CN117857177A - Data security storage system - Google Patents
Data security storage system Download PDFInfo
- Publication number
- CN117857177A CN117857177A CN202410017051.9A CN202410017051A CN117857177A CN 117857177 A CN117857177 A CN 117857177A CN 202410017051 A CN202410017051 A CN 202410017051A CN 117857177 A CN117857177 A CN 117857177A
- Authority
- CN
- China
- Prior art keywords
- data
- storage
- function
- security
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 23
- 238000011084 recovery Methods 0.000 claims abstract description 10
- 230000006835 compression Effects 0.000 claims description 46
- 238000007906 compression Methods 0.000 claims description 46
- 238000004458 analytical method Methods 0.000 claims description 18
- 238000011156 evaluation Methods 0.000 claims description 17
- 238000012502 risk assessment Methods 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 9
- 239000007787 solid Substances 0.000 claims description 5
- 238000007405 data analysis Methods 0.000 claims description 3
- 230000000737 periodic effect Effects 0.000 claims description 3
- 238000013439 planning Methods 0.000 claims description 3
- 230000035945 sensitivity Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000013210 evaluation model Methods 0.000 claims description 2
- 238000007726 management method Methods 0.000 abstract description 4
- 239000002699 waste material Substances 0.000 abstract description 3
- 238000013500 data storage Methods 0.000 abstract description 2
- 230000007547 defect Effects 0.000 abstract description 2
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a data safety storage system, which relates to the technical field of data storage and solves the technical problems that the prior art has defects in improving the use efficiency of storage space, most systems do not fully utilize the storage space, and the resource waste and the management cost are increased; the system can determine the storage strategy according to the data type, the volume and the like so as to optimize the storage efficiency, the method reduces the resource waste and the management cost, and meanwhile, the invention determines corresponding safety measures including data encryption, backup frequency, disaster recovery plan and the like by comprehensively evaluating the data type and the storage requirement, thereby not only ensuring the safety of the data, but also enhancing the recovery capability of the data under the unexpected condition and greatly reducing the risk of data loss.
Description
Technical Field
The invention relates to the technical field of data storage, in particular to a data security storage system.
Background
In the field of modern data management, the development of data secure storage systems has mainly focused on improving the security and integrity of data. These systems protect data from external threats, such as illegal access and data tampering, by employing a variety of encryption and backup policies. However, the prior art has a disadvantage in improving the use efficiency of the storage space. Most systems do not fully utilize storage space, resulting in wasted resources and increased management costs.
In addition, data security storage systems have difficulty ensuring maximization of data security while not considering costs and operational feasibility, and greatly reducing the risk of data loss and security threats without appropriate policies to manage sensitive data and ensure data recoverability.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data security storage system, which solves the problems in the background technology.
In order to achieve the above purpose, the invention is realized by the following technical scheme: a data secure storage system, comprising:
the user terminal module is used for generating information to be stored and transmitting the stored information to the subsequent identification module;
the identification module is used for identifying the data type of the stored information, evaluating the storage requirement through a decision function by taking the identified data type, performance requirement and data volume as parameters to obtain a final determined storage mode, selecting a proper compression mode according to the identified data type, quality requirement and final determined storage mode, sorting into compression packets, and transmitting to the subsequent analysis processing module;
the analysis processing module is used for receiving the compressed package of the identification module, acquiring a corresponding data type and a storage strategy, analyzing the stored data through a preset evaluation model to obtain a risk evaluation result, comprehensively evaluating the risk evaluation result through a safety function, finally determining the safety strategy to obtain a storage requirement of the compressed package, and transmitting the compressed package and the storage requirement to a subsequent storage module to store according to the storage requirement;
and the storage module is used for receiving the transmitted compressed packet and the corresponding storage requirement of the data analysis module and storing the compressed packet according to the storage requirement.
Preferably, the data types include: text data, image data, audio data, video data, numeric data, structured data, unstructured data.
Preferably, the manner of identifying the data type of the stored information is:
s1: acquiring stored information data;
by the function formula: t=f (D);
wherein: t represents the output of the data type of the data, D represents the input storage information data, f represents the recognition function and represents the data type recognition process;
s2: the steps of identifying the internal mechanism of the function f are:
s21: checking file extension, wherein a function firstly checks the file extension of a data sample;
s22: magic number checking, the function will check the beginning byte of the data sample to find the magic number, which is a specific byte sequence of the file format, if the extension is ambiguous or further verification is required;
s23: content analysis, wherein if the data types cannot be determined in the first two steps, the function performs deeper content analysis on the data samples; the method comprises the steps of checking text characteristics by text pattern matching and checking structural characteristics of non-text files by binary analysis;
s24: comprehensively judging, and finally, integrating the results of the previous steps by the function to make final data type judgment;
s3: and in the output stage, outputting the data type T, and obtaining the data type according to the analysis of the function f.
Preferably, the specific storage requirement assessment is performed in the following manner:
p1: acquiring the data type;
through a function formula s=g (T, P, V);
wherein: s represents a storage strategy; p represents a performance requirement; v represents the data volume; g represents a storage decision function for deciding a storage policy based on the data type, performance requirements and data volume;
preferably, after P1:
p2: the step of storing the internal mechanism of the decision function g is:
p21: performance requirement P evaluation:
analyzing the use mode of the data, and then taking the requirement on response time into consideration to obtain the performance requirement during data processing and storage;
and (3) outputting: quantitative or qualitative descriptions of performance requirements;
p22: data volume V evaluation:
the method comprises the steps of directly measuring the size of a file, and estimating the growth rate and the maximum capacity of a database or dynamic data through a preset prediction model;
and (3) outputting: a quantized value of the data volume;
p23: determining a storage strategy S;
evaluating the applicability of different storage options by combining T, P, V with a storage decision function g; then selecting the most suitable storage strategy based on the factors;
consider a variety of storage solutions including hard disks, solid state disks, network attached storage, cloud storage;
and (3) outputting: the finally determined storage strategy is used as a storage mode and comprises the following steps: "use solid state disk storage", "employ cloud storage solution".
Preferably, the specific method for selecting a proper compression mode is as follows:
AS1: acquiring a data type and a corresponding storage mode;
through the function formula c=h (T, Q, S i)
Wherein: c represents the selected compression strategy; q represents the quality requirement and h represents the compression strategy function, which determines the most appropriate compression strategy based on the values of T, Q and S.
Preferably, after AS1:
AS2: the steps of compressing the internal mechanism of the strategy function are as follows:
AS21: quality requirement Q evaluation:
for critical data, lossless compression is typically required; for image and video media files, determining acceptable quality loss degree according to the use scene; then obtaining the requirement on the quality of the compressed data;
and (3) outputting: quantitative or qualitative descriptions of quality requirements, including: "lossless", "high quality", "standard quality".
AS22: compression strategy C determines:
using a compression strategy function h to evaluate the applicability of different compression options by combining a data type T, a quality requirement Q and a storage strategy S, and selecting a proper compression mode based on the factors;
and (3) outputting: the final determined compression strategy comprises the following steps: "lossless compression", "JPEG compression", "MP3 compression".
Preferably, the specific comprehensive evaluation mode is as follows:
x1: acquiring a data type T and a storage strategy S;
through the function formula b=i (T, S, R);
where B represents the selected backup and security policy, R represents a risk assessment, i is a security function that determines the most appropriate security policy based on T, S and the value of R.
Preferably, following X2:
x2: the internal mechanism of the security function i comprises the steps of:
x21: risk assessment R, analyzing the sensitivity, the value and the exposure risk of the data through a preset assessment model, and then considering potential security threats such as hacking, physical damage and the like;
and (3) outputting: the risk assessment results include: "high risk", "medium risk";
x22: backup and security policy B decision to evaluate the applicability of different security options by using security function i in combination with data type T, storage policy S, risk assessment R;
considering a variety of security solutions including data encryption, backup frequency, multiple backups, disaster recovery planning, selecting appropriate backup and security methods based on the above factors;
and (3) outputting: finally, the security policy is determined, which comprises the following steps: "periodic remote backup", "encrypting storage", "establishing disaster recovery plan".
The invention provides a data security storage system. Compared with the prior art, the method has the following beneficial effects:
(1) According to the invention, the storage space can be more effectively utilized by identifying different types of data and evaluating the storage requirement of the data; the system can determine the storage policy based on the data type (e.g., text, image, audio, etc.) and volume to optimize storage efficiency. The method reduces resource waste and reduces management cost.
(2) The invention determines corresponding safety measures including data encryption, backup frequency and disaster recovery plan by comprehensively evaluating the data types and storage requirements. The strategy not only ensures the safety of the data, but also enhances the recovery capability of the data under the unexpected condition, and greatly reduces the risk of data loss.
Drawings
The invention is further described below with reference to the accompanying drawings.
FIG. 1 is a system frame diagram of a data security storage system of the present invention;
FIG. 2 is a flowchart illustrating steps of a data security storage system according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
1-2, the present invention provides a data security storage system, comprising;
and the user terminal module is used for generating information to be stored and transmitting the stored information to the subsequent identification module.
The identification module is used for identifying the data type of the stored information, carrying out storage requirement assessment through the identified data type to obtain a final determined storage mode, selecting a proper compression mode according to the identified data type and the final determined storage mode, then finishing the data type and the final determined storage mode into a compression packet, and then transmitting the compression packet to the subsequent analysis processing module; wherein the data types include: text data, image data, audio data, video data, numeric data, structured data, unstructured data, etc.;
the manner of identifying the data type of the stored information is:
s1: acquiring stored information data;
by the function formula: t=f (D);
wherein: t represents the output of the data type of the data, D represents the input storage information data, f represents the recognition function, and represents the data type recognition process.
S2: the steps of identifying the internal mechanism of the function f are:
s21: checking file extension, wherein the function firstly checks the file extension of the data sample, such as txt represents a text file, jpg represents an image file and the like;
s22: magic number checking, the function will check the bytes at the beginning of the data sample to find the magic number, which is a specific byte sequence in file format, if the extension is ambiguous or needs further verification, such as PDF file beginning with% PDF;
s23: content analysis, wherein if the data types cannot be determined in the first two steps, the function performs deeper content analysis on the data samples; including text pattern matching (checking text features), binary analysis (checking structural features of non-text files), etc.;
s24: comprehensively judging, and finally, integrating the results of the previous steps by the function to make final data type judgment;
s3: in the output stage, the data type outputs T, and the T obtains the data type, such as text, image, audio and other specific data types, according to the analysis of the function f;
the specific storage demand assessment method is as follows:
p1: acquiring the data type;
through a function formula s=g (T, P, V);
wherein: s represents a storage strategy; p represents a performance requirement; v represents the data volume; g represents a storage decision function for deciding a storage policy based on the data type, performance requirements and data volume;
p2: the step of storing the internal mechanism of the decision function g is:
p21: performance requirement (P) evaluation:
the data processing and storage performance requirements are obtained by analyzing the data use modes, such as the reading and writing frequency, and then considering the response time requirements;
and (3) outputting: quantitative or qualitative descriptions of performance requirements, such as "high speed read-write", "low frequency access", and the like.
P22: data volume (V) evaluation:
the method comprises the steps of directly measuring the size of a file, and estimating the growth rate and the maximum capacity of a database or dynamic data through a preset prediction model;
and (3) outputting: quantized values of data volumes, such as "500GB", "2TB", etc.
P23: a storage strategy (S) determination;
evaluating the applicability of different storage options by combining T, P, V with a storage decision function g; the most appropriate storage policy is then selected based on the factors described above.
Various storage solutions are contemplated including hard disk (HDD), solid State Disk (SSD), network Attached Storage (NAS), cloud storage, and the like.
And (3) outputting: the finally determined storage strategy is used as a storage mode, for example, "using SSD storage", "adopting a cloud storage solution", and the like.
The specific method for selecting the proper compression mode comprises the following steps:
AS1: acquiring a data type and a corresponding storage mode;
through the function formula c=h (T, Q, S i)
Wherein: c represents the selected compression strategy; q represents the quality requirement, h represents the compression strategy function, which determines the most appropriate compression strategy based on the values of T, Q and S;
AS2: the steps of compressing the internal mechanism of the strategy function are as follows:
AS21: quality requirement (Q) evaluation:
lossless compression is typically required for critical data, such as text or program code; for media files such as images, videos and the like, determining acceptable quality loss degree according to a use scene; and then gets the demand for the quality of the compressed data.
And (3) outputting: quantitative or qualitative descriptions of quality requirements, such as "lossless", "high quality", "standard quality".
AS22: compression strategy (C) decision
The applicability of the different compression options is evaluated using the compression policy function h in combination with T (data type), Q (quality requirement), S (storage policy), and an appropriate compression scheme is selected based on the above factors.
And (3) outputting: the compression strategy to be finally determined is, for example, "lossless compression", "JPEG compression", "MP3 compression", etc.
Example two
In the implementation process of this embodiment, on the basis of the first embodiment, the difference from the first embodiment is that:
the analysis processing module is used for receiving the compressed package of the identification module, acquiring corresponding T (data type) and S (storage strategy), carrying out comprehensive evaluation, finally determining the security strategy to obtain the storage requirement of the compressed package, and sending the compressed package and the storage requirement to the subsequent storage module for storage according to the storage requirement.
The specific comprehensive evaluation mode is as follows:
x1: acquiring T (data type) and S (storage strategy);
through the function formula b=i (T, S, R);
where B represents the selected backup and security policy, R represents a risk assessment, i is a security function that determines the most appropriate security policy based on T, S and the value of R.
X2: the internal mechanism of the security function i comprises the steps of:
x21: risk assessment (R), analyzing the sensitivity, value and exposure risk of the data by a preset assessment model, and then considering potential security threats such as hacking, physical damage and the like;
and (3) outputting: the results of risk assessment, such as "high risk", "medium risk".
X22: backup and security policy (B) decision, the applicability of the different security options is evaluated by using the security function i in combination with T (data type), S (storage policy), R (risk assessment).
Considering a variety of security solutions including data encryption, backup frequency, multiple backups, disaster recovery planning, etc., appropriate backup and security methods are selected based on the above factors.
And (3) outputting: finally, security policies such as "periodic remote backup", "encrypting storage", "establishing disaster recovery plan", etc. are determined.
And the storage module is used for receiving the transmitted compressed packet and the corresponding storage requirement of the data analysis module and storing the compressed packet according to the storage requirement.
Example III
This embodiment includes all of the implementations of the two sets of embodiments described above.
Some of the data in the above formulas are numerical calculated by removing their dimensionality, and the contents not described in detail in the present specification are all well known in the prior art.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.
Claims (9)
1. A data secure storage system, comprising:
the user terminal module is used for generating information to be stored and transmitting the stored information to the subsequent identification module;
the identification module is used for identifying the data type of the stored information, evaluating the storage requirement through a decision function by taking the identified data type, performance requirement and data volume as parameters to obtain a final determined storage mode, selecting a proper compression mode according to the identified data type, quality requirement and final determined storage mode, sorting into compression packets, and transmitting to the subsequent analysis processing module;
the analysis processing module is used for receiving the compressed package of the identification module, acquiring a corresponding data type and a storage strategy, analyzing the stored data through a preset evaluation model to obtain a risk evaluation result, comprehensively evaluating the risk evaluation result through a safety function, finally determining the safety strategy to obtain a storage requirement of the compressed package, and transmitting the compressed package and the storage requirement to a subsequent storage module to store according to the storage requirement;
and the storage module is used for receiving the transmitted compressed packet and the corresponding storage requirement of the data analysis module and storing the compressed packet according to the storage requirement.
2. A data security storage system in accordance with claim 1, wherein,
the data types include: text data, image data, audio data, video data, numeric data, structured data, unstructured data.
3. A data security storage system in accordance with claim 1, wherein,
the manner of identifying the data type of the stored information is:
s1: acquiring stored information data;
by the function formula: t=f (D);
wherein: t represents the output of the data type of the data, D represents the input storage information data, f represents the recognition function and represents the data type recognition process;
s2: the steps of identifying the internal mechanism of the function f are:
s21: checking file extension, wherein a function firstly checks the file extension of a data sample;
s22: magic number checking, the function will check the beginning byte of the data sample to find the magic number, which is a specific byte sequence of the file format, if the extension is ambiguous or further verification is required;
s23: content analysis, wherein if the data types cannot be determined in the first two steps, the function performs deeper content analysis on the data samples; the method comprises the steps of checking text characteristics by text pattern matching and checking structural characteristics of non-text files by binary analysis;
s24: comprehensively judging, and finally, integrating the results of the previous steps by the function to make final data type judgment;
s3: and in the output stage, outputting the data type T, and obtaining the data type according to the analysis of the function f.
4. A data security storage system in accordance with claim 3 wherein,
the specific storage demand assessment method is as follows:
p1: acquiring the data type;
through a function formula s=g (T, P, V);
wherein: s represents a storage strategy; p represents a performance requirement; v represents the data volume; g represents a storage decision function for deciding a storage policy based on the data type, performance requirements and data volume.
5. A data security storage system in accordance with claim 4, wherein,
after P1:
p2: the step of storing the internal mechanism of the decision function g is:
p21: performance requirement P evaluation:
analyzing the use mode of the data, and then taking the requirement on response time into consideration to obtain the performance requirement during data processing and storage;
and (3) outputting: quantitative or qualitative descriptions of performance requirements;
p22: data volume V evaluation:
the method comprises the steps of directly measuring the size of a file, and estimating the growth rate and the maximum capacity of a database or dynamic data through a preset prediction model;
and (3) outputting: a quantized value of the data volume;
p23: determining a storage strategy S;
evaluating the applicability of different storage options by combining T, P, V with a storage decision function g; then selecting the most suitable storage strategy based on the factors;
consider a variety of storage solutions including hard disks, solid state disks, network attached storage, cloud storage;
and (3) outputting: the finally determined storage strategy is used as a storage mode and comprises the following steps: "use solid state disk storage", "employ cloud storage solution".
6. A data security storage system in accordance with claim 5, wherein,
the specific method for selecting the proper compression mode comprises the following steps:
AS1: acquiring a data type and a corresponding storage mode;
through the function formula c=h (T, Q, si)
Wherein: c represents the selected compression strategy; q represents the quality requirement and h represents the compression strategy function, which determines the most appropriate compression strategy based on the values of T, Q and S.
7. A data security storage system in accordance with claim 6, wherein,
after AS1:
AS2: the steps of compressing the internal mechanism of the strategy function are as follows:
AS21: quality requirement Q evaluation:
for critical data, lossless compression is typically required; for image and video media files, determining acceptable quality loss degree according to the use scene; then obtaining the requirement on the quality of the compressed data;
and (3) outputting: quantitative or qualitative descriptions of quality requirements, including: "lossless", "high quality", "standard quality".
AS22: compression strategy C determines:
the applicability of different compression options is evaluated by using a compression strategy function h in combination with a data type T, a quality requirement Q and a storage strategy S, and a proper compression mode is selected based on the factors.
And (3) outputting: the final determined compression strategy comprises the following steps: "lossless compression", "JPEG compression", "MP3 compression".
8. A data security storage system in accordance with claim 1, wherein,
the specific comprehensive evaluation mode is as follows:
x1: acquiring a data type T and a storage strategy S;
through the function formula b=i (T, S, R);
where B represents the selected backup and security policy, R represents a risk assessment, i is a security function that determines the most appropriate security policy based on T, S and the value of R.
9. A data security storage system in accordance with claim 8, wherein,
after X2:
x2: the internal mechanism of the security function i comprises the steps of:
x21: risk assessment R, analyzing the sensitivity, the value and the exposure risk of the data through a preset assessment model, and then considering potential security threats such as hacking, physical damage and the like;
and (3) outputting: the risk assessment results include: "high risk", "medium risk";
x22: backup and security policy B decides to evaluate the applicability of the different security options by using security function i in combination with data type T, storage policy S, risk assessment R.
Considering a variety of security solutions including data encryption, backup frequency, multiple backups, disaster recovery planning, a suitable backup and security method is selected based on the above factors.
And (3) outputting: finally, the security policy is determined, which comprises the following steps: "periodic remote backup", "encrypting storage", "establishing disaster recovery plan".
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410017051.9A CN117857177A (en) | 2024-01-05 | 2024-01-05 | Data security storage system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410017051.9A CN117857177A (en) | 2024-01-05 | 2024-01-05 | Data security storage system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117857177A true CN117857177A (en) | 2024-04-09 |
Family
ID=90534180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410017051.9A Pending CN117857177A (en) | 2024-01-05 | 2024-01-05 | Data security storage system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117857177A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118312111A (en) * | 2024-06-11 | 2024-07-09 | 深圳市领德创科技有限公司 | Solid state disk data storage management system |
-
2024
- 2024-01-05 CN CN202410017051.9A patent/CN117857177A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118312111A (en) * | 2024-06-11 | 2024-07-09 | 深圳市领德创科技有限公司 | Solid state disk data storage management system |
CN118312111B (en) * | 2024-06-11 | 2024-08-30 | 深圳市领德创科技有限公司 | Solid state disk data storage management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11468510B2 (en) | Due diligence in electronic documents | |
EP3734489B1 (en) | Evidence collection method and system based on blockchain evidence storage | |
CN117857177A (en) | Data security storage system | |
US8422730B2 (en) | System for analyzing forensic evidence using image filter and method thereof | |
Ali et al. | A review of digital forensics methods for JPEG file carving | |
US20210133742A1 (en) | Detection of security threats in a network environment | |
US11249987B2 (en) | Data storage in blockchain-type ledger | |
WO2021027252A1 (en) | Data storage method and apparatus in block chain-type account book, and device | |
CN112632568B (en) | Temperature data storage and acquisition method, system, electronic equipment and storage medium | |
CN113177203B (en) | Method and device for identifying encrypted malicious message flow | |
CN116881687B (en) | Power grid sensitive data identification method and device based on feature extraction | |
CN117077158A (en) | Compliance data conversion storage system | |
CN108563396B (en) | Safe cloud object storage method | |
CN114546957A (en) | Intelligent centralized data processing service platform | |
CN110674219A (en) | Block chain based ambient air detection data chaining method and equipment for Internet of things | |
CN112445773B (en) | Method and device for generating decompression log of compressed file and readable storage medium | |
US11928135B2 (en) | Edge computing data reproduction and filtering gatekeeper | |
CN117596174B (en) | Iron tower video data cloud transmission adjustment and measurement method, system and medium | |
CN113992978B (en) | Evaluation method and device of video defense system, storage medium and processor | |
CN108848104B (en) | Information management method and device | |
Abdi et al. | Corrupted MP4 carving using MP4-Karver | |
CN116955702A (en) | Video processing method, device and storage medium based on block chain | |
KR101886526B1 (en) | Method and system for specifying payload signature for elaborate application traffic classification | |
Ge et al. | Adaptive carving method for live flv streaming | |
CN113590636A (en) | Online transaction system and method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |