invention, acquiring backup editing information of a target database to be backed up according to a received backup encryption instruction of the target database to be backed up, dividing the backup editing information into a backup encryption element list and a non-backup encryption element list, then, based on the distribution of the backup encryption element list and the non-backup encryption element list, determining a first encryption field distribution corresponding to the backup encryption element list and a second encryption field distribution corresponding to the non-backup encryption element list, then, according to the first encryption field distribution and the second encryption field distribution, a target backup encryption element replacing the non-backup encryption element list is determined from the backup encryption element list, and optimizing the backup editing information by using the backup encryption element list and the target backup encryption element. Therefore, the distribution condition of the encrypted fields can be automatically and dynamically determined according to the backup editing information of the database to be backed up without the complicated interaction of a user, and the flow in the backup encryption process can be quickly positioned.
In order to make the aforementioned objects, features and advantages of the embodiments of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
FIG. 1 illustrates a component diagram of a server provided by an embodiment of the invention;
FIG. 2 is a flow chart illustrating a database backup encryption method according to an embodiment of the present invention;
fig. 3 shows a functional block diagram of a database backup encryption system according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood by the scholars in the technical field, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Fig. 1 shows an exemplary component schematic of a server 100. The server 100 may include one or more processors 104, such as one or more Central Processing Units (CPUs), each of which may implement one or more hardware threads. The server 100 may also include any storage media 106 for storing any kind of information, such as code, settings, data, etc. For example, and without limitation, storage medium 106 may include any one or more of the following in combination: any type of RAM, any type of ROM, flash memory devices, hard disks, optical disks, etc. More generally, any storage medium may use any technology to store information. Further, any storage medium may provide volatile or non-volatile retention of information. Further, any storage medium may represent a fixed or removable component of server 100. In one case, when the processor 104 executes the associated instructions stored in any storage medium or combination of storage media, the server 100 may perform any of the operations of the associated instructions. The server 100 further comprises one or more drive units 108 for interacting with any storage medium, such as a hard disk drive unit, an optical disk drive unit, etc.
The server 100 also includes input/output 110 (I/O) for receiving various inputs (via input unit 112) and for providing various outputs (via output unit 114)). One particular output mechanism may include a presentation device 116 and an associated Graphical User Interface (GUI) 118. The server 100 may also include one or more network interfaces 120 for exchanging data with other devices via one or more communication units 122. One or more communication buses 124 couple the above-described components together.
The communication unit 122 may be implemented in any manner, such as over a local area network, a wide area network (e.g., the internet), a point-to-point connection, etc., or any combination thereof. The communication unit 122 may include any combination of hardwired links, wireless links, routers, gateway functions, name servers 100, and so forth, governed by any protocol or combination of protocols.
Fig. 2 is a flowchart illustrating a database backup encryption method according to an embodiment of the present invention, which may be executed by the server 100 shown in fig. 1, and details of the database backup encryption method are described as follows.
Step S110, when a backup encryption instruction for a target database to be backed up is received, acquiring backup editing information of the database to be backed up according to the backup encryption instruction, and dividing the backup editing information into a backup encryption element list and a non-backup encryption element list;
step S120, based on the distribution of the backup encryption element list and the non-backup encryption element list, determining the distribution of a first encryption field corresponding to the backup encryption element list and the distribution of a second encryption field corresponding to the non-backup encryption element list;
step S130, according to the first encrypted field distribution and the second encrypted field distribution, determining a target backup encrypted element that replaces the non-backup encrypted element list from the backup encrypted element list, and optimizing the backup editing information by using the backup encrypted element list and the target backup encrypted element to obtain optimized backup editing information and store the optimized backup editing information in a backup encrypted script of the target database to be backed up.
Based on the above steps, this embodiment obtains backup editing information of the database to be backed up according to the received backup encryption instruction for the target database to be backed up, divides the backup editing information into a backup encryption element list and a non-backup encryption element list, then determines a first encryption field distribution corresponding to the backup encryption element list and a second encryption field distribution corresponding to the non-backup encryption element list based on the distributions of the backup encryption element list and the non-backup encryption element list, then determines a target backup encryption element replacing the non-backup encryption element list from the backup encryption element list according to the first encryption field distribution and the second encryption field distribution, and performs optimization processing on the backup editing information by using the backup encryption element list and the target backup encryption element. Therefore, the distribution condition of the encrypted fields can be automatically and dynamically determined according to the backup editing information of the database to be backed up without the complicated interaction of a user, and the flow in the backup encryption process can be quickly positioned.
In one possible example, for step S120, the present embodiment may calculate a ratio of the non-backup encryption element list to a backup editing node list of the backup editing information based on the backup encryption element list and the distribution of the non-backup encryption element list, and when the ratio is greater than or equal to a preset threshold, calculate the first encryption field distribution and the second encryption field distribution.
For another example, when the ratio is smaller than the preset threshold, the backup encryption element list is used to optimize the backup editing information, so as to obtain optimized backup editing information, and the optimized backup editing information is stored in the backup encryption script of the target database to be backed up.
In a possible example, for step S130, this embodiment may obtain an extended backup edit node of the backup encryption element list according to the first encryption field distribution, the second encryption field distribution, and the backup encryption element list, then perform fusion value calculation according to the first encryption field distribution, the extended backup edit node, and the ratio, and determine the target backup encryption element that replaces the non-backup encryption element list from the backup encryption element list.
For example, in a possible example, the present embodiment may perform node type ratio calculation on the first encrypted field distribution, the second encrypted field distribution, and the backup encrypted element list to obtain a backup editing node distribution map including the first encrypted field distribution, the second encrypted field distribution, and the backup encrypted element list, and then obtain the extended backup editing node on the backup editing node distribution map according to an intersection point of a connection line between the first encrypted field distribution and the second encrypted field distribution and a backup editing node of the backup encrypted element list.
Fig. 3 is a functional block diagram of a database backup encryption system 200 according to an embodiment of the present invention, where the functions implemented by the database backup encryption system 200 may correspond to the steps executed by the foregoing method. The database backup encryption system 200 may be understood as the server 100 or a processor of the server 100, or may be understood as a component that is independent from the server 100 or the processor and implements the functions of the present invention under the control of the server 100, as shown in fig. 3, and the functions of the functional modules of the database backup encryption system 200 are described in detail below.
The obtaining module 210 is configured to, when a backup encryption instruction for a target database to be backed up is received, obtain backup editing information of the database to be backed up according to the backup encryption instruction, and divide the backup editing information into a backup encryption element list and a non-backup encryption element list;
a first determining module 220, configured to determine, based on the distribution of the backup encrypted element list and the non-backup encrypted element list, a first encrypted field distribution corresponding to the backup encrypted element list and a second encrypted field distribution corresponding to the non-backup encrypted element list;
a second determining module 230, configured to determine, according to the first encryption field distribution and the second encryption field distribution, a target backup encryption element that replaces the non-backup encryption element list from the backup encryption element list, and optimize the backup editing information by using the backup encryption element list and the target backup encryption element, to obtain optimized backup editing information, and store the optimized backup editing information in a backup encryption script of the target database to be backed up.
In one possible example, the first determining module 210 is configured to determine the first distribution of encrypted fields corresponding to the list of backup encrypted elements and the second distribution of encrypted fields corresponding to the list of non-backup encrypted elements by:
calculating the proportion of the non-backup encryption element list in a backup editing node list of the backup editing information based on the distribution of the backup encryption element list and the non-backup encryption element list;
and when the ratio is greater than or equal to a preset threshold value, calculating the first encryption field distribution and the second encryption field distribution.
In a possible example, the first determining module 210 is further configured to, when the ratio is smaller than the preset threshold, perform optimization processing on the backup editing information by using the backup encryption element list, to obtain optimized backup editing information, and store the optimized backup editing information in a backup encryption script of the target database to be backed up.
In one possible example, the second determining module 230 is specifically configured to determine the target backup cryptographic element from the list of backup cryptographic elements in place of the list of non-backup cryptographic elements by:
obtaining an extended backup editing node of the backup encryption element list according to the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and calculating a fusion value according to the first encryption field distribution, the expanded backup editing node and the proportion, and determining the target backup encryption element replacing the non-backup encryption element list from the backup encryption element list.
In a possible example, the second determining module 230 is specifically configured to obtain the extended backup editing node of the backup encrypted element list by:
calculating the node type ratio of the first encryption field distribution, the second encryption field distribution and the backup encryption element list to obtain a backup editing node distribution map containing the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and obtaining the extended backup editing node on the backup editing node distribution map according to the intersection point of the connecting line of the first encryption field distribution and the second encryption field distribution and the backup editing node of the backup encryption element list.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
Alternatively, all or part of the implementation may be in software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any drawing credit or debit acknowledgement in the claims should not be construed as limiting the claim concerned.
Claims (10)
1. A database backup encryption method is applied to a server, the server is in communication connection with a database to be backed up, and the method comprises the following steps:
when a backup encryption instruction for a target database to be backed up is received, acquiring backup editing information of the database to be backed up according to the backup encryption instruction, and dividing the backup editing information into a backup encryption element list and a non-backup encryption element list;
determining a first encryption field distribution corresponding to the backup encryption element list and a second encryption field distribution corresponding to the non-backup encryption element list based on the distribution of the backup encryption element list and the non-backup encryption element list;
and according to the first encryption field distribution and the second encryption field distribution, determining a target backup encryption element replacing the non-backup encryption element list from the backup encryption element list, and optimizing the backup editing information by using the backup encryption element list and the target backup encryption element to obtain optimized backup editing information and store the optimized backup editing information in a backup encryption script of the target database to be backed up.
2. The database backup encryption method according to claim 1, wherein the step of determining the first encryption field distribution corresponding to the backup encryption element list and the second encryption field distribution corresponding to the non-backup encryption element list based on the distribution of the backup encryption element list and the non-backup encryption element list comprises:
calculating the proportion of the non-backup encryption element list in a backup editing node list of the backup editing information based on the distribution of the backup encryption element list and the non-backup encryption element list;
and when the ratio is greater than or equal to a preset threshold value, calculating the first encryption field distribution and the second encryption field distribution.
3. The database backup encryption method of claim 2, wherein the method further comprises:
and when the proportion is smaller than the preset threshold value, optimizing the backup editing information by using the backup encryption element list to obtain the optimized backup editing information and storing the optimized backup editing information in a backup encryption script of the target database to be backed up.
4. The database backup encryption method according to claim 1, wherein the step of determining the target backup encryption element from the backup encryption element list in place of the non-backup encryption element list according to the first encryption field distribution and the second encryption field distribution comprises:
obtaining an extended backup editing node of the backup encryption element list according to the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and calculating a fusion value according to the first encryption field distribution, the expanded backup editing node and the proportion, and determining the target backup encryption element replacing the non-backup encryption element list from the backup encryption element list.
5. The database backup encryption method according to claim 4, wherein the step of obtaining the extended backup edit node of the backup encryption element list according to the first encryption field distribution, the second encryption field distribution, and the backup encryption element list includes:
calculating the node type ratio of the first encryption field distribution, the second encryption field distribution and the backup encryption element list to obtain a backup editing node distribution map containing the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and obtaining the extended backup editing node on the backup editing node distribution map according to the intersection point of the connecting line of the first encryption field distribution and the second encryption field distribution and the backup editing node of the backup encryption element list.
6. A database backup encryption system, applied to a server, wherein the server is in communication connection with a database to be backed up, the system comprising:
the acquisition module is used for acquiring backup editing information of the database to be backed up according to a backup encryption instruction when the backup encryption instruction of the target database to be backed up is received, and dividing the backup editing information into a backup encryption element list and a non-backup encryption element list;
a first determining module, configured to determine, based on the distribution of the backup encryption element list and the non-backup encryption element list, a first encryption field distribution corresponding to the backup encryption element list and a second encryption field distribution corresponding to the non-backup encryption element list;
and the second determining module is used for determining a target backup encryption element replacing the non-backup encryption element list from the backup encryption element list according to the first encryption field distribution and the second encryption field distribution, optimizing the backup editing information by using the backup encryption element list and the target backup encryption element to obtain optimized backup editing information and storing the optimized backup editing information in a backup encryption script of the target database to be backed up.
7. The database backup encryption system of claim 6, wherein the first determination module is configured to determine the first distribution of encrypted fields corresponding to the list of backup encrypted elements and the second distribution of encrypted fields corresponding to the list of non-backup encrypted elements by:
calculating the proportion of the non-backup encryption element list in a backup editing node list of the backup editing information based on the distribution of the backup encryption element list and the non-backup encryption element list;
and when the ratio is greater than or equal to a preset threshold value, calculating the first encryption field distribution and the second encryption field distribution.
8. The database backup encryption system according to claim 8, wherein the first determining module is further configured to, when the ratio is smaller than the preset threshold, perform optimization processing on the backup editing information by using the backup encryption element list, obtain optimized backup editing information, and store the optimized backup editing information in the backup encryption script of the target database to be backed up.
9. The database backup encryption system according to claim 6, wherein the second determining module is specifically configured to determine the target backup encryption element that replaces the non-backup encryption element list from the backup encryption element list by:
obtaining an extended backup editing node of the backup encryption element list according to the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and calculating a fusion value according to the first encryption field distribution, the expanded backup editing node and the proportion, and determining the target backup encryption element replacing the non-backup encryption element list from the backup encryption element list.
10. The database backup encryption system according to claim 9, wherein the second determining module is specifically configured to obtain the extended backup edit node of the backup encryption element list by:
calculating the node type ratio of the first encryption field distribution, the second encryption field distribution and the backup encryption element list to obtain a backup editing node distribution map containing the first encryption field distribution, the second encryption field distribution and the backup encryption element list;
and obtaining the extended backup editing node on the backup editing node distribution map according to the intersection point of the connecting line of the first encryption field distribution and the second encryption field distribution and the backup editing node of the backup encryption element list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010999013.XA CN113821375A (en) | 2020-09-22 | 2020-09-22 | Database backup encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010999013.XA CN113821375A (en) | 2020-09-22 | 2020-09-22 | Database backup encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113821375A true CN113821375A (en) | 2021-12-21 |
Family
ID=78912221
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010999013.XA Withdrawn CN113821375A (en) | 2020-09-22 | 2020-09-22 | Database backup encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113821375A (en) |
-
2020
- 2020-09-22 CN CN202010999013.XA patent/CN113821375A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113779409A (en) | Intention mining method and system based on big data | |
CN111324753B (en) | Media information publishing management method and system | |
CN113821375A (en) | Database backup encryption method and system | |
CN111274437B (en) | Video material resource management method and system based on Internet | |
CN112019632A (en) | Information management method and system of Internet cloud platform | |
CN113286156B (en) | Live broadcast cargo-carrying client information tracing query method and system | |
CN113904782A (en) | Online cloud platform management method and system | |
CN112100844A (en) | Internet of vehicles information configuration simulation method and system | |
CN111309344A (en) | Product installation information management method and system | |
CN113179289B (en) | Conference video information uploading method and system based on cloud computing service | |
CN111767437B (en) | Enterprise science and technology project management method and system | |
CN113282481A (en) | Software performance testing method and system | |
CN112118247B (en) | Internet of vehicles data encryption method and system | |
CN112948598A (en) | Pattern learning information embedding method and system | |
CN113282823A (en) | Hot topic tracking method and system based on artificial intelligence | |
CN113222444A (en) | Intelligent office scheduling method and system based on big data | |
CN113901020A (en) | Database remote backup method and system | |
CN113901364A (en) | Webpage graph rendering method and system based on cloud computing service | |
CN113282924A (en) | Method and system for detecting malicious behaviors of software | |
CN113849216A (en) | Method and system for verifying software development kit | |
CN113282480A (en) | Software development testing method and system | |
CN113901509A (en) | Member information encryption method and system | |
CN112256329A (en) | Material manufacturing process information management method and system | |
CN112052279A (en) | Data mining method and system based on big data | |
CN113742399A (en) | Data tracing method and system based on cloud edge cooperation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211221 |