CN205430310U - Data storage device - Google Patents

Data storage device Download PDF

Info

Publication number
CN205430310U
CN205430310U CN201520860092.0U CN201520860092U CN205430310U CN 205430310 U CN205430310 U CN 205430310U CN 201520860092 U CN201520860092 U CN 201520860092U CN 205430310 U CN205430310 U CN 205430310U
Authority
CN
China
Prior art keywords
data
encryption
storage device
user
storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201520860092.0U
Other languages
Chinese (zh)
Inventor
陈建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan miracle cloud Technology Co., Ltd.
Original Assignee
Nanjing Qinshe Mingshi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Qinshe Mingshi Information Technology Co Ltd filed Critical Nanjing Qinshe Mingshi Information Technology Co Ltd
Priority to CN201520860092.0U priority Critical patent/CN205430310U/en
Application granted granted Critical
Publication of CN205430310U publication Critical patent/CN205430310U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The utility model discloses a data storage device, data storage device includes: data storage device includes: shift register, trigger, content address memory and operational amplifier, shift register trigger, content address memory and operational amplifier electricity are connected, wherein, shift register includes the local cipher dish, the local cipher dish is independent data space, the trigger obtains the data of local cipher dish, sends a encrypted data and gives the server, the encryption dish of a encrypted data to other at least one storage device is saved in step to the content address memory, other at least one storage device's encryption dish is divided in advance, operational amplifier accepts the instruction of deletion data, sends the inquiry request and gives the server, synchronous storage data arrive other at least one computers.

Description

A kind of data storage device
Technical field
This utility model relates to computer realm, particularly relates to a kind of data storage device.
Background technology
Dropbox can be regarded as hard disk or the USB flash disk leaving on network, and therefore Dropbox is also called Network U plate or network hard disc, for providing a user with online file and store, access, back up, the file management facilities such as sharing.By Dropbox, no matter user is anywhere, as long as can connect to the Internet, so that it may by the file of on-line storage in mobile terminal administration Dropbox.
Existing Dropbox storage mode has multiple, such as, the file uploading method of the network hard disc that the application documents of Application No. 201210362185.1 provide, according to document, file is stored;The most such as, the network disk file storage method that the application documents of Application No. 201280000563.X provide, carry out file storage according to file name.
Dropbox, as a kind of method of effective backup local file, is widely used, but Dropbox can increase an administrator role, creates new security risk.
Data are stored to Dropbox user and are obtained the data preserved by password;The data of storage can not be obtained without password then user, can to a certain degree ensure data safety.But, in the method for Dropbox storage data, Dropbox manager has the authority of management user storage data, and Dropbox manager can inquire about the data of user's storage and even deletes storage content or freeze Dropbox account, affects data storage security.
Utility model content
The utility model proposes a kind of data storage device, it is possible to strengthen the safety of local datastore.
This utility model embodiment provides a kind of data storage device, described data storage device includes: described data storage device includes: shift register, trigger, contents address memory and operational amplifier, described shift register, described trigger, contents address memory and operational amplifier electrical connection;Wherein, described shift register includes that local cipher dish, described local cipher dish are independent data space;Described trigger obtains the data of local cipher dish, sends the first encryption data to server;Described contents address memory synchronizes storage the first encryption data encryption disc to other at least one storage devices, and the encryption disc of other at least one storage devices described divides in advance;Described operational amplifier accepts to delete the instruction of data, sends inquiry request to server;Synchronize to store described data to other at least one computers.
The data storage device that the utility model proposes, local cipher dish is divided according to user setup, by user, these data stored to local cipher dish are encrypted, obtain encryption data, encryption data is synchronized the storage encryption disc to other at least one storage devices, thus the data encryption that will be stored in local cipher dish is stored in other storage devices, thus strengthen the safety of local datastore.Additionally, when deleting data, the quantity once the computer storing described data is less than the quantity preset, and controls described data and backups to other computers, to ensure data safety.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe, the disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meets embodiment of the present utility model, and is used for explaining principle of the present utility model together with description.
Fig. 1 is a kind of flow chart of this utility model computer embodiment;
Fig. 2 is a kind of Computer Systems Organization schematic diagram of this utility model computer embodiment;
Fig. 3 is that the encryption disc memory space of this utility model computer embodiment uses schematic diagram;
Fig. 4 is another flow chart of this utility model computer embodiment;
Fig. 5 is the structural representation of the device that this utility model provides;
Wherein,
S1 core memory equipment
S2 stores server
S3 computer
S4 mobile device.
Detailed description of the invention
This utility model one data storage device, see Fig. 5, described data storage device includes: described data storage device includes: shift register, trigger, contents address memory and operational amplifier, described shift register, described trigger, contents address memory and operational amplifier electrical connection;Wherein,
Described shift register includes that local cipher dish, described local cipher dish are independent data space;
Described trigger obtains the data of local cipher dish, sends the first encryption data to server;
Described contents address memory synchronizes storage the first encryption data encryption disc to other at least one storage devices, and the encryption disc of other at least one storage devices described divides in advance;
Described operational amplifier accepts to delete the instruction of data, sends inquiry request to server;Synchronize to store described data to other at least one computers.
In one embodiment, described data storage device also includes transceiver: described transceivers the second encryption data, sends the second encryption data to local cipher dish;
Sending described second encryption data to be deleted to the encryption disc of other at least one storage devices, the encryption disc of described at least other storage device divides in advance.
In one embodiment, described trigger obtains the data of local cipher dish, sends the cryptographic Hash of described data to server;
Send key request to server;Receive the key that server is sent.
In one embodiment, described trigger receives other storage device and takes the request of described key;
Described trigger sends described key to other storage device described.
This utility model embodiment provides a kind of data storage device, and described data storage device includes:
First processing unit, for dividing local cipher dish according to user setup, described local cipher dish is independent data space;
By user, these data stored to local cipher dish are encrypted, and obtain the first encryption data;
Described first encryption data is issued server;
By the encryption disc of described data sync storage to other at least one computers, the encryption disc of other at least one computers described divides in advance;
Second processing unit, for when described first computer receives the instruction deleting data, described first computer stores the information of the computer of described data to server lookup;
When store described data computer quantity less than preset quantity time, described first computer by described data sync storage to other at least one computers.
In one embodiment, described first processing unit, for stochastic generation key;
According to described key, by user, these data stored to local cipher dish are encrypted, and obtain described first encryption data.
In one embodiment, described first processing unit, it is used for
Receive the second encryption data, described first encryption data that the second described encryption data synchronizes from other storage device;
Second encryption data is stored to local cipher dish;
When deleting described second encryption data of local cipher disk storage, described second encryption data being transferred to the encryption disc of other at least one storage devices, the encryption disc of described at least other storage device divides in advance.
In one embodiment, described first processing unit, it is used for
Storing the data to local cipher dish according to this, generate corresponding cryptographic Hash, described cryptographic Hash uniquely identifies this and stores the data to local cipher dish;
Ask the key that other any user generate when being stored in the data file identical with described cryptographic Hash in its local cipher dish;
Receive described key;
Accordingly, by user, these data stored to local cipher dish are encrypted, and obtain the first encryption data and include:
According to described key, to user, these data stored to local cipher dish are encrypted.
In one embodiment, described first processing unit, it is used for
Receive other storage device and take the request of described key, described in take the described key data to be stored by other storage device described of request identical with these data stored to local cipher dish described time transmission;
According to the request of the described key of described acquisition, send described key to other storage device described.
In one embodiment, described first processing unit, after user identity is by checking, reads described first encryption data according to described key from least one memorizer described.
The present embodiment divides local cipher dish according to user setup, by user, these data stored to local cipher dish are encrypted, obtain encryption data, encryption data is synchronized the storage encryption disc to other at least one storage devices, thus the data encryption that will be stored in local cipher dish is stored in other storage devices, thus strengthen the safety of local datastore.And, in the present embodiment when deleting data, the quantity once the computer storing described data is less than the quantity preset, and controls described data and backups to other computers, to ensure data safety.
For making the purpose of the present embodiment, technical scheme and advantage clearer, below in conjunction with the accompanying drawing in the present embodiment, the technical scheme in the present embodiment is clearly and completely described, it is clear that, described embodiment is a part of embodiment of this utility model rather than whole embodiments.Based on the embodiment in this utility model, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into the scope of this utility model protection.
Memorizer in the present embodiment can be the equipment with data storage function, concrete, and this equipment with data storage function can be the equipment comprising storage chip, storage hard disk, such as computer etc., and the present embodiment does not limits.
Embodiment 1
The computer of the present embodiment, by having the equipment of storage function, as computer realizes.The present embodiment realizes illustrating as a example by this computer by computer, but the computer of the present embodiment is not limited to computer.
As it is shown in figure 1, this computer includes:
Step 11: dividing local cipher dish according to user setup, local cipher dish is independent data space.
In the present embodiment, in the storage device of computer, mark off part memory space as local cipher dish according to user setup, for depositing the encryption data of this locality.
Can actively ensure to store the safety of content for realizing the encryption disc on computer, can arrange the access password of encryption disc, the most also can use secure logon facility in the present embodiment, user needs to log in and could access local cipher dish.
Such as, when user accesses local cipher dish, limit user and input the errors number of password.After number of times exceeds, refuse again to access within a period of time, such as, just can again attempt to access after several hours or after one day.
During networking, send note can to reserved phone number, remind user cipher input error.
During off-line, then lock that this encryption disc is current and inaccessible within a period of time.
In order to avoid the content of local cipher dish cannot be opened in the case of not having network, local account encrypted code verification can be allowed.If continuous cipher authentication failed reaches set point number, then require that user networks checking.
After user networks, the checking frequency of user can be controlled at server end, it is to avoid have the situation of Brute Force user name password to occur, thus guarantee data security.
Step 12: these data stored to local cipher dish are encrypted by user, obtain the first encryption data.
Can use multiple cipher mode in the present embodiment, the present embodiment does not limit concrete cipher mode.
User this store the data to local cipher dish, through encryption after, obtain the first encryption data.Data encryption can actively strengthen safety when data are propagated on the internet.
Step 13: the first encryption data synchronizes the storage encryption disc to other at least one storage devices, and the encryption disc of at least one storage device divides in advance.
Should be appreciated that the present available capacity of the encryption disc that arbitrary storage device divides in advance is more than the memory capacity required for the data after encryption.
In the present embodiment, whether the present available capacity that can prejudge storage device encryption disc is more than the memory capacity required for the data after encrypting, and when the present available capacity confirming storage device encryption disc is enough, then starts to carry out synchronizing storage to this storage device.
So, when to encryption disc write a encryption data when, carry out this encryption data at least one storage device on the Internet synchronizing storage.
In the present embodiment, can pre-set the storage device quantity synchronized required for storage the first encryption data according to different scenes, the storage device generally synchronizing storage the first encryption data should more than two, it is preferable that be at least 10.So, the backup quantity of data by increasing redundancy ensures that user can obtain the first encryption data in time, it is ensured that the safety of the first encryption data storage, prevents loss of data.
In the present embodiment, can automatically detect preservation current crypto data and active storage device quantity, when current quantity is less than predetermined number, server dominate, encryption data in the memory space of trend any active ues backs up.
In the present embodiment, when the first encryption data synchronizes storage to other at least one storage devices, P2P technology is used to carry out data transmission.The present embodiment can arrange system server assist and set up P2P link.First it is detected that neighbouring storage device active in current ink, and attempt carrying out P2P connection.If link establishment failure, then the data storage device reselecting another one active sets up P2P link.
In order to avoid currently available synchronous memory device very little, the present embodiment may also provide sufficient amount of common storage device, e.g., at least 10, and during to guarantee any instant, the P2P link between local memory device and public server can be successfully established.
In the present embodiment, in step 12, by user, these data stored to local cipher dish are encrypted, when obtaining the first encryption data, and can stochastic generation key, by this key, by user, these data stored to local cipher dish are encrypted, and obtain the first encryption data.
In the present embodiment, when being encrypted these data stored to local cipher dish, computer can one key of stochastic generation, this key is uniquely determined by these data, can only can decipher this encryption data by this key, it is thus achieved that these data, thus improve data storage safety.
Preferably, this key can be saved in local side and server end.
In the present embodiment, in step 13 by the data sync storage after encryption to after the encryption disc of other at least one storage devices, be additionally included in user identity by verifying after, read the first encryption data according to key from least one memorizer.
In the present embodiment, this first encryption data synchronizes storage in storage and other at least one storage devices in local cipher dish.After checking user identity, by the key uniquely mapped with this first encryption data, open this first encryption data being saved in certain current addressable storage device encryption disc.
Various ways can be used to verify user identity, such as account number cipher mode, dynamic password mode etc., and the present embodiment does not limits.
In the present embodiment, a user can be provided with encryption disc in multiple stage storage device;Different user can be provided with respective encryption disc on same equipment.In the present embodiment, can arrange cipher server and preserve the whole user profile using this computer, this user profile can include user name, password and other checking information etc..First each user profile is encrypted, it is preferable that obtain uniquely identifying the encryption subscriber information string of this user.The most again this encryption subscriber information string is uploaded to cipher server.Therefore, at cipher server end, user profile not stored in clear, user profile is transparent for cipher server.The information such as the password of user only have user, use the information such as username and password of oneself, could decipher this information, and this deciphering is only limitted to verify for user login information.Therefore, both ensure that cipher server end cannot inquire about the personal information of user, and avoided again plaintext user information accidentally to be leaked, thus strengthened the privacy of data storage.
In the present embodiment, file server can be set and preserve the listed files of the whole users using this computer.When user's data to its encryption disc in its arbitrary storage device being preset with local cipher dish are modified, synchronized update this document list, then other storage device being preset with local cipher dish can automatically derive synchronization after logging in its next time and when coupling the Internet.When user logs in the account of oneself in arbitrary storage device being preset with local cipher dish, may select and automatically from the Internet, fetch the data belonging to himself to his new encryption disc.
In the present embodiment, after step 11 divides local cipher dish according to user setup, further comprising the steps of:
Receiving the second encryption data, this second encryption data is the first encryption data synchronized from other storage device;
This second encryption data is stored to local cipher dish;
When deleting the second encryption data of local cipher disk storage, this second encryption data being transferred to the encryption disc of other at least one storage devices, the encryption disc of these other storage devices divides in advance.
The present embodiment carries out dynamic itemset counting to the active backup that each data file encryption is current, decides whether to continue to carry out synchronizing storage to other available storage devices according to the active backup counting that each data file encryption is current.
In the present embodiment, when deleting the second encryption data of local cipher disk storage, the second encryption data is transferred to the encryption disc of other at least one storage devices.Therefore, if the encryption data of one of them storage device storage is deleted or loses, by by encryption data to other storage device unloading, from without causing encryption data to be lost because the storage device of storage encryption data disappears, thus improve data storage security.
It should be noted that in the present embodiment, when its storage data deleted by local cipher dish, simultaneously or Preset Time such as, data corresponding in all synchronous memory device after 24 hours, can be deleted.Thus preventing user misoperation from accidentally deleting data, in order to data are recovered.
In the present embodiment, by user, these data stored to local cipher dish are encrypted step 12, before obtaining the first encryption data, also comprise the steps:
Storing the data to local cipher dish according to this, generate corresponding cryptographic Hash, this cryptographic Hash uniquely identifies this and stores the data to local cipher dish;
Ask the key that other any user generate when being stored in the data file identical with this cryptographic Hash in its local cipher dish;
Receive this key;
Accordingly, by user, these data stored to local cipher dish are encrypted, and obtain the first encryption data and include:
According to this key, to user, these data stored to local cipher dish are encrypted.
In the present embodiment, when encryption disc end Initiative Inventory Management data, according to user, this stores the file content of the data to local cipher dish, filename weighs its cryptographic Hash.According to the cryptographic Hash of two files, cryptographic Hash can just can interpolate that whether both be the file of same flesh and blood as the unique identification information of file.
In the present embodiment, by user, this cryptographic Hash storing the data to local cipher dish reports document management server;Whether inquiry cryptographic Hash exists in the listed files that document management server is safeguarded;If this cryptographic Hash has existed, then ask the key that other any user generate when being stored in the data file identical with this cryptographic Hash in its local cipher dish;This stores the key of the data to local cipher dish to receive user;According to the key received, to user, these data stored to local cipher dish are encrypted, and no longer active synchronization stores these data to other storage devices.
If user fails and other users get in touch, then automatically generate a new key, this document is encrypted in this locality, and active synchronization stores these data to other storage devices of more than at least 2.
In the present embodiment, after generating key, also include:
Receive other storage device and take the request of this key, take these data stored to local cipher dish of this key the request data and this to be stored by other storage device identical time transmission;
According to the request of this key of acquisition, send this key to these other storage device.
File for same flesh and blood is had this situation by multiple different network users, by cryptographic Hash, the present embodiment judges that whether certain two file is the file of same flesh and blood.For substantially identical file, the present embodiment no longer generates random key in this locality for this document, but by asking the key of this document to other users having had this document.After receiving the request taking this document key from other storage device, send this key to these other storage device.
It should be noted that in the present embodiment, " first ", " second " think division the most for convenience of description, do not constitute the restriction to we's embodiment.
The computer of the present embodiment, local cipher dish is divided according to user setup, by user, these data stored to local cipher dish are encrypted, obtain encryption data, encryption data is synchronized the storage encryption disc to other at least one storage devices, thus the data encryption that will be stored in local cipher dish is stored in other storage devices, thus strengthen the safety of local datastore.
Embodiment 2
As in figure 2 it is shown, the present embodiment proposes a kind of computer system, the computer that the present embodiment proposes can be applicable to this computer system.
This computer system includes 4 kind equipments interconnected by the Internet, respectively core memory equipment S1, storage server S 2, computer S3, mobile device S4.Wherein, core memory equipment S1, for storing the index information etc. of user profile, user file, also can assist simultaneously and set up P2P link.Arranging multiple Core server S1 within the system, on the one hand can provide more powerful dispatching, the opposing party is also for load balancing and disaster recovery.
Storage server S 2 be then in order to avoid user synchronize to store data time, current ink does not has other any active ues sufficient amount of set up therewith P2P connect and this situation of synchrodata and reserved arrange, its effect and functional equivalent are in domestic consumer's account.
Computer S3, mobile device S4 are this spendable terminal units of computer system domestic consumer.
In the local cipher dish of computer S3, both store local data, also store the Backup Data of other users in this network link.The Backup Data of these other users is transparent to local user.Local user's account can inquire about currently practical available memory capacity size in local cipher dish, but can not access the Backup Data belonging to other users.
Encryption disc is not pre-set in mobile device S4.User can be accessed data and management data, and the data backing up storage on network download to mobile terminal S4 by the application program installed in mobile device S4, but do not undertaken and mobile terminal data backup to network and backs up the task of other user data.
It is to be understood that Fig. 2 is only Application Scenarios-Example, does not constitute the restriction to the present embodiment.
Embodiment 3
In the present embodiment computer, the actually used situation of arbitrary local cipher disk capacity is as shown in Figure 3.The memory space that local user divides is defined as local cipher dish.In this local cipher dish, referring to that user cannot write the space of data again with space, local user's free space refers to that local user is at the heap(ed) capacity writing data in encryption disc.With in space, i.e. include the encryption data of local user, also include that other users of network synchronize the encryption data of storage.The encryption data synchronizing to store other users is that backstage is run automatically, can be transparent to local user, it is also possible to arrange the prompting to local user.
Therefore, local cipher dish had both stored local cipher data, also stored the Backup Data of other users in this network link.Preferably, the Backup Data of these other users is transparent to local user, and local user's account can inquire about currently practical available memory capacity size in local cipher dish, but can not access the synchronization storage data belonging to other users.
Such as, user is assigned with the memory space of 1G, and as local cipher dish, but user the most only employs the data of 500M, then remaining 500M space, can store the encryption data synchronizing storage from other storage devices.
Embodiment 4
The present embodiment combines concrete scene, is the computer that the present embodiment is discussed in detail as a example by the computer with storage function by executive agent.
It should be noted that in the present embodiment, file is identical with the implication of data.As shown in Figure 4, the present embodiment provides a kind of computer, including:
41 computers divide encryption disc according to user operation;
42 computers prepare to write unencrypted file to local cipher dish;
43 computers determine the cryptographic Hash of this unencrypted file, and this cryptographic Hash reporting file is managed server;
According to this cryptographic Hash, 44 document management servers judge that this document has synchronized storage;
If having synchronized storage, then perform 45;If the most not synchronizing storage, then perform 48;
45 have the user of this document to ask the key of this document to synchronizing storage;
46 judge that the key asking this document is the most successful;
If it succeeds, perform 47;If failure, perform 48;
47 use this double secret key this locality unencrypted file to be identified;
The key value of 48 stochastic generation this documents.
49 utilize this key value, synchronize the storage encryption disc to other storage devices after being encrypted by this document
This gives the method for shared key between the file of identical cryptographic Hash.The present embodiment give also when asking Authentication theory failure, additionally generates the method that a new key carrys out encryption data.Same file is screened by the present embodiment by cryptographic Hash, and by same file shared key and encryption data, thus be substantially reduced the potential same file of this many backups file memory method and repeatedly store the storage pressure brought, thus both make use of the idle storage resource on the Internet, data storage security can be strengthened again.
Being described above each embodiment of the present utility model, described above is exemplary, and non-exclusive, and it is also not necessarily limited to disclosed each embodiment.In the case of the scope and spirit without departing from illustrated each embodiment, many modifications and changes will be apparent from for those skilled in the art.The selection of term used herein, it is intended to explain the principle of each embodiment, actual application or the improvement to the technology in market best, or make other those of ordinary skill of the art be understood that each embodiment disclosed herein.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to other embodiment of the disclosure.The application is intended to any modification, purposes or the adaptations of the disclosure, and these modification, purposes or adaptations are followed the general principle of the disclosure and include the undocumented common knowledge in the art of the disclosure or conventional techniques means.

Claims (1)

1. a data storage device, it is characterised in that described data storage device includes: shift register, trigger, contents address memory and operational amplifier, described shift register, described trigger, contents address memory and operational amplifier electrical connection;Wherein,
Described shift register includes that local cipher dish, described local cipher dish are independent data space;
Described trigger, it is for obtaining the data of local cipher dish, and sends the first encryption data to server;
Described contents address memory, it is for synchronizing the encryption disc storing the first encryption data to other at least one storage devices, and the encryption disc of other at least one storage devices described divides in advance;
Described operational amplifier, it is for accepting to delete the instruction of data, and sends inquiry request to server;Synchronize to store described data to other at least one computers.
CN201520860092.0U 2015-10-30 2015-10-30 Data storage device Active CN205430310U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201520860092.0U CN205430310U (en) 2015-10-30 2015-10-30 Data storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201520860092.0U CN205430310U (en) 2015-10-30 2015-10-30 Data storage device

Publications (1)

Publication Number Publication Date
CN205430310U true CN205430310U (en) 2016-08-03

Family

ID=56517909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201520860092.0U Active CN205430310U (en) 2015-10-30 2015-10-30 Data storage device

Country Status (1)

Country Link
CN (1) CN205430310U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395350A (en) * 2017-08-22 2017-11-24 深圳市文鼎创数据科技有限公司 The generation method of key and key handles, system and intelligent key safety means

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395350A (en) * 2017-08-22 2017-11-24 深圳市文鼎创数据科技有限公司 The generation method of key and key handles, system and intelligent key safety means
CN107395350B (en) * 2017-08-22 2019-12-20 深圳市文鼎创数据科技有限公司 Method and system for generating key and key handle and intelligent key safety equipment

Similar Documents

Publication Publication Date Title
US9785785B2 (en) Systems and methods for secure data sharing
AU2011289239B2 (en) Systems and methods for secure remote storage of data
US9443097B2 (en) Systems and methods for securing data in motion
CN104023085A (en) Security cloud storage system based on increment synchronization
US20120136960A1 (en) Cloud Storage Data Access Method, Apparatus and System
US20090092252A1 (en) Method and System for Identifying and Managing Keys
US10685141B2 (en) Method for storing data blocks from client devices to a cloud storage system
CN105183402B (en) Date storage method
CN105224262A (en) Data processing method
AU2015203172B2 (en) Systems and methods for secure data sharing
CN105302490B (en) Date storage method
CN205430310U (en) Data storage device
CN105426783B (en) More Backup Data storage methods
CN105407091A (en) Data processing method
CN205080542U (en) Data storage device
CN205230060U (en) Data storage device
CN105426767B (en) Date storage method
CN205265735U (en) Data storage device
CN105262834A (en) Data storage method
CN105357193A (en) Anti-blasting data storage method
CN105426768B (en) Ciphertext date storage method

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20171010

Address after: 610000 Building 8, B District, 6, Jing Rong International Plaza, 200 Tianfu five street, Chengdu hi tech Zone, Sichuan

Patentee after: Sichuan miracle cloud Technology Co., Ltd.

Address before: 210000 Qinhuai City, Nanjing Province, the main street in the morning of the day on the morning of the 1865 Creative Park E-8 building, room 388, building, Room 202

Patentee before: NANJING QINSHE MINGSHI INFORMATION TECHNOLOGY CO., LTD.