TW507449B - File reading method with safety and secret - Google Patents

File reading method with safety and secret Download PDF

Info

Publication number
TW507449B
TW507449B TW89109381A TW89109381A TW507449B TW 507449 B TW507449 B TW 507449B TW 89109381 A TW89109381 A TW 89109381A TW 89109381 A TW89109381 A TW 89109381A TW 507449 B TW507449 B TW 507449B
Authority
TW
Taiwan
Prior art keywords
file
files
restored
server
scope
Prior art date
Application number
TW89109381A
Other languages
Chinese (zh)
Inventor
Jr-Shin Lan
Jiun-Shiung Guo
Jr-He Hung
Original Assignee
Newsoft Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Newsoft Technology Corp filed Critical Newsoft Technology Corp
Priority to TW89109381A priority Critical patent/TW507449B/en
Application granted granted Critical
Publication of TW507449B publication Critical patent/TW507449B/en

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

This invention is a method for processing files. The method comprises compressing the file to a compressed file; dividing the compressed file to multiple subordinate files; executing logic calculation among subordinate files to generate the restored file; transmitting the subordinate and restored file to the server; generating a record file; reading the record file; downloading the first group of subordinate and restored files capable of being linked to files in the server; restoring the compressed file which is completed by the first group of subordinate and restored files; decompressing the compressed file.

Description

)1)7449 A7 B7 五、 發明説明( tgg領域: 本發明係關於處理權案 全且保密之讀取檔案的方法月背棄: 的方法’特別是有關於一種安 經濟部智慧財產局員工消費合作社印製 ”蚪的存取是由FTP(File Transfer 傳統上,遠距間對貧料 0 “ p 士命沓料通常是利用FTP存取於單一的 Protocol)完成,而讀取貞打 飼服器中,狭m,如此的速作方式有一些缺點,首先,若 遠距的伺服器暫時發生〆些問則儲存於伺服器中的資 料將無法於該時刻被讀取,或疋伺服器遭受損毀,則伺服 器中的資料則無法復原,很顯然地,傳統的FTP並不安 全;再者,單一的資料檔案於不同的伺服器間完全地複 製,伺服器的管理者將很容易地得到一模一樣的資料,所 以,傳統的FTP並不安全。农後,單一傳輸的模式將降低 處理的速度,並且會有空間不足之虞。 發明目的及概述: 本發明的目的係提供一種具有保密性之處理檔案的 方法。 本發明之另一目的係提供一種具有安全性之處理檔 案的方法。 本發明之另一目的係提供一種節省時間之處理檔案 的方法。 第2頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂 507449 A7 B7 五、發明説明() 本發明提供之方法係以下列步驟完成:選擇要被儲存 於遠距之伺服器中的檔案,將被選擇的檔案壓縮為壓縮 檔,以減少被選擇檔案的大小。將壓縮檔分割為幾個次檔 案,而且由次檔案產生還原檔,例如執行互斥運算 (Exclusive-OR)於任意兩個次檔案之間,偵測是否有足夠 之情況良好的伺服器以傳送次檔案與還原檔,如果答案是 ”否”,則程序被中斷,若答案是”是”,則選擇情況較良好 之伺服器。 分別且同時地傳輸次檔案與還原檔至情況良好的伺 月艮器中,情況良好的伺服器是該伺服器具有穩定且高傳輸 速度。每一個次檔案或還原檔的大小比被選擇的檔案小, 而且,每一個次檔案或還原檔是同時傳輸至各伺服器中, 因此,本發明所執行的時間,將比傳統FTP之傳輸單一檔 案於單一伺服器中所執行的時間短。當傳輸的過程結束 後,產生一記錄檔,記錄檔記錄伺服器的名字、傳輸時間、 切割壓縮檔的方法、產生還原檔的方法、此檔案與伺服器 之間的對應關係、還原檔與伺服器的對應關係、使用者名 稱、密碼、、等等。 若要讀取檔案,首先讀取記錄檔,以得到被傳輸之檔 案、伺服器的名稱、次檔案、還原檔等等,然後,選擇要 下載的檔案。偵測是否該要被下載的檔案,可以從情況良 好伺服器中之次檔案或還原檔恢復,若答案是”否”,則執 行的過程被中斷,若答案是肯定的,則分別從相對應的伺 服器中同時地傳輸次檔案及還原檔。最後,結合或還原次 檔案與還原檔以得到要下載之檔案的壓縮檔。 第3頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁) 訂 參· 經濟部智慧財產局員工消費合作社印製 507449 A7 B7 五、發明説明() 圖式簡單說明= (請先閱讀背面之注意事項再填寫本頁) 所以上述之本發明的特徵、優點、及主題均可達到, 而更細部的了解則可由本發明的實施例配合附圖得知。然 而該注意的是,在附圖中之說明僅為本發明典型的實施 例,並非用以限定本發明之其他等效的實施。 第一圖顯示本發明之實施例的流程圖,圖中顯示儲存 檔案於遠距的伺服器中的情形。 第二圖顯示本發明之實施例的流程圖,圖中顯示讀取 遠距伺服器中之檔案的情形。 發明詳細說明: 經濟部智慧財產局員工消費合作社印製 於本發明中,揭露一新的傳輸方法,以下的實施例是 以網際網路或區域網路的系統來說明,然而,本發明之方 法,可實施於任何檔案之存取動作的過程中,即使是個人 電腦的系統中。參考第一圖,其為本發明之實施例的流程 圖,圖中顯示儲存檔案於遠距的伺服器中的情形,於方塊 1 00中,選擇要被儲存於遠距之伺服器中的檔案,參考方 塊11 0,將被選擇的檔案壓縮為壓縮檔,以減少被選擇檔 案的大小。 接著,參考方塊1 20,將壓縮檔分割為幾個次檔案, 而且由次檔案產生還原檔,產生還原檔的方法有很多,例 如,執行任何的邏輯運算於任意兩個次檔案之間,例如執 行互斥運算(E X c 1 u s i v e - Ο R)於任意兩個次檔案之間,參考 第4頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐) 507449 五、 A7 B7 發明説明() 方塊1 3 0,偵測是否有足夠之情況良好的伺服器以傳送次 檔案與還原檔’如果答案是”否”’則程序被中斷,若答案 是,,是’,,則選擇情況較良好之伺服器。 參考方塊1 4 0,分別且同時地傳輸次檔案與還原檔至 情況良好的伺服器中,情況良好的伺服器是該伺服器具有 穩定且高傳輸速度。每一個次檔案或還原檔的大小比被選 擇的檔案小,而且,每一個次檔案或還原檔是同時傳輸至 各伺服器中,因此,方塊1 4〇所執行的時間,將比傳統FTP 之傳輸單一檔案於單一伺服器中所執行的時間短。 當傳輸的過程結束後,產生一記錄檔’記錄檔記錄伺 服器的名字、傳輸時間、切割壓縮檔的方法、產生還原播 的方法、此檔案與伺服器之間的對應關係、還原檔與伺服 器的對應關係、使用者名稱、密碼、、等等。 參考第二圖,其為本發明之實施例的流程圖,圖中顯 示讀取遠距伺服器中之檔案的情形。於方塊200中,首先 讀取記錄檔,以得到被傳輸之檔案、伺服器的名稱、次才當 案、還原檔等等,然後’到方塊2 1 0 ’選擇要下载的槽案。 參考方塊220 ’偵測是否該要被下載的檔案,可以從 情況良好伺服器中之次檔案或還原檔恢復,若答案是,,否 ·’,則執行的過程被中斷’若答案是肯定的,則分別從相 對應的伺服器中同時地傳輸次檔案及還原檔,如方塊?3〇 所示。 接著,參考方塊2 4 0,結合或還原次樓案與還原播以 第湏 (請先閲讀背面之注意事項再填寫本頁) 、11 經濟部智慧財產局員工消費合作社印製 507449 A7 B7 五、發明説明() 得到要下載之檔案的壓縮檔。 實施例一 (請先閱讀背面之注意事項再填寫本頁) 現在,若選擇的檔案經壓縮後為一雙位元組的檔案, 如下 00001010 00000000 該雙位元組分割為兩個次檔案,係為第一次檔 與第二次檔,每一次檔包含該選擇之檔案的一半訊 息,第一次檔與第二次檔分別為 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 對第一次檔與第二次檔執行互斥(Exclusive-OR) 運算,得到一還原檔,其係為 0 0 0 0 1 0 1 0 經濟部智慧財產局員工消費合作社印製 接著,分別且同時地傳輸第一次檔與第二次檔 以及還原檔至遠端的三個伺服器,此三個伺服器分別 為··第一伺服器、第二伺服器、與第三伺服器,並產 生一還原檔。 第6頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X 297公釐)~ 507449 A7 B7 五、發明説明() (請先閱讀背面之注意事項再填寫本頁) 為了恢復該雙位元組之壓縮檔,首先必需讀取 記錄檔,以獲得伺服器與次檔案或還原檔之間的對應 關係,若由於一些因素,使用者無法與第一伺服器連 接,則分別從第二伺服器與第三伺服器中下載第二次 .檔與還原檔,對第二次檔與還原檔執行互斥運算,以 得到第一次檔。結合第二次檔與互斥運算後所得到的 第一次檔,可恢復被選擇之檔案的壓縮檔。值得注意 的是,即使第一伺服器出現一些問題,被選擇之檔案 仍可以被還原。 實施例二 若選擇的檔案經壓縮後為一三位元組的檔案, 如下 00001010 00000000 00001010 經濟部智慧財產局員工消費合作社印製 分割此壓縮檔成三個次檔案,為第一次檔案、 第二次檔案、第三次檔案,每一個次檔案分別包含該 壓縮檔三分之二的資訊,下列分別為第一次檔、第二 次檔與第三次檔 00001010 00000000 00000000 00001010 00001010 00001010 第7頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 507449 A7 B7 五、發明説明() 對任意兩個次檔案執行互斥運算,得到一還原 檔,例如··對第一次檔案與第二次檔案執行互斥後, 得到的還原檔為 00001010 00001010 第一次檔案、第二次檔案、第三次襠案與還原檔分別 傳送至第一伺服器、第二伺服器、第三伺服器與第四伺服 器;如果伺服器不夠,可以傳送第一次檔案與第二次檔案 至第一伺服器,而第三次檔案與還原檔則傳送至第二伺服 器與第三伺服器;或是僅選擇第一次檔案、第二次檔案與 還原檔,而將它們傳送至第五伺服器、第六伺服器與第七 伺服器。 若以上述最後一個例子為實施例,要恢復三位元組的 壓縮檔,首先,必須讀取記錄檔,以了解伺服器與次檔案 或還原檔之間的關係,如果因為某些因素,無法連接第七 伺服器,則從第五伺服器與第六伺服器分別下載第一次檔 案與第二次檔案。該三位元組的壓縮檔,藉由結合第一次 檔案與第二次檔案而得到,值得注意的事,並不是所有的 次檔案與還原檔都必須傳送至伺服器中儲存,其傳送的方 式依著當時伺服器的情況而定,而唯一的要求為該壓縮檔 可從傳送至伺服器中的次檔案與還原檔還原而得。 