WO2018076879A1 - Data backup method and apparatus, storage medium, and terminal - Google Patents

Data backup method and apparatus, storage medium, and terminal Download PDF

Info

Publication number
WO2018076879A1
WO2018076879A1 PCT/CN2017/095904 CN2017095904W WO2018076879A1 WO 2018076879 A1 WO2018076879 A1 WO 2018076879A1 CN 2017095904 W CN2017095904 W CN 2017095904W WO 2018076879 A1 WO2018076879 A1 WO 2018076879A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
backed
information
encrypted
backup
Prior art date
Application number
PCT/CN2017/095904
Other languages
French (fr)
Chinese (zh)
Inventor
马志峰
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Publication of WO2018076879A1 publication Critical patent/WO2018076879A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Definitions

  • the present invention relates to the field of network technologies, and in particular, to a data backup method, apparatus, storage medium, and terminal.
  • the user needs to log in to the cloud account to obtain the data that has been backed up in the cloud from the mobile terminal side, and then download it from the cloud server. If the server is hacked or the internal staff of the operator fails, the backup data of a server is leaked, and the user's information is obtained by the criminals, which may cause serious economic losses to the user.
  • the embodiment of the invention provides a data backup method, device, storage medium and terminal, which have the beneficial effects of improving the security of the backup data.
  • an embodiment of the present invention provides a data backup method, including the following steps:
  • identification information being associated with name information of the data to be backed up;
  • the embodiment of the present invention further provides a data backup device, including:
  • An encryption module configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data
  • a segmentation module configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments
  • An identifier module configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
  • an uploading module configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
  • an embodiment of the present invention further provides a storage medium, where the storage medium stores a plurality of instructions, the instructions being adapted to be loaded by a processor to perform the data backup method according to any one of the foregoing.
  • an embodiment of the present invention further provides a terminal, including a processor and a memory, the processor is electrically connected to the memory, the memory is used to store instructions and data, and the processor is configured to perform the following steps. :
  • identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
  • the embodiment of the invention provides a data backup method, device, storage medium and terminal, which have the beneficial effects of improving the security of the backup data.
  • FIG. 1 is a scene diagram of a data backup system according to an embodiment of the present invention.
  • FIG. 2 is a flowchart of a data backup method in an embodiment of the present invention.
  • FIG. 3 is another flowchart of a data backup method according to an embodiment of the present invention.
  • FIG. 4 is a structural diagram of a data backup apparatus according to an embodiment of the present invention.
  • FIG. 5 is a structural diagram of a terminal in an embodiment of the present invention.
  • An embodiment of the present invention provides a data backup method, including the following steps:
  • identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
  • the step of encrypting the data to be backed up to obtain encrypted data includes:
  • the data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
  • the step of segmenting the encrypted data by using a segmentation algorithm to obtain a plurality of data segments comprises:
  • the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
  • the method before the step of encrypting the backup data by using an encryption algorithm to obtain the encrypted data, the method further includes:
  • the target data to be backed up and the spoofed data are combined to obtain data to be backed up.
  • the step of acquiring the masquerading data according to the target data to be backed up includes:
  • the data backup system mainly includes a data backup device and a server, wherein the data backup device can be integrated into a mobile terminal such as a tablet computer or a mobile phone, and the server and the mobile terminal can be connected through a wired or wireless network. connection.
  • FIG. 1 is a schematic diagram of a data backup system provided by the present invention.
  • the data backup device is specifically integrated in a mobile phone, and is mainly used to encrypt data to be encrypted by using an encryption algorithm to obtain encrypted data; Encoding the encrypted data to obtain a plurality of data segments; adding identification information to each of the data segments, the identification information being associated with name information of the data to be backed up; and the plurality of data segments Uploading to at least two first servers for distributed storage, and uploading the identification information to the second server.
  • a data backup device which may be integrated into a mobile terminal such as a tablet computer or a mobile phone.
  • FIG. 2 is a flowchart of a data backup method in a preferred embodiment of the present invention, which is mainly used in a mobile terminal.
  • the data backup method includes the following steps:
  • S102 Segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments.
  • S104 Upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
  • the encryption algorithm may adopt a conventional encryption algorithm in the prior art, or may adopt a specially customized encryption algorithm.
  • the data to be backed up is data with a high degree of confidentiality, such as a bank card number and password, a privacy photo, an important file, and the like.
  • the segmentation algorithm may be divided according to the data capacity, and the data capacity of each data segment may be the same value or a different value.
  • the first segment is 2B
  • the second segment is 3B
  • the third segment is 4B and the like.
  • the segmentation algorithm can also be segmented to form data segments according to other criteria.
  • each data segment is added with an identification information, and the identification information is associated with the name information of the data to be backed up.
  • the name of the data to be backed up is a1
  • the identification information is a1b1, where b1 Is the identification number of the data segment to distinguish each data segment.
  • the plurality of data segments are distributed and stored in the at least two first servers, so that even if the data in one of the first servers is leaked, the complete data of the user cannot be obtained. And storing the identification information in the second server.
  • the plurality of identification information is obtained from the second server according to the name information of the data to be synchronized, and each identification information is associated with the name information. Then, according to the plurality of identification information, acquiring corresponding data segments from the at least two first servers, and then combining the plurality of data segments into encrypted data by using a combination algorithm corresponding to the segmentation algorithm, and finally adopting an encryption algorithm
  • the decryption algorithm can obtain the data to be synchronized.
  • the present invention uses an encryption algorithm to encrypt the backup data to obtain encrypted data; the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments; and each of the data segments is added with identification information.
  • the identifier information is associated with the name information of the data to be backed up; the plurality of data segments are uploaded to at least two first servers for distributed storage, and the identification information is uploaded to the second server, thereby completing the data backup.
  • the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, so that even if another person acquires data in one of the first servers through hacking technology, The user cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, without the identification information, the illegal user cannot Each piece of data of the backup data is extracted from the massive data; To prevent the user's backup data was informed that with improved security of backup data benefits.
  • FIG. 3 is a flowchart of a data backup method in another preferred embodiment of the present invention, which is mainly used in a mobile terminal, and the data backup method includes the following steps:
  • S205 Perform segmentation on the encrypted data by using a segmentation algorithm to obtain multiple data segments.
  • the updated data is extracted as the target data to be backed up, wherein the data with the higher security level may be the bank account password data, the photo, the important contract. Documents, important technical documents, etc.
  • the step S202 during specific implementation, the spoofed data is obtained according to the type of the target data to be backed up. Therefore, the step S202 specifically includes:
  • S2021 Acquire type information of the target data to be backed up; for example, the type information may be a text type, a digital type, a picture type, and the like.
  • S2022 Acquire masquerading data of a corresponding type according to the type information.
  • the target data to be backed up is a photo
  • the acquired camouflage data is also a photo.
  • the photo can be downloaded automatically from the web or from a local database.
  • step S203 the data target data to be backed up is combined with the masquerading data to form data to be backed up.
  • the encryption algorithm may adopt a conventional encryption algorithm in the prior art, or may adopt a specially customized encryption algorithm.
  • step S204 includes the following sub-steps:
  • the unique feature information may be fingerprint information, iris information, or sound information of the user.
  • S2042 Acquire a corresponding encryption algorithm according to the unique feature information; for example, the user inputs fingerprint information, then the corresponding encryption algorithm is an A algorithm, and if the input is sound information, the corresponding encryption algorithm is a B algorithm, if input Is the iris information, then the encryption algorithm for the C algorithm.
  • step S2043 Encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data.
  • the encryption data obtained in step S2043 is used to encrypt the backup data. After downloading the data, the same unique feature information must be input before the corresponding decryption algorithm can be obtained, thereby decrypting the encrypted data.
  • the segmentation algorithm may be divided according to the data capacity, and the data capacity of each data segment may be the same value or a different value.
  • the first segment is 2B
  • the second segment is 3B
  • the third segment is 4B and the like.
  • the segmentation algorithm can also form segments of data according to segmentation according to other criteria.
  • the step S205 specifically includes the following sub-steps:
  • S2051 Acquire a corresponding segmentation algorithm according to the unique feature information; for example, if the user inputs fingerprint information, then the corresponding segmentation algorithm is a W algorithm, and if the input is sound information, the corresponding segmentation algorithm is a Y algorithm, if input The input iris information, then the segmentation algorithm is the Z algorithm.
  • S2052 Segment the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
  • each data segment is added with an identification information, and the identification information is associated with the name information of the data to be backed up.
  • the name of the data to be backed up is a1
  • the identification information is a1b1, where b1 is The identification number of the data segment to distinguish each data segment.
  • the plurality of data segments are distributed and stored in at least two first servers, so that even if the data in one of the servers is leaked, the user's completion data cannot be obtained.
  • the identification information is stored in the second server.
  • the plurality of identification information is obtained from the second server according to the name information of the data to be synchronized, and each identification information is associated with the name information. Then, according to the plurality of identification information, acquiring corresponding data segments from the at least two first servers, and then combining the plurality of data segments into encrypted data by using a combination algorithm corresponding to the segmentation algorithm, and finally adopting an encryption algorithm
  • the decryption algorithm can obtain the data to be synchronized. Then, the spoofed data in the data to be synchronized is removed, and the target data that is finally needed is obtained.
  • the present invention uses an encryption algorithm to encrypt the backup data to obtain encrypted data; the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments; and each of the data segments is added with identification information.
  • the identifier information is associated with the name information of the data to be backed up; the plurality of data segments are uploaded to at least two first servers for distributed storage, and the identification information is uploaded to the second server, thereby completing the data backup.
  • the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, so that even if another person acquires data in one of the first servers through hacking technology, The user cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, without the identification information, the illegal user cannot Each piece of data of the backup data is extracted from the massive data; To prevent the user's backup data was informed that with improved security of backup data benefits.
  • the embodiment of the invention further provides a data backup device, comprising:
  • An encryption module configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data
  • a segmentation module configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments
  • An identifier module configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
  • an uploading module configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
  • the encryption module comprises:
  • a first acquiring unit configured to acquire unique feature information of the user
  • a second acquiring unit configured to acquire a corresponding encryption algorithm according to the unique feature information
  • an encryption unit configured to encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data.
  • the segmentation module comprises:
  • a third acquiring unit configured to acquire a corresponding segmentation algorithm according to the unique feature information
  • a dividing unit configured to divide the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
  • the method further includes:
  • a first acquiring module configured to acquire target data to be backed up
  • a second acquiring module configured to obtain masquerading data according to the target data to be backed up
  • the combination module combines the target data to be backed up and the spoofed data to obtain data to be backed up.
  • the first obtaining module comprises:
  • a fourth acquiring unit configured to acquire type information of the target data to be backed up
  • a fifth acquiring unit configured to acquire the masquerading data of the corresponding type according to the type information.
  • FIG. 4 is a structural diagram of a data backup apparatus 300 according to an embodiment of the present invention, which is mainly used in a mobile terminal.
  • the data backup apparatus 300 includes: a first obtaining module 301, a second acquiring module 302, The combination module 303, the encryption module 304, the segmentation module 305, the identification module 306, and the upload module 307.
  • the first obtaining module 301 is configured to acquire target data to be backed up.
  • the first obtaining module 301 includes a fourth obtaining unit 3011 and a fifth obtaining unit 3012.
  • the fourth obtaining unit 3011 is configured to acquire the type information of the target data to be backed up;
  • the fifth obtaining unit 3012 is configured to obtain the masquerading data of the corresponding type according to the type information.
  • the second obtaining module 302 is configured to obtain the masquerading data according to the target data to be backed up.
  • the combination module 303 is configured to combine the target data to be backed up and the spoofed data to obtain data to be backed up.
  • the encryption module 304 is configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data.
  • the encryption module 304 includes a first acquisition unit 3041, a second acquisition unit 3042, and an encryption unit 3043.
  • the first obtaining unit 3041 is configured to acquire unique feature information of the user;
  • the second acquiring unit 3042 is configured to obtain a corresponding encryption algorithm according to the unique feature information;
  • the encrypting unit 3043 is configured to use the encryption algorithm according to the encryption algorithm
  • the backup data is described as being encrypted to obtain encrypted data.
  • the segmentation module 305 is configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments.
  • the segmentation module 305 includes a third acquisition unit 3051 and a segmentation unit 3052.
  • the third obtaining unit 3051 is configured to obtain a corresponding segmentation algorithm according to the unique feature information.
  • the segmentation unit 3052 is configured to segment the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
  • the identification module 306 is configured to add identification information to each of the data segments, where the identification information is associated with the name information of the data to be backed up.
  • the uploading module 307 is configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
  • the encryption module uses the encryption algorithm to encrypt the backup data to obtain the encrypted data;
  • the segmentation module divides the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
  • the identification module is given to each Adding identification information to the data segment, the identification information is associated with the name information of the data to be backed up;
  • the uploading module uploads the plurality of data segments to at least two first servers for distributed storage, and the identification information is Uploading to the second server to complete the data backup operation; and, since the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, even if others acquire the hacking technology,
  • the data in one of the first servers cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, Without this identification information, illegal users cannot also use the backup data.
  • an embodiment of the present invention further provides a terminal 400, which may include a radio frequency (RF, Radio). Circuit 401, memory 402 including one or more computer readable storage media, input unit 403, display unit 404, sensor 405, audio circuit 406, wireless fidelity (WiFi, Wireless)
  • the Fidelity module 407 includes a processor 408 having one or more processing cores, and a power supply 409 and the like. It will be understood by those skilled in the art that the terminal shown in FIG. 5 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements. among them:
  • the RF circuit 401 can be used for transmitting and receiving information or during a call, and receiving and transmitting signals. Specifically, after receiving downlink information of the base station, the downlink information is processed by one or more processors 408. In addition, the data related to the uplink is sent to the base station. .
  • RF circuitry 401 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a subscriber identity module (SIM, Subscriber Identity Module) Card, Transceiver, Coupler, Low Noise Amplifier (LNA, Low Noise) Amplifier), duplexer, etc.
  • SIM Subscriber identity module
  • LNA Low Noise Amplifier
  • the RF circuit 401 can also communicate with the network and other devices through wireless communication.
  • the wireless communication can use any communication standard or protocol, including but not limited to a global mobile communication system (GSM, Global System of Mobile communication), General Packet Radio Service (GPRS, General Packet Radio) Service), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA, Wideband Code) Division Multiple Access), Long Term Evolution (LTE), e-mail, short message service (SMS, Short) Messaging Service) and so on.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short message service
  • the memory 402 can be used to store software programs and modules, and the processor 408 executes various functional applications and data processing by running software programs and modules stored in the memory 402.
  • the memory 402 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the terminal (such as audio data, phone book, etc.).
  • memory 402 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 402 may also include a memory controller to provide access to memory 402 by processor 408 and input unit 403.
  • Input unit 403 can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 403 can include a touch-sensitive surface as well as other input devices.
  • Touch-sensitive surfaces also known as touch screens or trackpads, collect touch operations on or near the user (such as the user using a finger, stylus, etc., any suitable object or accessory on a touch-sensitive surface or touch-sensitive Operation near the surface), and drive the corresponding connecting device according to a preset program.
  • the touch sensitive surface may include two parts of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 408 is provided and can receive commands from the processor 408 and execute them.
  • touch-sensitive surfaces can be implemented in a variety of types, including resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 403 can also include other input devices. Specifically, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • Display unit 404 can be used to display information entered by the user or information provided to the user, as well as various graphical user interfaces of the terminal, which can be composed of graphics, text, icons, video, and any combination thereof.
  • the display unit 404 can include a display panel, and optionally, a liquid crystal display (LCD, Liquid) can be used. Crystal Display), Organic Light-Emitting (OLED) Diode) and other forms to configure the display panel.
  • the touch-sensitive surface can cover the display panel, and when the touch-sensitive surface detects a touch operation thereon or nearby, it is transmitted to the processor 408 to determine the type of the touch event, and then the processor 408 displays the type according to the type of the touch event. A corresponding visual output is provided on the panel.
  • the touch-sensitive surface and display panel are implemented as two separate components to perform input and input functions, in some embodiments, the touch-sensitive surface can be integrated with the display panel to implement input and output functions.
  • the terminal may also include at least one type of sensor 405, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel according to the brightness of the ambient light, and the proximity sensor may close the display panel and/or the backlight when the terminal moves to the ear.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.;
  • Other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like that can be configured in the terminal are not described herein.
  • the audio circuit 406, the speaker, and the microphone provide an audio interface between the user and the terminal.
  • the audio circuit 406 can transmit the converted electrical signal of the audio data to the speaker, and convert it into a sound signal output by the speaker; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit 406 and then converted.
  • the audio data is then processed by the audio data output processor 408, sent via RF circuitry 401 to, for example, another terminal, or the audio data is output to memory 402 for further processing.
  • the audio circuit 406 may also include an earbud jack to provide communication between the peripheral earphone and the terminal.
  • WiFi is a short-range wireless transmission technology
  • the terminal can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 407, which provides wireless broadband Internet access for users.
  • FIG. 5 shows the WiFi module 407, it can be understood that it does not belong to the necessary configuration of the terminal, and may be omitted as needed within the scope of not changing the essence of the invention.
  • Processor 408 is the control center of the terminal, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in memory 402, and by invoking data stored in memory 402, The various functions of the terminal and processing data to monitor the mobile phone as a whole.
  • the processor 408 may include one or more processing cores; preferably, the processor 408 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 408.
  • the terminal also includes a power source 409 (such as a battery) that supplies power to the various components.
  • the power source can be logically coupled to the processor 408 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the power supply 409 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the terminal may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the processor 408 in the terminal loads the executable file corresponding to the process of one or more applications into the memory 402 according to the following instruction, and is executed by the processor 408 to be stored in the memory.
  • the application program in 402 thereby implementing the data backup method and the functions of the device in the foregoing embodiment: encrypting the backup data by using an encryption algorithm to obtain encrypted data; and dividing the encrypted data by using a segmentation algorithm to obtain more Adding identification information to each of the data segments, the identification information being associated with the name information of the data to be backed up; uploading the plurality of data segments to at least two first servers for distributed storage And uploading the identification information to the second server.
  • the data to be backed up is encrypted to obtain encrypted data
  • the processor is configured to perform the following steps:
  • the data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
  • the processor when the encrypted data is segmented using a segmentation algorithm to obtain a plurality of data segments, the processor is configured to perform the following steps:
  • the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
  • the processor is configured to perform the following steps:
  • the target data to be backed up and the spoofed data are combined to obtain data to be backed up.
  • the processor when the masquerading data is acquired according to the target data to be backed up, the processor is configured to perform the following steps:
  • the one or more operations may constitute computer readable instructions stored on one or more computer readable media that, when executed by an electronic device, cause the computing device to perform the operations.
  • the order in which some or all of the operations are described should not be construed as implying that the operations must be sequential. Those skilled in the art will appreciate alternative rankings that have the benefit of this specification. Moreover, it should be understood that not all operations must be present in every embodiment provided herein.
  • the word "preferred” as used herein is intended to serve as an example, instance, or illustration. Any aspect or design described as “preferred” by the text is not necessarily to be construed as being more advantageous than other aspects or designs. Instead, the use of the word “preferred” is intended to present a concept in a specific manner.
  • the term “or” as used in this application is intended to mean an “or” or “an” That is, unless otherwise specified or clear from the context, "X employs A or B” means naturally including any one of the permutations. That is, if X uses A; X uses B; or X uses both A and B, then "X uses A or B" is satisfied in any of the foregoing examples.
  • Each functional unit in the embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A data backup method and apparatus, a storage medium, and a terminal. The method comprises the following steps: using an encryption algorithm to encrypt data to be backed up, in order to obtain encrypted data; using a segmentation algorithm to segment the encrypted data, in order to obtain a plurality of data segments; adding identification information to each data segment; uploading the plurality of data segments to at least two first servers for distributed storage, and uploading the identification information to a second server.

Description

数据备份方法、装置、存储介质及终端 Data backup method, device, storage medium and terminal
本申请要求于2016年10月25日提交中国专利局、申请号为201610939399.9、发明名称为“数据备份方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。The present application claims the priority of the Chinese Patent Application, filed on Oct. 25, 2016, the entire disclosure of which is hereby incorporated by reference.
技术领域Technical field
本发明涉及网络技术领域,特别是涉及一种数据备份方法、装置、存储介质及终端。The present invention relates to the field of network technologies, and in particular, to a data backup method, apparatus, storage medium, and terminal.
背景技术Background technique
随着网络技术的发展,云端大数据、云备份以及云同步等技术的使用越来越普遍。With the development of network technologies, the use of technologies such as cloud big data, cloud backup, and cloud synchronization is becoming more and more common.
用户从移动终端侧获取已经备份在云端的数据需要登录云账号,然后从云服务器中下载。如果服务器被黑客入侵或者运营商内部工作人员的工作失误,造成一个服务器的备份数据泄露后,导致用户的信息被不法分子得到,从而可能给用户带来严重的经济损失。The user needs to log in to the cloud account to obtain the data that has been backed up in the cloud from the mobile terminal side, and then download it from the cloud server. If the server is hacked or the internal staff of the operator fails, the backup data of a server is leaked, and the user's information is obtained by the criminals, which may cause serious economic losses to the user.
技术问题technical problem
本发明实施例提供一种数据备份方法、装置、存储介质及终端,具有提高备份数据的安全性的有益效果。The embodiment of the invention provides a data backup method, device, storage medium and terminal, which have the beneficial effects of improving the security of the backup data.
技术解决方案Technical solution
第一方面,本发明实施例提供一种数据备份方法,包括以下步骤:In a first aspect, an embodiment of the present invention provides a data backup method, including the following steps:
采用加密算法对待备份数据进行加密,以得到加密数据;Encrypting the backup data with an encryption algorithm to obtain encrypted data;
采用分割算法对所述加密数据进行分割,以得到多个数据片段;Separating the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;Adding identification information to each of the data segments, the identification information being associated with name information of the data to be backed up;
将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。Uploading the plurality of data segments to at least two first servers for distributed storage, and uploading the identification information to the second server.
第二方面,本发明实施例还提供一种数据备份装置,包括:In a second aspect, the embodiment of the present invention further provides a data backup device, including:
加密模块,用于采用加密算法对待备份数据进行加密,以得到加密数据;An encryption module, configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data;
分割模块,用于采用分割算法对所述加密数据进行分割,以得到多个数据片段;a segmentation module, configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
标识模块,用于给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;An identifier module, configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
上传模块,用于将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。And an uploading module, configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
第三方面,本发明实施例还提供一种存储介质,所述存储介质中存储有多条指令,所述指令适于由处理器加载以执行上述任一项所述的数据备份方法。In a third aspect, an embodiment of the present invention further provides a storage medium, where the storage medium stores a plurality of instructions, the instructions being adapted to be loaded by a processor to perform the data backup method according to any one of the foregoing.
第四方面,本发明实施例还提供一种终端,包括处理器和存储器,所述处理器与所述存储器电性连接,所述存储器用于存储指令和数据,所述处理器用于执行以下步骤:In a fourth aspect, an embodiment of the present invention further provides a terminal, including a processor and a memory, the processor is electrically connected to the memory, the memory is used to store instructions and data, and the processor is configured to perform the following steps. :
采用加密算法对待备份数据进行加密,以得到加密数据;Encrypting the backup data with an encryption algorithm to obtain encrypted data;
采用分割算法对所述加密数据进行分割,以得到多个数据片段;Separating the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
给每一数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;Adding identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。Uploading the plurality of data segments to at least two first servers for distributed storage, and uploading the identification information to the second server.
有益效果 Beneficial effect
本发明实施例提供一种数据备份方法、装置、存储介质及终端,具有提高备份数据的安全性的有益效果。The embodiment of the invention provides a data backup method, device, storage medium and terminal, which have the beneficial effects of improving the security of the backup data.
附图说明DRAWINGS
图1为本发明一实施例中的数据备份系统的场景图。FIG. 1 is a scene diagram of a data backup system according to an embodiment of the present invention.
图2为本发明实施例中的数据备份方法的一种流程图。FIG. 2 is a flowchart of a data backup method in an embodiment of the present invention.
图3为本发明实施例中的数据备份方法的另一种流程图。FIG. 3 is another flowchart of a data backup method according to an embodiment of the present invention.
图4为本发明实施例中的数据备份装置的结构图。FIG. 4 is a structural diagram of a data backup apparatus according to an embodiment of the present invention.
图5为本发明实施例中的终端的结构图。FIG. 5 is a structural diagram of a terminal in an embodiment of the present invention.
本发明的最佳实施方式BEST MODE FOR CARRYING OUT THE INVENTION
请参照图式,其中相同的组件符号代表相同的组件,本发明的原理是以实施在一适当的运算环境中来举例说明。以下的说明是基于所例示的本发明具体实施例,其不应被视为限制本发明未在此详述的其它具体实施例。Referring to the drawings, wherein like reference numerals refer to the same components, the principles of the invention are illustrated in the context of a suitable computing environment. The following description is based on the specific embodiments of the invention, which are not to be construed as limiting the invention.
在以下的说明中,本发明的优选实施例将参考由一部或多部计算机所执行之作业的步骤及符号来说明,除非另有述明。因此,其将可了解到这些步骤及操作,其中有数次提到为由计算机执行,包括了由代表了以一结构化型式中的数据之电子信号的计算机处理单元所操纵。此操纵转换该数据或将其维持在该计算机之内存系统中的位置处,其可重新配置或另外以本领域技术人员所熟知的方式来改变该计算机之运作。该数据所维持的数据结构为该内存之实体位置,其具有由该数据格式所定义的特定特性。但是,本发明原理以上述文字来说明,其并不代表为一种限制,本领域技术人员将可了解到以下所述的多种步骤及操作亦可实施在硬件当中。In the following description, the preferred embodiments of the present invention will be described with reference to the steps and symbols of the operations performed by one or more computers, unless otherwise stated. Thus, it will be appreciated that these steps and operations, several of which are referred to as being performed by a computer, include manipulation by a computer processing unit that represents an electronic signal of data in a structured version. This manipulation converts the data or maintains it at a location in the memory system of the computer, which can be reconfigured or otherwise alter the operation of the computer in a manner well known to those skilled in the art. The data structure maintained by the data is the physical location of the memory, which has specific characteristics defined by the data format. However, the principles of the present invention are described in the above text, which is not intended to be a limitation, and those skilled in the art will appreciate that the various steps and operations described below can also be implemented in hardware.
本发明实施例提供了一种数据备份方法,包括以下步骤:An embodiment of the present invention provides a data backup method, including the following steps:
采用加密算法对待备份数据进行加密,以得到加密数据;Encrypting the backup data with an encryption algorithm to obtain encrypted data;
采用分割算法对所述加密数据进行分割,以得到多个数据片段;Separating the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
给每一数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;Adding identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。Uploading the plurality of data segments to at least two first servers for distributed storage, and uploading the identification information to the second server.
在一些实施例中,所述对待备份的数据进行加密,以得到加密数据的步骤包括:In some embodiments, the step of encrypting the data to be backed up to obtain encrypted data includes:
获取用户的唯一特征信息;Obtain unique feature information of the user;
根据所述唯一特征信息获取对应的加密算法;Obtaining a corresponding encryption algorithm according to the unique feature information;
根据所述加密算法对所述待备份数据进行加密,以得到加密数据。The data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
在一些实施例中,所述采用分割算法对所述加密数据进行分割,以得到多个数据片段的步骤包括:In some embodiments, the step of segmenting the encrypted data by using a segmentation algorithm to obtain a plurality of data segments comprises:
根据所述唯一特征信息获取对应的分割算法;Obtaining a corresponding segmentation algorithm according to the unique feature information;
采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。The segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
在一些实施例中,所述采用加密算法对待备份数据进行加密,以得到加密数据的步骤之前,还包括:In some embodiments, before the step of encrypting the backup data by using an encryption algorithm to obtain the encrypted data, the method further includes:
获取待备份目标数据;Obtain target data to be backed up;
根据所述待备份目标数据获取伪装数据;Obtaining masquerading data according to the target data to be backed up;
将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The target data to be backed up and the spoofed data are combined to obtain data to be backed up.
在一些实施例中,所述根据所述待备份目标数据获取伪装数据的步骤包括:In some embodiments, the step of acquiring the masquerading data according to the target data to be backed up includes:
获取所述待备份目标数据的类型信息;Obtaining type information of the target data to be backed up;
根据所述类型信息获取对应类型的伪装数据。Obtaining masquerading data of a corresponding type according to the type information.
本发明实施例提供的数据备份系统,主要包括数据备份装置以及服务器,其中,该数据备份装置具体可以集成在如平板电脑,手机等移动终端中,该服务器与移动终端可通过有线或无线网络进行连接。The data backup system provided by the embodiment of the present invention mainly includes a data backup device and a server, wherein the data backup device can be integrated into a mobile terminal such as a tablet computer or a mobile phone, and the server and the mobile terminal can be connected through a wired or wireless network. connection.
比如,请参考图1,图1为本发明提供的数据备份系统的场景示意图,该数据备份装置具体集成在手机中,主要用于采用加密算法对待备份数据进行加密,以得到加密数据;采用分割算法对所述加密数据进行分割,以得到多个数据片段;给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。For example, please refer to FIG. 1. FIG. 1 is a schematic diagram of a data backup system provided by the present invention. The data backup device is specifically integrated in a mobile phone, and is mainly used to encrypt data to be encrypted by using an encryption algorithm to obtain encrypted data; Encoding the encrypted data to obtain a plurality of data segments; adding identification information to each of the data segments, the identification information being associated with name information of the data to be backed up; and the plurality of data segments Uploading to at least two first servers for distributed storage, and uploading the identification information to the second server.
在本实施例中,将从数据备份装置的角度进行描述,该数据备份装置具体可以集成在如平板电脑,手机等移动终端中。In this embodiment, it will be described from the perspective of a data backup device, which may be integrated into a mobile terminal such as a tablet computer or a mobile phone.
请参照图2,图2是本发明一优选实施例中的数据备份方法的流程图,其主要运用于移动终端中,该数据备份方法包括以下步骤:Referring to FIG. 2, FIG. 2 is a flowchart of a data backup method in a preferred embodiment of the present invention, which is mainly used in a mobile terminal. The data backup method includes the following steps:
S101、采用加密算法对待备份数据进行加密,以得到加密数据;S101. Encrypt the backup data by using an encryption algorithm to obtain encrypted data.
S102、采用分割算法对所述加密数据进行分割,以得到多个数据片段;S102. Segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments.
S103、给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;S103. Add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
S104、将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。S104. Upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
下面对该数据备份方法的各个步骤进行详细说明。The steps of the data backup method are described in detail below.
在该步骤S101中,该加密算法可以采用现有技术中的常规加密算法,也可以采用专门定制的加密算法。该待备份数据为保密程度较高的数据,例如银行卡卡号及密码、隐私照片、重要文件等。In the step S101, the encryption algorithm may adopt a conventional encryption algorithm in the prior art, or may adopt a specially customized encryption algorithm. The data to be backed up is data with a high degree of confidentiality, such as a bank card number and password, a privacy photo, an important file, and the like.
在该步骤S102中,该分割算法可以是根据数据容量大小进行分割,每一数据片段的数据容量可以为相同的值,也可以为不同的值,例如,第一片段为2B,第二片段为3B,第三片段为4B等。当然,其并不限于此。该分割算法也可以根据其他标准来进行分割形成数据片段。In the step S102, the segmentation algorithm may be divided according to the data capacity, and the data capacity of each data segment may be the same value or a different value. For example, the first segment is 2B, and the second segment is 3B, the third segment is 4B and the like. Of course, it is not limited to this. The segmentation algorithm can also be segmented to form data segments according to other criteria.
在该步骤S103中,将每一数据片段都加一个标识信息,该标识信息与待备份数据的名称信息是关联的,例如,待备份数据的名称为a1,该标识信息为a1b1,其中,b1是该数据片段的标识号,用以区分各个数据片段。In the step S103, each data segment is added with an identification information, and the identification information is associated with the name information of the data to be backed up. For example, the name of the data to be backed up is a1, and the identification information is a1b1, where b1 Is the identification number of the data segment to distinguish each data segment.
在该步骤S104中,将该多个数据片段分散存储在至少两个第一服务器中,这样即使其中一个第一服务器中的数据泄露了,也无法得到用户的完整数据。并将该标识信息存储在第二服务器中。In the step S104, the plurality of data segments are distributed and stored in the at least two first servers, so that even if the data in one of the first servers is leaked, the complete data of the user cannot be obtained. And storing the identification information in the second server.
当用户需要下载该数据时,根据待同步数据的名称信息从该第二服务器中获取该多个标识信息,每一标识信息均与该名称信息相互关联。然后,根据该多个标识信息,从该至少两个第一服务器中获取对应的数据片段,接着采用与分割算法对应的组合算法将该多个数据片段组合成加密数据,最后采用与加密算法对应的解密算法即可得到该待同步数据。When the user needs to download the data, the plurality of identification information is obtained from the second server according to the name information of the data to be synchronized, and each identification information is associated with the name information. Then, according to the plurality of identification information, acquiring corresponding data segments from the at least two first servers, and then combining the plurality of data segments into encrypted data by using a combination algorithm corresponding to the segmentation algorithm, and finally adopting an encryption algorithm The decryption algorithm can obtain the data to be synchronized.
由上可知,本发明采用加密算法对待备份数据进行加密,以得到加密数据;采用分割算法对所述加密数据进行分割,以得到多个数据片段;给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器,从而完成数据备份操作;并且,由于是将待备份数据的加密数据分割成多个数据片段后分散存储在至少两个第一服务器中,使得即使他人通过黑客技术,获取了其中一个第一服务器中的数据,也无法获得用户的完整的备份数据,并且,由于该多个标识信息存储在第二服务器中,即使非法用户同时获取了该多个第一服务器中的数据,没有该标识信息,非法用户也无法将该备份数据的各个数据片段从海量数据里提取出来;从而可以防止用户的备份数据被人获悉,具有提高备份数据的安全性的有益效果。As can be seen from the above, the present invention uses an encryption algorithm to encrypt the backup data to obtain encrypted data; the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments; and each of the data segments is added with identification information. The identifier information is associated with the name information of the data to be backed up; the plurality of data segments are uploaded to at least two first servers for distributed storage, and the identification information is uploaded to the second server, thereby completing the data backup. And, because the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, so that even if another person acquires data in one of the first servers through hacking technology, The user cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, without the identification information, the illegal user cannot Each piece of data of the backup data is extracted from the massive data; To prevent the user's backup data was informed that with improved security of backup data benefits.
请参照图3,图3是本发明优选另一实施例中的数据备份方法的流程图,其主要运用于移动终端中,该数据备份方法包括以下步骤:Please refer to FIG. 3. FIG. 3 is a flowchart of a data backup method in another preferred embodiment of the present invention, which is mainly used in a mobile terminal, and the data backup method includes the following steps:
S201、获取待备份目标数据;S201. Obtain target data to be backed up;
S202、根据所述待备份目标数据获取伪装数据;S202. Acquire masquerading data according to the target data to be backed up;
S203、将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据;S203. Combine the target data to be backed up and the spoofed data to obtain data to be backed up;
S204、采用加密算法对待备份数据进行加密,以得到加密数据;S204. Encrypt the backup data by using an encryption algorithm to obtain encrypted data.
S205、采用分割算法对所述加密数据进行分割,以得到多个数据片段;S205. Perform segmentation on the encrypted data by using a segmentation algorithm to obtain multiple data segments.
S206、给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;S206. Add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
S207、将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。S207. Upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
下面对该数据备份方法的各个步骤进行详细说明。The steps of the data backup method are described in detail below.
在该步骤S201中,当终端检测到安全级别较高的数据更新时,提取出该更新的数据作为待备份目标数据,其中该安全级别较高的数据可以为银行账号密码数据、照片、重要合同文件、重要技术文件等。In the step S201, when the terminal detects the data update with a higher security level, the updated data is extracted as the target data to be backed up, wherein the data with the higher security level may be the bank account password data, the photo, the important contract. Documents, important technical documents, etc.
在该步骤S202中,具体实施时,根据该待备份目标数据的类型来获取伪装数据。因此,该步骤S202具体包括:In the step S202, during specific implementation, the spoofed data is obtained according to the type of the target data to be backed up. Therefore, the step S202 specifically includes:
S2021、获取所述待备份目标数据的类型信息;例如,该类型信息可以为文字类型、数字类型以及图片类型等。S2021: Acquire type information of the target data to be backed up; for example, the type information may be a text type, a digital type, a picture type, and the like.
S2022、根据所述类型信息获取对应类型的伪装数据。例如,当该待备份目标数据为照片时,获取的伪装数据也是照片。该照片可以是自动从网络下载,也可以从本地数据库提取。S2022: Acquire masquerading data of a corresponding type according to the type information. For example, when the target data to be backed up is a photo, the acquired camouflage data is also a photo. The photo can be downloaded automatically from the web or from a local database.
在该步骤S203中,将待备份数据目标数据与伪装数据组合形成待备份数据。In this step S203, the data target data to be backed up is combined with the masquerading data to form data to be backed up.
在该步骤S204中,该加密算法可以采用现有技术中的常规加密算法,也可以采用专门定制的加密算法。In the step S204, the encryption algorithm may adopt a conventional encryption algorithm in the prior art, or may adopt a specially customized encryption algorithm.
例如,当采用专门定制的加密算法时,该步骤S204包括以下子步骤:For example, when a specially customized encryption algorithm is employed, the step S204 includes the following sub-steps:
S2041、获取用户的唯一特征信息;该唯一特征信息可以是用户的指纹信息、虹膜信息或者声音信息等。S2041: Obtain unique feature information of the user; the unique feature information may be fingerprint information, iris information, or sound information of the user.
S2042、根据所述唯一特征信息获取对应的加密算法;例如,用户输入的是指纹信息,那么对应的加密算法是A算法,如果输入的是声音信息,那么对应的加密算法是B算法,如果输入的是虹膜信息,那么对于的加密算法是C算法。S2042: Acquire a corresponding encryption algorithm according to the unique feature information; for example, the user inputs fingerprint information, then the corresponding encryption algorithm is an A algorithm, and if the input is sound information, the corresponding encryption algorithm is a B algorithm, if input Is the iris information, then the encryption algorithm for the C algorithm.
S2043、根据所述加密算法对所述待备份数据进行加密,以得到加密数据。采用步骤S2043中获取的加密算法来对待备份数据进行加密,在以后下载该数据后,必须输入相同的唯一特征信息,才可以获取到对应的解密算法,从而对加密数据进行解密。S2043: Encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data. The encryption data obtained in step S2043 is used to encrypt the backup data. After downloading the data, the same unique feature information must be input before the corresponding decryption algorithm can be obtained, thereby decrypting the encrypted data.
在该步骤S205中,该分割算法可以是根据数据容量大小进行分割,每一数据片段的数据容量可以为相同的值,也可以为不同的值,例如,第一片段为2B,第二片段为3B,第三片段为4B等。当然,其并不限于此。该分割算法也可以根据根据其他标准来进行分割形成数据片段。具体地,在本实施例中,该步骤S205具体包括以下子步骤:In the step S205, the segmentation algorithm may be divided according to the data capacity, and the data capacity of each data segment may be the same value or a different value. For example, the first segment is 2B, and the second segment is 3B, the third segment is 4B and the like. Of course, it is not limited to this. The segmentation algorithm can also form segments of data according to segmentation according to other criteria. Specifically, in this embodiment, the step S205 specifically includes the following sub-steps:
S2051、根据所述唯一特征信息获取对应的分割算法;例如,用户输入的是指纹信息,那么对应的分割算法是W算法,如果输入的是声音信息,那么对应的分割算法是Y算法,如果输入的输虹膜信息,那么对于的分割算法是Z算法。S2051: Acquire a corresponding segmentation algorithm according to the unique feature information; for example, if the user inputs fingerprint information, then the corresponding segmentation algorithm is a W algorithm, and if the input is sound information, the corresponding segmentation algorithm is a Y algorithm, if input The input iris information, then the segmentation algorithm is the Z algorithm.
S2052、采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。S2052: Segment the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
在该步骤S206中,每一数据片段都加一个标识信息,该标识信息与待备份数据的名称信息是关联的,例如,待备份数据的名称为a1,该标识信息为a1b1,其中,b1是该数据片段的标识号,用以区分各个数据片段。In the step S206, each data segment is added with an identification information, and the identification information is associated with the name information of the data to be backed up. For example, the name of the data to be backed up is a1, and the identification information is a1b1, where b1 is The identification number of the data segment to distinguish each data segment.
在该步骤S207中,将该多个数据片段分散存储在至少两个第一服务器中,这样即使其中一个服务器中的数据泄露了,也无法得到用户的完成数据。将该标识信息存储在第二服务器中。In the step S207, the plurality of data segments are distributed and stored in at least two first servers, so that even if the data in one of the servers is leaked, the user's completion data cannot be obtained. The identification information is stored in the second server.
当用户需要下载该数据时,根据待同步数据的名称信息从该第二服务器中获取该多个标识信息,每一标识信息均与该名称信息相互关联。然后,根据该多个标识信息,从该至少两个第一服务器中获取对应的数据片段,接着采用与分割算法对应的组合算法将该多个数据片段组合成加密数据,最后采用与加密算法对应的解密算法即可得到该待同步数据。然后,去除该待同步数据中的伪装数据,即可得到最终需要的目标数据。When the user needs to download the data, the plurality of identification information is obtained from the second server according to the name information of the data to be synchronized, and each identification information is associated with the name information. Then, according to the plurality of identification information, acquiring corresponding data segments from the at least two first servers, and then combining the plurality of data segments into encrypted data by using a combination algorithm corresponding to the segmentation algorithm, and finally adopting an encryption algorithm The decryption algorithm can obtain the data to be synchronized. Then, the spoofed data in the data to be synchronized is removed, and the target data that is finally needed is obtained.
由上可知,本发明采用加密算法对待备份数据进行加密,以得到加密数据;采用分割算法对所述加密数据进行分割,以得到多个数据片段;给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器,从而完成数据备份操作;并且,由于是将待备份数据的加密数据分割成多个数据片段后分散存储在至少两个第一服务器中,使得即使他人通过黑客技术,获取了其中一个第一服务器中的数据,也无法获得用户的完整的备份数据,并且,由于该多个标识信息存储在第二服务器中,即使非法用户同时获取了该多个第一服务器中的数据,没有该标识信息,非法用户也无法将该备份数据的各个数据片段从海量数据里提取出来;从而可以防止用户的备份数据被人获悉,具有提高备份数据的安全性的有益效果。As can be seen from the above, the present invention uses an encryption algorithm to encrypt the backup data to obtain encrypted data; the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments; and each of the data segments is added with identification information. The identifier information is associated with the name information of the data to be backed up; the plurality of data segments are uploaded to at least two first servers for distributed storage, and the identification information is uploaded to the second server, thereby completing the data backup. And, because the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, so that even if another person acquires data in one of the first servers through hacking technology, The user cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, without the identification information, the illegal user cannot Each piece of data of the backup data is extracted from the massive data; To prevent the user's backup data was informed that with improved security of backup data benefits.
本发明实施例还提供了一种数据备份装置,包括:The embodiment of the invention further provides a data backup device, comprising:
加密模块,用于采用加密算法对待备份数据进行加密,以得到加密数据;An encryption module, configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data;
分割模块,用于采用分割算法对所述加密数据进行分割,以得到多个数据片段;a segmentation module, configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
标识模块,用于给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;An identifier module, configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
上传模块,用于将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。And an uploading module, configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
在一些实施例中,所述加密模块包括:In some embodiments, the encryption module comprises:
第一获取单元,用于获取用户的唯一特征信息;a first acquiring unit, configured to acquire unique feature information of the user;
第二获取单元,用于根据所述唯一特征信息获取对应的加密算法;a second acquiring unit, configured to acquire a corresponding encryption algorithm according to the unique feature information;
加密单元,用于根据所述加密算法对所述待备份数据进行加密,以得到加密数据。And an encryption unit, configured to encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data.
在一些实施例中,所述分割模块包括:In some embodiments, the segmentation module comprises:
第三获取单元,用于根据所述唯一特征信息获取对应的分割算法;a third acquiring unit, configured to acquire a corresponding segmentation algorithm according to the unique feature information;
分割单元,用于采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。a dividing unit, configured to divide the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
在一些实施例中,还包括:In some embodiments, the method further includes:
第一获取模块,用于获取待备份目标数据;a first acquiring module, configured to acquire target data to be backed up;
第二获取模块,用于根据所述待备份目标数据获取伪装数据;a second acquiring module, configured to obtain masquerading data according to the target data to be backed up;
组合模块,将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The combination module combines the target data to be backed up and the spoofed data to obtain data to be backed up.
在一些实施例中,所述第一获取模块包括:In some embodiments, the first obtaining module comprises:
第四获取单元,用于获取所述待备份目标数据的类型信息;a fourth acquiring unit, configured to acquire type information of the target data to be backed up;
第五获取单元,用于根据所述类型信息获取对应类型的伪装数据。And a fifth acquiring unit, configured to acquire the masquerading data of the corresponding type according to the type information.
请参照图4,图4是本发明一实施例中的数据备份装置300的结构图,其主要运用于移动终端中,该数据备份装置300包括:第一获取模块301、第二获取模块302、组合模块303、加密模块304、分割模块305、标识模块306以及上传模块307。Referring to FIG. 4, FIG. 4 is a structural diagram of a data backup apparatus 300 according to an embodiment of the present invention, which is mainly used in a mobile terminal. The data backup apparatus 300 includes: a first obtaining module 301, a second acquiring module 302, The combination module 303, the encryption module 304, the segmentation module 305, the identification module 306, and the upload module 307.
其中,该第一获取模块301用于获取待备份目标数据。该第一获取模块301包括第四获取单元3011以及第五获取单元3012。其中该第四获取单元3011用于获取所述待备份目标数据的类型信息;该第五获取单元3012用于根据所述类型信息获取对应类型的伪装数据。The first obtaining module 301 is configured to acquire target data to be backed up. The first obtaining module 301 includes a fourth obtaining unit 3011 and a fifth obtaining unit 3012. The fourth obtaining unit 3011 is configured to acquire the type information of the target data to be backed up; the fifth obtaining unit 3012 is configured to obtain the masquerading data of the corresponding type according to the type information.
第二获取模块302用于根据待备份目标数据获取伪装数据。The second obtaining module 302 is configured to obtain the masquerading data according to the target data to be backed up.
组合模块303用于将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The combination module 303 is configured to combine the target data to be backed up and the spoofed data to obtain data to be backed up.
加密模块304用于采用加密算法对待备份数据进行加密,以得到加密数据。该加密模块304包括第一获取单元3041、第二获取单元3042、加密单元3043。其中,该第一获取单元3041用于获取用户的唯一特征信息;该第二获取单元3042用于根据所述唯一特征信息获取对应的加密算法;该加密单元3043用于根据所述加密算法对所述待备份数据进行加密,以得到加密数据。The encryption module 304 is configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data. The encryption module 304 includes a first acquisition unit 3041, a second acquisition unit 3042, and an encryption unit 3043. The first obtaining unit 3041 is configured to acquire unique feature information of the user; the second acquiring unit 3042 is configured to obtain a corresponding encryption algorithm according to the unique feature information; the encrypting unit 3043 is configured to use the encryption algorithm according to the encryption algorithm The backup data is described as being encrypted to obtain encrypted data.
分割模块305用于采用分割算法对所述加密数据进行分割,以得到多个数据片段。该分割模块305包括第三获取单元3051、分割单元3052。其中,第三获取单元3051用于根据所述唯一特征信息获取对应的分割算法;分割单元3052用于采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。The segmentation module 305 is configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments. The segmentation module 305 includes a third acquisition unit 3051 and a segmentation unit 3052. The third obtaining unit 3051 is configured to obtain a corresponding segmentation algorithm according to the unique feature information. The segmentation unit 3052 is configured to segment the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
标识模块306用于给每一所述数据片段添加标识信息,标识信息与所述待备份数据的名称信息相关联。The identification module 306 is configured to add identification information to each of the data segments, where the identification information is associated with the name information of the data to be backed up.
上传模块307用于将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将标识信息上传至第二服务器。The uploading module 307 is configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
由上可知,本发明通过加密模块来采用加密算法对待备份数据进行加密,以得到加密数据;分割模块采用分割算法对所述加密数据进行分割,以得到多个数据片段;标识模块给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;上传模块将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器,从而完成数据备份操作;并且,由于是将待备份数据的加密数据分割成多个数据片段后分散存储在至少两个第一服务器中,使得即使他人通过黑客技术,获取了其中一个第一服务器中的数据,也无法获得用户的完整的备份数据,并且,由于该多个标识信息存储在第二服务器中,即使非法用户同时获取了该多个第一服务器中的数据,没有该标识信息,非法用户也无法将该备份数据的各个数据片段从海量数据里提取出来;具有提高备份数据的安全性的有益效果。It can be seen from the above that the encryption module uses the encryption algorithm to encrypt the backup data to obtain the encrypted data; the segmentation module divides the encrypted data by using a segmentation algorithm to obtain a plurality of data segments; the identification module is given to each Adding identification information to the data segment, the identification information is associated with the name information of the data to be backed up; the uploading module uploads the plurality of data segments to at least two first servers for distributed storage, and the identification information is Uploading to the second server to complete the data backup operation; and, since the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, even if others acquire the hacking technology, The data in one of the first servers cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, Without this identification information, illegal users cannot also use the backup data. Data segments extracted from data in the mass; having improved backup data security benefits.
如图5所示,本发明实施例还提供一种终端400,该终端400可以包括射频(RF,Radio Frequency)电路401、包括有一个或一个以上计算机可读存储介质的存储器402、输入单元403、显示单元404、传感器405、音频电路406、无线保真(WiFi,Wireless Fidelity)模块407、包括有一个或者一个以上处理核心的处理器408、以及电源409等部件。本领域技术人员可以理解,图5中示出的终端并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:As shown in FIG. 5, an embodiment of the present invention further provides a terminal 400, which may include a radio frequency (RF, Radio). Circuit 401, memory 402 including one or more computer readable storage media, input unit 403, display unit 404, sensor 405, audio circuit 406, wireless fidelity (WiFi, Wireless) The Fidelity module 407 includes a processor 408 having one or more processing cores, and a power supply 409 and the like. It will be understood by those skilled in the art that the terminal shown in FIG. 5 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements. among them:
RF电路401可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,交由一个或者一个以上处理器408处理;另外,将涉及上行的数据发送给基站。通常,RF电路401包括但不限于天线、至少一个放大器、调谐器、一个或多个振荡器、用户身份模块(SIM, Subscriber Identity Module)卡、收发信机、耦合器、低噪声放大器(LNA,Low Noise Amplifier)、双工器等。此外,RF电路401还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统 (GSM,Global System of Mobile communication)、通用分组无线服务(GPRS ,General Packet Radio Service)、码分多址(CDMA,Code Division Multiple Access)、宽带码分多址(WCDMA,Wideband Code Division Multiple Access)、长期演进(LTE,Long Term Evolution)、电子邮件、短消息服务(SMS,Short Messaging Service)等。The RF circuit 401 can be used for transmitting and receiving information or during a call, and receiving and transmitting signals. Specifically, after receiving downlink information of the base station, the downlink information is processed by one or more processors 408. In addition, the data related to the uplink is sent to the base station. . Typically, RF circuitry 401 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a subscriber identity module (SIM, Subscriber Identity Module) Card, Transceiver, Coupler, Low Noise Amplifier (LNA, Low Noise) Amplifier), duplexer, etc. In addition, the RF circuit 401 can also communicate with the network and other devices through wireless communication. The wireless communication can use any communication standard or protocol, including but not limited to a global mobile communication system (GSM, Global System of Mobile communication), General Packet Radio Service (GPRS, General Packet Radio) Service), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA, Wideband Code) Division Multiple Access), Long Term Evolution (LTE), e-mail, short message service (SMS, Short) Messaging Service) and so on.
存储器402可用于存储软件程序以及模块,处理器408通过运行存储在存储器402的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器402可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据终端的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器402可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器402还可以包括存储器控制器,以提供处理器408和输入单元403对存储器402的访问。The memory 402 can be used to store software programs and modules, and the processor 408 executes various functional applications and data processing by running software programs and modules stored in the memory 402. The memory 402 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the terminal (such as audio data, phone book, etc.). Moreover, memory 402 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 402 may also include a memory controller to provide access to memory 402 by processor 408 and input unit 403.
输入单元403可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,在一个具体的实施例中,输入单元403可包括触敏表面以及其他输入设备。触敏表面,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面上或在触敏表面附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器408,并能接收处理器408发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面。除了触敏表面,输入单元403还可以包括其他输入设备。具体地,其他输入设备可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。 Input unit 403 can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls. In particular, in one particular embodiment, input unit 403 can include a touch-sensitive surface as well as other input devices. Touch-sensitive surfaces, also known as touch screens or trackpads, collect touch operations on or near the user (such as the user using a finger, stylus, etc., any suitable object or accessory on a touch-sensitive surface or touch-sensitive Operation near the surface), and drive the corresponding connecting device according to a preset program. Alternatively, the touch sensitive surface may include two parts of a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 408 is provided and can receive commands from the processor 408 and execute them. In addition, touch-sensitive surfaces can be implemented in a variety of types, including resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch-sensitive surface, the input unit 403 can also include other input devices. Specifically, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
显示单元404可用于显示由用户输入的信息或提供给用户的信息以及终端的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元404可包括显示面板,可选的,可以采用液晶显示器(LCD,Liquid Crystal Display)、有机发光二极管(OLED,Organic Light-Emitting Diode)等形式来配置显示面板。进一步的,触敏表面可覆盖显示面板,当触敏表面检测到在其上或附近的触摸操作后,传送给处理器408以确定触摸事件的类型,随后处理器408根据触摸事件的类型在显示面板上提供相应的视觉输出。虽然在图5中,触敏表面与显示面板是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面与显示面板集成而实现输入和输出功能。Display unit 404 can be used to display information entered by the user or information provided to the user, as well as various graphical user interfaces of the terminal, which can be composed of graphics, text, icons, video, and any combination thereof. The display unit 404 can include a display panel, and optionally, a liquid crystal display (LCD, Liquid) can be used. Crystal Display), Organic Light-Emitting (OLED) Diode) and other forms to configure the display panel. Further, the touch-sensitive surface can cover the display panel, and when the touch-sensitive surface detects a touch operation thereon or nearby, it is transmitted to the processor 408 to determine the type of the touch event, and then the processor 408 displays the type according to the type of the touch event. A corresponding visual output is provided on the panel. Although in FIG. 5, the touch-sensitive surface and display panel are implemented as two separate components to perform input and input functions, in some embodiments, the touch-sensitive surface can be integrated with the display panel to implement input and output functions.
终端还可包括至少一种传感器405,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板的亮度,接近传感器可在终端移动到耳边时,关闭显示面板和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等; 至于终端还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The terminal may also include at least one type of sensor 405, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel according to the brightness of the ambient light, and the proximity sensor may close the display panel and/or the backlight when the terminal moves to the ear. . As a kind of motion sensor, the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; Other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like that can be configured in the terminal are not described herein.
音频电路406、扬声器,传声器可提供用户与终端之间的音频接口。音频电路406可将接收到的音频数据转换后的电信号,传输到扬声器,由扬声器转换为声音信号输出;另一方面,传声器将收集的声音信号转换为电信号,由音频电路406接收后转换为音频数据,再将音频数据输出处理器408处理后,经RF电路401以发送给比如另一终端,或者将音频数据输出至存储器402以便进一步处理。音频电路406还可能包括耳塞插孔,以提供外设耳机与终端的通信。The audio circuit 406, the speaker, and the microphone provide an audio interface between the user and the terminal. The audio circuit 406 can transmit the converted electrical signal of the audio data to the speaker, and convert it into a sound signal output by the speaker; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit 406 and then converted. The audio data is then processed by the audio data output processor 408, sent via RF circuitry 401 to, for example, another terminal, or the audio data is output to memory 402 for further processing. The audio circuit 406 may also include an earbud jack to provide communication between the peripheral earphone and the terminal.
WiFi属于短距离无线传输技术,终端通过WiFi模块407可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图5示出了WiFi模块407,但是可以理解的是,其并不属于终端的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-range wireless transmission technology, and the terminal can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 407, which provides wireless broadband Internet access for users. Although FIG. 5 shows the WiFi module 407, it can be understood that it does not belong to the necessary configuration of the terminal, and may be omitted as needed within the scope of not changing the essence of the invention.
处理器408是终端的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器402内的软件程序和/或模块,以及调用存储在存储器402内的数据,执行终端的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器408可包括一个或多个处理核心;优选的,处理器408可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器408中。Processor 408 is the control center of the terminal, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in memory 402, and by invoking data stored in memory 402, The various functions of the terminal and processing data to monitor the mobile phone as a whole. Optionally, the processor 408 may include one or more processing cores; preferably, the processor 408 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 408.
终端还包括给各个部件供电的电源409(比如电池),优选的,电源可以通过电源管理系统与处理器408逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源409还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。The terminal also includes a power source 409 (such as a battery) that supplies power to the various components. Preferably, the power source can be logically coupled to the processor 408 through a power management system to manage functions such as charging, discharging, and power management through the power management system. The power supply 409 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
尽管未示出,终端还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本实施例中,终端中的处理器408会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行文件加载到存储器402中,并由处理器408来运行存储在存储器402中的应用程序,从而实现上述实施例中的数据备份方法及装置的各个功能:采用加密算法对待备份数据进行加密,以得到加密数据;采用分割算法对所述加密数据进行分割,以得到多个数据片段;给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。Although not shown, the terminal may further include a camera, a Bluetooth module, and the like, and details are not described herein again. Specifically, in this embodiment, the processor 408 in the terminal loads the executable file corresponding to the process of one or more applications into the memory 402 according to the following instruction, and is executed by the processor 408 to be stored in the memory. The application program in 402, thereby implementing the data backup method and the functions of the device in the foregoing embodiment: encrypting the backup data by using an encryption algorithm to obtain encrypted data; and dividing the encrypted data by using a segmentation algorithm to obtain more Adding identification information to each of the data segments, the identification information being associated with the name information of the data to be backed up; uploading the plurality of data segments to at least two first servers for distributed storage And uploading the identification information to the second server.
在一些实施例中,对待备份的数据进行加密,以得到加密数据,所述处理器用于执行以下步骤:In some embodiments, the data to be backed up is encrypted to obtain encrypted data, and the processor is configured to perform the following steps:
获取用户的唯一特征信息;Obtain unique feature information of the user;
根据所述唯一特征信息获取对应的加密算法;Obtaining a corresponding encryption algorithm according to the unique feature information;
根据所述加密算法对所述待备份数据进行加密,以得到加密数据。The data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
在一些实施例中,采用分割算法对所述加密数据进行分割,以得到多个数据片段时,所述处理器用于执行以下步骤:In some embodiments, when the encrypted data is segmented using a segmentation algorithm to obtain a plurality of data segments, the processor is configured to perform the following steps:
根据所述唯一特征信息获取对应的分割算法;Obtaining a corresponding segmentation algorithm according to the unique feature information;
采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。The segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
在一些实施例中,所述处理器用于执行以下步骤:In some embodiments, the processor is configured to perform the following steps:
获取待备份目标数据;Obtain target data to be backed up;
根据所述待备份目标数据获取伪装数据;Obtaining masquerading data according to the target data to be backed up;
将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The target data to be backed up and the spoofed data are combined to obtain data to be backed up.
在一些实施例中,根据所述待备份目标数据获取伪装数据时,所述处理器用于执行以下步骤:In some embodiments, when the masquerading data is acquired according to the target data to be backed up, the processor is configured to perform the following steps:
获取所述待备份目标数据的类型信息;Obtaining type information of the target data to be backed up;
根据所述类型信息获取对应类型的伪装数据。Obtaining masquerading data of a corresponding type according to the type information.
本文提供了实施例的各种操作。在一个实施例中,所述的一个或多个操作可以构成一个或多个计算机可读介质上存储的计算机可读指令,其在被电子设备执行时将使得计算设备执行所述操作。描述一些或所有操作的顺序不应当被解释为暗示这些操作必需是顺序相关的。本领域技术人员将理解具有本说明书的益处的可替代的排序。而且,应当理解,不是所有操作必需在本文所提供的每个实施例中存在。Various operations of the embodiments are provided herein. In one embodiment, the one or more operations may constitute computer readable instructions stored on one or more computer readable media that, when executed by an electronic device, cause the computing device to perform the operations. The order in which some or all of the operations are described should not be construed as implying that the operations must be sequential. Those skilled in the art will appreciate alternative rankings that have the benefit of this specification. Moreover, it should be understood that not all operations must be present in every embodiment provided herein.
而且,本文所使用的词语“优选的”意指用作实例、示例或例证。奉文描述为“优选的”任意方面或设计不必被解释为比其他方面或设计更有利。相反,词语“优选的”的使用旨在以具体方式提出概念。如本申请中所使用的术语“或”旨在意指包含的“或”而非排除的“或”。即,除非另外指定或从上下文中清楚,“X使用A或B”意指自然包括排列的任意一个。即,如果X使用A;X使用B;或X使用A和B二者,则“X使用A或B”在前述任一示例中得到满足。Moreover, the word "preferred" as used herein is intended to serve as an example, instance, or illustration. Any aspect or design described as "preferred" by the text is not necessarily to be construed as being more advantageous than other aspects or designs. Instead, the use of the word "preferred" is intended to present a concept in a specific manner. The term "or" as used in this application is intended to mean an "or" or "an" That is, unless otherwise specified or clear from the context, "X employs A or B" means naturally including any one of the permutations. That is, if X uses A; X uses B; or X uses both A and B, then "X uses A or B" is satisfied in any of the foregoing examples.
而且,尽管已经相对于一个或多个实现方式示出并描述了本公开,但是本领域技术人员基于对本说明书和附图的阅读和理解将会想到等价变型和修改。本公开包括所有这样的修改和变型,并且仅由所附权利要求的范围限制。特别地关于由上述组件(例如元件、资源等)执行的各种功能,用于描述这样的组件的术语旨在对应于执行所述组件的指定功能(例如其在功能上是等价的)的任意组件(除非另外指示),即使在结构上与执行本文所示的本公开的示范性实现方式中的功能的公开结构不等同。此外,尽管本公开的特定特征已经相对于若干实现方式中的仅一个被公开,但是这种特征可以与如可以对给定或特定应用而言是期望和有利的其他实现方式的一个或多个其他特征组合。而且,就术语“包括”、“具有”、“含有”或其变形被用在具体实施方式或权利要求中而言,这样的术语旨在以与术语“包含”相似的方式包括。Rather, the present invention has been shown and described with respect to the embodiments of the present invention. The present disclosure includes all such modifications and variations, and is only limited by the scope of the appended claims. With particular regard to various functions performed by the above-described components (e.g., elements, resources, etc.), the terms used to describe such components are intended to correspond to performing the specified functions of the components (e.g., they are functionally equivalent). Any component (unless otherwise indicated) is not equivalent in structure to the disclosed structure for performing the functions in the exemplary implementations of the present disclosure as shown herein. Moreover, although certain features of the present disclosure have been disclosed with respect to only one of several implementations, such features may be combined with one or more other implementations as may be desired and advantageous for a given or particular application. Other feature combinations. Furthermore, the terms "comprising," "having," "having," or "include" or "comprising" are used in the particular embodiments or claims, and such terms are intended to be encompassed in a manner similar to the term "comprising."
本发明实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。上述提到的存储介质可以是只读存储器,磁盘或光盘等。上述的各装置或系统,可以执行相应方法实施例中的方法。Each functional unit in the embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. The integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium. The above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like. Each of the above described devices or systems can perform the methods of the corresponding method embodiments.
综上所述,虽然本发明已以优选实施例揭露如上,但上述优选实施例并非用以限制本发明,本领域的普通技术人员,在不脱离本发明的精神和范围内,均可作各种更动与润饰,因此本发明的保护范围以权利要求界定的范围为准。In the above, the present invention has been disclosed in the above preferred embodiments, but the preferred embodiments are not intended to limit the present invention, and those skilled in the art can make various modifications without departing from the spirit and scope of the invention. The invention is modified and retouched, and the scope of the invention is defined by the scope defined by the claims.

Claims (16)

  1. 一种数据备份方法,其中,包括以下步骤:A data backup method, which includes the following steps:
    采用加密算法对待备份数据进行加密,以得到加密数据;Encrypting the backup data with an encryption algorithm to obtain encrypted data;
    采用分割算法对所述加密数据进行分割,以得到多个数据片段;Separating the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
    给每一数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;Adding identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
    将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。Uploading the plurality of data segments to at least two first servers for distributed storage, and uploading the identification information to the second server.
  2. 根据权利要求1所述的数据备份方法,其中,所述对待备份的数据进行加密,以得到加密数据的步骤包括:The data backup method according to claim 1, wherein the step of encrypting the data to be backed up to obtain encrypted data comprises:
    获取用户的唯一特征信息;Obtain unique feature information of the user;
    根据所述唯一特征信息获取对应的加密算法;Obtaining a corresponding encryption algorithm according to the unique feature information;
    根据所述加密算法对所述待备份数据进行加密,以得到加密数据。The data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
  3. 根据权利要求2所述的数据备份方法,其中,所述采用分割算法对所述加密数据进行分割,以得到多个数据片段的步骤包括:The data backup method according to claim 2, wherein the step of dividing the encrypted data by using a segmentation algorithm to obtain a plurality of data segments comprises:
    根据所述唯一特征信息获取对应的分割算法;Obtaining a corresponding segmentation algorithm according to the unique feature information;
    采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。The segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
  4. 根据权利要求1所述的数据备份方法,其中,所述采用加密算法对待备份数据进行加密,以得到加密数据的步骤之前,还包括:The data backup method according to claim 1, wherein the step of encrypting the backup data to obtain the encrypted data by using the encryption algorithm further comprises:
    获取待备份目标数据;Obtain target data to be backed up;
    根据所述待备份目标数据获取伪装数据;Obtaining masquerading data according to the target data to be backed up;
    将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The target data to be backed up and the spoofed data are combined to obtain data to be backed up.
  5. 根据权利要求4所述的数据备份方法,其中,所述根据所述待备份目标数据获取伪装数据的步骤包括:The data backup method according to claim 4, wherein the step of acquiring the masquerading data according to the target data to be backed up comprises:
    获取所述待备份目标数据的类型信息;Obtaining type information of the target data to be backed up;
    根据所述类型信息获取对应类型的伪装数据。Obtaining masquerading data of a corresponding type according to the type information.
  6. 一种数据备份装置,其中,包括:A data backup device, comprising:
    加密模块,用于采用加密算法对待备份数据进行加密,以得到加密数据;An encryption module, configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data;
    分割模块,用于采用分割算法对所述加密数据进行分割,以得到多个数据片段;a segmentation module, configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
    标识模块,用于给每一所述数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;An identifier module, configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
    上传模块,用于将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。And an uploading module, configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
  7. 根据权利要求6所述的数据备份装置,其中,所述加密模块包括:The data backup device of claim 6, wherein the encryption module comprises:
    第一获取单元,用于获取用户的唯一特征信息;a first acquiring unit, configured to acquire unique feature information of the user;
    第二获取单元,用于根据所述唯一特征信息获取对应的加密算法;a second acquiring unit, configured to acquire a corresponding encryption algorithm according to the unique feature information;
    加密单元,用于根据所述加密算法对所述待备份数据进行加密,以得到加密数据。And an encryption unit, configured to encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data.
  8. 根据权利要求7所述的数据备份装置,其中,所述分割模块包括:The data backup device of claim 7, wherein the segmentation module comprises:
    第三获取单元,用于根据所述唯一特征信息获取对应的分割算法;a third acquiring unit, configured to acquire a corresponding segmentation algorithm according to the unique feature information;
    分割单元,用于采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。a dividing unit, configured to divide the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
  9. 根据权利要求6所述的数据备份装置,其中,还包括:The data backup device according to claim 6, further comprising:
    第一获取模块,用于获取待备份目标数据;a first acquiring module, configured to acquire target data to be backed up;
    第二获取模块,用于根据所述待备份目标数据获取伪装数据;a second acquiring module, configured to obtain masquerading data according to the target data to be backed up;
    组合模块,将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The combination module combines the target data to be backed up and the spoofed data to obtain data to be backed up.
  10. 根据权利要求9所述的数据备份装置,其中,所述第一获取模块包括:The data backup device of claim 9, wherein the first obtaining module comprises:
    第四获取单元,用于获取所述待备份目标数据的类型信息;a fourth acquiring unit, configured to acquire type information of the target data to be backed up;
    第五获取单元,用于根据所述类型信息获取对应类型的伪装数据。And a fifth acquiring unit, configured to acquire the masquerading data of the corresponding type according to the type information.
  11. 一种存储介质,其中,所述存储介质中存储有多条指令,所述指令适于由处理器加载以执行如权利要求1至5任一项所述的数据备份方法。A storage medium, wherein the storage medium stores a plurality of instructions adapted to be loaded by a processor to perform the data backup method according to any one of claims 1 to 5.
  12. 一种终端,其中,包括处理器和存储器,所述处理器与所述存储器电性连接,所述存储器用于存储指令和数据,所述处理器用于执行以下步骤:A terminal, comprising a processor and a memory, the processor being electrically connected to the memory, the memory for storing instructions and data, and the processor for performing the following steps:
    采用加密算法对待备份数据进行加密,以得到加密数据;Encrypting the backup data with an encryption algorithm to obtain encrypted data;
    采用分割算法对所述加密数据进行分割,以得到多个数据片段;Separating the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
    给每一数据片段添加标识信息,所述标识信息与所述待备份数据的名称信息相关联;Adding identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
    将所述多个数据片段上传至至少两个第一服务器进行分散保存,并将所述标识信息上传至第二服务器。Uploading the plurality of data segments to at least two first servers for distributed storage, and uploading the identification information to the second server.
  13. 根据权利要求12所述的终端,其中,对待备份的数据进行加密,以得到加密数据,所述处理器用于执行以下步骤:The terminal of claim 12, wherein the data to be backed up is encrypted to obtain encrypted data, and the processor is configured to perform the following steps:
    获取用户的唯一特征信息;Obtain unique feature information of the user;
    根据所述唯一特征信息获取对应的加密算法;Obtaining a corresponding encryption algorithm according to the unique feature information;
    根据所述加密算法对所述待备份数据进行加密,以得到加密数据。The data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
  14. 根据权利要求13所述的终端,其中,采用分割算法对所述加密数据进行分割,以得到多个数据片段时,所述处理器用于执行以下步骤:The terminal according to claim 13, wherein when the encrypted data is segmented by a segmentation algorithm to obtain a plurality of data segments, the processor is configured to perform the following steps:
    根据所述唯一特征信息获取对应的分割算法;Obtaining a corresponding segmentation algorithm according to the unique feature information;
    采用所述分割算法对所述加密数据进行分割,以得到多个数据片段。The segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
  15. 根据权利要求12所述的终端,其中,所述处理器用于执行以下步骤:The terminal of claim 12, wherein the processor is configured to perform the following steps:
    获取待备份目标数据;Obtain target data to be backed up;
    根据所述待备份目标数据获取伪装数据;Obtaining masquerading data according to the target data to be backed up;
    将所述待备份目标数据以及所述伪装数据进行组合,以得到待备份数据。The target data to be backed up and the spoofed data are combined to obtain data to be backed up.
  16. 根据权利要求15所述的终端,其中,根据所述待备份目标数据获取伪装数据时,所述处理器用于执行以下步骤:The terminal according to claim 15, wherein when the masquerading data is acquired according to the target data to be backed up, the processor is configured to perform the following steps:
    获取所述待备份目标数据的类型信息;Obtaining type information of the target data to be backed up;
    根据所述类型信息获取对应类型的伪装数据。Obtaining masquerading data of a corresponding type according to the type information.
PCT/CN2017/095904 2016-10-25 2017-08-03 Data backup method and apparatus, storage medium, and terminal WO2018076879A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610939399.9A CN106528334A (en) 2016-10-25 2016-10-25 Data backup method and apparatus
CN201610939399.9 2016-10-25

Publications (1)

Publication Number Publication Date
WO2018076879A1 true WO2018076879A1 (en) 2018-05-03

Family

ID=58292486

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/095904 WO2018076879A1 (en) 2016-10-25 2017-08-03 Data backup method and apparatus, storage medium, and terminal

Country Status (2)

Country Link
CN (1) CN106528334A (en)
WO (1) WO2018076879A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990606A (en) * 2019-12-11 2020-04-10 Tcl移动通信科技(宁波)有限公司 Picture storage method and device, storage medium and electronic equipment

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus
CN109871698B (en) * 2019-01-14 2021-10-26 深圳市奥特尔软件技术有限公司 Data processing method, data processing device, computer equipment and storage medium
CN109976948B (en) * 2019-03-18 2021-04-30 北京思源理想控股集团有限公司 Private information backup method and recovery method and system
CN110138754B (en) * 2019-04-26 2021-07-16 珍岛信息技术(上海)股份有限公司 Multi-cloud-end information processing system and resource sharing method thereof
CN111709040A (en) * 2020-06-04 2020-09-25 江苏智先生信息科技有限公司 Sensitive data oriented secure discrete storage method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130124873A1 (en) * 2009-05-25 2013-05-16 Hitachi, Ltd. Storage device and its control method
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN105577893A (en) * 2014-10-13 2016-05-11 中兴通讯股份有限公司 Method, device and terminal for information backup
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102412967B (en) * 2011-09-29 2013-11-27 用友软件股份有限公司 Data transmission system and method
CN104935429B (en) * 2014-03-17 2019-06-04 Tcl集团股份有限公司 A kind of data processing method and its system using multi-enciphering

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130124873A1 (en) * 2009-05-25 2013-05-16 Hitachi, Ltd. Storage device and its control method
CN103793666A (en) * 2014-01-24 2014-05-14 中经云数据存储科技(北京)有限公司 Data file protecting method and system
CN105577893A (en) * 2014-10-13 2016-05-11 中兴通讯股份有限公司 Method, device and terminal for information backup
CN106528334A (en) * 2016-10-25 2017-03-22 广东欧珀移动通信有限公司 Data backup method and apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990606A (en) * 2019-12-11 2020-04-10 Tcl移动通信科技(宁波)有限公司 Picture storage method and device, storage medium and electronic equipment
CN110990606B (en) * 2019-12-11 2023-10-03 Tcl移动通信科技(宁波)有限公司 Picture storage method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN106528334A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
WO2018076879A1 (en) Data backup method and apparatus, storage medium, and terminal
WO2016036115A1 (en) Electronic device and method for managing re-registration
WO2016137307A1 (en) Attestation by proxy
WO2015126135A1 (en) Method and apparatus for processing biometric information in electronic device
WO2016129936A1 (en) Security message transmission apparatus and processing method therefor
WO2017164585A1 (en) Electronic device and control method thereof
WO2018090823A1 (en) Method and system for protecting system partition key data, and terminal
WO2017122980A1 (en) Electronic device and method for authenticating identification information thereof
WO2017067291A1 (en) Method and device for fingerprint recognition and terminal
WO2018038419A1 (en) Method for recognizing location and electronic device implementing the same
WO2016184330A1 (en) Screen unlocking method and device, and storage medium
WO2018026164A1 (en) Method of processing touch events and electronic device adapted thereto
WO2018076881A1 (en) Data synchronization method and device, storage medium and server
WO2015199505A1 (en) Apparatus and method for preventing malfunction in an electronic device
WO2020155772A1 (en) Verification image sending method, synthesis method, device, storage medium, and terminal
WO2018080198A1 (en) Electronic device and method for performing authentication
WO2018035930A1 (en) System unlocking method and device
WO2018076880A1 (en) Data backup method, apparatus, storage medium, and terminal
WO2018076890A1 (en) Data backup method, device, storage medium, server and system
WO2018076842A1 (en) Data backup method, device, system, storage medium, and electronic device
WO2018145597A1 (en) Mobile terminal-based screen light-supplementing photographing method and system, and mobile terminal
WO2012053875A2 (en) Apparatus and system for transceiving data through fingerprint information
WO2013182073A1 (en) Method and system for identifying file security and storage medium
WO2018079999A1 (en) Electronic device and method for operating the same
WO2017026645A1 (en) Content security processing method and electronic device supporting the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17865453

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17865453

Country of ref document: EP

Kind code of ref document: A1