WO2020220536A1 - Procédé et dispositif de sauvegarde de données et support d'informations lisible par ordinateur - Google Patents

Procédé et dispositif de sauvegarde de données et support d'informations lisible par ordinateur Download PDF

Info

Publication number
WO2020220536A1
WO2020220536A1 PCT/CN2019/102771 CN2019102771W WO2020220536A1 WO 2020220536 A1 WO2020220536 A1 WO 2020220536A1 CN 2019102771 W CN2019102771 W CN 2019102771W WO 2020220536 A1 WO2020220536 A1 WO 2020220536A1
Authority
WO
WIPO (PCT)
Prior art keywords
backup
data
backed
storage system
user
Prior art date
Application number
PCT/CN2019/102771
Other languages
English (en)
Chinese (zh)
Inventor
王鹏
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020220536A1 publication Critical patent/WO2020220536A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments

Definitions

  • This application relates to the field of computer technology, and in particular to a method, device and computer-readable storage medium for data backup.
  • the distributed storage system adopts a fully distributed shared nothing architecture. With its own advantages of high reliability, high expansion, and low cost, it has been more and more widely used.
  • users store the backup data of the terminal operation data, they will not only save the operation data on the local disk, but also backup the data to different storage systems, such as solid state drives (Solid State). Disk, SSD), distributed file system (Ceph) and other storage systems.
  • SSD solid state drives
  • Ceph distributed file system
  • the embodiments of the present application provide a data backup method, device, and computer-readable storage medium, which can automatically backup according to user requirements, and effectively improve the efficiency of user data backup.
  • an embodiment of the present application provides a data backup method, which may include:
  • the server obtains the backup request of the first user and the identity of the first user sent by the terminal, where the backup request is used to request the backup of the first data to be backed up of the first user;
  • the server determines a backup plan according to the identity identifier and the backup request, and the backup plan includes one or more of a backup storage system, a backup quantity, a main storage system, and a backup delay time;
  • the server establishes a connection between the main storage system and the corresponding backup storage system in the blockchain network according to the backup plan;
  • the server backs up the first data to be backed up to the corresponding backup storage system.
  • an embodiment of the present application provides a data backup method, including:
  • the terminal obtains the backup request of the first user and the identity of the first user, where the backup request is used to request the backup of the first data to be backed up of the first user;
  • the terminal sends the backup request and the identity identifier to the server.
  • an embodiment of the present application provides a data backup device, which may include:
  • the first obtaining unit is configured to obtain a backup request of the first user and the identity of the first user sent by the terminal, and the backup request is used to request a backup of the first data to be backed up of the first user;
  • a first determining unit configured to determine a backup plan according to the identity identifier and the backup request, the backup plan including one or more of a backup storage system, a backup quantity, a main storage system, and a backup delay time;
  • connection unit is configured to establish a connection between the main storage system and the corresponding backup storage system in the blockchain network according to the backup plan;
  • the first backup unit is configured to back up the first data to be backed up to the corresponding backup storage system.
  • an embodiment of the present application provides a data backup device, which may include:
  • the first interaction unit is configured to obtain a backup request of a first user and the identity of the first user, and the backup request is used to request a backup of the first data to be backed up of the first user;
  • the first sending unit is configured to send the backup request and the identity identifier to the server.
  • an embodiment of the present application provides a server for performing the data backup method provided in the first aspect.
  • the server may include a processor, a communication interface and a memory, and the processor, the communication interface and the memory are connected to each other.
  • the communication interface is used to communicate with other network devices (such as terminals)
  • the memory is used to store the implementation code of the data backup method provided in the first aspect
  • the processor is used to execute the program code stored in the memory, that is, execute the first aspect.
  • the data backup method provided.
  • an embodiment of the present application provides a terminal for performing the data backup method provided in the second aspect.
  • the server may include a processor, a memory, an input device, and an output device.
  • the input device is used to receive the first user's input identification, backup request, modification instruction and viewing instruction
  • the output device is used to display the backup data.
  • the memory is used to store the implementation code of the data backup method provided in the second aspect
  • the processor is used to execute the program code stored in the memory, that is, to execute the data backup method provided in the second aspect.
  • an embodiment of the present application also provides a communication system, including: a terminal and a server.
  • the server may be the device described in the third aspect or the server described in the fifth aspect
  • the terminal may be the device described in the fourth aspect or the terminal described in the sixth aspect.
  • embodiments of the present application provide a computer-readable storage medium with instructions stored on the readable storage medium, which when run on a processor, cause the processor to execute the data backup method described in the first aspect.
  • embodiments of the present application provide a computer-readable storage medium with instructions stored on the readable storage medium, which when run on a processor, cause the processor to execute the data backup method described in the second aspect.
  • an embodiment of the present application provides a computer program containing instructions that, when run on a processor, causes the processor to execute the data backup method described in the first aspect.
  • an embodiment of the present application provides a computer program containing instructions, which when run on a processor, causes the processor to perform the data backup method described in the second aspect.
  • FIG. 1 is a schematic diagram of the system architecture of a data backup method provided by an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of a data backup method provided by an embodiment of the present application.
  • FIG. 4 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • FIG. 5 is a schematic diagram of another data backup method provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of yet another data backup method provided by an embodiment of the present application.
  • FIG. 7 is a schematic diagram of a display interface of a data and backup system provided by an embodiment of the present application.
  • FIG. 8 is a schematic diagram of yet another data backup method provided by an embodiment of the present application.
  • FIG. 9 is a logical address mapping diagram provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a data backup device provided by an embodiment of the present application.
  • FIG. 11 is a schematic diagram of another data backup device provided by an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another data backup device provided by an embodiment of the present application.
  • FIG. 13 is a schematic diagram of still another data backup device provided by an embodiment of the present application.
  • the embodiments of the present application provide a data backup method, device, and computer-readable storage medium, which can automatically backup according to user requirements, and effectively improve the efficiency of user data backup.
  • FIG. 1 is a schematic diagram of the system architecture of a data backup method provided by an embodiment of the present application.
  • the system architecture can include one or more servers (multiple servers can form a server cluster.
  • server 102 is taken as an example for illustration)
  • storage server 103 Take an example for description
  • terminal 101 is taken as an example for description in FIG. 1), where:
  • the terminal 101 can install and run related applications (or APPs).
  • Application refers to a program that corresponds to a server and provides local services to customers.
  • the local service may include, but is not limited to: sending information to the server (for example, data read and write requests) and receiving information sent by the server (for example, backup success, backup failure), sharing information, and so on.
  • the terminal in the embodiments of the present application may include, but is not limited to, any handheld electronic product based on a smart operating system, which can interact with the user through input devices such as keyboard, virtual keyboard, touch panel, touch screen, and voice control device. , Such as smart phones, tablets, personal computers, etc.
  • the smart operating system includes, but is not limited to, any operating system that enriches device functions by providing various mobile applications to the mobile device, such as Android, IOS, and Windows Phone.
  • the server 102 may include, but is not limited to, a background server, a component server, an information processing server, etc.
  • the server may communicate with multiple terminals through the Internet, or may communicate with multiple storage systems through the Internet.
  • the storage system includes one or more storage servers, such as storage system A, storage system B, and storage system C.
  • the server 102 monitors the read and write requests sent by the terminal, and backs up the terminal user's operation data to the storage system A, storage system B, and One or more of storage system C.
  • the server needs to run corresponding server-side programs to provide corresponding data backup services, such as data reading, data storage and backup, decision execution, and so on.
  • FIG. 2 is a schematic structural diagram of a server provided by an embodiment of the present application.
  • the server 200 may include: a memory 201, a communication interface 202, and one or more processors 203 (in the figure, the processor 203 is used as Example to explain). These components can be connected through the bus 204 or in other ways.
  • FIG. 2 takes the connection through the bus as an example. among them:
  • the memory 201 may be coupled with the processor 203 through a bus 204 or an input/output port, and the memory 201 may also be integrated with the processor 203.
  • the memory 201 is used to store various software programs and/or multiple sets of instructions.
  • the memory 201 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state storage devices.
  • the memory 201 may also store a network communication program, which may be used to communicate with one or more additional devices, one or more terminals, and one or more network devices.
  • the processor 203 may be a general-purpose processor, such as a central processing unit (CPU), a digital signal processing (DSP), an application specific integrated circuit (ASIC), or One or more integrated circuits configured to implement the embodiments of the present application.
  • the processor 203 may process data received through the communication interface 202.
  • the communication interface 202 is used for the server 200 to communicate with other network devices, for example, to communicate with a terminal.
  • the communication interface 202 may be a transceiver, a transceiver circuit, etc., where the communication interface is a general term and may include one or more interfaces, such as an interface between a terminal and a server.
  • the communication interface 202 may include a wired interface and a wireless interface, such as a standard interface, Ethernet, and a multi-machine synchronization interface.
  • the processor 203 can be used to read and execute computer-readable instructions. Specifically, the processor 203 may be used to call data stored in the memory 201. Optionally, when the processor 203 sends any message or data, it specifically drives or controls the communication interface 202 to do the sending. Optionally, when the processor 203 receives any message or data, it specifically drives or controls the communication interface 202 to do the reception. Therefore, the processor 203 can be regarded as a control center that performs transmission or reception, and the communication interface 202 is a specific performer of transmission and reception operations.
  • the communication interface 202 is specifically configured to execute the steps of data transceiving involved in the following method embodiments, and the processor 203 is specifically configured to implement data processing steps other than the data transceiving.
  • FIG. 3 is a schematic diagram of a data backup method provided by an embodiment of the present application; this method can be applied to the foregoing
  • the specific steps can be as follows:
  • Step S301 The server obtains the backup request of the first user and the identity of the first user sent by the terminal.
  • the backup request is used to request backup of the first data to be backed up of the first user.
  • Step S302 The server determines a backup scheme according to the identity identifier and the backup request.
  • the backup scheme includes one or more of the backup storage system, the number of backups, the main storage system, and the backup delay time.
  • Step S303 The server establishes a connection between the primary storage system and the corresponding backup storage system in the blockchain network according to the backup scheme.
  • the server confirms the backup scheme to search for a backup storage system matching the main storage system from the blockchain network; the embodiment of the present application does not limit the specific search process.
  • Step S304 The server backs up the first data to be backed up to the corresponding backup storage system.
  • the server can back up data to the backup storage system in the blockchain network through the wireless network.
  • FIG. 4 is a schematic structural diagram of a terminal provided by an embodiment of the present application.
  • the terminal may include: one or more processors (the processor 401 is taken as an example in the figure), a memory 402, and one or more An input device (the input device 404 is taken as an example in the figure) and one or more output devices (the output device 404 is taken as an example in the figure). These components can be connected via a bus 405 or other methods.
  • FIG. 4 uses a bus connection as an example. among them:
  • the processor 401 may be a central processing unit (Central Processing Unit, CPU), the processor may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC) , Ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory 402 may include a read-only memory and a random access memory, and provides instructions and data to the processor 401.
  • a part of the memory 402 may also include a non-volatile random access memory.
  • the memory 402 may also store device type information.
  • the input device 404 may include a touch panel, a fingerprint sensor (used to collect fingerprint information and fingerprint orientation information of the first user), a microphone, etc., and the output device 404 may include a display (LCD, etc.), a speaker, and the like.
  • a fingerprint sensor used to collect fingerprint information and fingerprint orientation information of the first user
  • a microphone used to collect fingerprint information and fingerprint orientation information of the first user
  • the output device 404 may include a display (LCD, etc.), a speaker, and the like.
  • FIG. 5 is a schematic diagram of another data backup method provided by an embodiment of the present application; the method can be applied to For the aforementioned terminal, the specific steps can be as follows:
  • Step S501 The terminal obtains the backup request of the first user and the identity of the first user.
  • the backup request is used to request backup of the first data to be backed up of the first user.
  • Step S502 The terminal sends the backup request and the identity identifier to the server.
  • the terminal can package the request and the identifier through the wireless network, and send the encrypted request to the server.
  • the embodiment of the present application does not limit the specific manner and details of how the terminal sends to the server.
  • FIG. 6 is a diagram of another data backup method provided by an embodiment of the present application. Schematic. Wherein, as shown in FIG. 6, a data backup method provided by an embodiment of the present application may include:
  • Step S601 The terminal obtains the backup request of the first user and the identity of the first user.
  • the content of the display interface of the data backup system may be, for example, but not limited to, as shown in FIG.
  • Figure 7 is a schematic diagram of a data and backup system display interface provided by an embodiment of the present application.
  • the data backup system interface 700 includes: a text box 701 for displaying the data that the user needs to back up.
  • the backup button 702 is used to indicate the user's backup request;
  • the exit button 703 is used to instruct the user to give up the backup data. Further, if the user selects the backup button, the terminal sends the user's backup request to the server.
  • Step S602 The terminal sends the backup request and the identity identifier to the server.
  • Step S603 The server obtains the backup request and the identity sent by the terminal.
  • Step S604 The server determines a backup scheme according to the identity identifier and the backup request.
  • the backup scheme may include: one or more storage systems to be backed up, the number of backups, the primary storage system, the backup storage system, and the backup delay time.
  • storage systems include storage systems such as Solid State Disks (SSD) and distributed storage systems.
  • SSD Solid State Disks
  • Different users have different backup requirements, and the server stores storage solutions corresponding to different user identities.
  • the backup storage system is determined according to user requirements. For example, user 1’s backup requirements are: user data needs to be backed up to storage system A and storage system B; user 2’s backup requirements are: user data needs to be backed up to storage system A and storage System B and Storage System C.
  • the server stores backup schemes corresponding to different users, which are described below in conjunction with Table 1.
  • the storage content of the data backup system may be, for example, but not limited to, as shown in Table 1:
  • the corresponding backup plan for the user whose user ID is 001 is: backup user data to storage system A and storage system B respectively, and the number of backups is 1 copy respectively, and storage system A is the main storage system, and System B is the backup storage system, and the backup delay time between backup storage systems is 30s;
  • the corresponding backup plan for the user whose user ID is 002 is: backup user data to storage system A, storage system B, and storage system C, respectively The number of each is 1 copy, where storage system A is the primary storage system, storage system B and storage system C are backup storage systems, and the backup delay time between backup storage systems is 30s.
  • Step S605 The server establishes a connection between the primary storage system and the corresponding backup storage system in the blockchain network according to the backup scheme.
  • the backup scheme includes the storage system that the user needs to back up, and the server establishes a connection with the storage system that the user needs to back up, so as to facilitate subsequent backup of user data to the corresponding storage system.
  • the main storage system may be a node in the blockchain network, or the main storage system may not be a node in the blockchain network.
  • the backup storage system is a node in the blockchain network (it can be understood that multiple backup storage systems correspond to multiple nodes in the blockchain network). Based on the characteristics of the blockchain, the backup data is not easily tampered with maliciously.
  • the user storage solution with the identity identifier 001 is to back up user data to storage system A and storage system B, respectively, so the server establishes a connection with storage system A and storage system B.
  • Step S606 The server backs up the first data to be backed up to the corresponding backup storage system.
  • the server backs up the data to be backed up to the corresponding backup storage system according to certain backup rules (including backup sequence, etc.).
  • Both the backup storage system and the primary storage system can be nodes in the blockchain network. Developers can preset that the system corresponding to a certain node is the primary storage system, and then the system corresponding to other nodes in the network is the backup storage system.
  • the embodiment of the present application does not limit the specific object content and form corresponding to the backup storage system and the main storage system.
  • the method further includes: the server performs desensitization processing on the first data to be backed up.
  • Some sensitive information in the backup data is deformed through desensitization rules to achieve reliable protection of sensitive privacy data.
  • desensitization rules to achieve reliable protection of sensitive privacy data.
  • reform the real data and provide test use such as personal information such as ID card number, mobile phone number, card number, customer number, etc. Data desensitization.
  • the method further includes: the server encrypts the first data to be backed up according to a hash algorithm.
  • the encryption system involved in the embodiments of this application is composed of plain text, cipher text, algorithms, and keys.
  • the sender that is, the server
  • the receiver After receiving the ciphertext, the receiver (that is, the storage system, such as the backup storage system) uses the decryption key to decrypt the ciphertext and restore it to plaintext.
  • the transmission process even if the ciphertext is stolenly obtained by illegal elements, what is obtained is only the unidentifiable ciphertext, which plays a role of data confidentiality.
  • the server backing up the first user data to the one or more storage systems includes:
  • the server backs up the first user data to the primary storage system at the first time, and backs up the first user data to the backup storage system at the second time, and the first time and the second time
  • the time interval is the backup delay time
  • the server backing up the first user data to the one or more storage systems includes:
  • the server determines a backup sequence for backing up the first user data to the multiple backup storage systems according to the backup space and remaining space capacity of the storage system occupied by the first user data, and the storage system includes one or more backup spaces ;
  • the server sequentially backs up the first user data to the multiple backup storage systems according to the backup sequence and the backup delay time.
  • each storage system includes one or more backup spaces, and each backup space has a corresponding remaining space capacity.
  • the server determines the logical address where the user data is backed up to the storage system according to the logical address of the first user data at the terminal, and then determines the corresponding backup space of the first user data in the storage system according to the logical address of the storage system, for example, the backup corresponding to user 002
  • storage system B and storage system C are backup storage systems, the backup space corresponding to the user data backed up to storage system B is backup space 1, and the remaining capacity of backup space 1 is 30G; the first user data is correspondingly backed up to storage
  • the backup space of system C is backup space 1, and the remaining capacity of backup space 2 is 40G.
  • the server sorts the multiple backup storage systems in ascending order of the ratio of the memory size of the backup space occupied by the first user data to the remaining space capacity of the backup space, and the The sequence is determined as the backup sequence of multiple standby storage systems.
  • the same user data size after being backed up to different storage systems may be the same or different.
  • the user data of user 002 is backed up to storage system B backup space 1 and the memory size of backup space 1 is 0.5G
  • backed up to storage system C backup space 1 and the memory size of backup space 2 is 0.4G
  • the ratio of the memory size of the backup space 1 occupied by the user data of the user 002 to the remaining space capacity of the backup space 1 is 1/6
  • the ratio of the memory size occupied by the backup space 2 to the remaining space capacity of the backup space 2 is 1. /10, so the backup of storage system B and storage system C is storage system B ⁇ storage system C.
  • the server backs up user data to one or more storage systems according to the user's backup scheme, avoiding multiple backups of user data to different storage systems, reducing user data backup time, and effectively improving user data backup efficiency.
  • FIG. 8 is a schematic diagram of still another data backup method provided by an embodiment of the present application.
  • the server may include step S801-step S817; among them, for step S801-step S806, please refer to the corresponding step S601-step S606 respectively in sequence, which will not be repeated here; the following are the steps S807-Step S817 detailed introduction:
  • Step S801 The terminal obtains the backup request of the first user and the identity of the first user.
  • Step S802 The terminal sends the backup request and the identity identifier to the server.
  • Step S803 The server obtains the backup request and the identity sent by the terminal.
  • Step S804 The server determines a backup scheme according to the identity identifier and the backup request.
  • Step S805 The server establishes a connection between the primary storage system and the corresponding backup storage system in the blockchain network according to the backup scheme.
  • Step S806 The server backs up the first data to be backed up to the corresponding backup storage system.
  • Step S807 The terminal obtains the modification instruction of the first user.
  • the terminal may modify the first user data; the modification instruction is used to instruct the server to modify part or all of the first data to be backed up . For example, take the first user backing up a large number of pictures as an example for description.
  • the user may perform modification operations such as deleting one or more photos and adding other photos.
  • Step S808 The terminal sends the modification instruction to the server.
  • Step S809 The server obtains the modification instruction.
  • Step S810 The server obtains the second data to be backed up.
  • Step S811 The server backs up the second data to be backed up to the corresponding backup storage system.
  • the server backs up the modified data modified by the first user to the storage system but may not back up all the first user data to the storage system.
  • the server backs up part or all of the modified data to one or more storage systems, including:
  • the server backs up the modified data after the modification operation in the logical address segment of the terminal and the first mapping table according to the partial data or all the data after the modification operation to the address corresponding to the one or more storage systems Block, the first mapping table includes the corresponding relationship between the modified data in the logical address segment of the terminal and the second mapping table, and the second mapping table includes the modified data in the one or more storage systems
  • the corresponding logical address segment and the physical address in the corresponding relationship, the physical address includes a physical block address and/or a combination of a physical block address and a predetermined offset.
  • FIG. 9 is a logical address mapping diagram provided by an embodiment of the present application.
  • the logical address segments of user data B, user data C and user data D in the terminal are logical address segment 1, logical address segment 2, and logical address respectively. Segment 3 and logical address segment 4.
  • the logical fields corresponding to user data A, B, C, and D in storage system A are logical address segment 1, logical address segment 3, logical address segment 5 and logical address segment 8, storage system A
  • the physical addresses corresponding to the logical address segment 1, logical address segment 3, logical address segment 5, and logical address segment 8 on the storage system A are physical address 1, physical address 2, physical address 3, and physical address 4, respectively.
  • Address 1 and physical address 3 have preset offsets.
  • the server stores the user data of the terminal to the physical address corresponding to the storage system according to the mapping table relationship between the logical address segment of the terminal user data and the logical address segment of the storage system.
  • the data A after the modification operation becomes data F
  • the server stores the data F in the physical address 1 in the storage system A. If the modified data F occupies a much larger memory than the data A, and the physical address 1 of the storage system A cannot back up part of the data of the data F, part of the data of the data F is backed up to the predetermined offset of the physical address 1.
  • Step S812 The terminal sends a view instruction of the first user to the first data to be backed up and/or the second data to be backed up.
  • the first user may have one or more backup data in the storage system, and the user inputs the target backup data to be viewed through the terminal.
  • Step S813 The server obtains the viewing instruction.
  • Step S814 The server obtains the first data to be backed up and/or the second data to be backed up from the main storage system according to the view instruction and the backup plan of the first user.
  • the server sends the target backup data (that is, the first data to be backed up and/or the second data to be backed up) identification to the primary storage system corresponding to the first user, and the primary storage system determines the target backup through the identification. Data, and then send the target backup data to the server.
  • the target backup data that is, the first data to be backed up and/or the second data to be backed up
  • the server when the server cannot send the target backup data from the main storage system within a preset time period, the server sends the identifier of the target backup data to the backup storage system, and obtains the target backup data from the backup storage system.
  • the target backup data is acquired from the backup storage system in the order of backing up the first user data.
  • Step S815 The server sends the first data to be backed up and/or the second data to be backed up to the terminal.
  • Step S816 The terminal receives the first data to be backed up and/or the second data to be backed up.
  • Step S817 The terminal outputs the first data to be backed up and/or the second data to be backed up.
  • the server monitors the user's modification request in real time during the backup process, and then backs up the modified data to the storage system, which effectively guarantees the consistency of the user's actual data and the backup data in the storage system.
  • Figure 10 is a schematic diagram of a data backup device provided by an embodiment of the application, as shown in Figure 10.
  • the device 100 may include a first obtaining unit 1001, a first determining unit 1002, a connecting unit 1003, and a first backup unit 1004; wherein,
  • the first obtaining unit 1001 is configured to obtain a backup request of a first user and the identity of the first user sent by a terminal, and the backup request is used to request a backup of the first data to be backed up of the first user;
  • the first determining unit 1002 is configured to determine a backup plan according to the identity identifier and the backup request, where the backup plan includes one or more of a backup storage system, a backup quantity, a main storage system, and a backup delay time;
  • the connection unit 1003 is configured to establish a connection between the main storage system and the corresponding backup storage system in the blockchain network according to the backup scheme;
  • the first backup unit 1004 is configured to back up the first data to be backed up to the corresponding backup storage system.
  • the data backup device described in the embodiment of the present application can refer to the related description of the server in the data backup method of the method embodiment described in FIG. 3, FIG. 6 and FIG. 8, which will not be repeated here. It is understandable that the functions of the units involved in the data backup device described in the embodiments of the application are part of the functions of the server, but do not include all the functions of the server; the order of describing the units in the device does not affect the actual device Features.
  • FIG. 11 is a schematic diagram of another data backup device provided by an embodiment of the present application.
  • a data backup device 1100 provided by an embodiment of the present application may include: a first obtaining unit 1101 First determination unit 1102, connection unit 1103, first backup unit 1104, second determination unit 1105, second backup unit 1106, second acquisition unit 1107, third acquisition unit 1108, third backup unit 1109, fourth acquisition unit 1110.
  • the optional unit may also include a second determining unit 1105, a second backup unit 1106, a second acquiring unit 1107, a third acquiring unit 1108, a third backup unit 1109, a fourth acquiring unit 1110, and a data sending unit 1111.
  • the first obtaining unit 1101 is configured to obtain a backup request of a first user and the identity of the first user sent by a terminal, and the backup request is used to request a backup of the first data to be backed up of the first user.
  • the first determining unit 1102 is configured to determine a backup plan according to the identity identifier and the backup request, where the backup plan includes one or more of a backup storage system, a backup quantity, a main storage system, and a backup delay time.
  • the connection unit 1103 is configured to establish a connection between the primary storage system and the corresponding backup storage system in the blockchain network according to the backup scheme.
  • the first backup unit 1104 is configured to back up the first data to be backed up to the corresponding backup storage system.
  • the first backup unit 1104 is specifically configured to:
  • the first data to be backed up is backed up to the main storage system at the first time, and the first data to be backed up is backed up to the corresponding backup storage system at the second time.
  • the time interval at the second moment is the backup delay time.
  • the first backup unit 1104 includes:
  • the second determining unit 1105 is configured to determine to back up the first data to be backed up to the multiple backups according to the backup space of the primary storage system occupied by the first data to be backed up and the remaining space of the backup space The backup sequence of the corresponding backup storage system in the storage system, where the primary storage system includes one or more backup spaces;
  • the second backup unit 1106 is configured to sequentially back up the first data to be backed up to the corresponding backup storage system according to the backup sequence and the backup delay time.
  • the second determining unit 1105 is specifically configured to: according to the ratio of the capacity of the backup space occupied by the first data to be backed up to the capacity of the remaining space, in order to increase Sort the corresponding backup storage systems in the plurality of backup storage systems in sequence; and determine the backup sequence of the corresponding backup storage systems according to the sequence after the arrangement.
  • the apparatus 1100 further includes:
  • the second obtaining unit 1107 is configured to obtain a modification instruction of the first user after obtaining the backup request of the first user and the identity of the first user sent by the terminal, and the modification instruction is used to instruct the partial or Modify all the first data to be backed up;
  • the third obtaining unit 1108 is configured to obtain second data to be backed up, where the second data to be backed up includes part or all of the first data to be backed up after the modification operation is performed;
  • the third backup unit 1109 is configured to back up the second data to be backed up to the corresponding backup storage system.
  • the third backup unit 1109 is specifically configured to:
  • the first mapping table includes the correspondence between the modified data in the logical address segment of the terminal and the second mapping table
  • the second mapping table includes the modified data in the one or more storage systems The corresponding relationship between the logical address segment and the physical address, where the physical address includes a physical block address and/or a combination of a physical block address and a predetermined offset.
  • the apparatus 1100 further includes:
  • the fourth obtaining unit 1110 is configured to obtain, after backing up the first data to be backed up to the corresponding backup storage system, the first user’s response to the first data to be backed up and/or the View instruction of the second data to be backed up;
  • a data acquisition unit 1112 configured to acquire the first data to be backed up and/or the second data to be backed up from the main storage system according to the viewing instruction and the backup plan of the first user;
  • the data sending unit 1111 is configured to send the first data to be backed up and/or the second data to be backed up to the terminal.
  • the device 1100 further includes a data desensitization unit 1113, configured to: before backing up the first data to be backed up to the corresponding backup storage system, The backup data is desensitized.
  • the device 1100 further includes a data encryption unit 1114, configured to: before backing up the first data to be backed up to the corresponding backup storage system, perform a hash algorithm on the The first data to be backed up is encrypted.
  • the data backup device described in the embodiment of the present application can refer to the related description of the server in the data backup method of the method embodiment described in FIG. 3, FIG. 6 and FIG. 8, which will not be repeated here. It is understandable that the functions of the units involved in the data backup device described in the embodiments of the application are part of the functions of the server, but do not include all the functions of the server; the order of describing the units in the device does not affect the actual device Features.
  • FIG. 12 is a schematic diagram of another data backup device provided in an embodiment of the present application.
  • the device 12 may include a first interaction unit 1201. And the first sending unit 1202; where,
  • the first interaction unit 1201 is configured to obtain a backup request of a first user and the identity of the first user, and the backup request is used to request a backup of the first data to be backed up of the first user;
  • the first sending unit 1202 is configured to send the backup request and the identity identifier to the server.
  • the data backup device described in the embodiment of the present application can refer to the related description of the terminal in the data backup method of the method embodiment described in FIG. 5, FIG. 6 and FIG. 8, which will not be repeated here. It is understandable that the functions of each unit involved in the data backup device described in the embodiments of this application are part of the functions of the terminal, but do not include all the functions of the terminal; the order of describing the units in the device does not affect the actual device Features.
  • FIG. 13 is a schematic diagram of another data backup device provided by an embodiment of the present application.
  • the device 1300 provided by an embodiment of the present application may include: a first interaction unit 1301, a first sending unit 1302, a second interaction unit 1303, a second sending unit 1304, a third interaction unit 1305, and a third sending unit 1306.
  • the unit may further include a second interaction unit 1303, a second sending unit 1304, a third interaction unit 1305, and a third sending unit 1306.
  • the first obtaining unit 1301 is configured to obtain a backup request of a first user and the identity of the first user, and the backup request is used to request a backup of the first data to be backed up of the first user;
  • the first sending unit 1302 is configured to send the backup request and the identity identifier to the server.
  • the device 1300 further includes:
  • the second obtaining unit 1303 is configured to obtain a modification instruction, where the modification instruction is used to instruct the server to modify part or all of the first data to be backed up;
  • the second sending unit 1304 is configured to send the modification instruction to the server.
  • the device 1300 further includes:
  • the third obtaining unit 1305 is configured to obtain a view instruction of the first user for the first data to be backed up and/or the second data to be backed up;
  • the third sending unit 1306 is configured to send the viewing instruction to the server.
  • the data backup device described in the embodiment of the present application can refer to the related description of the terminal in the data backup method of the method embodiment described in FIG. 5, FIG. 6 and FIG. 8, which will not be repeated here. It is understandable that the functions of each unit involved in the data backup device described in the embodiments of this application are part of the functions of the terminal, but do not include all the functions of the terminal; the order of describing the units in the device does not affect the actual device Features.
  • the embodiment of the present application also provides a communication system including: a terminal and a server.
  • the server may be the device or server described in the foregoing embodiment
  • the terminal may be the device or terminal described in the foregoing embodiment.
  • An embodiment of the present application further provides a computer storage medium, wherein the computer storage medium may store a program, and the program includes part or all of the steps of any one of the above method embodiments when executed.
  • the embodiments of the present application also provide a computer program, the computer program including instructions, when the computer program is executed by a computer, the computer can execute part or all of the steps of any data backup method.
  • the disclosed device may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the above-mentioned units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or integrated. To another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical or other forms.
  • the units described above as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
  • the functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solution of this application is essentially or the part that contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium It includes several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (read-only memory, ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program code .
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server or data center integrated with one or more available media.
  • the available medium may be a magnetic medium, (for example, a floppy disk, Hard disk, magnetic tape), optical media (such as digital versatile disc (DVD), semiconductor medium (such as solid state disk, SSD), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

L'invention concerne un procédé et un dispositif de sauvegarde de données, ainsi qu'un support d'informations lisible par ordinateur. Ledit procédé peut consister : à acquérir, au moyen d'un serveur, une demande de sauvegarde d'un premier utilisateur envoyée par un terminal (101) et l'identifiant d'identité du premier utilisateur (S301), la demande de sauvegarde servant à demander une sauvegarde de premières données à sauvegarder du premier utilisateur ; à déterminer, au moyen du serveur (102), un programme de sauvegarde en fonction de l'identifiant d'identité et de la demande de sauvegarde (S302), le programme de sauvegarde comprenant un ou plusieurs éléments parmi un système de stockage de sauvegarde, le nombre de sauvegardes, un système de stockage principal et un temps de retard de sauvegarde ; à établir, au moyen du serveur, selon le programme de sauvegarde, une connexion entre le système de stockage principal et un système de stockage de sauvegarde correspondant dans un réseau de chaîne de blocs (S303) ; et à sauvegarder, au moyen du serveur, lesdites premières données dans le système correspondant de stockage de sauvegarde (S304). La solution ci-dessus peut réaliser une sauvegarde automatique selon des exigences d'utilisateur, en améliorant sensiblement l'efficacité de sauvegarde de données d'utilisateur.
PCT/CN2019/102771 2019-04-28 2019-08-27 Procédé et dispositif de sauvegarde de données et support d'informations lisible par ordinateur WO2020220536A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910359291.6A CN110096388A (zh) 2019-04-28 2019-04-28 一种数据备份的方法、装置及计算机存储介质
CN201910359291.6 2019-04-28

Publications (1)

Publication Number Publication Date
WO2020220536A1 true WO2020220536A1 (fr) 2020-11-05

Family

ID=67446423

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/102771 WO2020220536A1 (fr) 2019-04-28 2019-08-27 Procédé et dispositif de sauvegarde de données et support d'informations lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN110096388A (fr)
WO (1) WO2020220536A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096388A (zh) * 2019-04-28 2019-08-06 平安科技(深圳)有限公司 一种数据备份的方法、装置及计算机存储介质
CN111221817B (zh) * 2019-12-25 2023-08-22 中国平安财产保险股份有限公司 业务信息数据存储方法、装置、计算机设备及存储介质
CN113127258A (zh) * 2019-12-30 2021-07-16 华为技术有限公司 一种数据备份方法、装置、设备及介质
CN111459722B (zh) * 2020-04-08 2023-04-14 江西博微新技术有限公司 一种数据处理方法、系统、可读存储介质及计算机设备
CN111858154A (zh) * 2020-06-06 2020-10-30 高榕科技(深圳)有限公司 基于网络系统的文件备份方法及实现该方法的网络系统
CN111930566A (zh) * 2020-07-28 2020-11-13 友谊时光科技股份有限公司 一种数据备份方法、装置、电子设备和存储介质
CN112839112B (zh) * 2021-03-25 2023-02-17 中国工商银行股份有限公司 一种分层数据存储系统及方法、备份管理服务器
CN113486985B (zh) * 2021-08-02 2023-04-18 汤恩智能科技(上海)有限公司 电动设备的用户识别方法、管理方法、介质和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088361A (zh) * 2009-12-02 2011-06-08 成都市华为赛门铁克科技有限公司 数据备份设备、方法和系统
CN102523290A (zh) * 2011-12-19 2012-06-27 成都市华为赛门铁克科技有限公司 数据的处理方法、设备和系统
CN109117305A (zh) * 2018-07-24 2019-01-01 郑州市景安网络科技股份有限公司 一种数据备份方法、装置、设备及计算机可读存储介质
CN110096388A (zh) * 2019-04-28 2019-08-06 平安科技(深圳)有限公司 一种数据备份的方法、装置及计算机存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6804690B1 (en) * 2000-12-27 2004-10-12 Emc Corporation Method for physical backup in data logical order
CN101436151B (zh) * 2008-12-01 2012-01-11 成都索贝数码科技股份有限公司 基于文件系统的数据实时备份方法及其系统
US9430330B1 (en) * 2010-12-29 2016-08-30 Netapp, Inc. System and method for managing environment metadata during data backups to a storage system
US9465426B2 (en) * 2013-09-18 2016-10-11 Huawei Technologies Co., Ltd. Method for backing up data in a case of power failure of storage system, and storage system controller
US9507668B2 (en) * 2014-10-30 2016-11-29 Netapp, Inc. System and method for implementing a block-based backup restart
CN106502837B (zh) * 2016-10-25 2019-06-14 Oppo广东移动通信有限公司 一种数据备份的方法、装置及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102088361A (zh) * 2009-12-02 2011-06-08 成都市华为赛门铁克科技有限公司 数据备份设备、方法和系统
CN102523290A (zh) * 2011-12-19 2012-06-27 成都市华为赛门铁克科技有限公司 数据的处理方法、设备和系统
CN109117305A (zh) * 2018-07-24 2019-01-01 郑州市景安网络科技股份有限公司 一种数据备份方法、装置、设备及计算机可读存储介质
CN110096388A (zh) * 2019-04-28 2019-08-06 平安科技(深圳)有限公司 一种数据备份的方法、装置及计算机存储介质

Also Published As

Publication number Publication date
CN110096388A (zh) 2019-08-06

Similar Documents

Publication Publication Date Title
WO2020220536A1 (fr) Procédé et dispositif de sauvegarde de données et support d'informations lisible par ordinateur
US10903976B2 (en) End-to-end secure operations using a query matrix
US10608811B2 (en) Private set intersection encryption techniques
US9626497B2 (en) Sharing USB key by multiple virtual machines located at different hosts
US20180212753A1 (en) End-To-End Secure Operations Using a Query Vector
US10623186B1 (en) Authenticated encryption with multiple contexts
CN109214201B (zh) 一种数据共享方法、终端设备及计算机可读存储介质
US20230058013A1 (en) Providing access to encrypted insights using anonymous insight records
WO2022142616A1 (fr) Procédé et appareil de stockage de données basés sur redis, et dispositif et support de stockage
CN112150141A (zh) 一种区块链共识方法、装置和系统
CN111478974B (zh) 网络连接方法及装置、电子设备和可读存储介质
WO2022161182A1 (fr) Procédé et appareil informatiques de confiance basés sur un flux de données
US9306937B2 (en) Using a PKCS module for opening multiple databases
CN113806777A (zh) 文件访问的实现方法及装置、存储介质及电子设备
KR20200085095A (ko) 블록체인 기반으로 데이터를 관리하는 전자 장치 및 데이터 관리 방법
CN110046000B (zh) 小程序运行方法和装置
US10958744B2 (en) Identifying and managing redundant digital content transfers
CN113434906B (zh) 数据查询方法、装置、计算机设备及存储介质
WO2020253380A1 (fr) Procédé et appareil de chiffrement de données, et équipement terminal
US20240265126A1 (en) Enforcing location-based data privacy rules across networked workloads
CN110545542B (zh) 基于非对称加密算法的主控密钥下载方法、装置和计算机设备
US11042583B2 (en) Systems and methods for real-time multi-party recommendation in a peer to peer communication
US20230336534A1 (en) Decentralized messaging inbox
CN107566499A (zh) 数据同步的方法、装置和系统
JP2020048107A (ja) データ管理方法、データ管理装置及びデータ管理プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19927264

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19927264

Country of ref document: EP

Kind code of ref document: A1