CN116860526B - User data processing method and system based on information security - Google Patents

User data processing method and system based on information security Download PDF

Info

Publication number
CN116860526B
CN116860526B CN202311126148.5A CN202311126148A CN116860526B CN 116860526 B CN116860526 B CN 116860526B CN 202311126148 A CN202311126148 A CN 202311126148A CN 116860526 B CN116860526 B CN 116860526B
Authority
CN
China
Prior art keywords
user data
module
data
storage module
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311126148.5A
Other languages
Chinese (zh)
Other versions
CN116860526A (en
Inventor
陈超
崔博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanheng Zhanchuang Shenzhen Development Partnership LP
Original Assignee
Shanheng Zhanchuang Shenzhen Development Partnership LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanheng Zhanchuang Shenzhen Development Partnership LP filed Critical Shanheng Zhanchuang Shenzhen Development Partnership LP
Priority to CN202311126148.5A priority Critical patent/CN116860526B/en
Publication of CN116860526A publication Critical patent/CN116860526A/en
Application granted granted Critical
Publication of CN116860526B publication Critical patent/CN116860526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the field of data processing, and discloses a user data processing method and system based on information security, wherein the method comprises the following steps: the cloud data server generates a user data storage module and a user data backup storage module, and dynamically adjusts the size of the user data backup storage module through a data isolation processing module according to the use capacity of the user data storage module; and transmitting the user data acquired by the user data acquisition module to the user data storage module through the data uploading module corresponding to the user data management module, generating a user data change list according to the difference between the acquired user data and the user data stored by the user data storage module, transmitting the user data change list to the data isolation processing module, and carrying out user data change and storage by the user data backup storage module according to the user data change list to finish user data processing. By the scheme of the invention, the data security is ensured, and the real-time backup of the data is realized.

Description

User data processing method and system based on information security
Technical Field
The invention relates to the field of data processing, in particular to a user data processing method and system based on information security.
Background
With the popularity of the internet and mobile devices, the generation and transmission of large amounts of user data is becoming a reality. User data includes personal identity information, transaction records, social media data, etc., and disclosure of such data may lead to problems with user privacy being violated, financial fraud, malicious exploitation, etc. Therefore, protecting the security of user data is an important and urgent issue in today's society.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a user data processing method based on information security, which comprises the following steps:
step one, a cloud data server generates a user data storage module and a user data backup storage module, and the size of the user data backup storage module is dynamically adjusted through a data isolation processing module according to the use capacity of the user data storage module;
step two, a user data acquisition module acquires user data, a user data management module judges whether the data is uploaded for the first time according to the information of the user data acquisition module, if so, a data uploading module and a data backup module corresponding to the user data management module are generated, a step three is entered, and if not, a step seven is entered;
step three, the user data management module respectively carries out security verification on the user data acquisition module information and the uploaded user data, if both the user data acquisition module information and the uploaded user data pass the verification, the user data are cached in the data caching module in the user data management module, the user data acquisition module information is added to a user data acquisition module information list of the user data management module, the user data are transmitted to the user data storage module through the data uploading module corresponding to the user data management module, the copied user data are transmitted to the user data backup storage module through the data backup module, and the data backup module enters dormancy after the transmission is completed;
step four, checking the data consistency of the same user data in the user data storage module and the user data backup storage module through the data isolation processing module, deleting the user data in the cache module of the user data management module if the user data is consistent, generating user data inconsistent information according to the user data information through the data isolation processing module if the user data is inconsistent, and entering the step five;
fifthly, carrying out consistency check on the user data in the user data storage module and the user data in the data cache module, and if the user data in the user data storage module are inconsistent, replacing the user data in the user data storage module with the user data in the data cache module; if the two types of the information are consistent, the step six is entered;
step six, waking up the data backup module, taking the user data in the data cache module as secondary user data, sending the secondary user data to the user data backup storage module through the data backup module, acquiring inconsistent information of the user data from the data isolation processing module when the user data backup storage module receives the secondary user data, and replacing the user data in the user data backup storage module with the secondary user data to finish data verification if the inconsistent information of the user data corresponding to the user data information exists;
and seventhly, transmitting the user data acquired by the user data acquisition module to the user data storage module through the data uploading module corresponding to the user data management module, generating a user data change list according to the difference between the acquired user data and the user data stored by the user data storage module, transmitting the user data change list to the data isolation processing module, and carrying out user data change and storage by the user data backup storage module according to the user data change list to finish user data processing.
Further, the step of dynamically adjusting the size of the user data backup storage module through the data isolation processing module according to the capacity change of the user data storage module includes:
the data isolation processing module adjusts the capacity of the user data backup storage module according to the difference between the capacity of the user data backup storage module and the use capacity of the user data storage module, so that the capacity of the user data backup storage module is consistent with the capacity of the user data storage module.
Further, the user data management module judges whether to upload data for the first time according to the information of the user data acquisition module, including: and according to the user data acquisition module information list, if the user data acquisition module information list does not contain the information of the user data acquisition module, uploading the data for the first time, otherwise, not uploading the data for the first time.
Further, the user data management module performs security verification on the user data acquisition module information and the uploaded user data respectively, and includes:
and verifying the authorization information in the user data acquisition module information, if the authorization verification is passed, performing integrity verification on the uploaded user data, and if the integrity verification is passed, completing security verification.
Further, the data consistency verification for the same user data in the user data storage module and the user data backup storage module through the data isolation processing module includes:
the data isolation processing module extracts the same user data in the user data storage module and the user data backup storage module into the data isolation processing module respectively, and performs data consistency verification.
The user data processing system applies the user data processing method based on information security, and the user data processing method comprises a cloud data server, a user data acquisition module, a user data management module and a communication device;
the user data acquisition module and the user data management module are respectively in communication connection with the communication device; the user data management module is in communication connection with the cloud data server.
The beneficial effects of the invention are as follows: by the technical scheme provided by the invention, the protection of the user data can be realized, and the real-time backup of the data is realized while the data safety is ensured by isolating the backup data from the storage data.
Drawings
FIG. 1 is a schematic diagram of a user data processing method based on information security;
FIG. 2 is a schematic diagram of a user data processing system based on information security.
Detailed Description
The technical solution of the present invention will be described in further detail with reference to the accompanying drawings, but the scope of the present invention is not limited to the following description.
For the purpose of making the technical solution and advantages of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the particular embodiments described herein are illustrative only and are not intended to limit the invention, i.e., the embodiments described are merely some, but not all, of the embodiments of the invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention. It is noted that relational terms such as "first" and "second", and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The features and capabilities of the present invention are described in further detail below in connection with the examples.
As shown in fig. 1, a user data processing method based on information security includes the following steps:
step one, a cloud data server generates a user data storage module and a user data backup storage module, and the size of the user data backup storage module is dynamically adjusted through a data isolation processing module according to the use capacity of the user data storage module;
step two, a user data acquisition module acquires user data, a user data management module judges whether the data is uploaded for the first time according to the information of the user data acquisition module, if so, a data uploading module and a data backup module corresponding to the user data management module are generated, a step three is entered, and if not, a step seven is entered;
step three, the user data management module respectively carries out security verification on the user data acquisition module information and the uploaded user data, if both the user data acquisition module information and the uploaded user data pass the verification, the user data are cached in the data caching module in the user data management module, the user data acquisition module information is added to a user data acquisition module information list of the user data management module, the user data are transmitted to the user data storage module through the data uploading module corresponding to the user data management module, the copied user data are transmitted to the user data backup storage module through the data backup module, and the data backup module enters dormancy after the transmission is completed;
step four, checking the data consistency of the same user data in the user data storage module and the user data backup storage module through the data isolation processing module, deleting the user data in the cache module of the user data management module if the user data is consistent, generating user data inconsistent information according to the user data information through the data isolation processing module if the user data is inconsistent, and entering the step five;
fifthly, carrying out consistency check on the user data in the user data storage module and the user data in the data cache module, and if the user data in the user data storage module are inconsistent, replacing the user data in the user data storage module with the user data in the data cache module; if the two types of the information are consistent, the step six is entered;
step six, waking up the data backup module, taking the user data in the data cache module as secondary user data, sending the secondary user data to the user data backup storage module through the data backup module, acquiring inconsistent information of the user data from the data isolation processing module when the user data backup storage module receives the secondary user data, and replacing the user data in the user data backup storage module with the secondary user data to finish data verification if the inconsistent information of the user data corresponding to the user data information exists;
and seventhly, transmitting the user data acquired by the user data acquisition module to the user data storage module through the data uploading module corresponding to the user data management module, generating a user data change list according to the difference between the acquired user data and the user data stored by the user data storage module, transmitting the user data change list to the data isolation processing module, and carrying out user data change and storage by the user data backup storage module according to the user data change list to finish user data processing.
The method for dynamically adjusting the size of the user data backup storage module through the data isolation processing module according to the capacity change of the user data storage module comprises the following steps:
the data isolation processing module adjusts the capacity of the user data backup storage module according to the difference between the capacity of the user data backup storage module and the use capacity of the user data storage module, so that the capacity of the user data backup storage module is consistent with the capacity of the user data storage module.
The user data management module judges whether the data is uploaded for the first time according to the information of the user data acquisition module, and comprises the following steps: and according to the user data acquisition module information list, if the user data acquisition module information list does not contain the information of the user data acquisition module, uploading the data for the first time, otherwise, not uploading the data for the first time.
The user data management module performs security verification on the user data acquisition module information and the uploaded user data respectively, and the security verification comprises the following steps:
and verifying the authorization information in the user data acquisition module information, if the authorization verification is passed, performing integrity verification on the uploaded user data, and if the integrity verification is passed, completing security verification.
The data consistency check is performed on the same user data in the user data storage module and the user data backup storage module through the data isolation processing module, and the data consistency check method comprises the following steps:
the data isolation processing module extracts the same user data in the user data storage module and the user data backup storage module into the data isolation processing module respectively, and performs data consistency verification.
As shown in fig. 2, a user data processing system applies the user data processing method based on information security, and the user data processing system includes a cloud data server, a user data acquisition module, a user data management module and a communication device;
the user data acquisition module and the user data management module are respectively in communication connection with the communication device; the user data management module is in communication connection with the cloud data server.
The foregoing is merely a preferred embodiment of the invention, and it is to be understood that the invention is not limited to the form disclosed herein but is not to be construed as excluding other embodiments, but is capable of numerous other combinations, modifications and environments and is capable of modifications within the scope of the inventive concept, either as taught or as a matter of routine skill or knowledge in the relevant art. And that modifications and variations which do not depart from the spirit and scope of the invention are intended to be within the scope of the appended claims.

Claims (6)

1. The user data processing method based on information security is characterized by comprising the following steps:
step one, a cloud data server generates a user data storage module and a user data backup storage module, and the size of the user data backup storage module is dynamically adjusted through a data isolation processing module according to the use capacity of the user data storage module;
step two, a user data acquisition module acquires user data, a user data management module judges whether the data is uploaded for the first time according to the information of the user data acquisition module, if so, a data uploading module and a data backup module corresponding to the user data management module are generated, a step three is entered, and if not, a step seven is entered;
step three, the user data management module respectively carries out security verification on the user data acquisition module information and the uploaded user data, if both the user data acquisition module information and the uploaded user data pass the verification, the user data are cached in the data caching module in the user data management module, the user data acquisition module information is added to a user data acquisition module information list of the user data management module, the user data are transmitted to the user data storage module through the data uploading module corresponding to the user data management module, the copied user data are transmitted to the user data backup storage module through the data backup module, and the data backup module enters dormancy after the transmission is completed;
step four, checking the data consistency of the same user data in the user data storage module and the user data backup storage module through the data isolation processing module, deleting the user data in the cache module of the user data management module if the user data is consistent, generating user data inconsistent information according to the user data information through the data isolation processing module if the user data is inconsistent, and entering the step five;
fifthly, carrying out consistency check on the user data in the user data storage module and the user data in the data cache module, and if the user data in the user data storage module are inconsistent, replacing the user data in the user data storage module with the user data in the data cache module; if the two types of the information are consistent, the step six is entered;
step six, waking up the data backup module, taking the user data in the data cache module as secondary user data, sending the secondary user data to the user data backup storage module through the data backup module, acquiring inconsistent information of the user data from the data isolation processing module when the user data backup storage module receives the secondary user data, and replacing the user data in the user data backup storage module with the secondary user data to finish data verification if the inconsistent information of the user data corresponding to the user data information exists;
and seventhly, transmitting the user data acquired by the user data acquisition module to the user data storage module through the data uploading module corresponding to the user data management module, generating a user data change list according to the difference between the acquired user data and the user data stored by the user data storage module, transmitting the user data change list to the data isolation processing module, and carrying out user data change and storage by the user data backup storage module according to the user data change list to finish user data processing.
2. The method for processing user data based on information security according to claim 1, wherein the step of dynamically adjusting the size of the user data backup storage module by the data isolation processing module according to the capacity change of the user data storage module comprises the steps of:
the data isolation processing module adjusts the capacity of the user data backup storage module according to the difference between the capacity of the user data backup storage module and the use capacity of the user data storage module, so that the capacity of the user data backup storage module is consistent with the capacity of the user data storage module.
3. The method for processing user data based on information security as claimed in claim 1, wherein the user data management module determines whether the data is uploaded for the first time according to the information of the user data acquisition module, comprising: and according to the user data acquisition module information list, if the user data acquisition module information list does not contain the information of the user data acquisition module, uploading the data for the first time, otherwise, not uploading the data for the first time.
4. The method for processing user data based on information security as claimed in claim 1, wherein the user data management module performs security verification on the user data acquisition module information and the uploaded user data respectively, and the method comprises the steps of:
and verifying the authorization information in the user data acquisition module information, if the authorization verification is passed, performing integrity verification on the uploaded user data, and if the integrity verification is passed, completing security verification.
5. The method for processing user data based on information security according to claim 1, wherein the step of performing data consistency check on the same user data in the user data storage module and the user data backup storage module through the data isolation processing module comprises the steps of:
the data isolation processing module extracts the same user data in the user data storage module and the user data backup storage module into the data isolation processing module respectively, and performs data consistency verification.
6. The user data processing system based on information security is characterized in that the user data processing method based on information security according to any one of claims 1-5 is applied and comprises a cloud data server, a user data acquisition module, a user data management module and a communication device;
the user data acquisition module and the user data management module are respectively in communication connection with the communication device; the user data management module is in communication connection with the cloud data server.
CN202311126148.5A 2023-09-04 2023-09-04 User data processing method and system based on information security Active CN116860526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311126148.5A CN116860526B (en) 2023-09-04 2023-09-04 User data processing method and system based on information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311126148.5A CN116860526B (en) 2023-09-04 2023-09-04 User data processing method and system based on information security

Publications (2)

Publication Number Publication Date
CN116860526A CN116860526A (en) 2023-10-10
CN116860526B true CN116860526B (en) 2024-02-09

Family

ID=88234447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311126148.5A Active CN116860526B (en) 2023-09-04 2023-09-04 User data processing method and system based on information security

Country Status (1)

Country Link
CN (1) CN116860526B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105204962A (en) * 2015-09-25 2015-12-30 北京金山安全软件有限公司 Data backup method and device and server
CN106250265A (en) * 2016-07-18 2016-12-21 乐视控股(北京)有限公司 Data back up method and system for object storage
CN111708657A (en) * 2020-06-04 2020-09-25 江苏荣泽信息科技股份有限公司 System backup and verification method based on block chain query
CN116527401A (en) * 2023-06-30 2023-08-01 诚罡科技(天津)有限公司 Secure communication method and system of distributed data server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11275514B2 (en) * 2020-08-10 2022-03-15 International Business Machines Corporation Expanding storage capacity for implementing logical corruption protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105204962A (en) * 2015-09-25 2015-12-30 北京金山安全软件有限公司 Data backup method and device and server
CN106250265A (en) * 2016-07-18 2016-12-21 乐视控股(北京)有限公司 Data back up method and system for object storage
CN111708657A (en) * 2020-06-04 2020-09-25 江苏荣泽信息科技股份有限公司 System backup and verification method based on block chain query
CN116527401A (en) * 2023-06-30 2023-08-01 诚罡科技(天津)有限公司 Secure communication method and system of distributed data server

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
An Approach to Secure Capacity Optimization in Cloud Computing using Cryptographic Hash Function and Data De-duplication;Magesh Kumar S 等;《2020 3rd International Conference on Intelligent Sustainable Systems (ICISS)》;1256-1262 *
软件定义网络可扩展性研究综述;付永红 等;《通信学报》;第38卷(第7期);141-154 *
面向云计算的数据完整性检验方法研究与实现;苏兰;《中国优秀硕士学位论文全文数据库 信息科技辑》;I138-51 *

Also Published As

Publication number Publication date
CN116860526A (en) 2023-10-10

Similar Documents

Publication Publication Date Title
CN104364790B (en) system and method for implementing multi-factor authentication
US8407194B1 (en) Data classification and privacy repository
CN106874778B (en) Intelligent terminal file acquisition and data recovery system and method based on android system
US20140068733A1 (en) Managing password strength
US20090260055A1 (en) Real-time data sharing among a plurality of users
CN101952848A (en) Systems and methods for delegating access to online accounts
CN115859345B (en) Data access management method and system based on block chain
US20100114750A1 (en) Communication device and method for securing an internet bank account
CN103581441B (en) Mobile terminal follows the trail of burglary-resisting system and method
CN205594622U (en) Computer storage system
CN106161710B (en) A kind of user account safety management system based on smart phone
CN111339141B (en) Data transmission method, block chain node equipment and medium
CN110175316B (en) Media number interaction method, system and storage medium based on blockchain
CN103095530A (en) Method and system for sensitive information monitoring and leakage prevention based on front-end gateway
CN106778295A (en) File storage, display methods, device and terminal
CN114168830A (en) Public opinion data processing system and method, computer storage medium and electronic equipment
CN113904821A (en) Identity authentication method and device and readable storage medium
CN101964710A (en) Digital signature and signature authenticating method
CN108667818A (en) The method of cloud device and cloud net end Collaborative Control access rights
CN107580002A (en) Double factor authentication safety management machine login system and method
CN116860526B (en) User data processing method and system based on information security
CN113542232A (en) Website data safety protection system based on big data
CN102708143A (en) Tracking redo completion at a page level
CN105430013B (en) A kind of information access control method and system
US20160117524A1 (en) Enhanced view compliance tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20231229

Address after: No. 6, Youxin Group, Nongsheng Village, Lingguandian Town, Shaodong County, Shaoyang City, Hunan Province, 422000

Applicant after: Liu Yong

Applicant after: Xiong Yan

Address before: No.12 Xixin Avenue, high tech Zone, Chengdu, Sichuan 610000

Applicant before: Chengdu Shengyashi Lighting Equipment Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240119

Address after: W402, Shenzhen Hong Kong industry university research base, 015 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000

Applicant after: Shanheng Zhanchuang (Shenzhen) Development Partnership (L.P.)

Address before: No. 6, Youxin Group, Nongsheng Village, Lingguandian Town, Shaodong County, Shaoyang City, Hunan Province, 422000

Applicant before: Liu Yong

Applicant before: Xiong Yan

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant