WO2018076879A1 - Procédé et appareil de sauvegarde de données, support d'informations et terminal - Google Patents
Procédé et appareil de sauvegarde de données, support d'informations et terminal Download PDFInfo
- Publication number
- WO2018076879A1 WO2018076879A1 PCT/CN2017/095904 CN2017095904W WO2018076879A1 WO 2018076879 A1 WO2018076879 A1 WO 2018076879A1 CN 2017095904 W CN2017095904 W CN 2017095904W WO 2018076879 A1 WO2018076879 A1 WO 2018076879A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- backed
- information
- encrypted
- backup
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Definitions
- the present invention relates to the field of network technologies, and in particular, to a data backup method, apparatus, storage medium, and terminal.
- the user needs to log in to the cloud account to obtain the data that has been backed up in the cloud from the mobile terminal side, and then download it from the cloud server. If the server is hacked or the internal staff of the operator fails, the backup data of a server is leaked, and the user's information is obtained by the criminals, which may cause serious economic losses to the user.
- the embodiment of the invention provides a data backup method, device, storage medium and terminal, which have the beneficial effects of improving the security of the backup data.
- an embodiment of the present invention provides a data backup method, including the following steps:
- identification information being associated with name information of the data to be backed up;
- the embodiment of the present invention further provides a data backup device, including:
- An encryption module configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data
- a segmentation module configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments
- An identifier module configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
- an uploading module configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
- an embodiment of the present invention further provides a storage medium, where the storage medium stores a plurality of instructions, the instructions being adapted to be loaded by a processor to perform the data backup method according to any one of the foregoing.
- an embodiment of the present invention further provides a terminal, including a processor and a memory, the processor is electrically connected to the memory, the memory is used to store instructions and data, and the processor is configured to perform the following steps. :
- identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
- the embodiment of the invention provides a data backup method, device, storage medium and terminal, which have the beneficial effects of improving the security of the backup data.
- FIG. 1 is a scene diagram of a data backup system according to an embodiment of the present invention.
- FIG. 2 is a flowchart of a data backup method in an embodiment of the present invention.
- FIG. 3 is another flowchart of a data backup method according to an embodiment of the present invention.
- FIG. 4 is a structural diagram of a data backup apparatus according to an embodiment of the present invention.
- FIG. 5 is a structural diagram of a terminal in an embodiment of the present invention.
- An embodiment of the present invention provides a data backup method, including the following steps:
- identification information to each data segment, the identification information being associated with the name information of the data to be backed up;
- the step of encrypting the data to be backed up to obtain encrypted data includes:
- the data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
- the step of segmenting the encrypted data by using a segmentation algorithm to obtain a plurality of data segments comprises:
- the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
- the method before the step of encrypting the backup data by using an encryption algorithm to obtain the encrypted data, the method further includes:
- the target data to be backed up and the spoofed data are combined to obtain data to be backed up.
- the step of acquiring the masquerading data according to the target data to be backed up includes:
- the data backup system mainly includes a data backup device and a server, wherein the data backup device can be integrated into a mobile terminal such as a tablet computer or a mobile phone, and the server and the mobile terminal can be connected through a wired or wireless network. connection.
- FIG. 1 is a schematic diagram of a data backup system provided by the present invention.
- the data backup device is specifically integrated in a mobile phone, and is mainly used to encrypt data to be encrypted by using an encryption algorithm to obtain encrypted data; Encoding the encrypted data to obtain a plurality of data segments; adding identification information to each of the data segments, the identification information being associated with name information of the data to be backed up; and the plurality of data segments Uploading to at least two first servers for distributed storage, and uploading the identification information to the second server.
- a data backup device which may be integrated into a mobile terminal such as a tablet computer or a mobile phone.
- FIG. 2 is a flowchart of a data backup method in a preferred embodiment of the present invention, which is mainly used in a mobile terminal.
- the data backup method includes the following steps:
- S102 Segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments.
- S104 Upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
- the encryption algorithm may adopt a conventional encryption algorithm in the prior art, or may adopt a specially customized encryption algorithm.
- the data to be backed up is data with a high degree of confidentiality, such as a bank card number and password, a privacy photo, an important file, and the like.
- the segmentation algorithm may be divided according to the data capacity, and the data capacity of each data segment may be the same value or a different value.
- the first segment is 2B
- the second segment is 3B
- the third segment is 4B and the like.
- the segmentation algorithm can also be segmented to form data segments according to other criteria.
- each data segment is added with an identification information, and the identification information is associated with the name information of the data to be backed up.
- the name of the data to be backed up is a1
- the identification information is a1b1, where b1 Is the identification number of the data segment to distinguish each data segment.
- the plurality of data segments are distributed and stored in the at least two first servers, so that even if the data in one of the first servers is leaked, the complete data of the user cannot be obtained. And storing the identification information in the second server.
- the plurality of identification information is obtained from the second server according to the name information of the data to be synchronized, and each identification information is associated with the name information. Then, according to the plurality of identification information, acquiring corresponding data segments from the at least two first servers, and then combining the plurality of data segments into encrypted data by using a combination algorithm corresponding to the segmentation algorithm, and finally adopting an encryption algorithm
- the decryption algorithm can obtain the data to be synchronized.
- the present invention uses an encryption algorithm to encrypt the backup data to obtain encrypted data; the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments; and each of the data segments is added with identification information.
- the identifier information is associated with the name information of the data to be backed up; the plurality of data segments are uploaded to at least two first servers for distributed storage, and the identification information is uploaded to the second server, thereby completing the data backup.
- the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, so that even if another person acquires data in one of the first servers through hacking technology, The user cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, without the identification information, the illegal user cannot Each piece of data of the backup data is extracted from the massive data; To prevent the user's backup data was informed that with improved security of backup data benefits.
- FIG. 3 is a flowchart of a data backup method in another preferred embodiment of the present invention, which is mainly used in a mobile terminal, and the data backup method includes the following steps:
- S205 Perform segmentation on the encrypted data by using a segmentation algorithm to obtain multiple data segments.
- the updated data is extracted as the target data to be backed up, wherein the data with the higher security level may be the bank account password data, the photo, the important contract. Documents, important technical documents, etc.
- the step S202 during specific implementation, the spoofed data is obtained according to the type of the target data to be backed up. Therefore, the step S202 specifically includes:
- S2021 Acquire type information of the target data to be backed up; for example, the type information may be a text type, a digital type, a picture type, and the like.
- S2022 Acquire masquerading data of a corresponding type according to the type information.
- the target data to be backed up is a photo
- the acquired camouflage data is also a photo.
- the photo can be downloaded automatically from the web or from a local database.
- step S203 the data target data to be backed up is combined with the masquerading data to form data to be backed up.
- the encryption algorithm may adopt a conventional encryption algorithm in the prior art, or may adopt a specially customized encryption algorithm.
- step S204 includes the following sub-steps:
- the unique feature information may be fingerprint information, iris information, or sound information of the user.
- S2042 Acquire a corresponding encryption algorithm according to the unique feature information; for example, the user inputs fingerprint information, then the corresponding encryption algorithm is an A algorithm, and if the input is sound information, the corresponding encryption algorithm is a B algorithm, if input Is the iris information, then the encryption algorithm for the C algorithm.
- step S2043 Encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data.
- the encryption data obtained in step S2043 is used to encrypt the backup data. After downloading the data, the same unique feature information must be input before the corresponding decryption algorithm can be obtained, thereby decrypting the encrypted data.
- the segmentation algorithm may be divided according to the data capacity, and the data capacity of each data segment may be the same value or a different value.
- the first segment is 2B
- the second segment is 3B
- the third segment is 4B and the like.
- the segmentation algorithm can also form segments of data according to segmentation according to other criteria.
- the step S205 specifically includes the following sub-steps:
- S2051 Acquire a corresponding segmentation algorithm according to the unique feature information; for example, if the user inputs fingerprint information, then the corresponding segmentation algorithm is a W algorithm, and if the input is sound information, the corresponding segmentation algorithm is a Y algorithm, if input The input iris information, then the segmentation algorithm is the Z algorithm.
- S2052 Segment the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
- each data segment is added with an identification information, and the identification information is associated with the name information of the data to be backed up.
- the name of the data to be backed up is a1
- the identification information is a1b1, where b1 is The identification number of the data segment to distinguish each data segment.
- the plurality of data segments are distributed and stored in at least two first servers, so that even if the data in one of the servers is leaked, the user's completion data cannot be obtained.
- the identification information is stored in the second server.
- the plurality of identification information is obtained from the second server according to the name information of the data to be synchronized, and each identification information is associated with the name information. Then, according to the plurality of identification information, acquiring corresponding data segments from the at least two first servers, and then combining the plurality of data segments into encrypted data by using a combination algorithm corresponding to the segmentation algorithm, and finally adopting an encryption algorithm
- the decryption algorithm can obtain the data to be synchronized. Then, the spoofed data in the data to be synchronized is removed, and the target data that is finally needed is obtained.
- the present invention uses an encryption algorithm to encrypt the backup data to obtain encrypted data; the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments; and each of the data segments is added with identification information.
- the identifier information is associated with the name information of the data to be backed up; the plurality of data segments are uploaded to at least two first servers for distributed storage, and the identification information is uploaded to the second server, thereby completing the data backup.
- the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, so that even if another person acquires data in one of the first servers through hacking technology, The user cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, without the identification information, the illegal user cannot Each piece of data of the backup data is extracted from the massive data; To prevent the user's backup data was informed that with improved security of backup data benefits.
- the embodiment of the invention further provides a data backup device, comprising:
- An encryption module configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data
- a segmentation module configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments
- An identifier module configured to add identification information to each of the data segments, where the identifier information is associated with name information of the data to be backed up;
- an uploading module configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
- the encryption module comprises:
- a first acquiring unit configured to acquire unique feature information of the user
- a second acquiring unit configured to acquire a corresponding encryption algorithm according to the unique feature information
- an encryption unit configured to encrypt the data to be backed up according to the encryption algorithm to obtain encrypted data.
- the segmentation module comprises:
- a third acquiring unit configured to acquire a corresponding segmentation algorithm according to the unique feature information
- a dividing unit configured to divide the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
- the method further includes:
- a first acquiring module configured to acquire target data to be backed up
- a second acquiring module configured to obtain masquerading data according to the target data to be backed up
- the combination module combines the target data to be backed up and the spoofed data to obtain data to be backed up.
- the first obtaining module comprises:
- a fourth acquiring unit configured to acquire type information of the target data to be backed up
- a fifth acquiring unit configured to acquire the masquerading data of the corresponding type according to the type information.
- FIG. 4 is a structural diagram of a data backup apparatus 300 according to an embodiment of the present invention, which is mainly used in a mobile terminal.
- the data backup apparatus 300 includes: a first obtaining module 301, a second acquiring module 302, The combination module 303, the encryption module 304, the segmentation module 305, the identification module 306, and the upload module 307.
- the first obtaining module 301 is configured to acquire target data to be backed up.
- the first obtaining module 301 includes a fourth obtaining unit 3011 and a fifth obtaining unit 3012.
- the fourth obtaining unit 3011 is configured to acquire the type information of the target data to be backed up;
- the fifth obtaining unit 3012 is configured to obtain the masquerading data of the corresponding type according to the type information.
- the second obtaining module 302 is configured to obtain the masquerading data according to the target data to be backed up.
- the combination module 303 is configured to combine the target data to be backed up and the spoofed data to obtain data to be backed up.
- the encryption module 304 is configured to encrypt the backup data by using an encryption algorithm to obtain encrypted data.
- the encryption module 304 includes a first acquisition unit 3041, a second acquisition unit 3042, and an encryption unit 3043.
- the first obtaining unit 3041 is configured to acquire unique feature information of the user;
- the second acquiring unit 3042 is configured to obtain a corresponding encryption algorithm according to the unique feature information;
- the encrypting unit 3043 is configured to use the encryption algorithm according to the encryption algorithm
- the backup data is described as being encrypted to obtain encrypted data.
- the segmentation module 305 is configured to segment the encrypted data by using a segmentation algorithm to obtain a plurality of data segments.
- the segmentation module 305 includes a third acquisition unit 3051 and a segmentation unit 3052.
- the third obtaining unit 3051 is configured to obtain a corresponding segmentation algorithm according to the unique feature information.
- the segmentation unit 3052 is configured to segment the encrypted data by using the segmentation algorithm to obtain a plurality of data segments.
- the identification module 306 is configured to add identification information to each of the data segments, where the identification information is associated with the name information of the data to be backed up.
- the uploading module 307 is configured to upload the plurality of data segments to at least two first servers for distributed storage, and upload the identification information to the second server.
- the encryption module uses the encryption algorithm to encrypt the backup data to obtain the encrypted data;
- the segmentation module divides the encrypted data by using a segmentation algorithm to obtain a plurality of data segments;
- the identification module is given to each Adding identification information to the data segment, the identification information is associated with the name information of the data to be backed up;
- the uploading module uploads the plurality of data segments to at least two first servers for distributed storage, and the identification information is Uploading to the second server to complete the data backup operation; and, since the encrypted data of the data to be backed up is divided into a plurality of data segments and distributed and stored in at least two first servers, even if others acquire the hacking technology,
- the data in one of the first servers cannot obtain the complete backup data of the user, and since the plurality of identification information is stored in the second server, even if the illegal user acquires the data in the plurality of first servers at the same time, Without this identification information, illegal users cannot also use the backup data.
- an embodiment of the present invention further provides a terminal 400, which may include a radio frequency (RF, Radio). Circuit 401, memory 402 including one or more computer readable storage media, input unit 403, display unit 404, sensor 405, audio circuit 406, wireless fidelity (WiFi, Wireless)
- the Fidelity module 407 includes a processor 408 having one or more processing cores, and a power supply 409 and the like. It will be understood by those skilled in the art that the terminal shown in FIG. 5 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements. among them:
- the RF circuit 401 can be used for transmitting and receiving information or during a call, and receiving and transmitting signals. Specifically, after receiving downlink information of the base station, the downlink information is processed by one or more processors 408. In addition, the data related to the uplink is sent to the base station. .
- RF circuitry 401 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a subscriber identity module (SIM, Subscriber Identity Module) Card, Transceiver, Coupler, Low Noise Amplifier (LNA, Low Noise) Amplifier), duplexer, etc.
- SIM Subscriber identity module
- LNA Low Noise Amplifier
- the RF circuit 401 can also communicate with the network and other devices through wireless communication.
- the wireless communication can use any communication standard or protocol, including but not limited to a global mobile communication system (GSM, Global System of Mobile communication), General Packet Radio Service (GPRS, General Packet Radio) Service), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA, Wideband Code) Division Multiple Access), Long Term Evolution (LTE), e-mail, short message service (SMS, Short) Messaging Service) and so on.
- GSM Global System of Mobile communication
- GPRS General Packet Radio Service
- GPRS General Packet Radio Service
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- LTE Long Term Evolution
- SMS Short message service
- the memory 402 can be used to store software programs and modules, and the processor 408 executes various functional applications and data processing by running software programs and modules stored in the memory 402.
- the memory 402 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the terminal (such as audio data, phone book, etc.).
- memory 402 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 402 may also include a memory controller to provide access to memory 402 by processor 408 and input unit 403.
- Input unit 403 can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
- input unit 403 can include a touch-sensitive surface as well as other input devices.
- Touch-sensitive surfaces also known as touch screens or trackpads, collect touch operations on or near the user (such as the user using a finger, stylus, etc., any suitable object or accessory on a touch-sensitive surface or touch-sensitive Operation near the surface), and drive the corresponding connecting device according to a preset program.
- the touch sensitive surface may include two parts of a touch detection device and a touch controller.
- the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
- the processor 408 is provided and can receive commands from the processor 408 and execute them.
- touch-sensitive surfaces can be implemented in a variety of types, including resistive, capacitive, infrared, and surface acoustic waves.
- the input unit 403 can also include other input devices. Specifically, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- Display unit 404 can be used to display information entered by the user or information provided to the user, as well as various graphical user interfaces of the terminal, which can be composed of graphics, text, icons, video, and any combination thereof.
- the display unit 404 can include a display panel, and optionally, a liquid crystal display (LCD, Liquid) can be used. Crystal Display), Organic Light-Emitting (OLED) Diode) and other forms to configure the display panel.
- the touch-sensitive surface can cover the display panel, and when the touch-sensitive surface detects a touch operation thereon or nearby, it is transmitted to the processor 408 to determine the type of the touch event, and then the processor 408 displays the type according to the type of the touch event. A corresponding visual output is provided on the panel.
- the touch-sensitive surface and display panel are implemented as two separate components to perform input and input functions, in some embodiments, the touch-sensitive surface can be integrated with the display panel to implement input and output functions.
- the terminal may also include at least one type of sensor 405, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel according to the brightness of the ambient light, and the proximity sensor may close the display panel and/or the backlight when the terminal moves to the ear.
- the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.;
- Other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like that can be configured in the terminal are not described herein.
- the audio circuit 406, the speaker, and the microphone provide an audio interface between the user and the terminal.
- the audio circuit 406 can transmit the converted electrical signal of the audio data to the speaker, and convert it into a sound signal output by the speaker; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit 406 and then converted.
- the audio data is then processed by the audio data output processor 408, sent via RF circuitry 401 to, for example, another terminal, or the audio data is output to memory 402 for further processing.
- the audio circuit 406 may also include an earbud jack to provide communication between the peripheral earphone and the terminal.
- WiFi is a short-range wireless transmission technology
- the terminal can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 407, which provides wireless broadband Internet access for users.
- FIG. 5 shows the WiFi module 407, it can be understood that it does not belong to the necessary configuration of the terminal, and may be omitted as needed within the scope of not changing the essence of the invention.
- Processor 408 is the control center of the terminal, which connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in memory 402, and by invoking data stored in memory 402, The various functions of the terminal and processing data to monitor the mobile phone as a whole.
- the processor 408 may include one or more processing cores; preferably, the processor 408 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 408.
- the terminal also includes a power source 409 (such as a battery) that supplies power to the various components.
- the power source can be logically coupled to the processor 408 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
- the power supply 409 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
- the terminal may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
- the processor 408 in the terminal loads the executable file corresponding to the process of one or more applications into the memory 402 according to the following instruction, and is executed by the processor 408 to be stored in the memory.
- the application program in 402 thereby implementing the data backup method and the functions of the device in the foregoing embodiment: encrypting the backup data by using an encryption algorithm to obtain encrypted data; and dividing the encrypted data by using a segmentation algorithm to obtain more Adding identification information to each of the data segments, the identification information being associated with the name information of the data to be backed up; uploading the plurality of data segments to at least two first servers for distributed storage And uploading the identification information to the second server.
- the data to be backed up is encrypted to obtain encrypted data
- the processor is configured to perform the following steps:
- the data to be backed up is encrypted according to the encryption algorithm to obtain encrypted data.
- the processor when the encrypted data is segmented using a segmentation algorithm to obtain a plurality of data segments, the processor is configured to perform the following steps:
- the segmentation algorithm is used to segment the encrypted data to obtain a plurality of data segments.
- the processor is configured to perform the following steps:
- the target data to be backed up and the spoofed data are combined to obtain data to be backed up.
- the processor when the masquerading data is acquired according to the target data to be backed up, the processor is configured to perform the following steps:
- the one or more operations may constitute computer readable instructions stored on one or more computer readable media that, when executed by an electronic device, cause the computing device to perform the operations.
- the order in which some or all of the operations are described should not be construed as implying that the operations must be sequential. Those skilled in the art will appreciate alternative rankings that have the benefit of this specification. Moreover, it should be understood that not all operations must be present in every embodiment provided herein.
- the word "preferred” as used herein is intended to serve as an example, instance, or illustration. Any aspect or design described as “preferred” by the text is not necessarily to be construed as being more advantageous than other aspects or designs. Instead, the use of the word “preferred” is intended to present a concept in a specific manner.
- the term “or” as used in this application is intended to mean an “or” or “an” That is, unless otherwise specified or clear from the context, "X employs A or B” means naturally including any one of the permutations. That is, if X uses A; X uses B; or X uses both A and B, then "X uses A or B" is satisfied in any of the foregoing examples.
- Each functional unit in the embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
- the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
L'invention concerne un procédé et un appareil de sauvegarde de données, un support d'informations et un terminal. Le procédé comprend les étapes suivantes : l'utilisation d'un algorithme de chiffrement pour chiffrer des données à sauvegarder, afin d'obtenir des données chiffrées ; l'utilisation d'un algorithme de segmentation pour segmenter les données chiffrées, afin d'obtenir une pluralité de segments de données ; l'ajout d'informations d'identification à chaque segment de données ; le téléchargement de la pluralité de segments de données sur au moins deux premiers serveurs pour un stockage réparti ; et le téléchargement d'informations d'identification sur un deuxième serveur.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610939399.9 | 2016-10-25 | ||
CN201610939399.9A CN106528334A (zh) | 2016-10-25 | 2016-10-25 | 数据备份方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018076879A1 true WO2018076879A1 (fr) | 2018-05-03 |
Family
ID=58292486
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/095904 WO2018076879A1 (fr) | 2016-10-25 | 2017-08-03 | Procédé et appareil de sauvegarde de données, support d'informations et terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106528334A (fr) |
WO (1) | WO2018076879A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990606A (zh) * | 2019-12-11 | 2020-04-10 | Tcl移动通信科技(宁波)有限公司 | 图片存储方法、装置、存储介质及电子设备 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106528334A (zh) * | 2016-10-25 | 2017-03-22 | 广东欧珀移动通信有限公司 | 数据备份方法及装置 |
CN109871698B (zh) * | 2019-01-14 | 2021-10-26 | 深圳市奥特尔软件技术有限公司 | 数据处理方法、装置、计算机设备和存储介质 |
CN109976948B (zh) * | 2019-03-18 | 2021-04-30 | 北京思源理想控股集团有限公司 | 一种私密信息备份方法及恢复方法和系统 |
CN110138754B (zh) * | 2019-04-26 | 2021-07-16 | 珍岛信息技术(上海)股份有限公司 | 一种多云端信息处理系统及其资源共享方法 |
CN111709040A (zh) * | 2020-06-04 | 2020-09-25 | 江苏智先生信息科技有限公司 | 一种面向敏感数据的安全离散存储方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130124873A1 (en) * | 2009-05-25 | 2013-05-16 | Hitachi, Ltd. | Storage device and its control method |
CN103793666A (zh) * | 2014-01-24 | 2014-05-14 | 中经云数据存储科技(北京)有限公司 | 一种数据文件的保护方法及系统 |
CN105577893A (zh) * | 2014-10-13 | 2016-05-11 | 中兴通讯股份有限公司 | 一种备份信息的方法、装置及终端 |
CN106528334A (zh) * | 2016-10-25 | 2017-03-22 | 广东欧珀移动通信有限公司 | 数据备份方法及装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102412967B (zh) * | 2011-09-29 | 2013-11-27 | 用友软件股份有限公司 | 数据传输系统和方法 |
CN104935429B (zh) * | 2014-03-17 | 2019-06-04 | Tcl集团股份有限公司 | 一种采用多重加密的数据处理方法及其系统 |
-
2016
- 2016-10-25 CN CN201610939399.9A patent/CN106528334A/zh active Pending
-
2017
- 2017-08-03 WO PCT/CN2017/095904 patent/WO2018076879A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130124873A1 (en) * | 2009-05-25 | 2013-05-16 | Hitachi, Ltd. | Storage device and its control method |
CN103793666A (zh) * | 2014-01-24 | 2014-05-14 | 中经云数据存储科技(北京)有限公司 | 一种数据文件的保护方法及系统 |
CN105577893A (zh) * | 2014-10-13 | 2016-05-11 | 中兴通讯股份有限公司 | 一种备份信息的方法、装置及终端 |
CN106528334A (zh) * | 2016-10-25 | 2017-03-22 | 广东欧珀移动通信有限公司 | 数据备份方法及装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990606A (zh) * | 2019-12-11 | 2020-04-10 | Tcl移动通信科技(宁波)有限公司 | 图片存储方法、装置、存储介质及电子设备 |
CN110990606B (zh) * | 2019-12-11 | 2023-10-03 | Tcl移动通信科技(宁波)有限公司 | 图片存储方法、装置、存储介质及电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN106528334A (zh) | 2017-03-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018076879A1 (fr) | Procédé et appareil de sauvegarde de données, support d'informations et terminal | |
WO2018182296A1 (fr) | Dispositif électronique et procédé de partage d'ecran de dispositif électronique | |
WO2016036115A1 (fr) | Dispositif électronique et procédé de gestion de réenregistrement | |
WO2016137307A1 (fr) | Attestation par mandataire | |
WO2017164585A1 (fr) | Dispositif électronique et son procédé de commande | |
WO2017122980A1 (fr) | Dispositif électronique et procédé d'authentification d'informations d'identification associé | |
WO2018090823A1 (fr) | Procédé et système de protection de données de clé de partition de système et terminal | |
WO2018038419A1 (fr) | Procédé de reconnaissance d'emplacement et dispositif électronique le mettant en œuvre | |
WO2017067291A1 (fr) | Procédé et dispositif de reconnaissance d'empreinte digitale, et terminal | |
WO2018076881A1 (fr) | Procédé et dispositif de synchronisation de données, support de stockage et serveur | |
WO2016184330A1 (fr) | Procédé et dispositif de déverrouillage d'écran, et support d'informations | |
CN107103211B (zh) | Sdk发送、应用发布、应用运行方法及装置 | |
WO2018026164A1 (fr) | Procédé de traitement d'événements tactiles et dispositif électronique adapté à celui-ci | |
WO2015199505A1 (fr) | Appareil et procédé de prévention de dysfonctionnement dans un dispositif électronique | |
WO2020155772A1 (fr) | Procédé d'envoi d'image de vérification, procédé de synthèse, dispositif, support d'informations et terminal | |
WO2018080198A1 (fr) | Dispositif électronique et procédé pour effectuer une authentification | |
WO2018035930A1 (fr) | Procédé et dispositif de déverrouillage de système | |
WO2018076880A1 (fr) | Procédé de sauvegarde de données, appareil, support d'informations, et terminal | |
WO2012053875A2 (fr) | Appareil et système pour transmettre et recevoir des données via des informations d'empreinte digitale | |
WO2018076890A1 (fr) | Procédé de sauvegarde de données, dispositif, support d'informations, serveur et système | |
WO2018076842A1 (fr) | Procédé de sauvegarde de données, dispositif, système, support de stockage et dispositif électronique | |
WO2018145597A1 (fr) | Procédé et système de photographie à ajout de lumière d'écran sur la base d'un terminal mobile, et terminal mobile | |
WO2013182073A1 (fr) | Procédé et système d'identification de sécurité de fichier et support de stockage | |
WO2018079999A1 (fr) | Dispositif électronique et son procédé d'exploitation | |
WO2017026645A1 (fr) | Procédé de traitement de sécurité de contenu et dispositif électronique le prenant en charge |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17865453 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17865453 Country of ref document: EP Kind code of ref document: A1 |