縱上所述,本發明之處理檔案的方法具有下列幾項優 點,(1)保密性:任何擷取伺服器中之資訊的人,並不能得 第碩 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁)) 1) 7449 A7 B7 V. Description of the invention (tgg field: The present invention is a method of reading files that is complete and confidential in handling rights cases. The method is betrayed: the method 'especially about an employee consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs The access to the "print" card is performed by FTP (File Transfer traditionally, the long-distance data is usually 0 "p. The command file is usually accessed by FTP in a single protocol), and the reading feeder is read. Medium, narrow m. There are some shortcomings in this kind of quick work method. First, if some problems occur temporarily in the remote server, the data stored in the server cannot be read at that moment, or the server is damaged. , The data in the server cannot be recovered. Obviously, traditional FTP is not secure. Furthermore, a single data file is completely copied between different servers, and the administrator of the server will easily get exactly the same. Therefore, the traditional FTP is not secure. After farming, the single transmission mode will reduce the processing speed and there may be a shortage of space. Purpose and Summary of the Invention: The purpose of the present invention is to provide A method for processing archives with confidentiality. Another object of the present invention is to provide a method for processing archives with security. Another object of the present invention is to provide a method for processing archives which saves time. Page 2 The dimensions are applicable to Chinese National Standard (CNS) A4 specifications (210X 297 mm) (Please read the notes on the back before filling this page) Order 507449 A7 B7 V. Description of the invention () The method provided by the present invention is completed by the following steps: Select the file to be stored in the remote server, compress the selected file into a compressed file to reduce the size of the selected file. Divide the compressed file into several secondary files, and generate a recovery file from the secondary file For example, perform an exclusive-OR operation between any two secondary files to detect whether there are enough good servers to send the secondary files and restore files. If the answer is "No", the process is interrupted. If the answer is "Yes", select the server with better condition. Transfer the secondary file and restore file to the server with good condition separately and simultaneously. A good server is that the server has a stable and high transfer speed. The size of each secondary file or restore file is smaller than the selected file, and each secondary file or restore file is transferred to each server at the same time. Therefore, the execution time of the present invention will be shorter than the execution time of the traditional FTP transmission of a single file on a single server. When the transmission process ends, a log file is generated. The log file records the server name and transmission time. , Method for cutting compressed file, method for generating restored file, correspondence between this file and server, correspondence between restored file and server, username, password, etc. To read the file, first Read the log file to get the transferred file, server name, secondary file, restore file, etc., and then select the file to download. Detect whether the file to be downloaded can be recovered from the secondary file or restore file in a good server. If the answer is "No", the execution process is interrupted. If the answer is yes, then the corresponding Transfer the secondary file and restore file to the server at the same time. Finally, combine or restore the secondary file and the restored file to get a compressed file of the file to be downloaded. Page 3 This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling out this page) Ordering · Printed by the Intellectual Property Bureau Staff Consumer Cooperative of the Ministry of Economic Affairs 507449 A7 B7 5 、 Explanation of the invention () Schematic description = (Please read the precautions on the back before filling out this page) So the above-mentioned features, advantages, and themes of the present invention can be achieved, and a more detailed understanding can be implemented by the present invention Examples are shown in conjunction with the drawings. It should be noted, however, that the description in the drawings is only a typical embodiment of the present invention and is not intended to limit other equivalent implementations of the present invention. The first diagram shows a flow chart of an embodiment of the present invention. The diagram shows a situation where files are stored on a remote server. The second figure shows a flowchart of an embodiment of the present invention, and the figure shows a situation of reading a file in a remote server. Detailed description of the invention: The consumer cooperative of the Intellectual Property Bureau of the Ministry of Economics printed in the present invention, and disclosed a new transmission method. The following embodiments are described by the Internet or local area network system. However, the method of the present invention , Can be implemented in the process of accessing any file, even in a personal computer system. Referring to the first figure, which is a flowchart of an embodiment of the present invention, the figure shows a situation where files are stored in a remote server. In box 100, a file to be stored in a remote server is selected. With reference to box 110, the selected file is compressed into a compressed file to reduce the size of the selected file. Next, referring to box 1 20, the compressed file is divided into several secondary files, and the recovery file is generated from the secondary file. There are many methods for generating the recovery file. For example, perform any logical operation between any two secondary files. For example, Perform a mutually exclusive operation (EX c 1 usive-〇 R) between any two sub-files, refer to page 4 This paper size applies the Chinese National Standard (CNS) A4 specification (210X 297 mm) 507449 V. A7 B7 invention Explanation () Box 1 3 0, detect if there are enough good servers to send the secondary file and restore file 'If the answer is “No”', the process is interrupted. If the answer is “Yes”, select A better server. Referring to box 1 40, transfer the secondary file and the restore file to the good server separately and simultaneously. The good server is that the server has stable and high transmission speed. The size of each secondary file or restore file is smaller than the selected file, and each secondary file or restore file is transferred to each server at the same time. Therefore, the execution time of block 1 40 will be longer than that of traditional FTP. The time required to transfer a single file to a single server is short. When the transmission process is over, a log file is generated. The name of the log server, the transmission time, the method of cutting the compressed file, the method of generating the restore broadcast, the correspondence between this file and the server, the restore file and the server Device, user name, password, etc. Reference is made to the second figure, which is a flowchart of an embodiment of the present invention. The figure shows a situation in which files in a remote server are read. In block 200, first read the log file to obtain the transferred file, the server name, the less-than-important file, the restore file, and so on, and then 'go to block 2 1 0' to select the slot file to download. Refer to box 220 'Detect whether the file to be downloaded can be recovered from a secondary file or a restore file in a good server. If the answer is yes, no ·', the execution process is interrupted. 'If the answer is yes , Then transfer the secondary file and restore file from the corresponding server simultaneously, such as a box? 3〇 shown. Then, referring to box 2 4 0, combine or restore the sub-floor case and restore the broadcast page (please read the precautions on the back before filling out this page), 11 printed by the Intellectual Property Bureau Employee Consumer Cooperative of the Ministry of Economic Affairs 507449 A7 B7 V. Description of the invention () Get the compressed file of the file to be downloaded. Example 1 (Please read the notes on the back before filling this page) Now, if the selected file is compressed into a double-byte file, as follows: 00001010 00000000 The double-byte file is divided into two secondary files. For the first and second files, each file contains half of the information of the selected file. The first and second files are 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 Exclusive-OR operation is performed on the first and second files to obtain a restored file, which is 0 0 0 0 1 0 1 0 printed by the Consumer Consumption Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs. Simultaneously transmit the first file, the second file, and the restore file to three remote servers. The three servers are the first server, the second server, and the third server, and Generate a restore file. Page 6 This paper size applies the Chinese National Standard (CNS) A4 specification (210X 297 mm) ~ 507449 A7 B7 V. Description of the invention () (Please read the notes on the back before filling this page) In order to restore the double bit For the compressed files of the group, the log file must be read first to obtain the correspondence between the server and the secondary file or the restored file. If due to some factors, the user cannot connect with the first server, then the second server Download the second .file and restore file from the third server, and perform a mutually exclusive operation on the second and restore files to obtain the first file. Combining the second file with the first file obtained after the mutex operation can restore the compressed file of the selected file. It is worth noting that even if there are some problems with the first server, the selected files can still be restored. In the second embodiment, if the selected file is compressed into a one-three-byte file, the following is printed: The secondary file and the third file, each of which contains two-thirds of the compressed file. The following are the first file, the second file, and the third file: 00001010 00000000 00000000 00001010 00001010 00001010 7 The paper size of this page applies the Chinese National Standard (CNS) A4 specification (210X297 mm) 507449 A7 B7 V. Description of the invention () Perform a mutually exclusive operation on any two secondary files to get a restored file, for example, for the first time After the file and the second file are mutually exclusive, the restored file is 00001010 00001010 The first file, the second file, the third crotch case, and the restored file are sent to the first server, the second server, and the first file respectively. Three servers and fourth server; if the server is not enough, you can send the first file and the second file to the first server, and the third file The restored files are sent to the second server and the third server; or only the first file, the second file and the restored file are selected, and they are sent to the fifth server, the sixth server and the seventh server Device. If the last example described above is taken as an example, to recover a three-byte compressed file, you must first read the log file to understand the relationship between the server and the secondary file or the restored file. When the seventh server is connected, the first file and the second file are downloaded from the fifth server and the sixth server, respectively. The three-byte compressed file is obtained by combining the first file and the second file. It is worth noting that not all the secondary files and restore files must be transmitted to the server for storage. The method depends on the situation of the server at the time, and the only requirement is that the compressed file can be restored from the secondary file and the restore file sent to the server. As mentioned above, the method for processing files of the present invention has the following advantages: (1) confidentiality: anyone who retrieves information from the server cannot obtain the paper standard that is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling this page)

、1T 經濟部智慧財產局員工消費合作社印製 JU/449 、發明説明() 到所有_的訊息,不似傳統FTP的 檔案完全地於伺服器間複製,(2)安全广方式,將整個 式被分割為好幾個部份,且 ·矾息以特殊的方 服哭肋佔甘以不同的形式儲存於不同的伺 服盗,即使某些伺服器中的 97 從其餘位被損毀的檔案恢復 ::原始榀案仍可 又(J )得运私案至各個伺服器或 從各個伺服器下载檔案皆同時進行,本發明之多工傳輸所 進行的時間較傳統FTP的單一傳輸短。 以上所述僅為本發明之較佳實施例而已,並奍用以限 定本發明之申請專利範圍;凡其它未脫離本發明所揭示之 本月神下所元成之專效改變或修飾,均應包含在下述之申 專利範圍内。 ----------^ I l· 1-- (請先閲讀背面之注意事項再填寫本頁) 訂 -參· 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(公釐)1, 1T printed by JU / 449, Consumer Cooperative of Intellectual Property Bureau, Ministry of Economic Affairs, Invention Description () to all messages, unlike traditional FTP files are completely copied between servers, (2) safe and wide way, the whole type It is divided into several parts, and Alumni is stored in different forms in different forms in special servers, even though 97 in some servers are recovered from the remaining damaged files: The original case can still (J) be shipped to each server or downloaded from each server at the same time. The multiplexed transmission of the present invention takes less time than a single transmission of traditional FTP. The above are only the preferred embodiments of the present invention, and are not intended to limit the scope of the patent application for the present invention; all other special changes or modifications that do not depart from the present God revealed by the present invention are all Should be included in the scope of patent application below. ---------- ^ I l · 1-- (Please read the notes on the back before filling out this page) Order-see-printed by the Intellectual Property Bureau of the Ministry of Economic Affairs, Consumer Cooperatives Paper size applicable to China Standard (CNS) A4 specification (mm)

Claims (1)

507449 A8 B8 €8 D8 六、申請專利範圍 專利申請範圍= (請先閱讀背面之注意事項再填寫本頁) 1. 一種處理檔案的方法,該方法至少包含:, 壓縮該擋案為一壓縮檔; 分割該壓縮檔為複數個次檔案; 執行邏輯運算於次插案之間,以產生還原檔; 傳送該次檔案與該還原檔至伺服器中;及 產生一記錄檔。 2. 如申請專利範圍第1項所述之方法,其中上述之執行邏 輯運算係對任以兩個次檔案執行互斥運算。 3. 如申請專利範圍第1項所述之方法,其中上述之傳送步 驟係傳送選擇之次檔案與選擇之還原檔,如果伺服器的 數目少於次檔案與還原檔的總數目,該檔案可由該選擇 之次檔案與選擇之還原檔還原。 4. 如申請專利範圍第1項所述之方法,其中上述之傳送 步驟係傳送該次檔案與該還原檔,如果伺服器的數目 大於次檔案與還原檔的總數目,該檔案可由該次檔案 與該還原檔還原。 經濟部智慧財產局員工消費合作社印製 5. 如申請專利範圍第1項所述之方法,其中上述之記錄 檔係包含該伺服器的名字、傳送時間、分割該檔案的方法 以及產生還原檔的方法。 6. 如申請專利範圍第5項所述之方法,其中上述之記錄 檔更包含該伺服器與該次檔案或該還原檔之間的關係。 第10頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 507449 A8 B8 C8 D8 六、申請專利範圍 7. 如申請專利範圍第5項所述之方法,其中上述之記錄 檔更包含該伺服器的使用名稱與密碼。 8. 如申請專利範圍第1項所述之方法,其中上述之方法 更包含下列步驟: 讀取該記錄檔; 下載第一組次檔案與第一組還原檔,該第一組次檔 案與該第一組還原檔係為可連結之該伺服器中之檔案, 還原該壓縮檔,其係藉由該第一組次檔案與該第一 組還原檔完成;及 解壓縮該壓縮檔。 9. 一種處理檔案的方法,該方法至少包含: 壓縮該檔案為一壓縮檔; 分割該壓縮檔為複數個次檔案; 產生還原檔; 傳送該次檔案與該還原檔至伺服器中; 產生一記錄檔; 讀取該記錄檔; 下載第一組次檔案與第一組還原檔,該第一組次檔案 與該第一組還原檔係為可連結之該伺服器中之檔案, 還原該壓縮檔,其係藉由該第一組次檔案與該第一組 還原檔完成;及 解壓縮該壓縮檔。 1 0.如申請專利範圍第9項所述之方法,其中上述之產生 還原擋係對兩個次檔案執行邏輯運算。 第11頁 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂 參· 經濟部智慧財產局員工消費合作社印製 507449 A8 B8 €8 D8 六、申請專利範圍 1 1.如申請專利範圍第1 0項所述之方法,其中上述之執 行邏輯運算係對任意兩個次檔案執行互斥運算。 1 2.如申請專利範圍第9項所述之方法,其中上述之傳送 步驟係傳送選擇之次檔案與選擇之還原檔,如果伺服器的 數目少於次檔案與還原檔的總數目,該檔案可由該選擇之 次檔案與選擇之還原檔還原。 1 3 .如申請專利範圍第9項所述之方法,其中上述之傳送步 驟係傳送該次檔案與該還原檔,如果伺服器的數目大於次 檔案與還原檔的總數目,該檔案可由該次檔案與該還原檔 還原。 1 4.如申請專利範圍第9項所述之方法,其中上述之記錄檔 係包含該伺服器的名字、傳送時間、分割該檔案的方法以 及產生還原檔的方法。 14. 如申請專利範圍第1 4項所述之方法,其中上述之記 錄檔更包含該伺服器與該次檔案或該還原檔之間的關 係。 1 5.如申請專利範圍第1 4項所述之方法,其中上述之記 錄檔更包含該伺服器的使用名稱與密碼。 第12頁 本紙張尺度適用中國國家標準(CNS ) Α4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 、1T 經濟部智慧財產局員工消費合作社印製507449 A8 B8 € 8 D8 VI. Scope of patent application Patent application scope = (Please read the precautions on the back before filling out this page) 1. A method for processing files, which at least includes: compressing the file into a compressed file ; Dividing the compressed file into a plurality of secondary files; performing a logical operation between the sub-inserts to generate a restore file; transmitting the secondary file and the restore file to a server; and generating a log file. 2. The method as described in item 1 of the scope of patent application, wherein the above-mentioned execution logic operation performs a mutually exclusive operation on any two files. 3. The method as described in item 1 of the scope of patent application, wherein the above-mentioned transmission step is to transmit the selected secondary file and selected recovery file. If the number of servers is less than the total number of secondary files and recovery files, the file can be The selected secondary file and the selected restore file are restored. 4. The method as described in item 1 of the scope of patent application, wherein the above-mentioned transmission step is to transmit the secondary file and the restored file. If the number of servers is greater than the total number of secondary files and restored files, the file can be used by the secondary file. Restore with the restore file. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 5. The method described in item 1 of the scope of patent application, wherein the above-mentioned record file includes the name of the server, the transmission time, the method of dividing the file, and the method of generating the restored file method. 6. The method according to item 5 of the scope of patent application, wherein the above-mentioned record file further includes the relationship between the server and the secondary file or the restored file. Page 10 This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) 507449 A8 B8 C8 D8 6. Application for patent scope 7. The method described in item 5 of the scope of patent application, where the above-mentioned record file is more Contains the server's username and password. 8. The method according to item 1 of the scope of patent application, wherein the above method further comprises the following steps: reading the log file; downloading the first set of secondary files and the first set of restored files, the first set of secondary files and the The first set of restored files are files in the server that can be linked, and the compressed files are restored by the first set of secondary files and the first set of restored files; and the compressed files are decompressed. 9. A method for processing a file, the method at least comprising: compressing the file into a compressed file; dividing the compressed file into a plurality of secondary files; generating a restore file; transmitting the secondary file and the restore file to a server; generating a Log file; read the log file; download the first set of secondary files and the first set of restored files, the first set of secondary files and the first set of restored files are the files in the server that can be linked, and restore the compression File, which is completed by the first set of secondary files and the first set of restored files; and decompressing the compressed file. 10. The method as described in item 9 of the scope of the patent application, wherein the above-mentioned generating and restoring gear performs logical operations on two secondary files. Page 11 This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the notes on the back before filling out this page) Ordering · Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives 507449 A8 B8 € 8 D8 VI. Scope of patent application 1 1. The method described in item 10 of the scope of patent application, wherein the above-mentioned execution logical operation is to perform a mutually exclusive operation on any two secondary files. 1 2. The method according to item 9 of the scope of patent application, wherein the above-mentioned transmission step is to transmit the selected secondary file and the selected recovery file. If the number of servers is less than the total number of the secondary file and the recovery file, the file It can be restored by the selected secondary file and the selected restore file. 1 3. The method as described in item 9 of the scope of patent application, wherein the above-mentioned transmission step is to transmit the secondary file and the restored file. If the number of servers is greater than the total number of secondary files and restored files, the file can be used by the secondary The file is restored with the restore file. 14. The method according to item 9 of the scope of patent application, wherein the above-mentioned record file includes the name of the server, the transmission time, the method of dividing the file, and the method of generating the restored file. 14. The method according to item 14 of the scope of patent application, wherein the above-mentioned log file further includes a relationship between the server and the secondary file or the restored file. 15. The method according to item 14 of the scope of patent application, wherein the above-mentioned log file further includes the server's use name and password. Page 12 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling out this page), printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs
TW89109381A 2000-05-16 2000-05-16 File reading method with safety and secret TW507449B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW89109381A TW507449B (en) 2000-05-16 2000-05-16 File reading method with safety and secret

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW89109381A TW507449B (en) 2000-05-16 2000-05-16 File reading method with safety and secret

Publications (1)

Publication Number Publication Date
TW507449B true TW507449B (en) 2002-10-21

Family

ID=27621649

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89109381A TW507449B (en) 2000-05-16 2000-05-16 File reading method with safety and secret

Country Status (1)

Country Link
TW (1) TW507449B (en)

Similar Documents

Publication Publication Date Title
US8300823B2 (en) Encryption and compression of data for storage
US8867083B2 (en) Image processing apparatus and its control method for processing image data according to whether a process includes an input job or an output job
CN101646995B (en) Data stream filters and plug-ins for storage managers
US9483486B1 (en) Data encryption for a segment-based single instance file storage system
US20150365385A1 (en) Method and apparatus for securing sensitive data in a cloud storage system
US8285997B2 (en) Backup apparatus with higher security and lower network bandwidth consumption
US20110072115A1 (en) Block based access to a dispersed data storage network
US20100250751A1 (en) Slice server method and apparatus of dispersed digital storage vaults
CN1341240A (en) Distributed data archive device and system
US20150339196A1 (en) Obtaining Complete Forensic Images Of Electronic Storage Media
DE112005002955T5 (en) Electrical transmission system in a secret environment between virtual disks and associated electrical transmission method
US10152487B1 (en) System and method for a cloud storage provider to safely deduplicate encrypted backup objects
GB2422753A (en) Compression / decompression method which also provides data security
WO2022082891A1 (en) Big data acquisition method and system, and computer device and storage medium thereof
US8402284B2 (en) Symbiotic storage devices
CN114466028A (en) Mirror image synchronization method, device, equipment and storage medium
JP4409874B2 (en) Data transmitting apparatus and method, data receiving apparatus and method, and data distribution system and method
CN112862425B (en) Device and technology for reading OFD format file life cycle information
JP2005092731A (en) Online print management system and method, offline job restoring device, offline job generating device, and printer driver
TW507449B (en) File reading method with safety and secret
JP6298288B2 (en) Information processing apparatus, information processing method, and program
KR100414188B1 (en) Method and apparatus for protecting digital documents
CN111177751A (en) Method, equipment and readable medium for encrypting pdf file
JP4731179B2 (en) Data transmission method
US7672933B2 (en) Information processing apparatus, information processing method, program, and storage medium

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees