CN114661524A - Method for realizing real estate registration data backup technology based on log analysis - Google Patents

Method for realizing real estate registration data backup technology based on log analysis Download PDF

Info

Publication number
CN114661524A
CN114661524A CN202210276577.XA CN202210276577A CN114661524A CN 114661524 A CN114661524 A CN 114661524A CN 202210276577 A CN202210276577 A CN 202210276577A CN 114661524 A CN114661524 A CN 114661524A
Authority
CN
China
Prior art keywords
data
backup
real estate
log
check value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210276577.XA
Other languages
Chinese (zh)
Other versions
CN114661524B (en
Inventor
闫亮
赵根
王彦集
张�浩
彭丽媛
黄九松
张旭
朱丹
陈坤
毛华锐
黄智�
蒋正坤
李翔
邹敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Planning And Natural Resources Information Center
Original Assignee
Chongqing Planning And Natural Resources Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Planning And Natural Resources Information Center filed Critical Chongqing Planning And Natural Resources Information Center
Priority to CN202210276577.XA priority Critical patent/CN114661524B/en
Publication of CN114661524A publication Critical patent/CN114661524A/en
Application granted granted Critical
Publication of CN114661524B publication Critical patent/CN114661524B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1471Saving, restoring, recovering or retrying involving logging of persistent data for recovery
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a method for realizing real estate registration data backup technology based on log analysis, which comprises the following steps: s1, judging whether the real estate storage service database is down; s2, obtaining backup log data in the real estate backup database, and judging whether unsynchronized log data exist in the log data to be synchronized in the step S1 according to the obtained real estate backup log data; s3, importing the unsynchronized log data obtained in the step S1 into the backup log data obtained in the step S2; s4, sending the backup log data and the final check value to the appointed client; and S5, determining the received backup log data by using the received final verification value, and then performing data recovery on the real estate storage service database by using the received backup log data. The invention can realize the safety of log backup.

Description

Method for realizing real estate registration data backup technology based on log analysis
Technical Field
The invention relates to the technical field of logs, in particular to a method for realizing a real estate registration data backup technology based on log analysis.
Background
HBase (Hadoop database) is a distributed storage system with high reliability, high performance, column orientation and scalability, and a large-scale structured storage cluster can be built on a personal computer server by utilizing HBase technology. Patent application No. 2021103481130 entitled "log data backup method, apparatus, device and storage medium", discloses that the method includes: the method comprises the steps of collecting a plurality of log records corresponding to each regional service from a pre-written log file of each regional service in a first cluster, wherein each regional service is pre-distributed with at least one pre-distributed storage region, respectively determining a target storage region corresponding to each log record from the at least one pre-distributed storage region, analyzing each log record by adopting a target analysis thread corresponding to the target storage region to obtain log data in each log record, and backing up the log data in the plurality of log records. The log records are analyzed by adopting the target analysis thread, the log records are processed in a multi-thread fragment parallel mode, mutual interference among all target storage areas is avoided, high throughput can be guaranteed while serial analysis is carried out on all target storage areas, and extra adjustment on the configuration of an HBase cluster is not needed.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly creatively provides a method for realizing the real estate registration data backup technology based on log analysis.
In order to achieve the above object, the invention provides a real estate registration data backup technology implementation system based on log analysis, which comprises a real estate storage service database downtime determination module, a backup log determination acquisition module, an import data module, a data sending module and a data recovery module;
the data output end of the real estate storage service database downtime judging module is connected with the data input end of the backup log judging and acquiring module, the data output end of the backup log judging and acquiring module is connected with the data input end of the imported data module, the data output end of the imported data module is connected with the data input end of the data sending module, and the data output end of the data sending module is connected with the data input end of the data restoring module;
the real estate storage service database downtime determination module is used for determining whether the real estate storage service database is down:
if the real estate storage service database is monitored to be down, acquiring log data to be synchronized in the real estate storage service database;
if the real estate storage service database is not monitored to be down, continuing to wait, and returning to a real estate storage service database down judgment module;
the backup log judging and acquiring module is used for acquiring backup log data in the real estate backup database, and judging whether log data to be synchronized in the real estate storage service database downtime judging module contains unsynchronized log data according to the acquired real estate backup log data:
if the log data to be synchronized has unsynchronized log data, executing a data importing module;
if the log data to be synchronized does not have unsynchronized log data, executing a data sending module;
the import data module is used for importing the unsynchronized log data acquired by the downtime judgment module of the real estate storage service database into the backup log data acquired by the backup log judgment acquisition module;
the data sending module is used for sending the backup log data and the final check value to a specified client;
and the data recovery module is used for judging the received backup log data by using the received final check value and then recovering the data of the real estate storage service database by using the received backup log data.
In a preferred embodiment of the present invention, the data recovery module includes a security determination module, and the security determination module is configured to determine security of the received backup log according to the client-side check value and the received final check value:
if the client check value is consistent with the received final check value, the received backup log is safe;
and if the client check value is inconsistent with the received final check value, the received backup log is unsafe and has risks, the received backup log is deleted, and the server is requested to send the backup log data and the final check value again.
In a preferred embodiment of the present invention, the method for obtaining the client check value according to the received backup log comprises the following steps:
s51, presetting a binary mode data digit G as a preset character length threshold value at a client, wherein G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order by the client according to the preset character length threshold value G, and respectively setting the backup logs as a 1 st group, a 2 nd group, a 3 rd group, a … … th group and a G th group, wherein G is the total number;
s52, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s53, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S52, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S52;
s54, judging the relation between g' and g:
if g', finishing, and finally generating a new check value as a client check value;
if g '< g, g' + 1; return is made to step S53.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S52 is:
I=(1-I)/I,
wherein I is a partition factor;
1 denotes the coefficient 1.
In a preferred embodiment of the present invention, the calculation method of the initial value J of the check value in step S52 is: j-int<I*2G-I>,
Wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the shift value i of the kernel pair value in step S52 is:
Figure BDA0003555968790000031
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } represents an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total group number g is calculated in step S51 by:
Figure BDA0003555968790000032
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000033
indicating that the aggregate character symbol does not belong to;
Z+denotes a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-completion on the characters in the g-th group comprises the following steps:
s511, of the characters in the g-th groupA binary mode of filling the lowest bit with the preset filling data in 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s512, one bit of data is taken out each time in sequence from the starting point of the preset padding data, and the data is padded to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after padding is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S53 is:
Figure BDA0003555968790000041
wherein ,
Figure BDA0003555968790000042
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000043
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
In a preferred embodiment of the present invention, the method for obtaining the final verification value from the backup log comprises the following steps:
s41, presetting a binary mode data digit G as a preset character length threshold at a server end, wherein the G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order according to the preset character length threshold G, and respectively forming a 1 st group, a 2 nd group, a 3 rd group, … … and a G th group, wherein G is the total number;
s42, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s43, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S42, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current checkup value is the initial value J of the checkup values calculated in step S42;
s44, judging the relation between g' and g:
if g' is g, ending, and finally generating a new check value as a final check value;
if g '< g, g' + 1; return is made to step S43.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S42 is:
I=(1-I)/I,
wherein I is a partition factor;
1 denotes the coefficient 1.
In a preferred embodiment of the present invention, the method for calculating the initial value J of the check value in step S42 is:
J=int<I*2G-I>,
wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the shift value i of the kernel pair value in step S42 is:
Figure BDA0003555968790000051
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a rounding-down algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } represents an even number set;
{ even number } denotes the odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total group number g is calculated in step S41 by:
Figure BDA0003555968790000061
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000062
indicating that the aggregate character symbol does not belong to;
Z+denotes a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-completion on the characters in the g-th group comprises the following steps:
s411, filling the preset filling data in the binary mode of the lowest bit of the characters in the g group in 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s412, one bit of data is taken out in sequence from the starting point of the preset filling data each time, and the data is filled to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after filling is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S43 is:
Figure BDA0003555968790000063
wherein ,
Figure BDA0003555968790000064
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000065
representing an exclusive or algorithm;
[ g '] represents data in the g' th group;
j' indicates the generation of a new check value.
The invention also discloses a method for realizing the real estate registration data backup technology based on log analysis, which comprises the following steps:
s1, judging whether the real estate storage service database is down:
if the real estate storage service database is monitored to be down, acquiring log data to be synchronized in the real estate storage service database;
if the real estate storage service database is not monitored to be down, continuing to wait, and returning to the step S1;
s2, obtaining backup log data in the real estate backup database, and judging whether unsynchronized log data exist in the log data to be synchronized in the step S1 according to the obtained real estate backup log data:
if the log data to be synchronized has unsynchronized log data, executing the next step;
if unsynchronized log data does not exist in the log data to be synchronized, executing step S4;
s3, importing the unsynchronized log data obtained in step S1 into the backup log data obtained in step S2; even if the real estate storage service database is down, the real estate backup database can provide services according to the backup log data after the unsynchronized log data are imported, and user experience is enhanced.
S4, sending the backup log data and the final check value to the appointed client;
and S5, determining the received backup log data by using the received final verification value, and then performing data recovery on the real estate storage service database by using the received backup log data. After shutdown, the real estate storage service database may be restored to data synchronization with the real estate backup database based on the received backup log data.
In a preferred embodiment of the present invention, the security of the received backup log is determined in step S5 based on the client check value and the received final check value:
if the client check value is consistent with the received final check value, the received backup log is safe;
and if the client check value is inconsistent with the received final check value, the received backup log is unsafe and has risks, the received backup log is deleted, and the server is requested to send the backup log data and the final check value again.
In a preferred embodiment of the present invention, the method for obtaining the client check value according to the received backup log comprises the following steps:
s51, presetting a binary mode data digit G as a preset character length threshold value at the client, wherein G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order by the client according to the preset character length threshold value G, wherein the backup logs are respectively a 1 st group, a 2 nd group, a 3 rd group, a … … group and a G th group, and G is a total number;
s52, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s53, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S52, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S52;
s54, judging the relation between g' and g:
if g', finishing, and finally generating a new check value as a client check value;
if g '< g, g' + 1; return is made to step S53.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S52 is: i is (1-I)/I,
wherein I is a partition factor;
1 denotes the coefficient 1.
In a preferred embodiment of the present invention, the method for calculating the initial value J of the check value in step S52 is: j-int<I*2G-I>,
Wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the shift value i of the kernel pair value in step S52 is:
Figure BDA0003555968790000081
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } represents an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total number of groups g in step S51 is calculated by:
Figure BDA0003555968790000091
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000092
indicating that the aggregate character symbol does not belong to;
Z+represents a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-completion on the characters in the g-th group comprises the following steps:
s511, the lowest bit of the characters in the g-th group is filled with the preset filling data in a binary mode, and the preset filling data is set to be 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s512, one bit of data is taken out each time in sequence from the starting point of the preset padding data, and the data is padded to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after padding is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S53 is:
Figure BDA0003555968790000093
wherein ,
Figure BDA0003555968790000094
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000095
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
In a preferred embodiment of the present invention, the method for obtaining the final verification value from the backup log comprises the following steps:
s41, presetting a binary mode data digit G as a preset character length threshold at a server end, wherein the G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order according to the preset character length threshold G, and respectively forming a 1 st group, a 2 nd group, a 3 rd group, … … and a G th group, wherein G is the total number;
s42, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s43, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S42, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S42;
s44, judging the relation between g' and g:
if g' is g, ending, and finally generating a new check value as a final check value;
if g '< g, g' + 1; return is made to step S43.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S42 is:
I=(1-I)/I,
wherein I is a partition factor;
1 denotes the coefficient 1.
In a preferred embodiment of the present invention, the method for calculating the initial value J of the check value in step S42 is:
J=int<I*2G-I>,
wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the moving value i of the check value in step S42 is:
Figure BDA0003555968790000101
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number represents an odd number;
{ odd number } denotes an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total group number g is calculated in step S41 by:
Figure BDA0003555968790000111
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents that the character symbol in the set belongs to;
Figure BDA0003555968790000112
indicating that the aggregate character symbol does not belong to;
Z+represents a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-completion on the characters in the g-th group comprises the following steps:
s411, filling the preset filling data in the binary mode of the lowest bit of the characters in the g group in 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s412, one bit of data is taken out in sequence from the starting point of the preset filling data each time, and the data is filled to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after filling is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S43 is:
Figure BDA0003555968790000121
wherein ,
Figure BDA0003555968790000122
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000123
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
In summary, due to the adoption of the technical scheme, the log backup method and the log backup system can realize the safety of log backup.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic block diagram of the process of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention provides a real estate registration data backup technology implementation system based on log analysis, which comprises a real estate storage service database downtime judgment module, a backup log judgment acquisition module, a data importing module, a data sending module and a data recovery module, wherein the real estate storage service database downtime judgment module is used for judging whether a real estate registration data is a backup data or not;
the data output end of the real estate storage service database downtime judging module is connected with the data input end of the backup log judging and acquiring module, the data output end of the backup log judging and acquiring module is connected with the data input end of the imported data module, the data output end of the imported data module is connected with the data input end of the data sending module, and the data output end of the data sending module is connected with the data input end of the data restoring module;
the real estate storage service database downtime determination module is used for determining whether the real estate storage service database is down:
if the real estate storage service database is monitored to be down, acquiring log data to be synchronized in the real estate storage service database;
if the real estate storage service database is not monitored to be down, continuing to wait, and returning to a real estate storage service database down judgment module;
the backup log judging and acquiring module is used for acquiring backup log data in the real estate backup database, and judging whether log data to be synchronized in the real estate storage service database downtime judging module contains unsynchronized log data according to the acquired real estate backup log data:
if the log data to be synchronized has unsynchronized log data, executing a data importing module;
if the log data to be synchronized does not have unsynchronized log data, executing a data sending module;
the import data module is used for importing the unsynchronized log data acquired by the downtime judgment module of the real estate storage service database into the backup log data acquired by the backup log judgment acquisition module;
the data sending module is used for sending the backup log data and the final check value to a specified client; in order to ensure the safety of the backup log data and the final check value, the backup log data and the final check value are encrypted by using an SM4 symmetric KEY SM4_ KEY and then sent to a specified client;
and the data recovery module is used for judging the received backup log data by using the received final check value and then recovering the data of the real estate storage service database by using the received backup log data. The client decrypts the received encrypted backup log data and the final check value by using an SM4 symmetric KEY SM4_ KEY to obtain the decrypted backup log data and the final check value; the method for obtaining the SM4 symmetric KEY SM4_ KEY by the server side comprises the following steps:
firstly, a client sends a request for obtaining an SM2 public key to a server, and an SM2 public key SM2_ PUBKEY and SM2 private key SM2_ PRIKEY pair are stored on the server;
secondly, after receiving the SM2 public key request sent by the client, the server side returns the SM2 public key SM2_ PUBKEY to the client in a plaintext form;
thirdly, after receiving the SM2 public KEY SM2_ PUBKEY sent by the server, the client generates an SM4 symmetric KEY SM4_ KEY;
fourthly, using an SM2 public KEY SM2_ PUBKEY to encrypt an SM4 symmetric KEY SM4_ KEY by SM2 to obtain a ciphertext ENSM4K, and sending the ciphertext ENSM4K to the server side;
fifthly, after receiving the ciphertext ENSM4K sent by the client, the server decrypts the received ciphertext ENSM4K by using an SM2 private KEY SM2_ PRIKEY to obtain an SM4 symmetric KEY SM4_ KEY, and at the moment, the server obtains an SM4 symmetric KEY SM4_ KEY, so as to ensure the communication query between the client and the server, the method further comprises the following steps:
sixthly, the server generates a communication identifier TK, and the communication identifier TK is associated with an SM4 symmetric KEY SM4_ KEY to form a KV KEY value pair which is stored in a cache server redis; carrying out SM4 symmetric encryption on the communication identifier TK by using an SM4 symmetric KEY SM4_ KEY to obtain an encrypted identifier ENTK, and returning the encrypted identifier ENTK to the client;
and seventhly, the client side carries out SM4 symmetric decryption on the received encrypted identifier ENTK by using an SM4 symmetric KEY SM4_ KEY to obtain the communication identifier TK. The SM4 symmetric KEY SM4_ KEY has timeliness, which may be one hour, one day, one month, etc., and updates the SM4 symmetric KEY SM4_ KEY after expiration, and for security, the server may also update the SM2 public KEY SM2_ PUBKEY and SM2 private KEY SM2_ PRIKEY pair at the same time.
In a preferred embodiment of the present invention, the data recovery module includes a security determination module, and the security determination module is configured to determine security of the received backup log according to the client-side check value and the received final check value:
if the client check value is consistent with the received final check value, the received backup log is safe;
and if the client check value is inconsistent with the received final check value, the received backup log is unsafe and has risks, the received backup log is deleted, and the server is requested to send the backup log data and the final check value again.
In a preferred embodiment of the present invention, the method for obtaining the client check value according to the received backup log comprises the following steps:
s51, presetting a binary mode data digit G as a preset character length threshold value at a client, wherein G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order by the client according to the preset character length threshold value G, and respectively setting the backup logs as a 1 st group, a 2 nd group, a 3 rd group, a … … th group and a G th group, wherein G is the total number;
s52, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s53, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S52, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S52;
s54, judging the relation between g' and g:
if g' is equal to g, ending, and finally generating a new check value as a client check value;
if g '< g, g' + 1; return is made to step S53.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S52 is:
I=(1-I)/I,
wherein I is a partition factor;
1 denotes the coefficient 1.
In a preferred embodiment of the present invention, the method for calculating the initial value J of the check value in step S52 is:
J=int<I*2G-I>,
wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the moving value i of the check value in step S52 is:
Figure BDA0003555968790000141
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } denotes an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total group number g is calculated in step S51 by:
Figure BDA0003555968790000151
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000152
indicating that the collection character symbol does not belong to;
Z+represents a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-and-fill on the characters in the g-th group comprises the following steps:
s511, the lowest bit of the characters in the g-th group is filled with the preset filling data in a binary mode, and the preset filling data is set to be 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s512, one bit of data is taken out each time in sequence from the starting point of the preset padding data, and the data is padded to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after padding is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S53 is:
Figure BDA0003555968790000161
wherein ,
Figure BDA0003555968790000162
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000163
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
In a preferred embodiment of the present invention, the method for obtaining the final verification value from the backup log comprises the following steps:
s41, presetting a binary mode data digit G as a preset character length threshold value at a server end, wherein G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order according to the preset character length threshold value G, wherein the backup logs are respectively a 1 st group, a 2 nd group, a 3 rd group, … … and a G th group, and G is a total number;
s42, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s43, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S42, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S42;
s44, judging the relation between g' and g:
if g' is g, ending, and finally generating a new check value as a final check value;
if g '< g, g' + 1; return is made to step S43.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S42 is:
I=(1-I)/I,
wherein I is a partition factor;
1 denotes the coefficient 1.
In a preferred embodiment of the present invention, the calculation method of the initial value J of the check value in step S42 is:
J=int<I*2G-I>,
wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the shift value i of the kernel pair value in step S42 is:
Figure BDA0003555968790000171
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } represents an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total group number g is calculated in step S41 by:
Figure BDA0003555968790000172
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000173
indicating that the aggregate character symbol does not belong to;
Z+representing a set of positive integersZ is+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, not conducting preset completion on the characters in the G group;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-completion on the characters in the g-th group comprises the following steps:
s411, filling the preset filling data in the binary mode of the lowest bit of the characters in the g group in 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s412, one bit of data is taken out in sequence from the starting point of the preset filling data each time, and the data is filled to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after filling is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S43 is:
Figure BDA0003555968790000181
wherein ,
Figure BDA0003555968790000182
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000183
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
The invention also discloses a method for realizing the real estate registration data backup technology based on log analysis, which comprises the following steps as shown in figure 1:
s1, judging whether the real estate storage service database is down:
if the real estate storage service database is monitored to be down, acquiring log data to be synchronized in the real estate storage service database;
if the real estate storage service database is not monitored to be down, continuing to wait, and returning to the step S1;
s2, obtaining backup log data in the real estate backup database, and determining whether unsynchronized log data exist in the log data to be synchronized in the step S1 according to the obtained real estate backup log data:
if the log data to be synchronized contains unsynchronized log data, executing the next step;
if the log data to be synchronized does not have unsynchronized log data, executing step S4;
s3, importing the unsynchronized log data obtained in the step S1 into the backup log data obtained in the step S2;
s4, sending the backup log data and the final check value to the appointed client;
and S5, after judging the received backup log data by using the received final check value, performing data recovery on the real estate storage service database by using the received backup log data.
In step S4, the calculation method for obtaining the final verification value includes the steps of:
s41, presetting a digit G of binary mode data as a preset character length threshold, wherein the G is a positive integer greater than or equal to 1, and grouping backup logs from high order to low order according to the preset character length threshold G, wherein the backup logs are respectively a 1 st group, a 2 nd group, a 3 rd group, … … th group and a G th group, and G is a total number; the total group number g is calculated by the following method:
Figure BDA0003555968790000191
wherein int < > represents a rounding-down algorithm; the rounding-down algorithm means that if there is a fractional part, only the integer part is retained, e.g., int (2.892) 2, int (1.715) 1, int (0.196) 0, int (6.342) 6.
G' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000192
indicating that the aggregate character symbol does not belong to;
Z+denotes a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
if the number of the characters in the G group is smaller than a preset character length threshold value G, performing preset completion on the characters in the G group; the method for performing preset completion on the characters in the g group comprises the following steps:
s411, filling the preset filling data in the binary mode of the lowest bit of the characters in the g group in 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hhpreferably, 0XA8C8739F is used.
Wherein h represents the total number of bits of the preset padding data; 0X denotes hexadecimal, and 0XH1H2H3…HhConverting the character length of the binary system into a binary system, wherein the character length of the binary system is greater than or equal to a preset character length threshold value G;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 2;
H1a hexadecimal value of one of 1, 2, 3, … …, F;
s412, one bit of data is taken out in sequence from the starting point of the preset filling data each time, and the data is filled to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after filling is equal to the preset character length threshold value.
For example, the backup log is 3236345679821432093973(0XAF715190E73E8AFD15), whose binary expression is:
1010 1111 0111 0001 0101 0001 1001 0000 1110 0111 0011 1110 1000 1010 1111 1101 0001 0101;
the grouping is carried out according to the preset character length threshold value of 32 bits because
Figure BDA0003555968790000201
Thus, g is 3, and is divided into three groups, i.e. group 1, group 2 and group 3, wherein group 1 is 0XAF715190, which is expressed in binary form as:
1010 1111 0111 0001 0101 0001 1001 0000;
group 2 is 0XE73E8AFD, which is expressed in binary:
1110 0111 0011 1110 1000 1010 1111 1101;
group 3 is 0X15, which is expressed in binary form as:
0001 0101;
because the length of the 3 rd group character is not equal to 32 bits, the data completion processing is carried out on the 3 rd group, when the data is completed, the 0XA is taken as a starting point, the subsequent data are sequentially completed until the length is equal to 32 bits, and the obtained data are as follows:
0001 0101 1010 1000 1100 1000 0111 0011;
that is, the filled data is 0XA8C873, and the last set of data is finally 0X15A8C 873.
S42, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; the calculation method of the partition factor I comprises the following steps:
the calculation method of the partition factor I comprises the following steps:
Figure BDA0003555968790000202
∵I>0
Figure BDA0003555968790000203
wherein I is a partition factor;
1 denotes the coefficient 1.
The calculation method of the initial value J of the check value is as follows:
Figure BDA0003555968790000211
wherein int < > is a rounding-down algorithm; i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
The method for generating the movement value i of the check value comprises the following steps:
Figure BDA0003555968790000212
Figure BDA0003555968790000213
Figure BDA0003555968790000214
Figure BDA0003555968790000215
Figure BDA0003555968790000216
wherein i represents a shifted value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } represents an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
S43, circularly right shifting the current check value according to the shifting value i of the check value obtained in the step S42, calculating the check value circularly right shifted by i and the data in the g' th group to generate a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S42;
the first-used current checkup value is the initial value J of the checkup value calculated in step S42 ═ 2654435768;
its binary expression is:
1001 1110 0011 0111 0111 1001 1011 1000;
if the shift value i of the current check value is 19, and J is 2654435768, the loop is shifted to the right by 19 bits, then the loop is shifted to the right by 19 bits, and the following results are obtained:
1110 1111 0011 0111 0001 0011 1100 0110;
s44, judging the relation between g' and g:
if g' is g, ending, and finally generating a new check value as a final check value;
if g '< g, g' + 1; return is made to step S43.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S43 is:
Figure BDA0003555968790000221
wherein ,
Figure BDA0003555968790000222
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000223
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
In a preferred embodiment of the present invention, the security of the received backup log is determined in step S5 based on the client check value and the received final check value:
if the client check value is consistent with the received final check value, the received backup log is safe;
and if the client check value is inconsistent with the received final check value, the received backup log is unsafe and has risks, the received backup log is deleted, and the server is requested to send the backup log data and the final check value again. The method for calculating the client check value comprises the following steps:
s51, presetting a binary mode data digit G as a preset character length threshold value at a client, wherein G is a positive integer greater than or equal to 1, grouping backup logs from high order to low order by the client according to the preset character length threshold value G, and respectively setting the backup logs as a 1 st group, a 2 nd group, a 3 rd group, a … … th group and a G th group, wherein G is the total number;
s52, calculating to obtain a starting value J of the check value by using the division factor I, and calculating to obtain a moving value I of the check value by using the division factor I; let g' be 1;
s53, using the current check value to do circulation right shift according to the shift value i of the check value obtained in the step S52, calculating the check value after circulation right shift by i and the data in the g' group, generating a new check value; the first-used current verification value is the initial value J of the verification value calculated in step S52;
s54, judging the relation between g' and g:
if g', finishing, and finally generating a new check value as a client check value;
if g '< g, g' + 1; return is made to step S53.
In a preferred embodiment of the present invention, the method for calculating the partition factor I in step S52 is:
I=(1-I)/I,
wherein I is a partition factor;
1 denotes a coefficient 1.
In a preferred embodiment of the present invention, the method for calculating the initial value J of the check value in step S52 is:
J=int<I*2G-I>,
wherein int < > is a rounding-down algorithm;
i is a partition factor, and I is a positive number;
g is a preset character length threshold value,
j is the starting value of the check value.
In a preferred embodiment of the present invention, the method for generating the shift value i of the kernel pair value in step S52 is:
Figure BDA0003555968790000231
wherein i represents a moving value of the collation value;
i is a partition factor;
g is a preset character length threshold;
int < > is a downward rounding algorithm;
odd number represents an even number;
even number indicates an odd number;
{ odd number } represents an even number set;
{ even number } represents an odd number set;
e represents the set character symbol belongs to.
In a preferred embodiment of the present invention, the total group number g is calculated in step S51 by:
Figure BDA0003555968790000241
wherein int < > represents a rounding-down algorithm;
g' represents the character length of the backup log;
g represents a preset character length threshold;
e represents the set character symbol belongs to;
Figure BDA0003555968790000242
indicating that the aggregate character symbol does not belong to;
Z+denotes a set of positive integers, Z+={1,2,3,……};
g represents the total number of groups;
judging whether the character length in the G group is equal to a preset character length threshold value G:
if the number of the characters in the G group is equal to a preset character length threshold value G, the characters in the G group are not subjected to preset completion;
and if the number of the characters in the G group is less than a preset character length threshold value G, performing preset completion on the characters in the G group.
In a preferred embodiment of the present invention, the method for performing the preset-completion on the characters in the g-th group comprises the following steps:
s511, the lowest bit of the characters in the g-th group is filled with the preset filling data in a binary mode, and the preset filling data is set to be 0XH1As a starting point, the preset completion data is in the form of:
0XH1H2H3…Hh
wherein h represents the total number of bits of the preset padding data;
Hh′a hexadecimal value of one of 0, 1, 2, 3, … …, F;
h' is a positive integer less than or equal to h and greater than or equal to 1;
s512, one bit of data is taken out each time in sequence from the starting point of the preset padding data, and the data is padded to the lowest bit of the character in the g-th group until the bit number of the character in the g-th group in the binary mode after padding is equal to the preset character length threshold value.
In a preferred embodiment of the present invention, the calculation method for generating the new verification value in step S53 is:
Figure BDA0003555968790000243
wherein ,
Figure BDA0003555968790000244
representing the check value after cyclic right shift by i bits;
Figure BDA0003555968790000251
representing an exclusive or algorithm;
[ g '] represents the data in the g' th group;
j' indicates the generation of a new check value.
While embodiments of the present invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.

Claims (4)

1. A real estate registration data backup technology implementation system based on log analysis is characterized by comprising a real estate storage service database downtime judgment module, a backup log judgment acquisition module, a data importing module, a data sending module and a data recovery module;
the data output end of the real estate storage service database downtime judging module is connected with the data input end of the backup log judging and acquiring module, the data output end of the backup log judging and acquiring module is connected with the data input end of the imported data module, the data output end of the imported data module is connected with the data input end of the data sending module, and the data output end of the data sending module is connected with the data input end of the data restoring module;
the real estate storage service database downtime judging module is used for judging whether the real estate storage service database is down:
if the real estate storage service database is monitored to be down, acquiring log data to be synchronized in the real estate storage service database;
if the real estate storage service database is not monitored to be down, continuing to wait, and returning to a real estate storage service database down judgment module;
the backup log judging and acquiring module is used for acquiring backup log data in the real estate backup database and judging whether unsynchronized log data exist in the log data to be synchronized in the downtime judging module of the real estate storage service database according to the acquired real estate backup log data:
if the log data to be synchronized has unsynchronized log data, executing a data importing module;
if the log data to be synchronized does not have unsynchronized log data, executing a data sending module;
the import data module is used for importing the unsynchronized log data acquired by the downtime judgment module of the real estate storage service database into the backup log data acquired by the backup log judgment acquisition module;
the data sending module is used for sending the backup log data and the final check value to a specified client;
and the data recovery module is used for judging the received backup log data by using the received final check value and then recovering the data of the real estate storage service database by using the received backup log data.
2. The system for implementing log analysis-based real estate registration data backup technology according to claim 1, wherein the data recovery module comprises a security determination module for determining security of the received backup log according to the client-side check value and the received final check value:
if the client check value is consistent with the received final check value, the received backup log is safe;
and if the client check value is inconsistent with the received final check value, the received backup log is unsafe and has risks, the received backup log is deleted, and the server is requested to send the backup log data and the final check value again.
3. A method for realizing real estate registration data backup technology based on log analysis is characterized by comprising the following steps:
s1, judging whether the real estate storage service database is down:
if the real estate storage service database is monitored to be down, acquiring log data to be synchronized in the real estate storage service database;
if the real estate storage service database is not monitored to be down, continuing to wait, and returning to the step S1;
s2, obtaining backup log data in the real estate backup database, and judging whether unsynchronized log data exist in the log data to be synchronized in the step S1 according to the obtained real estate backup log data:
if the log data to be synchronized has unsynchronized log data, executing the next step;
if the log data to be synchronized does not have unsynchronized log data, executing step S4;
s3, importing the unsynchronized log data obtained in step S1 into the backup log data obtained in step S2;
s4, sending the backup log data and the final check value to the appointed client;
and S5, after judging the received backup log data by using the received final check value, performing data recovery on the real estate storage service database by using the received backup log data.
4. The method for implementing the real estate registration data backing technology based on log analysis according to claim 3, wherein in step S5, the security of the received backup log is determined according to the client check value and the received final check value:
if the client check value is consistent with the received final check value, the received backup log is safe;
and if the client check value is inconsistent with the received final check value, the received backup log is unsafe and has risks, the received backup log is deleted, and the server is requested to send the backup log data and the final check value again.
CN202210276577.XA 2022-03-21 2022-03-21 Method for realizing real estate registration data backup technology based on log analysis Active CN114661524B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210276577.XA CN114661524B (en) 2022-03-21 2022-03-21 Method for realizing real estate registration data backup technology based on log analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210276577.XA CN114661524B (en) 2022-03-21 2022-03-21 Method for realizing real estate registration data backup technology based on log analysis

Publications (2)

Publication Number Publication Date
CN114661524A true CN114661524A (en) 2022-06-24
CN114661524B CN114661524B (en) 2023-06-02

Family

ID=82032229

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210276577.XA Active CN114661524B (en) 2022-03-21 2022-03-21 Method for realizing real estate registration data backup technology based on log analysis

Country Status (1)

Country Link
CN (1) CN114661524B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938350A (en) * 2010-07-16 2011-01-05 黑龙江大学 File encryption and decryption method based on combinatorial coding
TW201103298A (en) * 2009-03-25 2011-01-16 Pacid Technologies Llc Method and system for securing communication
CN102567146A (en) * 2011-12-29 2012-07-11 北京握奇数据系统有限公司 Log backup method and device and smart card
CN106407356A (en) * 2016-09-07 2017-02-15 网易(杭州)网络有限公司 Data backup method and device
CN106447198A (en) * 2016-09-28 2017-02-22 国网山东省电力公司电力科学研究院 Power consumption checking method based on business expanding installation data
CN106910050A (en) * 2017-04-17 2017-06-30 国网安徽省电力公司芜湖供电公司 Based on the fixed electronic handing-over and automatic checking system and its operating method that are wirelessly transferred
CN107844386A (en) * 2016-09-19 2018-03-27 北京金山云网络技术有限公司 A kind of data backup, restoration methods and device
CN111628953A (en) * 2020-04-28 2020-09-04 珠海中慧微电子有限公司 Method for reducing peak-to-average ratio of OFDM signal
CN111639132A (en) * 2020-05-29 2020-09-08 中国联合网络通信集团有限公司 Log synchronization method and device
CN111860888A (en) * 2020-07-17 2020-10-30 国网江苏省电力有限公司 Real-time monitoring and searching system and method for inspection state of unmanned aerial vehicle of power transmission line
CN112365373A (en) * 2020-11-10 2021-02-12 四川大学 Method for preserving and mutually recognizing electronic file on case
CN112905390A (en) * 2021-03-31 2021-06-04 恒生电子股份有限公司 Log data backup method, device, equipment and storage medium
CN113095212A (en) * 2021-04-08 2021-07-09 武汉理工大学 Face recognition method and system based on local sorting algorithm encryption
CN113452522A (en) * 2021-06-28 2021-09-28 杭州云象网络技术有限公司 Hardware security module software implementation method based on state password, storage medium and device
CN113590604A (en) * 2021-08-04 2021-11-02 中国工商银行股份有限公司 Service data processing method and device and server

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201103298A (en) * 2009-03-25 2011-01-16 Pacid Technologies Llc Method and system for securing communication
CN101938350A (en) * 2010-07-16 2011-01-05 黑龙江大学 File encryption and decryption method based on combinatorial coding
CN102567146A (en) * 2011-12-29 2012-07-11 北京握奇数据系统有限公司 Log backup method and device and smart card
CN106407356A (en) * 2016-09-07 2017-02-15 网易(杭州)网络有限公司 Data backup method and device
CN107844386A (en) * 2016-09-19 2018-03-27 北京金山云网络技术有限公司 A kind of data backup, restoration methods and device
CN106447198A (en) * 2016-09-28 2017-02-22 国网山东省电力公司电力科学研究院 Power consumption checking method based on business expanding installation data
CN106910050A (en) * 2017-04-17 2017-06-30 国网安徽省电力公司芜湖供电公司 Based on the fixed electronic handing-over and automatic checking system and its operating method that are wirelessly transferred
CN111628953A (en) * 2020-04-28 2020-09-04 珠海中慧微电子有限公司 Method for reducing peak-to-average ratio of OFDM signal
CN111639132A (en) * 2020-05-29 2020-09-08 中国联合网络通信集团有限公司 Log synchronization method and device
CN111860888A (en) * 2020-07-17 2020-10-30 国网江苏省电力有限公司 Real-time monitoring and searching system and method for inspection state of unmanned aerial vehicle of power transmission line
CN112365373A (en) * 2020-11-10 2021-02-12 四川大学 Method for preserving and mutually recognizing electronic file on case
CN112905390A (en) * 2021-03-31 2021-06-04 恒生电子股份有限公司 Log data backup method, device, equipment and storage medium
CN113095212A (en) * 2021-04-08 2021-07-09 武汉理工大学 Face recognition method and system based on local sorting algorithm encryption
CN113452522A (en) * 2021-06-28 2021-09-28 杭州云象网络技术有限公司 Hardware security module software implementation method based on state password, storage medium and device
CN113590604A (en) * 2021-08-04 2021-11-02 中国工商银行股份有限公司 Service data processing method and device and server

Also Published As

Publication number Publication date
CN114661524B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN113297606B (en) Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN101394266B (en) Method for generating variable parameter chaos signal and chaos secret communication system
CN108197484B (en) Method for realizing node data security in distributed storage environment
WO2014075469A1 (en) Method and device for information hiding
Wang et al. Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
CN108881186B (en) Compressed sensing encryption method capable of realizing key sharing and error control
CN104881838B (en) One kind is based on GF (23) (K, N) significant point deposited without expansion image and reconstructing method
CN111064558B (en) Homomorphic encryption matrix continuous multiplication secure outsourcing method based on cloud computing
CN116232586A (en) Image encryption method based on fractional order memristor neural network time feedback control
CN112866299B (en) Encrypted data deduplication and sharing device and method for mobile edge computing network
CN113630250B (en) Model training method and system based on data encryption
CN109088850B (en) Lot cloud auditing method for positioning error files based on Lucas sequence
CN117235342A (en) Dynamic cloud auditing method based on homomorphic hash function and virtual index
CN114661524A (en) Method for realizing real estate registration data backup technology based on log analysis
Salman et al. A homomorphic cloud framework for big data analytics based on elliptic curve cryptography
JP2003535362A (en) Decryption of cryptographic polynomial
CN115834163B (en) Method, device, equipment and storage medium for generating secret key of encrypted data
CN111740965A (en) Internet of things equipment authentication method based on physical unclonable equation
CN112487459B (en) Remote sensing metadata uplink method based on alliance chain
CN106209772A (en) Network data coded method, device, checking method, device and transmission method
CN113163232B (en) Chaos-based multi-user video file encryption system and method
CN111400731A (en) DNACNott-based quantum image encryption method
CN114640438B (en) Full-element informatization management method based on informationized asset
Ding et al. Participants Increasing for Shamir’s Polynomial-Based Secret Image Sharing Scheme
CN110266488B (en) Key generation method based on position combination and data encryption transmission method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant