WO2021056726A1 - Method and device for data restoration, computer device, and storage medium - Google Patents

Method and device for data restoration, computer device, and storage medium Download PDF

Info

Publication number
WO2021056726A1
WO2021056726A1 PCT/CN2019/117247 CN2019117247W WO2021056726A1 WO 2021056726 A1 WO2021056726 A1 WO 2021056726A1 CN 2019117247 W CN2019117247 W CN 2019117247W WO 2021056726 A1 WO2021056726 A1 WO 2021056726A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
client
cloud
user information
target
Prior art date
Application number
PCT/CN2019/117247
Other languages
French (fr)
Chinese (zh)
Inventor
杨祎
孙振建
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021056726A1 publication Critical patent/WO2021056726A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/178Techniques for file synchronisation in file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • This application relates to the field of data processing, and in particular to a data restoration method, device, computer equipment and storage medium.
  • the method of regular saving is usually used to back up important files. After the preset time interval is reached, the current file is stored and a temporary file is obtained. You can ask if you want to restore to the last saved temporary file state. If you choose Yes, read the latest temporary file to realize file recovery.
  • this method reduces the risk of data loss to a certain extent, but this method often has a long time interval when the time interval is long. A lot of data will still be lost. When the timing interval is short, it will occupy a large amount of smart device resources, which will cause the performance of the smart device to decrease or even be abnormal. At the same time, when the smart device itself is abnormal, the data saved in this way is also It may not be able to be retrieved, resulting in low security of user data.
  • the embodiments of the present application provide a data restoration method, device, computer equipment, and storage medium to ensure user data security when an abnormality occurs in a smart device or application.
  • a method of data restoration including:
  • the first query result is that the storage path corresponding to the initial data identifier has not been queried, obtain user information corresponding to the client;
  • the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data, wherein the cloud data is a hot update method , Synchronizing the real-time data of the client to the data stored in the cloud database;
  • a data restoration device includes:
  • the data identification acquisition module is configured to acquire the initial data identification included in the data restoration request if the data restoration request sent by the client is received;
  • the query request sending module is configured to send a path query request containing the initial data identifier to the client, so that the client can query the storage medium of the client according to the path query request for whether there is a record location.
  • the path identified by the initial data obtain the first query result, and send the first query result to the server;
  • a query result receiving module configured to receive the first query result fed back by the client
  • a user information obtaining module configured to obtain user information corresponding to the client if the first query result is that the storage path corresponding to the initial data identifier is not queried;
  • the user identity verification module is used to perform identity verification of the cloud server on the user information to obtain the identity verification result;
  • the target data determining module is configured to obtain the cloud data corresponding to the initial data identifier from the cloud server in a preset manner if the identity verification result is passed, as the target data, wherein the cloud
  • the data is to synchronize the real-time data of the client to the data stored in the cloud database by means of hot update;
  • the target data sending module is used to send the target data to the client.
  • a computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, and the processor implements the above-mentioned data restoration method when the processor executes the computer-readable instruction step.
  • a computer non-volatile readable storage medium wherein the computer non-volatile readable storage medium stores computer readable instructions, and the computer readable instructions implement the steps of the above data restoration method when executed by a processor.
  • the data restoration method, device, computer equipment, and storage medium provided in the embodiments of the application obtain the initial data identifier included in the data restoration request when receiving the data restoration request sent by the client, and then determine whether the storage medium of the client is queried There is a path to record the initial data identification, and when the storage path corresponding to the initial data identification is not queried, the user information corresponding to the client is obtained, and the user information is authenticated by the cloud server. If the authentication result is passed, Then, through a preset method, the cloud data corresponding to the initial data identifier is obtained from the cloud server as the target data.
  • FIG. 1 is a schematic diagram of an application environment of a data restoration method provided by an embodiment of the present application
  • FIG. 2 is an implementation flowchart of a data restoration method provided by an embodiment of the present application
  • FIG. 3 is a flowchart of the implementation of step S60 in the data restoration method provided by the embodiment of the present application.
  • FIG. 4 is a flowchart of the implementation of step S50 in the data restoration method provided by the embodiment of the present application.
  • FIG. 5 is a flowchart of synchronizing client data to a cloud server in the data restoration method provided by an embodiment of the present application
  • FIG. 6 is a flowchart of the implementation of step S82 in the data restoration method provided by the embodiment of the present application.
  • FIG. 7 is a schematic diagram of a data restoration device provided by an embodiment of the present application.
  • Fig. 8 is a schematic diagram of a computer device provided by an embodiment of the present application.
  • FIG. 1 shows an application environment of the data restoration method provided by an embodiment of the present application.
  • the data restoration method is applied in a data restoration scenario after the data of a smart device is abnormally lost.
  • the data restoration scenario includes a server and a client.
  • the server and the client are connected through a network.
  • the server includes a cloud server.
  • the client sends a data restoration request containing the initial data identifier to the server.
  • the initial data identification included in the data restoration request performs data restoration/recovery.
  • the client can be, but is not limited to, various personal computers, netbooks, tablet computers, smart phones and other smart devices, and the server can be implemented by an independent server or a server cluster composed of multiple servers.
  • FIG. 2 shows a data restoration method provided by an embodiment of the present application. The method is applied to the server in FIG. 1 as an example for description. The details are as follows:
  • the client has some misoperations (such as accidental deletion of files, direct exit of unsaved files, etc.), or some unexpected situations (such as sudden power failure, system failure, etc.)
  • the client sends a data restoration request containing the initial data identification to the server.
  • the server receives the data restoration request and obtains the initial data identification to perform subsequent data restoration processing based on the initial data identification. .
  • the initial data identifier is a data identifier used to identify the data to be restored in this embodiment, and the client user first selects the initial data identifier according to preset conditions before sending a data restoration request through the client.
  • the initial data identification can be selected according to actual needs, such as file name, file type, etc.
  • the expression form of the initial data identification can specifically be one or more combinations of words, letters, numbers, and symbols, which is not limited here.
  • the initial data identifier can specifically be a file.
  • the initial data identifier "123.txt” means that the file name is "123” and the file type is a txt file, or it can be a type of file, such as ,
  • the initial data identifier "*.doc” means that the file type is all files in doc format.
  • S20 Send a path query request containing the initial data identifier to the client, so that the client queries whether there is a path recording the initial data identifier from the storage medium of the client according to the path query request, obtains the first query result, and compares the first query result.
  • the query result is sent to the server.
  • the server sends a path query request containing the initial data identifier to the client.
  • the path query request includes a path query instruction for the initial data identifier.
  • the client responds to the initial data identifier.
  • the path query instruction identified by the data, and the first query result is obtained, and then the first query result is fed back to the server.
  • the path query instruction is a computer readable instruction used to query the path of the specified data identifier from the storage medium.
  • the data when data is stored, the data is recorded by changing the polarity of the magnetic particles in the storage medium.
  • the magnetic head in the client storage device converts the polarity of the magnetic particles on the storage medium to the corresponding
  • the electrical pulse signal is converted into a data format that can be recognized by the computer.
  • the particle polarity on the magnetic medium will not be cleared, and the operating system is only an index of the data Part of the modification was made.
  • the corresponding paragraph mark of the data to be deleted was marked for deletion.
  • the polarity of the magnetic particle protecting the deletion mark was identified through the initial data mark and path acquisition instructions, and the polarity of the magnetic particle of the deletion mark was judged. Whether there is record data corresponding to the initial data identifier, the first query result is obtained.
  • the first query result includes the storage path corresponding to the record of the initial data identifier is queried and the storage path corresponding to the record of the initial data identifier is not queried.
  • the first query result is sent to the server, and the server receives the first query result and makes different response strategies according to the first query result.
  • the first query result includes the storage path corresponding to the recorded initial data identifier is queried and the storage path corresponding to the recorded initial data identifier is not queried.
  • the client has a storage path corresponding to the recorded initial data identifier, it is also That is, the data file corresponding to the initial data identifier can be directly restored from the storage medium of the client; when the client does not have a storage path corresponding to the initial data identifier, that is, the initial data identifier cannot be mapped from the client. Recovery of data files.
  • the client corresponding The user information of the user information, and then the subsequent data restoration through the cloud data corresponding to the user information.
  • the user information is information used to uniquely determine the user of the client, which may specifically be, but is not limited to, the MAC address of the client, the user account password, and real-time verification information.
  • the server stores the MAC address, and allocates dynamic storage space for the client corresponding to the MAC address.
  • the client sends a registration request to the server and performs the registration process. After the registration is successful, the server saves the user account and password, and is the user account password The corresponding client allocates dynamic storage space.
  • real-time verification information is only real-time verification of client users, such as mobile phone numbers and verification codes, biometrics, etc.
  • this embodiment provides a variety of selectable user information methods, so that while ensuring user data security, different client users are provided with more choices, which is conducive to improving user experience. Client users can choose any one.
  • This kind of user information is used for subsequent identity verification, that is, subsequent identity verification can adopt different verification methods according to the different user information selected by the client.
  • S50 Perform identity verification of the cloud server on the user information, and obtain the identity verification result.
  • the identity verification result is obtained.
  • the cloud server stores the cloud data corresponding to multiple clients.
  • the cloud storage device provided by the server dynamically provides for each client The user allocates cloud storage space and needs to authenticate the client user before restoring the data through the cloud. After the verification is passed, the client user's corresponding cloud storage space is inquired about whether there is data to be restored.
  • the identity verification result includes verification passed and verification failed.
  • this embodiment presets different verification methods for different types of user information. Specifically, the type and verification method of user information can be set according to actual needs, and we will not do more here. limit.
  • this embodiment adopts the real-time verification information and the voice information of the user’s voiceprint information as the user information for verification to ensure the data security of the client user.
  • voiceprint information for verification to ensure the data security of the client user.
  • the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data.
  • the cloud data is a hot update method to update the real-time data of the client Synchronize the data stored in the cloud database.
  • the cloud data corresponding to the initial data identifier is screened out from the cloud server in a preset manner as the target data.
  • hot update is a data synchronization method.
  • it refers to a method of real-time synchronization of client files to the cloud server in real time, and there is no need to close the file during the synchronization process.
  • step S81 to step The description of S83 will not be repeated here.
  • the preset mode can be set according to actual needs, and there is no restriction here.
  • this embodiment adopts a dynamic decryption method to obtain the cloud data corresponding to the user information from the cloud server.
  • a dynamic decryption method to obtain the cloud data corresponding to the user information from the cloud server.
  • S70 Send the target data to the client.
  • the server sends the selected target data to the designated location of the client for storage through the network transmission protocol.
  • network transmission protocols include but are not limited to: Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP Address Resolution Protocol, ARP), File Transfer Protocol (File Transfer Protocol, FTP), etc.
  • ICMP Internet Control Message Protocol
  • ARP Address Resolution Protocol ARP
  • FTP File Transfer Protocol
  • the initial data identification included in the data restoration request is obtained, and then the path query request containing the initial data identification is sent to the client, so that the client can follow the path Query request, query whether there is a path to record the initial data identifier from the storage medium of the client, and obtain the first query result, receive the first query result fed back by the client, and if the first query result is that the initial data identifier has not been queried and recorded
  • the user information corresponding to the client is obtained, and the user information is authenticated by the cloud server to obtain the identity verification result.
  • the initial data identifies the corresponding cloud data as the target data.
  • the cloud data is the data stored in the cloud database by synchronizing the client's instant data with the hot update method, and sending the target data to the client.
  • the storage device performs a query. If the data file corresponding to the initial data identifier is not stored in the client storage device, the cloud server further queries the synchronization file corresponding to the initial data identifier in the cloud data synchronized by hot update, and performs the data Restoration provides multiple dimensions of data restoration security, which is conducive to improving data security.
  • using hot update to synchronize real-time data to the cloud server is also conducive to real-time and fast data storage and backup to ensure data security Sex.
  • the following uses a specific embodiment to verify that if the authentication result in step S60 is passed, the initial data is obtained from the cloud server in a preset manner. Identifies the corresponding cloud data, as a specific realization method of the target data for detailed description.
  • FIG. 3 shows a specific implementation process of step S60 provided in an embodiment of the present application, which is detailed as follows:
  • the identity verification result is that the verification is passed
  • the target key corresponding to the user information is obtained
  • the cloud data is decrypted using the target key to obtain the cloud data corresponding to the user information.
  • the target key is a key used to decrypt the cloud data corresponding to the user information.
  • the cloud server encrypts the synchronized data according to the user information of the client. , Obtain the target key corresponding to the user information and the encrypted cloud data, and store the encrypted cloud data corresponding to the same user information in the same dynamic space.
  • the cloud data corresponding to the dynamic space can be decrypted by the target key. Obtain the decrypted cloud data corresponding to the user information.
  • the dynamic space corresponding to the user information is directly obtained and decrypted, and the cloud data corresponding to the user information is obtained, which is beneficial to quickly extract the user information from the user information of many different users stored in the cloud server.
  • the user information of the user corresponding to the target key helps to improve the efficiency of data query.
  • the initial data identifier is used as the query object, and the query is performed in the data identifier of the cloud data corresponding to the user information to obtain the second query result.
  • the cloud data with the initial data identifier is used as the data to be restored.
  • the query result will be fed back to the client, and the client will be reminded of the initial data identifier of the query through a prompt message Is it wrong.
  • S64 Send the data identifier of the data to be restored to the client, so that the user of the client selects at least one data identifier from the data identifier of the data to be restored as the data identifier of the target data.
  • the data identifier of the data to be restored is sent to the client.
  • the client user selects one or more data identifiers as the data identifier of the target data according to actual needs. , And feed back to the server through a message.
  • one data identifier may correspond to multiple pieces of data, for example, a data identifier whose initial data identifier is "case status table", after querying , Get three data files with data identification as "case status table", their time points are July 1, July 2, and July 6, respectively.
  • S65 Receive the selection message fed back by the client, obtain the data identification of the target data from the selection message, and determine the target data from the data to be restored according to the data identification of the target data.
  • the data identification of the target data is obtained from the selection message, and the target data is determined from the data to be restored according to the data identification of the target data.
  • the target key corresponding to the user information is obtained, and the target key is used to decrypt the cloud data to obtain the cloud data corresponding to the user information, and then the cloud data corresponding to the user information is obtained in the cloud corresponding to the user information.
  • the data identification of the data perform query processing on the initial data identification to obtain the second query result.
  • the initial data will exist
  • the identified cloud data is used as the data to be restored, and the data identification of the data to be restored is sent to the client, so that the user of the client selects at least one data identification from the data identification of the data to be restored as the data identification of the target data, and finally receives
  • the client feedbacks the selection message, and obtains the data identification of the target data from the selection message, and determines the target data from the data to be restored according to the data identification of the target data, and quickly finds the target data that needs to be restored from the numerous data stored in the cloud server , Improve the efficiency of query and determination of target data.
  • FIG. 4 shows a specific implementation process of step S50 provided in an embodiment of the present application, which is described in detail as follows:
  • S51 Perform voiceprint extraction on the audio information to obtain target voiceprint information.
  • the cloud server before selecting the identity verification of the cloud server, the cloud server obtains the unique identification information preset by the client as the user identification, and sends the information containing the random verification code to the client, and the user of the client reads the information and performs Recording, using the recording file as user information for identity verification.
  • the server After receiving the user information, the server extracts the voiceprint information from the audio information, and determines whether the voiceprint information corresponds to the client pre-selected and stored by the cloud server User voiceprint information.
  • the unique identification information may specifically be the MAC address of the client, or the mobile phone number of the client user bound to the cloud server, etc., which is not specifically limited here.
  • the random verification code information can specifically be a short message that is automatically generated and sent using the SMS SDK interface.
  • the random verification code generated using the SMS SDK excuse is real-time and random. For example, a random verification code is generated as "Your This time the verification code is h36ty0, and the verification code is valid for 2 minutes".
  • the audio information is extracted by voiceprint, and the detailed process of obtaining the target voiceprint information is as follows:
  • the audio information is extracted by voiceprint, and the detailed process of obtaining the target voiceprint information is as follows:
  • the voiceprint feature is extracted, and the obtained voiceprint feature is used as the target voiceprint information.
  • the target voiceprint information is the voiceprint information included in the verification information, and the voiceprint information is subsequently verified to determine whether the voiceprint information is the voiceprint information corresponding to the client.
  • pre-emphasis is a signal processing method that compensates for the high-frequency components of the input signal at the transmitting end. As the signal rate increases, the signal is greatly damaged during transmission. In order to get a better signal waveform at the receiving terminal, it is necessary to compensate for the damaged signal.
  • the idea of pre-emphasis technology is to enhance at the beginning of the transmission line. The high-frequency component of the signal is used to compensate for the excessive attenuation of the high-frequency component in the transmission process, and the pre-emphasis has no effect on the noise, so the output signal-to-noise ratio is effectively improved.
  • framing refers to dividing the entire speech signal into frames, that is, dividing it into many segments.
  • a speech signal is not stable as a whole, but it can be regarded as stable locally, and it needs to be input in the later speech processing. It is a stationary signal, so the entire speech signal needs to be framed, that is, divided into many segments.
  • the signal can be considered stable in the range of 10-30ms, and generally no less than 20ms is a frame.
  • windowing is to use a windowing function to process the framed speech signal to make the speech frame continuous. After the frame is processed, there will be discontinuities at the beginning and end of each frame. The more the error from the original signal, the greater the error. Through the windowing process, the framed signal becomes continuous, and each frame will show the characteristics of the periodic function.
  • the target voiceprint information is the voiceprint information contained in the verification information.
  • the voiceprint information is subsequently verified to determine whether the voiceprint information is the preset user voiceprint information of the client pre-stored in the cloud server .
  • S52 Compare and verify the target voiceprint information with the user voiceprint information of each preset client to obtain a first verification result.
  • the voiceprint information corresponding to each client terminal that uses audio information verification is pre-stored as the preset permission voiceprint information, and the calculation steps are respectively calculated through the preset similarity calculation method.
  • the similarity between the target voiceprint information obtained in S51 and each preset authority voiceprint information is obtained, and the similarity value between the target voiceprint information and each preset authority voiceprint information is obtained. If these similarity values exist If the similarity value is greater than or equal to the preset similarity threshold, it is determined that the target voiceprint information is one of the preset permission voiceprint information. At this time, the voiceprint verification result is confirmed to be verified.
  • the similarity value is less than the preset similarity threshold, it is determined that the target voiceprint information does not belong to any one of the preset permission voiceprint information. At this time, the voiceprint verification result is confirmed to be a verification failure.
  • the preset similarity calculation methods include but are not limited to: cosine similarity, k-Nearest Neighbor (kNN) classification algorithm, Manhattan Distance (Manhattan Distance), and Hamming distance based on SimHash algorithm.
  • S53 Convert the audio information by adopting a voice-to-text method to obtain the target text.
  • the audio information is text-converted through a preset voice-to-text method to obtain the target text.
  • the preset voice-to-text method can be implemented through a voice-to-text algorithm, through a third-party tool, or through a third-party application programming interface (Application Programming Interface, API).
  • API Application Programming Interface
  • S54 parse the target text to obtain the current verification code.
  • a preset regular expression is used to perform regular matching on the target text to obtain the current verification code contained in the target text.
  • the legitimacy of the current verification code obtained in step S54 is verified to obtain a second verification result, where the second verification result includes verification passed and verification failed.
  • the legitimacy verification is passed, it is confirmed that the second verification result is The verification is passed, and when the legality verification fails, it is confirmed that the second verification result is a verification failure.
  • the legality verification is used to verify whether the current verification code is consistent with the initial verification code. If the current verification code and the initial verification code are consistent with the initial verification code, it is determined that the current verification code has passed the legality verification; otherwise, the current verification code is confirmed. The legality verification failed.
  • step S51 to step S52 and step S53 to step S55 there is no inevitable sequence of execution between step S51 to step S52 and step S53 to step S55, and it may be executed in parallel, which is not limited here.
  • the customer feedbacks the prompt message of the verification failure, and records and saves the audio information and verification information to the preset abnormal information file, so that subsequent analysis of the preset abnormal information file can obtain the cause of the abnormality, and Make corresponding exception handling.
  • the target voiceprint information is obtained by extracting the voiceprint of the audio information, and then the target voiceprint information is compared and verified with the user voiceprint information of each preset client, and the first verification result is obtained.
  • Use the voice-to-text method to convert the audio information to obtain the target text, and then parse the target text to obtain the current verification code, and then verify the legality of the current verification code to obtain the second verification result.
  • the identity verification result is confirmed to be verified.
  • An audio file is used to confirm the user's identity in multiple dimensions to quickly and conveniently confirm the legality of the user's identity and improve data security.
  • the data restoration method further includes restoring data from the client through instructions, specifically as follows:
  • the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, a data restoration instruction is sent to the client, so that the client executes the deletion flag of the modified storage path and the creation of the file according to the data restoration instruction Index action.
  • the client modifies the delete flag of the storage path so that the file corresponding to the storage path is displayed on the client visually, and the file index is re-established, so that the initial data identifies the corresponding file It has a physical path and can be executed.
  • the storage medium on the client still retains the data of the data file itself, but the mark of the storage path corresponding to the data file is modified to the deletion mark, and the data file is deleted. Index, so that the data file is not displayed on the client and cannot be executed.
  • a data restoration instruction is sent to the client, so that the client can modify the storage path according to the data restoration instruction.
  • the action of deleting the flag and establishing the file index so as to quickly restore the data file through the client, and improve the efficiency of data file recovery.
  • the data restoration method before step S10, further includes synchronizing the client data to the cloud server.
  • the following uses a specific embodiment to implement the specific implementation method of synchronizing the client data to the cloud server. Detailed description.
  • FIG. 5 shows a specific implementation process of synchronizing client data to a cloud server according to an embodiment of the present application, which is described in detail as follows:
  • S81 Obtain the updated data file and the user information of the client from the client through a preset synchronization method, where the updated data corresponds to the original backup data on the cloud server.
  • the update data file and the user information of the client are obtained from the client through a preset step.
  • the update data file refers to the content that has changed since the last update of the implemented file.
  • common synchronization methods include, but are not limited to: file copy, file movement, file real-time sharing, etc.
  • the data of the changed file is directly read from the memory of the client, and the data is updated to the cloud server for storage by hot update.
  • the specific process can be Refer to the description of step S82, or step S821 to step S824, in order to avoid repetition, the details are not repeated here.
  • the update and acquisition of the client's data file can be done in a timed manner, or in real-time storage, or a combination of the two.
  • timed saving is set to automatically save for 5 minutes
  • real-time saving is real-time saving when a passively triggered save instruction is received.
  • S82 Synchronize the update data file to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information, and encrypt the backup data corresponding to the user information to obtain the target key corresponding to the user information and the corresponding user information Cloud data.
  • the update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information
  • the backup data corresponding to the user information is encrypted to obtain the target key and user information corresponding to the user information Corresponding cloud data.
  • the specific methods of encryption processing include, but are not limited to: Message-Digest Algorithm 5 (MD5), RSA (RSA algorithm) encryption algorithm, and key encryption block algorithm (Data Encryption Standard, DES), etc.
  • MD5 Message-Digest Algorithm 5
  • RSA RSA algorithm
  • DES key encryption block algorithm
  • the cloud data corresponding to the acquired user information is stored in the cloud server.
  • the update data file and the user information of the client are obtained from the client through a preset synchronization method, and then the update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information.
  • the backup data corresponding to the user information is encrypted to obtain the target key corresponding to the user information and the cloud data corresponding to the user information, and then the cloud data corresponding to the user information is stored in the cloud server to achieve real-time data synchronization and ensure data
  • the speed and completeness of synchronization can avoid data not being saved in time when the client is abnormal, and improve the efficiency of data synchronization and data security.
  • the following uses a specific embodiment to synchronize the update data file mentioned in step S82 to the original backup data corresponding to the update data file to obtain the backup corresponding to the user information.
  • the specific realization method of the data is explained in detail.
  • FIG. 6 shows a specific implementation process of step S82 provided by an embodiment of the present application, which is described in detail as follows: S821: Obtain the original backup file corresponding to the updated data file from the cloud server.
  • the server performs update detection on the file, and when it detects that the file is updated, it obtains the original file corresponding to the updated data file from the backup data of the cloud server.
  • the file with the same identity in the cloud backup data is obtained according to the identity of the word document as the original file corresponding to the word document.
  • S822 Obtain update content corresponding to the update data file, and generate a resource file package according to the update content.
  • the update content corresponding to the update data file in the cache is read through a preset instruction, and a resource file package is generated according to the update content.
  • resource files such as images and audio are associated with the updated content
  • the resource files in the updated content will also be packaged into a resource file package.
  • the resource file package refers to a file package that encapsulates resources such as update content, images, audio, etc., and its specific format can be set according to actual needs.
  • the bundle package is used as the resource file package corresponding to the update content in this embodiment.
  • the bundle package has a function similar to a static library. It encapsulates the update content into the bundle package, which can directly release and run the update data and resource files contained in the bundle package, but also ensure that the update data and resource files will not be used during use. Access to other users ensures the security of updated data and resource files.
  • the process of generating the resource file package in this step belongs to the background silent generation and does not affect file reading and writing. Therefore, the file update data can be obtained and backed up without closing the file.
  • the method of data link list analysis is used to perform a difference comparison between the updated resource package and the original file, and the difference information between the two is obtained.
  • the method of data link list analysis refers to using the original backup file to establish a data link list, and the obtained update resource package is inserted in the form of difference comparison with the data in the data link list.
  • the data linked list is a non-contiguous, non-sequential storage structure on a physical storage unit, and the logical order of data elements is realized through the link order of the pointers in the linked list.
  • the linked list is composed of a series of nodes (each element in the linked list is called a node), and the nodes can be dynamically generated at runtime.
  • Each node includes two parts: one is the data field that stores the data element, and the other is the pointer field that stores the address of the next node.
  • S824 Use the difference information to update the original backup file to obtain the updated file, and synchronize the updated file to the cloud backup data as the backup data corresponding to the user information.
  • the original backup file is updated using the difference information to obtain the updated file, and the updated file is synchronized to the cloud backup data as the backup data corresponding to the user information.
  • the original backup file corresponding to the updated data file is obtained from the cloud server, and then the updated content corresponding to the updated data file is obtained, and the resource file package is generated according to the updated content, and then the difference between the updated resource package and the original backup file is performed
  • the difference information is obtained by the difference information, and then the original backup file is updated with the difference information, and the updated file is obtained, and the updated file is synchronized to the cloud backup data as the backup data corresponding to the user information to realize the rapid synchronization of the updated data file
  • the efficiency of data synchronization is improved, data loss caused by sudden abnormalities is reduced or avoided, and data security is improved.
  • FIG. 7 shows a principle block diagram of a data restoration device corresponding to the data restoration method of the above embodiment one-to-one.
  • the data restoration device includes a data identification acquisition module 10, a query request sending module 20, a query result receiving module 30, a user information acquiring module 40, a user identity verification module 50, a target data determining module 60, and a target data sending module.
  • Module 70 The detailed description of each functional module is as follows:
  • the data identification obtaining module 10 is configured to obtain the initial data identification included in the data restoration request if the data restoration request sent by the client is received;
  • the query request sending module 20 is configured to send a path query request containing the initial data identifier to the client, so that the client can query the storage medium of the client to see if there is a path for recording the initial data identifier according to the path query request, and obtain the first query Result, and send the first query result to the server;
  • the query result receiving module 30 is configured to receive the first query result fed back by the client terminal;
  • the user information obtaining module 40 is configured to obtain user information corresponding to the client if the first query result is that the storage path corresponding to the record initial data identifier is not queried;
  • the user identity verification module 50 is used to perform identity verification of the cloud server on the user information to obtain the identity verification result;
  • the target data determining module 60 is configured to obtain the cloud data corresponding to the initial data identifier from the cloud server in a preset manner if the identity verification result is passed, as the target data, where the cloud data is through hot update , To synchronize the client's real-time data to the data stored in the cloud database;
  • the target data sending module 70 is used to send target data to the client.
  • the target data determining module 60 includes:
  • the cloud data decryption unit is used to obtain the target key corresponding to the user information if the authentication result is passed, and use the target key to decrypt the cloud data to obtain the cloud data corresponding to the user information;
  • the data identification query unit is used to perform query processing on the initial data identification in the data identification of the cloud data corresponding to the user information to obtain the second query result;
  • the data selection unit to be restored is configured to, if the second query result is that there is at least one initial data identification in the data identification of the cloud backup data corresponding to the user information, use the cloud data with the initial data identification as the data to be restored;
  • the to-be-restored data sending unit is configured to send the data identifier of the data to be restored to the client, so that the user of the client selects at least one data identifier from the data identifiers of the data to be restored as the data identifier of the target data.
  • the target data confirming unit is used to receive the selection message fed back by the client, obtain the data identification of the target data from the selection message, and determine the target data from the data to be restored according to the data identification of the target data.
  • the user identity verification module 50 includes:
  • the voiceprint extraction unit is used to extract the voiceprint of the audio information to obtain the target voiceprint information
  • the voiceprint verification unit is used to compare and verify the target voiceprint information with the user voiceprint information of each preset client to obtain the first verification result;
  • the voice conversion unit is used to convert the audio information to obtain the target text by adopting a voice-to-text method
  • the text parsing unit is used to parse the target text to obtain the current verification code
  • the text verification unit is used to verify the legality of the current verification code to obtain the second verification result
  • the result determining unit is used for confirming that the identity verification result is the verification passed if the first verification result and the second verification result are both verified.
  • the data restoration method also includes:
  • the data recovery module is configured to send a data restoration instruction to the client if the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, so that the client executes the modification of the storage path according to the data restoration instruction Delete flag and create file index action.
  • the data restoration method also includes:
  • the update data acquisition module is used to acquire the update data file and the user information of the client from the client through a preset synchronization method, where the updated data corresponds to the original backup data on the cloud server;
  • the cloud data generation module is used to synchronize the update data file to the original backup data corresponding to the update data file, to obtain the backup data corresponding to the user information, and to encrypt the backup data corresponding to the user information to obtain the target secret corresponding to the user information Cloud data corresponding to the key and user information;
  • the cloud data storage module is used to store the cloud data corresponding to the user information in the cloud server.
  • the cloud data generation module includes:
  • the backup file obtaining unit is used to obtain the original backup file corresponding to the updated data file from the cloud server;
  • the resource file package generation unit is used to obtain the update content corresponding to the update data file, and generate the resource file package according to the update content;
  • the difference comparison unit is used to perform a difference comparison between the updated resource package and the original backup file to obtain difference information
  • the synchronization update unit is used to update the original backup file with the difference information, obtain the updated file, and synchronize the updated file to the cloud backup data as the backup data corresponding to the user information.
  • Each module in the above-mentioned data restoration device can be implemented in whole or in part by software, hardware, and a combination thereof.
  • the above-mentioned modules may be embedded in the form of hardware or independent of the processor in the computer equipment, or may be stored in the memory of the computer equipment in the form of software, so that the processor can call and execute the operations corresponding to the above-mentioned modules.
  • Fig. 8 is a schematic diagram of a computer device provided by an embodiment of the present application.
  • the computer device may be a server, and its internal structure diagram may be as shown in Figure 8.
  • the computer equipment includes a processor, a memory, a network interface, and a database connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, computer readable instructions, and a database.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the database of the computer equipment is used to store cloud data and user information.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer readable instruction is executed by the processor to realize a data restoration method.
  • a computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor.
  • the processor executes the computer-readable instructions to realize data restoration in the above-mentioned embodiment.
  • the steps of the method are, for example, step S10 to step 70 shown in FIG. 2.
  • the processor executes the computer-readable instructions, the functions of the modules/units of the data restoration apparatus in the above-mentioned embodiment are realized, for example, the functions of the modules 10 to 70 shown in FIG. To avoid repetition, I won’t repeat them here.
  • a computer non-volatile readable storage medium is provided, and computer readable instructions are stored on the computer non-volatile readable storage medium.
  • the computer readable instructions implement the above-mentioned embodiments when executed by a processor.
  • the steps of the data restoration method, or when the computer-readable instructions are executed by the processor realize the functions of the modules/units in the data restoration apparatus of the foregoing embodiment. To avoid repetition, I won’t repeat them here.
  • the computer non-volatile readable storage medium may include: any entity or device, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, Computer memory, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electrical carrier signal and telecommunication signal, etc.

Abstract

A method and device for data restoration, a computer device, and a storage medium. The method comprises: if a data restoration request transmitted by a client is received, then acquiring an initial data identifier that the data restoration request comprises (S10); transmitting to the client a path query request comprising the initial data identifier to allow the client to query, on the basis of the path query request, in a storage medium of the client whether a path with a record of the initial data identifier is present, producing a first query result, and transmitting the first query result to a server (S20); receiving the first query result fed back by the client (S30); if the first query result is such that no corresponding storage path with a record of the initial data identifier is found, then acquiring user information corresponding to the client (S40); performing an identity authentication of a cloud server with respect to the user information to produce an identity authentication result (S50); if the identity authentication result is authentication successful, then by means of a preset scheme, acquiring cloud data corresponding to the initial data identifier from the cloud server to serve as target data, where the cloud data is data synchronized by means of hot update from real-time data of the client to a cloud database for storage (S60); and transmitting the target data to the client (S70).

Description

数据还原方法、装置、计算机设备及存储介质Data restoration method, device, computer equipment and storage medium
本申请以2019年9月24日提交的申请号为201910902027.2,名称为“数据还原方法、装置、计算机设备及存储介质”的中国发明专利申请为基础,并要求其优先权。This application is based on the Chinese invention patent application filed on September 24, 2019 with the application number 201910902027.2 and titled "data restoration method, device, computer equipment and storage medium", and claims its priority.
技术领域Technical field
本申请涉及数据处理领域,尤其涉及一种数据还原方法、装置、计算机设备及存储介质。This application relates to the field of data processing, and in particular to a data restoration method, device, computer equipment and storage medium.
背景技术Background technique
随着机计算机技术的迅猛发展,日常的文件处理工作经常需要用到各种智能设备,例如:手机、平板电脑、个人计算机(Personal Computer,PC)等,在使用这些智能设备时,难免遇到一些异常情形,例如中途死机,或者掉电,或者应用异常等异常关闭情形,这些异常容易导致数据的丢失。With the rapid development of computer technology, daily file processing tasks often require various smart devices, such as mobile phones, tablet computers, personal computers (PC), etc. When using these smart devices, it is inevitable to encounter Some abnormal situations, such as crashes in the middle, or power failure, or abnormal shutdown situations such as abnormal applications, these exceptions can easily lead to data loss.
为避免这些异常情况造成数据丢失的风险,在当前,通常采用定时保存的方式来对重要文件进行备份,在达到预设的时间间隔后,对当前文件进行存储,得到一个临时文件,当再次开机时,可以询问是否恢复到最后保存的临时文件状态,如果选择是,则读取最新的临时文件,即可实现文件恢复。在实现本申请的过程中,发明人意识到现有的实现方式至少存入如下问题:该方式在一定程度上减少了数据丢失的风险,但是,该方法在定时的时间间隔较长时,往往还是会丢失较多数据,在定时的间隔时间较短时,会大量占用智能设备资源,从而使得智能设备性能下降,甚至异常,同时,在智能设备自身发生异常时,这种方式保存的数据也可能无法找回,导致用户数据的安全性不高。In order to avoid the risk of data loss caused by these abnormal situations, at present, the method of regular saving is usually used to back up important files. After the preset time interval is reached, the current file is stored and a temporary file is obtained. You can ask if you want to restore to the last saved temporary file state. If you choose Yes, read the latest temporary file to realize file recovery. In the process of realizing this application, the inventor realizes that the existing implementation has at least the following problem: this method reduces the risk of data loss to a certain extent, but this method often has a long time interval when the time interval is long. A lot of data will still be lost. When the timing interval is short, it will occupy a large amount of smart device resources, which will cause the performance of the smart device to decrease or even be abnormal. At the same time, when the smart device itself is abnormal, the data saved in this way is also It may not be able to be retrieved, resulting in low security of user data.
因而,在用户的智能设备或应用出现异常时,如何确保数据的安全,成了亟待解决Therefore, how to ensure data security when the user's smart device or application is abnormal is an urgent solution.
的一个技术难题。A technical problem.
发明内容Summary of the invention
本申请实施例提供一种数据还原方法、装置、计算机设备和存储介质,以确保在智能设备或应用出现异常时,用户的数据安全。The embodiments of the present application provide a data restoration method, device, computer equipment, and storage medium to ensure user data security when an abnormality occurs in a smart device or application.
一种数据还原方法,包括:A method of data restoration, including:
若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识;If a data restoration request sent by the client is received, acquiring the initial data identifier included in the data restoration request;
向所述客户端发送包含所述初始数据标识的路径查询请求,以使所述客户端根据所述路径查询请求,从所述客户端的存储介质中查询是否存在记录所述初始数据标识的路径,得到第一查询结果,并将所述第一查询结果发送给服务端;Sending a path query request including the initial data identifier to the client, so that the client may query from the storage medium of the client whether there is a path recording the initial data identifier according to the path query request, Obtain the first query result, and send the first query result to the server;
接收所述客户端反馈的第一查询结果;Receiving the first query result fed back by the client;
若所述第一查询结果为未查询到记录所述初始数据标识对应的存储路径,则获取所述客户端对应的用户信息;If the first query result is that the storage path corresponding to the initial data identifier has not been queried, obtain user information corresponding to the client;
对所述用户信息进行云端服务器的身份验证,得到身份验证结果;Perform identity verification of the cloud server on the user information to obtain the identity verification result;
若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据,其中,所述云端数据为通过热更新的方式,将客户端的即时数据同步到所述云端数据库存储的数据;If the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data, wherein the cloud data is a hot update method , Synchronizing the real-time data of the client to the data stored in the cloud database;
将所述目标数据发送至所述客户端。Sending the target data to the client.
一种数据还原装置,包括:A data restoration device includes:
数据标识获取模块,用于若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识;The data identification acquisition module is configured to acquire the initial data identification included in the data restoration request if the data restoration request sent by the client is received;
查询请求发送模块,用于向所述客户端发送包含所述初始数据标识的路径查询请求,以 使所述客户端根据所述路径查询请求,从所述客户端的存储介质中查询是否存在记录所述初始数据标识的路径,得到第一查询结果,并将所述第一查询结果发送给服务端;The query request sending module is configured to send a path query request containing the initial data identifier to the client, so that the client can query the storage medium of the client according to the path query request for whether there is a record location. The path identified by the initial data, obtain the first query result, and send the first query result to the server;
查询结果接收模块,用于接收所述客户端反馈的第一查询结果;A query result receiving module, configured to receive the first query result fed back by the client;
用户信息获取模块,用于若所述第一查询结果为未查询到记录所述初始数据标识对应的存储路径,则获取所述客户端对应的用户信息;A user information obtaining module, configured to obtain user information corresponding to the client if the first query result is that the storage path corresponding to the initial data identifier is not queried;
用户身份验证模块,用于对所述用户信息进行云端服务器的身份验证,得到身份验证结果;The user identity verification module is used to perform identity verification of the cloud server on the user information to obtain the identity verification result;
目标数据确定模块,用于若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据,其中,所述云端数据为通过热更新的方式,将客户端的即时数据同步到所述云端数据库存储的数据;The target data determining module is configured to obtain the cloud data corresponding to the initial data identifier from the cloud server in a preset manner if the identity verification result is passed, as the target data, wherein the cloud The data is to synchronize the real-time data of the client to the data stored in the cloud database by means of hot update;
目标数据发送模块,用于将所述目标数据发送至所述客户端。The target data sending module is used to send the target data to the client.
一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现上述数据还原方法的步骤。A computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, and the processor implements the above-mentioned data restoration method when the processor executes the computer-readable instruction step.
一种计算机非易失性可读存储介质,所述计算机非易失性可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时实现上述数据还原方法的步骤。A computer non-volatile readable storage medium, wherein the computer non-volatile readable storage medium stores computer readable instructions, and the computer readable instructions implement the steps of the above data restoration method when executed by a processor.
本申请实施例提供的数据还原方法、装置、计算机设备及存储介质,在接收到客户端发送的数据还原请求时,获取数据还原请求中包含的初始数据标识,进而判断客户端的存储介质中查询是否存在记录该初始数据标识的路径,未查询到记录该初始数据标识对应的存储路径时,获取客户端对应的用户信息,并对用户信息进行云端服务器的身份验证,若身份验证结果为验证通过,则通过预设的方式,从云端服务器中获取初始数据标识对应的云端数据,作为目标数据,从目标数据中,查询通过热更新同步的云端数据中该初始数据标识对应的同步文件,并进行数据还原,提供多种维度的数据还原的安全保障,有利于提高数据的安全性,同时,采用热更新的方式,将实时数据同步到云端服务器,也有利于数据实时快速地存储备份,确保数据安全性。The data restoration method, device, computer equipment, and storage medium provided in the embodiments of the application obtain the initial data identifier included in the data restoration request when receiving the data restoration request sent by the client, and then determine whether the storage medium of the client is queried There is a path to record the initial data identification, and when the storage path corresponding to the initial data identification is not queried, the user information corresponding to the client is obtained, and the user information is authenticated by the cloud server. If the authentication result is passed, Then, through a preset method, the cloud data corresponding to the initial data identifier is obtained from the cloud server as the target data. From the target data, query the synchronization file corresponding to the initial data identifier in the cloud data synchronized by hot update, and perform the data Restoration provides multiple dimensions of data restoration security, which is conducive to improving data security. At the same time, using hot update to synchronize real-time data to the cloud server is also conducive to real-time and fast data storage and backup to ensure data security Sex.
附图说明Description of the drawings
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to explain the technical solutions of the embodiments of the present application more clearly, the following will briefly introduce the drawings that need to be used in the description of the embodiments of the present application. Obviously, the drawings in the following description are only some embodiments of the present application. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative labor.
图1是本申请实施例提供的数据还原方法的应用环境示意图;FIG. 1 is a schematic diagram of an application environment of a data restoration method provided by an embodiment of the present application;
图2是本申请实施例提供的数据还原方法的实现流程图;FIG. 2 is an implementation flowchart of a data restoration method provided by an embodiment of the present application;
图3是本申请实施例提供的数据还原方法中步骤S60的实现流程图;FIG. 3 is a flowchart of the implementation of step S60 in the data restoration method provided by the embodiment of the present application;
图4是本申请实施例提供的数据还原方法中步骤S50的实现流程图;FIG. 4 is a flowchart of the implementation of step S50 in the data restoration method provided by the embodiment of the present application;
图5是本申请实施例提供的数据还原方法中将客户端数据同步到云端服务器的实现流程图;FIG. 5 is a flowchart of synchronizing client data to a cloud server in the data restoration method provided by an embodiment of the present application;
图6是本申请实施例提供的数据还原方法中步骤S82的实现流程图;FIG. 6 is a flowchart of the implementation of step S82 in the data restoration method provided by the embodiment of the present application;
图7是本申请实施例提供的数据还原装置的示意图;FIG. 7 is a schematic diagram of a data restoration device provided by an embodiment of the present application;
图8是本申请实施例提供的计算机设备的示意图。Fig. 8 is a schematic diagram of a computer device provided by an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请 中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all of them. Based on the embodiments in this application, all other embodiments obtained by a person of ordinary skill in the art without creative work shall fall within the protection scope of this application.
请参阅图1,图1示出本申请实施例提供的数据还原方法的应用环境。该数据还原方法应用在智能设备的数据异常丢失后的数据还原场景中。该数据还原场景包括服务端和客户端,其中,服务端和客户端之间通过网络进行连接,服务端包括云端服务器,客户端向服务端发送包含初始数据标识的数据还原请求,服务端根据该数据还原请求中包含的初始数据标识执行数据还原/恢复。客户端具体可以但不限于是各种个人计算机、上网本、平板电脑和智能手机等智能设备,服务端具体可以用独立的服务器或者多个服务器组成的服务器集群实现。Please refer to FIG. 1. FIG. 1 shows an application environment of the data restoration method provided by an embodiment of the present application. The data restoration method is applied in a data restoration scenario after the data of a smart device is abnormally lost. The data restoration scenario includes a server and a client. The server and the client are connected through a network. The server includes a cloud server. The client sends a data restoration request containing the initial data identifier to the server. The initial data identification included in the data restoration request performs data restoration/recovery. The client can be, but is not limited to, various personal computers, netbooks, tablet computers, smart phones and other smart devices, and the server can be implemented by an independent server or a server cluster composed of multiple servers.
请参阅图2,图2示出本申请实施例提供的一种数据还原方法,以该方法应用在图1中的服务端为例进行说明,详述如下:Please refer to FIG. 2. FIG. 2 shows a data restoration method provided by an embodiment of the present application. The method is applied to the server in FIG. 1 as an example for description. The details are as follows:
S10:若接收到客户端发送的数据还原请求,则获取数据还原请求中包含的初始数据标识。S10: If the data restoration request sent by the client is received, the initial data identifier included in the data restoration request is obtained.
具体地,客户端在进行文件操作的过程中,产生一些误操作(例如文件误删除、未保存文件直接退出等)时,或者,遇到一些突发情况(例如突然断电、系统故障等)时,需要对文件进行恢复处理,客户端向服务端发送包含初始数据标识的数据还原请求,服务端接收该数据还原请求,并获取初始数据标识,以便根据初始数据标识来执行后续的数据还原处理。Specifically, in the process of file operations, the client has some misoperations (such as accidental deletion of files, direct exit of unsaved files, etc.), or some unexpected situations (such as sudden power failure, system failure, etc.) When the file needs to be restored, the client sends a data restoration request containing the initial data identification to the server. The server receives the data restoration request and obtains the initial data identification to perform subsequent data restoration processing based on the initial data identification. .
其中,初始数据标识在本实施例中是用于标识待还原数据的数据标识,客户端用户在通过客户端发送数据还原请求之前,先按照预设条件选取初始数据标识。Wherein, the initial data identifier is a data identifier used to identify the data to be restored in this embodiment, and the client user first selects the initial data identifier according to preset conditions before sending a data restoration request through the client.
初始数据标识可根据实际需要来进行选取,例如文件名称、文件类型等,初始数据标识的表现形式具体可以是文字、字母、数字和符号中的一种或多种组合,此处不做限制。The initial data identification can be selected according to actual needs, such as file name, file type, etc. The expression form of the initial data identification can specifically be one or more combinations of words, letters, numbers, and symbols, which is not limited here.
需要说明的是,初始数据标识具体可以是一个文件,例如,初始数据标识“123.txt”表示文件名称为“123”,且文件类型为txt文本格式的文件,也可以是一类文件,例如,初始数据标识“*.doc”表示文件类型为doc格式的所有文件。It should be noted that the initial data identifier can specifically be a file. For example, the initial data identifier "123.txt" means that the file name is "123" and the file type is a txt file, or it can be a type of file, such as , The initial data identifier "*.doc" means that the file type is all files in doc format.
S20:向客户端发送包含初始数据标识的路径查询请求,以使客户端根据路径查询请求,从客户端的存储介质中查询是否存在记录初始数据标识的路径,得到第一查询结果,并将第一查询结果发送给服务端。S20: Send a path query request containing the initial data identifier to the client, so that the client queries whether there is a path recording the initial data identifier from the storage medium of the client according to the path query request, obtains the first query result, and compares the first query result. The query result is sent to the server.
具体地,服务端向客户端发送包含初始数据标识的路径查询请求,该路径查询请求中包含路径针对该初始数据标识的路径查询指令,客户端在接收到该路径查询请求后,响应针对该初始数据标识的路径查询指令,并得到第一查询结果,进而将第一查询结果反馈给服务端。Specifically, the server sends a path query request containing the initial data identifier to the client. The path query request includes a path query instruction for the initial data identifier. After receiving the path query request, the client responds to the initial data identifier. The path query instruction identified by the data, and the first query result is obtained, and then the first query result is fed back to the server.
其中,路径查询指令是用于从存储介质中查询指定数据标识的路径的计算机可读指令。Wherein, the path query instruction is a computer readable instruction used to query the path of the specified data identifier from the storage medium.
应理解,数据在进行存储时,是通过改变存储介质中的磁粒子的极性来记录数据,在数据读取时,客户端存储设备中的磁头将存储介质上的磁粒子极性转换成相应的电脉冲信号,并转换成计算机可以识别的数据形式,目前利用操作系统提供的方式删除或修改数据文件的时候,磁介质上的粒子极性并不会被清除,操作系统只是对数据的索引部分进行了修改,将要删除数据的相应段落标识进行了删除标记,通过初试数据标识和路径获取指令,对保护删除标志的磁粒子的极性进行识别,判断删除标志的磁粒子的极性中,是否存在初始数据标识对应的记录数据,得到第一查询结果。It should be understood that when data is stored, the data is recorded by changing the polarity of the magnetic particles in the storage medium. When reading data, the magnetic head in the client storage device converts the polarity of the magnetic particles on the storage medium to the corresponding The electrical pulse signal is converted into a data format that can be recognized by the computer. At present, when the data file is deleted or modified by the method provided by the operating system, the particle polarity on the magnetic medium will not be cleared, and the operating system is only an index of the data Part of the modification was made. The corresponding paragraph mark of the data to be deleted was marked for deletion. The polarity of the magnetic particle protecting the deletion mark was identified through the initial data mark and path acquisition instructions, and the polarity of the magnetic particle of the deletion mark was judged. Whether there is record data corresponding to the initial data identifier, the first query result is obtained.
其中,第一查询结果包括查询到记录所述初始数据标识对应的存储路径和未查询到记录所述初始数据标识对应的存储路径。Wherein, the first query result includes the storage path corresponding to the record of the initial data identifier is queried and the storage path corresponding to the record of the initial data identifier is not queried.
S30:接收客户端反馈的第一查询结果。S30: Receive the first query result fed back by the client.
具体地,在客户端完成查询后,将第一查询结果发送至服务端,服务端接收该第一查询结果,并根据第一查询结果做出不同的应对策略。Specifically, after the client completes the query, the first query result is sent to the server, and the server receives the first query result and makes different response strategies according to the first query result.
如步骤S20中的描述,第一查询结果包括查询到记录初始数据标识对应的存储路径和未查询到记录初始数据标识对应的存储路径,在客户端存在记录初始数据标识对应的存储路径时候,也即,可以从客户端的存储介质中直接进行该初始数据标识对应的数据文件的恢复; 在客户端不存在记录初始数据标识对应的存储路径时候,也即,无法从客户端进行该初始数据标识对应的数据文件的恢复。As described in step S20, the first query result includes the storage path corresponding to the recorded initial data identifier is queried and the storage path corresponding to the recorded initial data identifier is not queried. When the client has a storage path corresponding to the recorded initial data identifier, it is also That is, the data file corresponding to the initial data identifier can be directly restored from the storage medium of the client; when the client does not have a storage path corresponding to the initial data identifier, that is, the initial data identifier cannot be mapped from the client. Recovery of data files.
S40:若第一查询结果为未查询到记录初始数据标识对应的存储路径,则获取客户端对应的用户信息。S40: If the first query result is that the storage path corresponding to the recorded initial data identifier is not queried, obtain user information corresponding to the client.
具体地,在第一查询结果为未查询到记录所述初始数据标识对应的存储路径时,也即,在客户端的存储设备上获取不到该初始数据标识对应的备份数据时,获取客户端对应的用户信息,进而在后续通过用户信息对应的云端数据来进行数据还原。Specifically, when the first query result is that the storage path corresponding to the initial data identifier is not queried, that is, when the backup data corresponding to the initial data identifier cannot be obtained on the storage device of the client, the client corresponding The user information of the user information, and then the subsequent data restoration through the cloud data corresponding to the user information.
其中,用户信息是用于唯一确定客户端用户的信息,具体可以是但不限于是:客户端的MAC地址、用户账号密码和实时验证信息等。Among them, the user information is information used to uniquely determine the user of the client, which may specifically be, but is not limited to, the MAC address of the client, the user account password, and real-time verification information.
若用户信息为客户端的MAC地址,则在首次进行云端数据备份时,需要录入客户端对应的MAC地址,服务端存储该MAC地址,并为该MAC地址对应的客户端分配动态存储空间。If the user information is the MAC address of the client, when performing cloud data backup for the first time, the MAC address corresponding to the client needs to be entered, the server stores the MAC address, and allocates dynamic storage space for the client corresponding to the MAC address.
若用户信息为用户账号密码时,在首次进行云端数据备份时,客户端向服务端发送注册请求,并进行注册流程,在注册成功后,服务端保存该用户账号密码,并为该用户账号密码对应的客户端分配动态存储空间。If the user information is the user account password, when the cloud data backup is performed for the first time, the client sends a registration request to the server and performs the registration process. After the registration is successful, the server saves the user account and password, and is the user account password The corresponding client allocates dynamic storage space.
其中,实时验证信息是只对客户端用户进行实时验证,例如手机号码和验证码、生物识别等。Among them, real-time verification information is only real-time verification of client users, such as mobile phone numbers and verification codes, biometrics, etc.
需要说明的是,本实施例提供多种可选择的用户信息方式,使得在保障用户数据安全的同时,给不同客户端用户提供更多选择,有利于提升用户体验,客户端用户可以选取任意一种用户信息来进行后续的身份验证,也即,后续身份验证可根据客户端选取的用户信息的不同,而采取不同的验证方式。It should be noted that this embodiment provides a variety of selectable user information methods, so that while ensuring user data security, different client users are provided with more choices, which is conducive to improving user experience. Client users can choose any one. This kind of user information is used for subsequent identity verification, that is, subsequent identity verification can adopt different verification methods according to the different user information selected by the client.
S50:对用户信息进行云端服务器的身份验证,得到身份验证结果。S50: Perform identity verification of the cloud server on the user information, and obtain the identity verification result.
具体地,通过对步骤S40中得到的用户信息进行云端身份验证,得到身份验证结果。Specifically, by performing cloud identity verification on the user information obtained in step S40, the identity verification result is obtained.
在本实施例中,云端服务器中存储有多个客户端对应的云端数据,为确保每个客户端用户的数据安全和节约云端服务器的资源,服务端提供的云端存储设备动态为每个客户端用户分配云端存储空间,并在通过云端数据还原之前,需要对客户端用户进行身份验证,在验证通过后,从该客户端用户对应的云端存储空间中,查询是否存在待还原数据。In this embodiment, the cloud server stores the cloud data corresponding to multiple clients. In order to ensure the data security of each client user and save the resources of the cloud server, the cloud storage device provided by the server dynamically provides for each client The user allocates cloud storage space and needs to authenticate the client user before restoring the data through the cloud. After the verification is passed, the client user's corresponding cloud storage space is inquired about whether there is data to be restored.
其中,身份验证结果包括验证通过和验证失败。Among them, the identity verification result includes verification passed and verification failed.
需要说明的是,如步骤S40所述,本实施例对不同类型的用户信息预设有不同的验证方式,具体地用户信息的类型和验证方式可根据实际需要进行设置,此处不做更多限制。It should be noted that, as described in step S40, this embodiment presets different verification methods for different types of user information. Specifically, the type and verification method of user information can be set according to actual needs, and we will not do more here. limit.
优选地,本实施例采用实时验证信息和用户声纹信息的语音信息,作为用户信息,来进行验证,确保客户端用户的数据安全,具体实施过程可参考步骤S51至步骤S56的描述,为避免重复,此处不在赘述。Preferably, this embodiment adopts the real-time verification information and the voice information of the user’s voiceprint information as the user information for verification to ensure the data security of the client user. For the specific implementation process, please refer to the description of step S51 to step S56, in order to avoid Repeat, not repeat it here.
S60:若身份验证结果为验证通过,则通过预设的方式,从云端服务器中获取初始数据标识对应的云端数据,作为目标数据,其中,云端数据为通过热更新的方式,将客户端的即时数据同步到云端数据库存储的数据。S60: If the identity verification result is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data. Among them, the cloud data is a hot update method to update the real-time data of the client Synchronize the data stored in the cloud database.
具体地,在身份验证结果为验证通过时,通过预设的方式,从云端服务器中筛选出初始数据标识对应的云端数据,作为目标数据。Specifically, when the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is screened out from the cloud server in a preset manner as the target data.
其中,热更新是一种数据同步方式,在本实施例中,是指实时将客户端文件实时同步到云端服务器的方式,而在同步的过程中无需关闭文件,具体过程可参考步骤S81至步骤S83的描述,此处不再赘述。Among them, hot update is a data synchronization method. In this embodiment, it refers to a method of real-time synchronization of client files to the cloud server in real time, and there is no need to close the file during the synchronization process. For the specific process, please refer to step S81 to step The description of S83 will not be repeated here.
其中,预设的方式,可以根据实际需求来设定,此处不做限制。Among them, the preset mode can be set according to actual needs, and there is no restriction here.
优选地,本实施例采用动态解密的方式,从云端服务器中获取用户信息对应的云端数据,具体过程可参考步骤S61至步骤S65的描述,为避免重复,此处不再赘述。Preferably, this embodiment adopts a dynamic decryption method to obtain the cloud data corresponding to the user information from the cloud server. For the specific process, refer to the description of step S61 to step S65. To avoid repetition, details are not repeated here.
S70:将目标数据发送至客户端。S70: Send the target data to the client.
具体地,服务端将选取的目标数据通过网络传输协议发送给客户端指定位置进行存储。Specifically, the server sends the selected target data to the designated location of the client for storage through the network transmission protocol.
其中,网络传输协议包括但不限于:互联网控制报文协议(Internet Control Message Protocol,ICMP)、地址解析协议(ARP Address Resolution Protocol,ARP)和文件传输协议(File Transfer Protocol,FTP)等。Among them, network transmission protocols include but are not limited to: Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP Address Resolution Protocol, ARP), File Transfer Protocol (File Transfer Protocol, FTP), etc.
在本实施例中,在接收到客户端发送的数据还原请求时,获取数据还原请求中包含的初始数据标识,进而向客户端发送包含该初始数据标识的路径查询请求,以使客户端根据路径查询请求,从客户端的存储介质中查询是否存在记录该初始数据标识的路径,得到第一查询结果,接收客户端反馈的第一查询结果,在第一查询结果为未查询到记录该初始数据标识对应的存储路径时,获取客户端对应的用户信息,并对用户信息进行云端服务器的身份验证,得到身份验证结果,若身份验证结果为验证通过,则通过预设的方式,从云端服务器中获取初始数据标识对应的云端数据,作为目标数据,其中,云端数据为通过热更新的方式,将客户端的即时数据同步到云端数据库存储的数据,并将目标数据发送至客户端,通过先对客户端存储设备进行查询,在客户端存储设备中未存储该初始数据标识对应的数据文件中,进一步从云端服务器中,查询通过热更新同步的云端数据中该初始数据标识对应的同步文件,并进行数据还原,提供多种维度的数据还原的安全保障,有利于提高数据的安全性,同时,采用热更新的方式,将实时数据同步到云端服务器,也有利于数据实时快速地存储备份,确保数据安全性。In this embodiment, when the data restoration request sent by the client is received, the initial data identification included in the data restoration request is obtained, and then the path query request containing the initial data identification is sent to the client, so that the client can follow the path Query request, query whether there is a path to record the initial data identifier from the storage medium of the client, and obtain the first query result, receive the first query result fed back by the client, and if the first query result is that the initial data identifier has not been queried and recorded When the corresponding storage path is used, the user information corresponding to the client is obtained, and the user information is authenticated by the cloud server to obtain the identity verification result. If the identity verification result is verified, it will be obtained from the cloud server through a preset method The initial data identifies the corresponding cloud data as the target data. The cloud data is the data stored in the cloud database by synchronizing the client's instant data with the hot update method, and sending the target data to the client. The storage device performs a query. If the data file corresponding to the initial data identifier is not stored in the client storage device, the cloud server further queries the synchronization file corresponding to the initial data identifier in the cloud data synchronized by hot update, and performs the data Restoration provides multiple dimensions of data restoration security, which is conducive to improving data security. At the same time, using hot update to synchronize real-time data to the cloud server is also conducive to real-time and fast data storage and backup to ensure data security Sex.
在图2对应的实施例的基础之上,下面通过一个具体的实施例来对步骤S60中所提及的若身份验证结果为验证通过,则通过预设的方式,从云端服务器中获取初始数据标识对应的云端数据,作为目标数据的具体实现方法进行详细说明。On the basis of the embodiment corresponding to FIG. 2, the following uses a specific embodiment to verify that if the authentication result in step S60 is passed, the initial data is obtained from the cloud server in a preset manner. Identifies the corresponding cloud data, as a specific realization method of the target data for detailed description.
请参阅图3,图3示出了本申请实施例提供的步骤S60的具体实现流程,详述如下:Please refer to FIG. 3. FIG. 3 shows a specific implementation process of step S60 provided in an embodiment of the present application, which is detailed as follows:
S61:若身份验证结果为验证通过,则获取用户信息对应的目标密钥,并使用目标密钥对云端数据进行解密,得到用户信息对应的云端数据。S61: If the identity verification result is that the verification is passed, obtain the target key corresponding to the user information, and use the target key to decrypt the cloud data to obtain the cloud data corresponding to the user information.
具体地,在身份验证结果为验证通过时,获取用户信息对应的目标密钥,并使用目标密钥对云端数据进行解密,得到用户信息对应的云端数据。Specifically, when the identity verification result is that the verification is passed, the target key corresponding to the user information is obtained, and the cloud data is decrypted using the target key to obtain the cloud data corresponding to the user information.
其中,目标密钥是用于对用户信息对应的云端数据进行解密的密钥,在本实施例中,客户端的数据同步到云端服务器时,云端服务器根据客户端的用户信息,对同步的数据进行加密,得到用户信息对应的目标密钥和加密后云端数据,并将同一用户信息对应的加密后云端数据存储到同一个动态空间,通过该目标密钥可对该动态空间对应的云端数据进行解密,得到用户信息对应的解密后的云端数据。Among them, the target key is a key used to decrypt the cloud data corresponding to the user information. In this embodiment, when the data of the client is synchronized to the cloud server, the cloud server encrypts the synchronized data according to the user information of the client. , Obtain the target key corresponding to the user information and the encrypted cloud data, and store the encrypted cloud data corresponding to the same user information in the same dynamic space. The cloud data corresponding to the dynamic space can be decrypted by the target key. Obtain the decrypted cloud data corresponding to the user information.
需要说明的是,通过目标密钥,直接获取用户信息对应的动态空间并进行解密,得到用户信息对应的云端数据,有利于快速从云端服务器中存储的众多不同用户的用户信息中,提取出该目标密钥对应的用户的用户信息,有利于提高数据查询的效率。It should be noted that, through the target key, the dynamic space corresponding to the user information is directly obtained and decrypted, and the cloud data corresponding to the user information is obtained, which is beneficial to quickly extract the user information from the user information of many different users stored in the cloud server. The user information of the user corresponding to the target key helps to improve the efficiency of data query.
S62:在用户信息对应的云端数据的数据标识中,对初始数据标识执行查询处理,得到第二查询结果。S62: In the data identifier of the cloud data corresponding to the user information, perform query processing on the initial data identifier to obtain a second query result.
具体地,在得到用户信息对应的云端数据的数据标识后,使用初始数据标识最为查询对象,在用户信息对应的云端数据的数据标识中进行查询,得到第二查询结果。Specifically, after the data identifier of the cloud data corresponding to the user information is obtained, the initial data identifier is used as the query object, and the query is performed in the data identifier of the cloud data corresponding to the user information to obtain the second query result.
S63:若第二查询结果为用户信息对应的云端备份数据的数据标识中,存在至少一条初始数据标识,则将存在初始数据标识的云端数据作为待还原数据。S63: If the second query result is that there is at least one initial data identifier among the data identifiers of the cloud backup data corresponding to the user information, the cloud data with the initial data identifier is used as the data to be restored.
具体地,在第二查询结果为用户信息对应的云端备份数据的数据标识中,存在至少一条初始数据标识时,将存在初始数据标识的云端数据作为待还原数据。Specifically, when the second query result is the data identifier of the cloud backup data corresponding to the user information, when there is at least one initial data identifier, the cloud data with the initial data identifier is used as the data to be restored.
需要说明的是,若第二查询结果为用户信息对应的云端备份数据的数据标识中,不存在该初始数据标识,则向客户端反馈该查询结果,通过提示消息提醒客户端查询的初始数据标识是否有误。It should be noted that if the second query result is that the initial data identifier does not exist in the data identifier of the cloud backup data corresponding to the user information, the query result will be fed back to the client, and the client will be reminded of the initial data identifier of the query through a prompt message Is it wrong.
S64:将待还原数据的数据标识发送给客户端,以使客户端的用户从待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识。S64: Send the data identifier of the data to be restored to the client, so that the user of the client selects at least one data identifier from the data identifier of the data to be restored as the data identifier of the target data.
具体地,将待还原数据的数据标识发送给客户端,客户端用户通过客户端接收到这些待 还原数据的数据标识后,根据实际需要,选取一条或多条数据标识,作为目标数据的数据标识,并通过消息的方式反馈给服务端。Specifically, the data identifier of the data to be restored is sent to the client. After receiving the data identifier of the data to be restored through the client, the client user selects one or more data identifiers as the data identifier of the target data according to actual needs. , And feed back to the server through a message.
需要说明的是,本实施例中,可以根据需要,设置不同时间点的存储,使得一条数据标识可能对应多条数据,例如,一初始据标识为“案件状态表”的数据标识,经查询后,得到三条数据标识为“案件状态表”的数据文件,其时间点分别为7月1号、7月2号和7月6号。It should be noted that in this embodiment, storage at different time points can be set according to needs, so that one data identifier may correspond to multiple pieces of data, for example, a data identifier whose initial data identifier is "case status table", after querying , Get three data files with data identification as "case status table", their time points are July 1, July 2, and July 6, respectively.
S65:接收客户端反馈的选取消息,并从选取消息获取目标数据的数据标识,并根据目标数据的数据标识,从待还原数据中确定目标数据。S65: Receive the selection message fed back by the client, obtain the data identification of the target data from the selection message, and determine the target data from the data to be restored according to the data identification of the target data.
具体地,在接收到客户端反馈的选取消息时,从选取消息中获取目标数据的数据标识,并根据目标数据的数据标识,从待还原数据中确定目标数据。Specifically, when the selection message fed back by the client is received, the data identification of the target data is obtained from the selection message, and the target data is determined from the data to be restored according to the data identification of the target data.
在本实施例中,在身份验证结果为验证通过时,获取用户信息对应的目标密钥,并使用目标密钥对云端数据进行解密,得到用户信息对应的云端数据,进而在用户信息对应的云端数据的数据标识中,对初始数据标识执行查询处理,得到第二查询结果,若第二查询结果为用户信息对应的云端备份数据的数据标识中,存在至少一条初始数据标识,则将存在初始数据标识的云端数据作为待还原数据,再将待还原数据的数据标识发送给客户端,以使客户端的用户从待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识,最后接收客户端反馈的选取消息,并从选取消息获取目标数据的数据标识,并根据目标数据的数据标识,从待还原数据中确定目标数据,快速从云端服务器存储的众多数据中找到需要还原的目标数据,提高了目标数据的查询和确定效率。In this embodiment, when the identity verification result is that the verification is passed, the target key corresponding to the user information is obtained, and the target key is used to decrypt the cloud data to obtain the cloud data corresponding to the user information, and then the cloud data corresponding to the user information is obtained in the cloud corresponding to the user information. In the data identification of the data, perform query processing on the initial data identification to obtain the second query result. If the second query result is that there is at least one initial data identification in the data identification of the cloud backup data corresponding to the user information, the initial data will exist The identified cloud data is used as the data to be restored, and the data identification of the data to be restored is sent to the client, so that the user of the client selects at least one data identification from the data identification of the data to be restored as the data identification of the target data, and finally receives The client feedbacks the selection message, and obtains the data identification of the target data from the selection message, and determines the target data from the data to be restored according to the data identification of the target data, and quickly finds the target data that needs to be restored from the numerous data stored in the cloud server , Improve the efficiency of query and determination of target data.
在图2对应的实施例的基础之上,下面通过一个具体的实施例来对步骤S50中所提及的对用户信息进行云端服务器的身份验证,得到身份验证结果的具体实现方法进行详细说明。On the basis of the embodiment corresponding to FIG. 2, the specific implementation method of performing the identity verification of the cloud server on the user information mentioned in step S50 and obtaining the identity verification result will be described in detail below through a specific embodiment.
请参阅图4,图4示出了本申请实施例提供的步骤S50的具体实现流程,详述如下:Please refer to FIG. 4, which shows a specific implementation process of step S50 provided in an embodiment of the present application, which is described in detail as follows:
S51:对音频信息进行声纹提取,得到目标声纹信息。S51: Perform voiceprint extraction on the audio information to obtain target voiceprint information.
具体地,在选择进行云端服务器的身份验证之前,云端服务器获取该客户端预设的唯一标识信息作为用户标识,并向该客户端发送包含随机验证码的信息,客户端的用户朗读该信息并进行录音,将录音文件作为用于验证身份的用户信息,服务端在接收到用户信息后,从该音频信息中提取声纹信息,并判断该声纹信息是否为云端服务器预选存储的客户端对应的用户声纹信息。Specifically, before selecting the identity verification of the cloud server, the cloud server obtains the unique identification information preset by the client as the user identification, and sends the information containing the random verification code to the client, and the user of the client reads the information and performs Recording, using the recording file as user information for identity verification. After receiving the user information, the server extracts the voiceprint information from the audio information, and determines whether the voiceprint information corresponds to the client pre-selected and stored by the cloud server User voiceprint information.
需要说明的是,客户端在第一次进行云端服务器存储时,需要录入唯一标识信息和声纹信息,以便后续的身份认证。It should be noted that when the client performs cloud server storage for the first time, it needs to enter unique identification information and voiceprint information for subsequent identity authentication.
其中,唯一标识信息具体可以是客户端的MAC地址,或者,客户端用户绑定该云端服务器的手机号码等,此处不做具体限定。Among them, the unique identification information may specifically be the MAC address of the client, or the mobile phone number of the client user bound to the cloud server, etc., which is not specifically limited here.
其中,随机验证码信息具体可以是采用短信SDK接口自动生成并发送的短信息,使用短信SDK借口生成的随机验证码具有实时性和随机性,例如,生成的一个随机验证码信息为“您的本次验证码为h36ty0,验证码有效时长为2分钟”。Among them, the random verification code information can specifically be a short message that is automatically generated and sent using the SMS SDK interface. The random verification code generated using the SMS SDK excuse is real-time and random. For example, a random verification code is generated as "Your This time the verification code is h36ty0, and the verification code is valid for 2 minutes".
其中,对音频信息进行声纹提取,得到目标声纹信息详细过程如下:对音频信息进行声纹提取,得到目标声纹信息详细过程如下:Among them, the audio information is extracted by voiceprint, and the detailed process of obtaining the target voiceprint information is as follows: The audio information is extracted by voiceprint, and the detailed process of obtaining the target voiceprint information is as follows:
对音频信息进行声纹解析,得到初始声纹样本;Perform voiceprint analysis on audio information to obtain initial voiceprint samples;
对初始声纹样本进行预加重处理,生成具有平坦频谱的加重处理声纹样本;Perform pre-emphasis processing on the initial voiceprint samples to generate emphasized voiceprint samples with a flat frequency spectrum;
采用分帧和加窗的方式,对加重处理声纹样本进行分帧处理,得到初始语音帧;Using framing and windowing methods, perform framing processing on the emphasized voiceprint samples to obtain the initial speech frame;
对初始语音帧进行静默音分离,得到目标语音帧;Perform silent sound separation on the initial speech frame to obtain the target speech frame;
基于目标语音帧,提取声纹特征,将得到的声纹特征作为目标声纹信息。Based on the target speech frame, the voiceprint feature is extracted, and the obtained voiceprint feature is used as the target voiceprint information.
容易理解地,目标声纹信息为验证信息中包含的声纹信息,后续通过对该声纹信息进行校验,判断该声纹信息是否为客户端对应的声纹信息。It is easy to understand that the target voiceprint information is the voiceprint information included in the verification information, and the voiceprint information is subsequently verified to determine whether the voiceprint information is the voiceprint information corresponding to the client.
其中,预加重是一种在发送端对输入信号高频分量进行补偿的信号处理方式。随着信号 速率的增加,信号在传输过程中受损很大,为了在接收终端能得到比较好的信号波形,就需要对受损的信号进行补偿,预加重技术的思想就是在传输线的始端增强信号的高频成分,以补偿高频分量在传输过程中的过大衰减,而预加重对噪声并没有影响,因此有效地提高了输出信噪比。Among them, pre-emphasis is a signal processing method that compensates for the high-frequency components of the input signal at the transmitting end. As the signal rate increases, the signal is greatly damaged during transmission. In order to get a better signal waveform at the receiving terminal, it is necessary to compensate for the damaged signal. The idea of pre-emphasis technology is to enhance at the beginning of the transmission line. The high-frequency component of the signal is used to compensate for the excessive attenuation of the high-frequency component in the transmission process, and the pre-emphasis has no effect on the noise, so the output signal-to-noise ratio is effectively improved.
其中,分帧是指将整段语音信号分帧,也就是切分成很多段,一段语音信号整体上看不是平稳的,但是在局部上可以看作是平稳的,在后期的语音处理中需要输入的是平稳信号,因而要对整段语音信号分帧,也就是切分成很多段。在10-30ms范围内都可以认为信号是稳定的,一般以不少于20ms为一帧。Among them, framing refers to dividing the entire speech signal into frames, that is, dividing it into many segments. A speech signal is not stable as a whole, but it can be regarded as stable locally, and it needs to be input in the later speech processing. It is a stationary signal, so the entire speech signal needs to be framed, that is, divided into many segments. The signal can be considered stable in the range of 10-30ms, and generally no less than 20ms is a frame.
其中,加窗是采用加窗函数对分帧后的语音信号进行处理,使得语音帧连续,在进行分帧处理后,每一帧的起始段和末尾端会出现不连续的地方,分帧越多与原始信号的误差也就越大。通过加窗处理,使分帧后的信号变得连续,每一帧就会表现出周期函数的特征。Among them, windowing is to use a windowing function to process the framed speech signal to make the speech frame continuous. After the frame is processed, there will be discontinuities at the beginning and end of each frame. The more the error from the original signal, the greater the error. Through the windowing process, the framed signal becomes continuous, and each frame will show the characteristics of the periodic function.
容易理解地,目标声纹信息为验证信息中包含的声纹信息,后续通过对该声纹信息进行校验,判断该声纹信息是否为云端服务器预先存储的预设的客户端的用户声纹信息。It is easy to understand that the target voiceprint information is the voiceprint information contained in the verification information. The voiceprint information is subsequently verified to determine whether the voiceprint information is the preset user voiceprint information of the client pre-stored in the cloud server .
S52:将目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果。S52: Compare and verify the target voiceprint information with the user voiceprint information of each preset client to obtain a first verification result.
具体地,在服务端的云端存储设备中,预先存储有每个使用音频信息验证的客户端对应的声纹信息,作为预设的权限声纹信息,通过预设的相似度计算方式,分别计算步骤S51中得到的目标声纹信息与每个预设的权限声纹信息的相似度,得到目标声纹信息与每个预设的权限声纹信息的相似度值,若这些相似度值中,存在大于或等于预设相似度阈值的相似度值,则确定该目标声纹信息为预设的权限声纹信息中的一个,此时,确认声纹验证结果为验证通过,若这些相似度值均小于预设相似度阈值的相似度值,则确定该目标声纹信息不属于预设的权限声纹信息中的任意一个,此时,确认声纹验证结果为验证失败。Specifically, in the cloud storage device on the server side, the voiceprint information corresponding to each client terminal that uses audio information verification is pre-stored as the preset permission voiceprint information, and the calculation steps are respectively calculated through the preset similarity calculation method. The similarity between the target voiceprint information obtained in S51 and each preset authority voiceprint information is obtained, and the similarity value between the target voiceprint information and each preset authority voiceprint information is obtained. If these similarity values exist If the similarity value is greater than or equal to the preset similarity threshold, it is determined that the target voiceprint information is one of the preset permission voiceprint information. At this time, the voiceprint verification result is confirmed to be verified. If these similarity values are all If the similarity value is less than the preset similarity threshold, it is determined that the target voiceprint information does not belong to any one of the preset permission voiceprint information. At this time, the voiceprint verification result is confirmed to be a verification failure.
其中,预设的相似度计算方式包括但不限于:余弦相似性、最近邻(k-Nearest Neighbor,kNN)分类算法、曼哈顿距离(Manhattan Distance)、基于SimHash算法的汉明距离等。The preset similarity calculation methods include but are not limited to: cosine similarity, k-Nearest Neighbor (kNN) classification algorithm, Manhattan Distance (Manhattan Distance), and Hamming distance based on SimHash algorithm.
S53:采用语音转换文本的方式,对音频信息进行转换,得到目标文本。S53: Convert the audio information by adopting a voice-to-text method to obtain the target text.
具体地,通过预设的语音转换文本的方式,对音频信息进行文本转换,得到目标文本。Specifically, the audio information is text-converted through a preset voice-to-text method to obtain the target text.
其中,预设的语音转换文本的方式可以是通过语音转换文本算法,也可以是通过第三方工具来实现,还可以是通过调用第三方应用程序编程接口(Application Programming Interface,API)来实现,可依据实际需求进行选择,此处不做限定。Among them, the preset voice-to-text method can be implemented through a voice-to-text algorithm, through a third-party tool, or through a third-party application programming interface (Application Programming Interface, API). The selection is based on actual needs and is not limited here.
S54:对目标文本进行解析,得到当前验证码。S54: parse the target text to obtain the current verification code.
具体地,采用预设好的正则表达式对目标文本进行正则匹配,得到目标文本中包含的当前验证码。Specifically, a preset regular expression is used to perform regular matching on the target text to obtain the current verification code contained in the target text.
S55:对当前验证码进行合法性验证,得到第二验证结果。S55: Perform legality verification on the current verification code to obtain a second verification result.
具体地,对步骤S54中得到的当前验证码的合法性进行验证,得到第二验证结果,其中,第二验证结果包括验证通过和验证失败,在合法性验证通过时,确认第二验证结果为验证通过,在合法性验证失败时,确认第二验证结果为验证失败。Specifically, the legitimacy of the current verification code obtained in step S54 is verified to obtain a second verification result, where the second verification result includes verification passed and verification failed. When the legitimacy verification is passed, it is confirmed that the second verification result is The verification is passed, and when the legality verification fails, it is confirmed that the second verification result is a verification failure.
其中,合法性验证是用于验证当前验证码是否和初始验证码一致,若当前验证码和初始验证码一致和初始验证码一致,则确定当前验证码合法性验证通过,否则,确认当前验证码合法性验证失败。Among them, the legality verification is used to verify whether the current verification code is consistent with the initial verification code. If the current verification code and the initial verification code are consistent with the initial verification code, it is determined that the current verification code has passed the legality verification; otherwise, the current verification code is confirmed. The legality verification failed.
需要说明的是,步骤S51至步骤S52,与步骤S53至步骤S55之间,没有必然的先后执行顺序,其可以是并列执行的关系,此处不做限制。It should be noted that there is no inevitable sequence of execution between step S51 to step S52 and step S53 to step S55, and it may be executed in parallel, which is not limited here.
S56:若第一验证结果和第二验证结果均为验证通过,则确认身份验证结果为验证通过。S56: If the first verification result and the second verification result are both verified, then confirm that the identity verification result is verified.
具体地,在第一验证结果和所述第二验证结果均为验证通过,则确认身份验证结果为验证通过。Specifically, when the first verification result and the second verification result are both verified, it is confirmed that the identity verification result is verified.
容易理解地,若第一验证结果为验证失败,或者第二验证结果为验证失败,或者第一验证结果和第二验证结果均为验证失败,则确认身份验证结果为验证失败,此时,向客户度反 馈验证失败的提示消息,并将该音频信息和验证信息进行记录并保存到预设的异常信息文件中,以便后续可以通过对该预设的异常信息文件进行分析,得到异常原因,并作出相应异常处理。It is easy to understand that if the first verification result is verification failure, or the second verification result is verification failure, or both the first verification result and the second verification result are verification failures, then it is confirmed that the identity verification result is verification failure. The customer feedbacks the prompt message of the verification failure, and records and saves the audio information and verification information to the preset abnormal information file, so that subsequent analysis of the preset abnormal information file can obtain the cause of the abnormality, and Make corresponding exception handling.
在本实施例中,通过对音频信息进行声纹提取,得到目标声纹信息,进而将目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果,同时,采用语音转换文本的方式,对音频信息进行转换,得到目标文本,进而对目标文本进行解析,得到当前验证码,再对当前验证码进行合法性验证,得到第二验证结果,最后,在第一验证结果和第二验证结果均为验证通过时,确认身份验证结果为验证通过,通过一个音频文件,对用户身份进行多维确认,快速便捷地确认用户身份合法,提高了数据的安全性。In this embodiment, the target voiceprint information is obtained by extracting the voiceprint of the audio information, and then the target voiceprint information is compared and verified with the user voiceprint information of each preset client, and the first verification result is obtained. , Use the voice-to-text method to convert the audio information to obtain the target text, and then parse the target text to obtain the current verification code, and then verify the legality of the current verification code to obtain the second verification result. Finally, in the first When both the first verification result and the second verification result are verified, the identity verification result is confirmed to be verified. An audio file is used to confirm the user's identity in multiple dimensions to quickly and conveniently confirm the legality of the user's identity and improve data security.
在一实施例中,在步骤S30之后,若第一查询结果为查询到记录初始数据标识对应的存储路径,则该数据还原方法还包括通过指令从客户端进行数据还原,具体如下:In one embodiment, after step S30, if the first query result is that the storage path corresponding to the recorded initial data identifier is queried, the data restoration method further includes restoring data from the client through instructions, specifically as follows:
若第一查询结果为在客户端的存储介质中,查询到初始数据标识对应的存储路径,则向客户端发送数据还原指令,以使客户端根据数据还原指令执行修改存储路径的删除标志和建立文件索引的动作。If the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, a data restoration instruction is sent to the client, so that the client executes the deletion flag of the modified storage path and the creation of the file according to the data restoration instruction Index action.
具体地,在第一查询结果为在客户端的存储介质中,查询到初始数据标识对应的存储路径时,确认客户端的存储介质中存储有该初始数据标识对应的数据文件,此时,向客户端发送数据还原指令,客户端在接收到该数据还原指令后,修改存储路径的删除标志,使得该存储路径对应的文件在客户端可视化显示,并重新建立文件索引,使得该初始数据标识对应的文件具有物理路径,可以被执行。Specifically, when the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, it is confirmed that the storage medium of the client stores the data file corresponding to the initial data identifier. Send a data restore instruction. After receiving the data restore instruction, the client modifies the delete flag of the storage path so that the file corresponding to the storage path is displayed on the client visually, and the file index is re-established, so that the initial data identifies the corresponding file It has a physical path and can be executed.
需要说明的是,客户端的数据文件在被删除时,客户端上的存储介质依旧保留数据文件本身的数据,只是将该数据文件对应的存储路径的标志修改为删除标识,并删除该数据文件的索引,使得该数据文件在客户端不显示且不可被执行,通过修改存储路径的删除标识,并重新建立文件索引的方式,可以实现快速进行文件恢复。It should be noted that when the data file of the client is deleted, the storage medium on the client still retains the data of the data file itself, but the mark of the storage path corresponding to the data file is modified to the deletion mark, and the data file is deleted. Index, so that the data file is not displayed on the client and cannot be executed. By modifying the deletion identifier of the storage path and re-establishing the file index, fast file recovery can be realized.
在本实施例中,在第一查询结果为在客户端的存储介质中,查询到初始数据标识对应的存储路径时,向客户端发送数据还原指令,以使客户端根据数据还原指令执行修改存储路径的删除标志和建立文件索引的动作,从而快速通过客户端进行数据文件的恢复,提高了数据文件恢复的效率。In this embodiment, when the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, a data restoration instruction is sent to the client, so that the client can modify the storage path according to the data restoration instruction. The action of deleting the flag and establishing the file index, so as to quickly restore the data file through the client, and improve the efficiency of data file recovery.
在一实施例中,在步骤S10之前,该数据还原方法还包括将客户端数据同步到云端服务器中,下面通过一个具体的实施例来对将客户端数据同步到云端服务器中的具体实现方法进行详细说明。In an embodiment, before step S10, the data restoration method further includes synchronizing the client data to the cloud server. The following uses a specific embodiment to implement the specific implementation method of synchronizing the client data to the cloud server. Detailed description.
请参阅图5,图5示出了本申请实施例提供的将客户端数据同步到云端服务器中的具体实现流程,详述如下:Please refer to FIG. 5. FIG. 5 shows a specific implementation process of synchronizing client data to a cloud server according to an embodiment of the present application, which is described in detail as follows:
S81:通过预设同步方式,从客户端获取更新数据文件和客户端的用户信息,其中,更新数据在云端服务器对应有原始备份数据。S81: Obtain the updated data file and the user information of the client from the client through a preset synchronization method, where the updated data corresponds to the original backup data on the cloud server.
具体地,在本实施例中,对于实时运行的文件,通过预设的步方式,从客户端获取更新数据文件和客户端的用户信息。Specifically, in this embodiment, for a file that runs in real time, the update data file and the user information of the client are obtained from the client through a preset step.
其中,更新数据文件是指该实施运行的文件在上一次更新之后,发生改变的内容。Among them, the update data file refers to the content that has changed since the last update of the implemented file.
其中,常见的同步方式具体包括但不限于:文件拷贝、文件移动、文件实时共享等。Among them, common synchronization methods include, but are not limited to: file copy, file movement, file real-time sharing, etc.
优选地,在本实施例中,为使得文件操作的便捷性,从客户端的内存中直接读取发生变化的文件的数据,并将数据通过热更新的方式更新到云端服务器进行存储,具体过程可参考步骤S82,或者步骤S821至步骤S824的描述,为避免重复,此处不再赘述。Preferably, in this embodiment, in order to facilitate the file operation, the data of the changed file is directly read from the memory of the client, and the data is updated to the cloud server for storage by hot update. The specific process can be Refer to the description of step S82, or step S821 to step S824, in order to avoid repetition, the details are not repeated here.
需要说明的是,对客户端的数据文件进行更新获取,可以是通过定时的方式,也可以是 通过实时保存的方式,也可以是两者的组合方式。It should be noted that the update and acquisition of the client's data file can be done in a timed manner, or in real-time storage, or a combination of the two.
例如,在一具体实施方式中,采用定时保存与实时保存结合的方式,定时保存为设置5分钟自动进行保存,实时保存为接收到被动触发的保存指令时,进行实时保存。For example, in a specific embodiment, a combination of timed saving and real-time saving is adopted, the timed saving is set to automatically save for 5 minutes, and the real-time saving is real-time saving when a passively triggered save instruction is received.
S82:将更新数据文件同步到更新数据文件对应的原始备份数据中,得到用户信息对应的备份数据,并对用户信息对应的备份数据进行加密处理,得到用户信息对应的目标密钥和用户信息对应的云端数据。S82: Synchronize the update data file to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information, and encrypt the backup data corresponding to the user information to obtain the target key corresponding to the user information and the corresponding user information Cloud data.
具体地,将更新数据文件同步到更新数据文件对应的原始备份数据中,得到用户信息对应的备份数据,并对用户信息对应的备份数据进行加密处理,得到用户信息对应的目标密钥和用户信息对应的云端数据。Specifically, the update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information, and the backup data corresponding to the user information is encrypted to obtain the target key and user information corresponding to the user information Corresponding cloud data.
其中,加密处理的具体方式包括但不限于:信息-摘要算法5(Message-Digest Algorithm 5,MD5)、RSA(RSA algorithm)加密算法和密钥加密的块算法(Data Encryption Standard,DES)等。The specific methods of encryption processing include, but are not limited to: Message-Digest Algorithm 5 (MD5), RSA (RSA algorithm) encryption algorithm, and key encryption block algorithm (Data Encryption Standard, DES), etc.
S83:将用户信息对应的云端数据存储到云端服务器中。S83: Store the cloud data corresponding to the user information in the cloud server.
具体地,将获取到的用户信息对应的云端数据,存储到云端服务器中。Specifically, the cloud data corresponding to the acquired user information is stored in the cloud server.
在本实施例中,通过预设同步方式,从客户端获取更新数据文件和客户端的用户信息,进而将更新数据文件同步到更新数据文件对应的原始备份数据中,得到用户信息对应的备份数据,并对用户信息对应的备份数据进行加密处理,得到用户信息对应的目标密钥和用户信息对应的云端数据,再将用户信息对应的云端数据存储到云端服务器中,实现数据的实时同步,确保数据同步的速度和完整性,避免在客户端异常时导致的数据未及时保存,提高了数据同步的效率和数据安全性。In this embodiment, the update data file and the user information of the client are obtained from the client through a preset synchronization method, and then the update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information. The backup data corresponding to the user information is encrypted to obtain the target key corresponding to the user information and the cloud data corresponding to the user information, and then the cloud data corresponding to the user information is stored in the cloud server to achieve real-time data synchronization and ensure data The speed and completeness of synchronization can avoid data not being saved in time when the client is abnormal, and improve the efficiency of data synchronization and data security.
在图5对应的实施例的基础之上,下面通过一个具体的实施例来对步骤S82中所提及的将更新数据文件同步到更新数据文件对应的原始备份数据中,得到用户信息对应的备份数据的具体实现方法进行详细说明。On the basis of the embodiment corresponding to FIG. 5, the following uses a specific embodiment to synchronize the update data file mentioned in step S82 to the original backup data corresponding to the update data file to obtain the backup corresponding to the user information. The specific realization method of the data is explained in detail.
请参阅图6,图6示出了本申请实施例提供的步骤S82的具体实现流程,详述如下:S821:从云端服务器获取更新数据文件对应的原始备份文件。Please refer to FIG. 6. FIG. 6 shows a specific implementation process of step S82 provided by an embodiment of the present application, which is described in detail as follows: S821: Obtain the original backup file corresponding to the updated data file from the cloud server.
具体地,每经过预设时间间隔,或者在接收到更新指令时,服务器对文件进行更新检测,在检测到文件有更新时,从云端服务器的备份数据中,获取更新数据文件对应的原始文件。Specifically, every time a preset time interval has elapsed or when an update instruction is received, the server performs update detection on the file, and when it detects that the file is updated, it obtains the original file corresponding to the updated data file from the backup data of the cloud server.
例如,在检测到一个正在编辑的word文档发生更新,根据该word文档的标识,获取云端备份数据中,具有相同标识的文件,作为该word文档对应的原始文件。For example, when it is detected that a word document that is being edited is updated, the file with the same identity in the cloud backup data is obtained according to the identity of the word document as the original file corresponding to the word document.
S822:获取更新数据文件对应的更新内容,并根据更新内容生成资源文件包。S822: Obtain update content corresponding to the update data file, and generate a resource file package according to the update content.
具体地,通过预设指令,读取缓存中更新数据文件对应的更新内容,并根据该更新内容,生成资源文件包。Specifically, the update content corresponding to the update data file in the cache is read through a preset instruction, and a resource file package is generated according to the update content.
值得说明的是,若该更新内容中关联有图像、音频等资源文件,也将与该更新内容中的资源文件封装到资源文件包中。It is worth noting that if resource files such as images and audio are associated with the updated content, the resource files in the updated content will also be packaged into a resource file package.
其中,资源文件包是指封装有更新内容、图像、音频等资源的文件包,其具体格式可以根据实际需求进行设置,优选地,本实施例采用bundle包来作为更新内容对应的资源文件包,bundle包具有类似静态库的功能,将更新内容封装到bundle包中,既可直接释放并运行bundle包中包含的更新数据和资源文件,又可保证更新数据和资源文件在使用的过程中不被其他用户获取,保证了更新数据和资源文件的安全性。Among them, the resource file package refers to a file package that encapsulates resources such as update content, images, audio, etc., and its specific format can be set according to actual needs. Preferably, the bundle package is used as the resource file package corresponding to the update content in this embodiment. The bundle package has a function similar to a static library. It encapsulates the update content into the bundle package, which can directly release and run the update data and resource files contained in the bundle package, but also ensure that the update data and resource files will not be used during use. Access to other users ensures the security of updated data and resource files.
应理解,本步骤生成资源文件包的过程,属于后台静默生成,对文件读写并不影响,因而,无需关闭文件即可实现文件更新数据的获取与备份。It should be understood that the process of generating the resource file package in this step belongs to the background silent generation and does not affect file reading and writing. Therefore, the file update data can be obtained and backed up without closing the file.
S823:对更新资源包和原始备份文件执行差异性比较,得到差异信息。S823: Perform a difference comparison between the updated resource package and the original backup file to obtain difference information.
具体地,采用数据链表分析的方式,对更新资源包和原始文件执行差异性比较,得到两者的差异信息。Specifically, the method of data link list analysis is used to perform a difference comparison between the updated resource package and the original file, and the difference information between the two is obtained.
其中,数据链表分析的方式,是指使用原始备份文件建立数据链表,并将得到的更新资源包以插入的形式与搞数据链表中的数据进行差异性对比。Among them, the method of data link list analysis refers to using the original backup file to establish a data link list, and the obtained update resource package is inserted in the form of difference comparison with the data in the data link list.
其中,数据链表是一种物理存储单元上非连续、非顺序的存储结构,数据元素的逻辑顺序是通过链表中的指针链接次序实现的。链表由一系列结点(链表中每一个元素称为结点)组成,结点可以在运行时动态生成。每个结点包括两个部分:一个是存储数据元素的数据域,另一个是存储下一个结点地址的指针域。Among them, the data linked list is a non-contiguous, non-sequential storage structure on a physical storage unit, and the logical order of data elements is realized through the link order of the pointers in the linked list. The linked list is composed of a series of nodes (each element in the linked list is called a node), and the nodes can be dynamically generated at runtime. Each node includes two parts: one is the data field that stores the data element, and the other is the pointer field that stores the address of the next node.
S824:使用差异信息更新原始备份文件,得到更新后的文件,并将更新后的文件同步到云端备份数据中,作为用户信息对应的备份数据。S824: Use the difference information to update the original backup file to obtain the updated file, and synchronize the updated file to the cloud backup data as the backup data corresponding to the user information.
具体地,在得到差异信息后,使用差异信息更新原始备份文件,得到更新后的文件,并将更新后的文件同步到云端备份数据中,作为用户信息对应的备份数据。Specifically, after the difference information is obtained, the original backup file is updated using the difference information to obtain the updated file, and the updated file is synchronized to the cloud backup data as the backup data corresponding to the user information.
在本实施例中,从云端服务器,获取更新数据文件对应的原始备份文件,进而获取更新数据文件对应的更新内容,并根据更新内容生成资源文件包,再对更新资源包和原始备份文件执行差异性比较,得到差异信息,进而使用差异信息更新原始备份文件,得到更新后的文件,并将更新后的文件同步到云端备份数据中,作为用户信息对应的备份数据,实现快速将更新数据文件同步到云端服务器,提高了数据同步的效率,减小或者避免突发异常导致的数据丢失,提高了数据的安全性。In this embodiment, the original backup file corresponding to the updated data file is obtained from the cloud server, and then the updated content corresponding to the updated data file is obtained, and the resource file package is generated according to the updated content, and then the difference between the updated resource package and the original backup file is performed The difference information is obtained by the difference information, and then the original backup file is updated with the difference information, and the updated file is obtained, and the updated file is synchronized to the cloud backup data as the backup data corresponding to the user information to realize the rapid synchronization of the updated data file To the cloud server, the efficiency of data synchronization is improved, data loss caused by sudden abnormalities is reduced or avoided, and data security is improved.
应理解,上述实施例中各步骤的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。It should be understood that the size of the sequence number of each step in the foregoing embodiment does not mean the order of execution. The execution sequence of each process should be determined by its function and internal logic, and should not constitute any limitation on the implementation process of the embodiment of the present application.
图7示出与上述实施例数据还原方法一一对应的数据还原装置的原理框图。如图7所示,该数据还原装置包括数据标识获取模块10、查询请求发送模块20、查询结果接收模块30、用户信息获取模块40、用户身份验证模块50、目标数据确定模块60和目标数据发送模块70。各功能模块详细说明如下:FIG. 7 shows a principle block diagram of a data restoration device corresponding to the data restoration method of the above embodiment one-to-one. As shown in Figure 7, the data restoration device includes a data identification acquisition module 10, a query request sending module 20, a query result receiving module 30, a user information acquiring module 40, a user identity verification module 50, a target data determining module 60, and a target data sending module. Module 70. The detailed description of each functional module is as follows:
数据标识获取模块10,用于若接收到客户端发送的数据还原请求,则获取数据还原请求中包含的初始数据标识;The data identification obtaining module 10 is configured to obtain the initial data identification included in the data restoration request if the data restoration request sent by the client is received;
查询请求发送模块20,用于向客户端发送包含初始数据标识的路径查询请求,以使客户端根据路径查询请求,从客户端的存储介质中查询是否存在记录初始数据标识的路径,得到第一查询结果,并将第一查询结果发送给服务端;The query request sending module 20 is configured to send a path query request containing the initial data identifier to the client, so that the client can query the storage medium of the client to see if there is a path for recording the initial data identifier according to the path query request, and obtain the first query Result, and send the first query result to the server;
查询结果接收模块30,用于接收客户端反馈的第一查询结果;The query result receiving module 30 is configured to receive the first query result fed back by the client terminal;
用户信息获取模块40,用于若第一查询结果为未查询到记录初始数据标识对应的存储路径,则获取客户端对应的用户信息;The user information obtaining module 40 is configured to obtain user information corresponding to the client if the first query result is that the storage path corresponding to the record initial data identifier is not queried;
用户身份验证模块50,用于对用户信息进行云端服务器的身份验证,得到身份验证结果;The user identity verification module 50 is used to perform identity verification of the cloud server on the user information to obtain the identity verification result;
目标数据确定模块60,用于若身份验证结果为验证通过,则通过预设的方式,从云端服务器中获取初始数据标识对应的云端数据,作为目标数据,其中,云端数据为通过热更新的方式,将客户端的即时数据同步到云端数据库存储的数据;The target data determining module 60 is configured to obtain the cloud data corresponding to the initial data identifier from the cloud server in a preset manner if the identity verification result is passed, as the target data, where the cloud data is through hot update , To synchronize the client's real-time data to the data stored in the cloud database;
目标数据发送模块70,用于将目标数据发送至客户端。The target data sending module 70 is used to send target data to the client.
进一步地,目标数据确定模块60包括:Further, the target data determining module 60 includes:
云端数据解密单元,用于若身份验证结果为验证通过,则获取用户信息对应的目标密钥,并使用目标密钥对云端数据进行解密,得到用户信息对应的云端数据;The cloud data decryption unit is used to obtain the target key corresponding to the user information if the authentication result is passed, and use the target key to decrypt the cloud data to obtain the cloud data corresponding to the user information;
数据标识查询单元,用于在用户信息对应的云端数据的数据标识中,对初始数据标识执行查询处理,得到第二查询结果;The data identification query unit is used to perform query processing on the initial data identification in the data identification of the cloud data corresponding to the user information to obtain the second query result;
待还原数据选取单元,用于若第二查询结果为用户信息对应的云端备份数据的数据标识中,存在至少一条初始数据标识,则将存在初始数据标识的云端数据作为待还原数据;The data selection unit to be restored is configured to, if the second query result is that there is at least one initial data identification in the data identification of the cloud backup data corresponding to the user information, use the cloud data with the initial data identification as the data to be restored;
待还原数据发送单元,用于将待还原数据的数据标识发送给客户端,以使客户端的用户从待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识。The to-be-restored data sending unit is configured to send the data identifier of the data to be restored to the client, so that the user of the client selects at least one data identifier from the data identifiers of the data to be restored as the data identifier of the target data.
目标数据确认单元,用于接收客户端反馈的选取消息,并从选取消息获取目标数据的数据标识,并根据目标数据的数据标识,从待还原数据中确定目标数据。The target data confirming unit is used to receive the selection message fed back by the client, obtain the data identification of the target data from the selection message, and determine the target data from the data to be restored according to the data identification of the target data.
进一步地,用户身份验证模块50包括:Further, the user identity verification module 50 includes:
声纹提取单元,用于对音频信息进行声纹提取,得到目标声纹信息;The voiceprint extraction unit is used to extract the voiceprint of the audio information to obtain the target voiceprint information;
声纹验证单元,用于将目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果;The voiceprint verification unit is used to compare and verify the target voiceprint information with the user voiceprint information of each preset client to obtain the first verification result;
语音转换单元,用于采用语音转换文本的方式,对音频信息进行转换,得到目标文本;The voice conversion unit is used to convert the audio information to obtain the target text by adopting a voice-to-text method;
文本解析单元,用于对目标文本进行解析,得到当前验证码;The text parsing unit is used to parse the target text to obtain the current verification code;
文本验证单元,用于对当前验证码进行合法性验证,得到第二验证结果;The text verification unit is used to verify the legality of the current verification code to obtain the second verification result;
结果确定单元,用于若第一验证结果和第二验证结果均为验证通过,则确认身份验证结果为验证通过。The result determining unit is used for confirming that the identity verification result is the verification passed if the first verification result and the second verification result are both verified.
该数据还原方法还包括:The data restoration method also includes:
数据恢复模块,用于若第一查询结果为在客户端的存储介质中,查询到初始数据标识对应的存储路径,则向客户端发送数据还原指令,以使客户端根据数据还原指令执行修改存储路径的删除标志和建立文件索引的动作。The data recovery module is configured to send a data restoration instruction to the client if the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, so that the client executes the modification of the storage path according to the data restoration instruction Delete flag and create file index action.
该数据还原方法还包括:The data restoration method also includes:
更新数据获取模块,用于通过预设同步方式,从客户端获取更新数据文件和客户端的用户信息,其中,更新数据在云端服务器对应有原始备份数据;The update data acquisition module is used to acquire the update data file and the user information of the client from the client through a preset synchronization method, where the updated data corresponds to the original backup data on the cloud server;
云端数据生成模块,用于将更新数据文件同步到更新数据文件对应的原始备份数据中,得到用户信息对应的备份数据,并对用户信息对应的备份数据进行加密处理,得到用户信息对应的目标密钥和用户信息对应的云端数据;The cloud data generation module is used to synchronize the update data file to the original backup data corresponding to the update data file, to obtain the backup data corresponding to the user information, and to encrypt the backup data corresponding to the user information to obtain the target secret corresponding to the user information Cloud data corresponding to the key and user information;
云端数据存储模块,用于将用户信息对应的云端数据存储到云端服务器中。The cloud data storage module is used to store the cloud data corresponding to the user information in the cloud server.
进一步地,云端数据生成模块包括:Further, the cloud data generation module includes:
备份文件获取单元,用于从云端服务器,获取更新数据文件对应的原始备份文件;The backup file obtaining unit is used to obtain the original backup file corresponding to the updated data file from the cloud server;
资源文件包生成单元,用于获取更新数据文件对应的更新内容,并根据更新内容生成资源文件包;The resource file package generation unit is used to obtain the update content corresponding to the update data file, and generate the resource file package according to the update content;
差异性对比单元,用于对更新资源包和原始备份文件执行差异性比较,得到差异信息;The difference comparison unit is used to perform a difference comparison between the updated resource package and the original backup file to obtain difference information;
同步更新单元,用于使用差异信息更新原始备份文件,得到更新后的文件,并将更新后的文件同步到云端备份数据中,作为用户信息对应的备份数据。The synchronization update unit is used to update the original backup file with the difference information, obtain the updated file, and synchronize the updated file to the cloud backup data as the backup data corresponding to the user information.
关于数据还原装置的具体限定可以参见上文中对于数据还原方法的限定,在此不再赘述。上述数据还原装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。For the specific limitation of the data restoration device, please refer to the above limitation of the data restoration method, which will not be repeated here. Each module in the above-mentioned data restoration device can be implemented in whole or in part by software, hardware, and a combination thereof. The above-mentioned modules may be embedded in the form of hardware or independent of the processor in the computer equipment, or may be stored in the memory of the computer equipment in the form of software, so that the processor can call and execute the operations corresponding to the above-mentioned modules.
图8是本申请一实施例提供的计算机设备的示意图。该计算机设备可以是服务端,其内部结构图可以如图8所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的数据库用于存储云端数据和用户信息。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种数据还原方法。Fig. 8 is a schematic diagram of a computer device provided by an embodiment of the present application. The computer device may be a server, and its internal structure diagram may be as shown in Figure 8. The computer equipment includes a processor, a memory, a network interface, and a database connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer readable instructions, and a database. The internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium. The database of the computer equipment is used to store cloud data and user information. The network interface of the computer device is used to communicate with an external terminal through a network connection. The computer readable instruction is executed by the processor to realize a data restoration method.
在一个实施例中,提供了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机可读指令,处理器执行计算机可读指令时实现上述实施例数据还原方法的步骤,例如图2所示的步骤S10至步骤70。或者,处理器执行计算机可读指令时实现上述实施例数据还原装置的各模块/单元的功能,例如图7所示的模块10至模块70的功能。为避免重复,这里不再赘述。In one embodiment, a computer device is provided, including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor. The processor executes the computer-readable instructions to realize data restoration in the above-mentioned embodiment. The steps of the method are, for example, step S10 to step 70 shown in FIG. 2. Or, when the processor executes the computer-readable instructions, the functions of the modules/units of the data restoration apparatus in the above-mentioned embodiment are realized, for example, the functions of the modules 10 to 70 shown in FIG. To avoid repetition, I won’t repeat them here.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元、 模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元、模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, only the division of the above functional units and modules is used as an example. In practical applications, the above functions can be allocated to different functional units and modules as needed. Module completion, that is, the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above.
在一实施例中,提供一计算机非易失性可读存储介质,该计算机非易失性可读存储介质上存储有计算机可读指令,该计算机可读指令被处理器执行时实现上述实施例数据还原方法的步骤,或者,该计算机可读指令被处理器执行时实现上述实施例数据还原装置中各模块/单元的功能。为避免重复,这里不再赘述。In an embodiment, a computer non-volatile readable storage medium is provided, and computer readable instructions are stored on the computer non-volatile readable storage medium. The computer readable instructions implement the above-mentioned embodiments when executed by a processor. The steps of the data restoration method, or when the computer-readable instructions are executed by the processor, realize the functions of the modules/units in the data restoration apparatus of the foregoing embodiment. To avoid repetition, I won’t repeat them here.
可以理解地,所述计算机非易失性可读存储介质可以包括:计算机可读指令能够携带所述计算机可读指令的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、电载波信号和电信信号等。Understandably, the computer non-volatile readable storage medium may include: any entity or device, recording medium, U disk, mobile hard disk, magnetic disk, optical disk, Computer memory, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), electrical carrier signal and telecommunication signal, etc.
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。The above-mentioned embodiments are only used to illustrate the technical solutions of the present application, not to limit them; although the present application has been described in detail with reference to the foregoing embodiments, a person of ordinary skill in the art should understand that it can still implement the foregoing The technical solutions recorded in the examples are modified, or some of the technical features are equivalently replaced; these modifications or replacements do not cause the essence of the corresponding technical solutions to deviate from the spirit and scope of the technical solutions of the embodiments of the application, and should be included in Within the scope of protection of this application.

Claims (20)

  1. 一种数据还原方法,其特征在于,所述数据还原方法包括:A method for restoring data, characterized in that the method for restoring data includes:
    若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识;If a data restoration request sent by the client is received, acquiring the initial data identifier included in the data restoration request;
    向所述客户端发送包含所述初始数据标识的路径查询请求,以使所述客户端根据所述路径查询请求,从所述客户端的存储介质中查询是否存在记录所述初始数据标识的路径,得到第一查询结果,并将所述第一查询结果发送给服务端;Sending a path query request including the initial data identifier to the client, so that the client may query from the storage medium of the client whether there is a path recording the initial data identifier according to the path query request, Obtain the first query result, and send the first query result to the server;
    接收所述客户端反馈的所述第一查询结果;Receiving the first query result fed back by the client;
    若所述第一查询结果为未查询到记录所述初始数据标识对应的存储路径,则获取所述客户端对应的用户信息;If the first query result is that the storage path corresponding to the initial data identifier has not been queried, obtain user information corresponding to the client;
    对所述用户信息进行云端服务器的身份验证,得到身份验证结果;Perform identity verification of the cloud server on the user information to obtain the identity verification result;
    若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据,其中,所述云端数据为通过热更新的方式,将客户端的即时数据同步到所述云端数据库存储的数据;If the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data, wherein the cloud data is a hot update method , Synchronizing the real-time data of the client to the data stored in the cloud database;
    将所述目标数据发送至所述客户端。Sending the target data to the client.
  2. 如权利要求1所述的数据还原方法,其特征在于,所述若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据包括:The data restoration method of claim 1, wherein if the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner , As target data include:
    若所述身份验证结果为验证通过,则获取所述用户信息对应的目标密钥,并使用所述目标密钥对云端数据进行解密,得到所述用户信息对应的云端数据;If the identity verification result is that the verification is passed, obtaining the target key corresponding to the user information, and decrypting the cloud data using the target key, to obtain the cloud data corresponding to the user information;
    在所述用户信息对应的云端数据的数据标识中,对所述初始数据标识执行查询处理,得到第二查询结果;In the data identifier of the cloud data corresponding to the user information, perform query processing on the initial data identifier to obtain a second query result;
    若所述第二查询结果为所述用户信息对应的云端备份数据的数据标识中,存在至少一条所述初始数据标识,则将所述存在所述初始数据标识的云端数据作为待还原数据;If the second query result is that there is at least one of the initial data identifiers in the data identifiers of the cloud backup data corresponding to the user information, then the cloud data with the initial data identifiers is used as the data to be restored;
    将所述待还原数据的数据标识发送给所述客户端,以使所述客户端的用户从所述待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识;Sending the data identification of the data to be restored to the client, so that the user of the client selects at least one data identification from the data identification of the data to be restored as the data identification of the target data;
    接收所述客户端反馈的选取消息,并从所述选取消息获取目标数据的数据标识,并根据所述目标数据的数据标识,从所述待还原数据中确定所述目标数据。Receive the selection message fed back by the client, obtain the data identifier of the target data from the selection message, and determine the target data from the data to be restored according to the data identifier of the target data.
  3. 如权利要求1所述的数据还原方法,其特征在于,所述用户信息为包含验证码信息的音频信息,所述对所述用户信息进行云端服务器的身份验证,得到身份验证结果包括:The data restoration method according to claim 1, wherein the user information is audio information including verification code information, and the performing identity verification of the cloud server on the user information to obtain the identity verification result comprises:
    对所述音频信息进行声纹提取,得到目标声纹信息;Performing voiceprint extraction on the audio information to obtain target voiceprint information;
    将所述目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果;Comparing and verifying the target voiceprint information with the user voiceprint information of each preset client terminal to obtain a first verification result;
    采用语音转换文本的方式,对所述音频信息进行转换,得到目标文本;Convert the audio information by means of voice-to-text to obtain the target text;
    对所述目标文本进行解析,得到当前验证码;Parse the target text to obtain the current verification code;
    对所述当前验证码进行合法性验证,得到第二验证结果;Performing legality verification on the current verification code to obtain a second verification result;
    若所述第一验证结果和所述第二验证结果均为验证通过,则确认所述身份验证结果为验证通过。If the first verification result and the second verification result are both verified, it is confirmed that the identity verification result is verified.
  4. 如权利要求1所述的数据还原方法,其特征在于,在所述接收所述客户端反馈的第一查询结果之后,所述数据还原方法还包括:5. The data restoration method according to claim 1, wherein after receiving the first query result fed back by the client, the data restoration method further comprises:
    若所述第一查询结果为在所述客户端的存储介质中,查询到所述初始数据标识对应的存储路径,则向所述客户端发送数据还原指令,以使所述客户端根据所述数据还原指令执行修改所述存储路径的删除标志和建立文件索引的动作。If the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, then a data restoration instruction is sent to the client, so that the client can use the data The restore instruction executes the actions of modifying the deletion flag of the storage path and establishing the file index.
  5. 如权利要求1至4任一项所述的数据还原方法,其特征在于,在所述若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识之前,所述数据还原方法还包括:The data restoration method according to any one of claims 1 to 4, characterized in that, if the data restoration request sent by the client is received, the initial data identification included in the data restoration request is obtained, The data restoration method also includes:
    通过预设同步方式,从所述客户端获取更新数据文件和所述客户端的用户信息,其中, 所述更新数据在所述云端服务器对应有原始备份数据;Obtain the updated data file and the user information of the client from the client through a preset synchronization method, wherein the updated data corresponds to the original backup data on the cloud server;
    将所述更新数据文件同步到所述更新数据文件对应的原始备份数据中,得到所述用户信息对应的备份数据,并对所述用户信息对应的备份数据进行加密处理,得到所述用户信息对应的目标密钥和所述用户信息对应的云端数据;The update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information, and the backup data corresponding to the user information is encrypted to obtain the user information corresponding The target key of and the cloud data corresponding to the user information;
    将所述用户信息对应的云端数据存储到所述云端服务器中。The cloud data corresponding to the user information is stored in the cloud server.
  6. 如权利要求5所述的数据还原方法,其特征在于,所述预设同步方式包括定时同步和/或实时同步。The data restoration method according to claim 5, wherein the preset synchronization mode includes timing synchronization and/or real-time synchronization.
  7. 如权利要求5所述的数据还原方法,其特征在于,所述将所述更新数据文件同步到所述更新数据文件对应的原始备份数据中,得到所述用户信息对应的备份数据包括:8. The data restoration method of claim 5, wherein the synchronizing the update data file to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information comprises:
    从所述云端服务器获取所述更新数据文件对应的原始备份文件;Obtaining the original backup file corresponding to the updated data file from the cloud server;
    获取所述更新数据文件对应的更新内容,并根据所述更新内容生成资源文件包;Acquiring update content corresponding to the update data file, and generating a resource file package according to the update content;
    对所述更新资源包和原始备份文件执行差异性比较,得到差异信息;Perform a difference comparison between the update resource package and the original backup file to obtain difference information;
    使用所述差异信息更新所述原始备份文件,得到更新后的文件,并将所述更新后的文件同步到云端备份数据中,作为所述用户信息对应的备份数据。Use the difference information to update the original backup file to obtain an updated file, and synchronize the updated file to cloud backup data as the backup data corresponding to the user information.
  8. 一种数据还原装置,其特征在于,所述数据还原装置包括:A data restoration device, characterized in that the data restoration device includes:
    数据标识获取模块,用于若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识;The data identification acquisition module is configured to acquire the initial data identification included in the data restoration request if the data restoration request sent by the client is received;
    查询请求发送模块,用于向所述客户端发送包含所述初始数据标识的路径查询请求,以使所述客户端根据所述路径查询请求,从所述客户端的存储介质中查询是否存在记录所述初始数据标识的路径,得到第一查询结果,并将所述第一查询结果发送给服务端;The query request sending module is configured to send a path query request containing the initial data identifier to the client, so that the client can query the storage medium of the client according to the path query request for whether there is a record location. The path identified by the initial data, obtain the first query result, and send the first query result to the server;
    查询结果接收模块,用于接收所述客户端反馈的第一查询结果;A query result receiving module, configured to receive the first query result fed back by the client;
    用户信息获取模块,用于若所述第一查询结果为未查询到记录所述初始数据标识对应的存储路径,则获取所述客户端对应的用户信息;A user information obtaining module, configured to obtain user information corresponding to the client if the first query result is that the storage path corresponding to the initial data identifier is not queried;
    用户身份验证模块,用于对所述用户信息进行云端服务器的身份验证,得到身份验证结果;The user identity verification module is used to perform identity verification of the cloud server on the user information to obtain the identity verification result;
    目标数据确定模块,用于若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据,其中,所述云端数据为通过热更新的方式,将客户端的即时数据同步到所述云端数据库存储的数据;The target data determining module is configured to obtain the cloud data corresponding to the initial data identifier from the cloud server in a preset manner if the identity verification result is passed, as the target data, wherein the cloud The data is to synchronize the real-time data of the client to the data stored in the cloud database by means of hot update;
    目标数据发送模块,用于将所述目标数据发送至所述客户端。The target data sending module is used to send the target data to the client.
  9. 如权利要求8所述的数据还原装置,其特征在于,所述目标数据确定模块包括:8. The data restoration device of claim 8, wherein the target data determining module comprises:
    云端数据解密单元,用于若所述身份验证结果为验证通过,则获取所述用户信息对应的目标密钥,并使用所述目标密钥对云端数据进行解密,得到所述用户信息对应的云端数据;The cloud data decryption unit is configured to obtain the target key corresponding to the user information if the identity verification result is passed, and use the target key to decrypt the cloud data to obtain the cloud corresponding to the user information data;
    数据标识查询单元,用于在所述用户信息对应的云端数据的数据标识中,对所述初始数据标识执行查询处理,得到第二查询结果;A data identification query unit, configured to perform query processing on the initial data identification in the data identification of the cloud data corresponding to the user information, to obtain a second query result;
    待还原数据选取单元,用于若所述第二查询结果为所述用户信息对应的云端备份数据的数据标识中,存在至少一条所述初始数据标识,则将所述存在所述初始数据标识的云端数据作为待还原数据;The to-be-restored data selection unit is configured to, if the second query result is that at least one of the initial data identifiers exists in the data identifiers of the cloud backup data corresponding to the user information, then the data identifiers that have the initial data identifiers Cloud data as the data to be restored;
    待还原数据发送单元,用于将所述待还原数据的数据标识发送给所述客户端,以使所述客户端的用户从所述待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识;The to-be-restored data sending unit is configured to send the data identification of the to-be-restored data to the client, so that the user of the client terminal selects at least one data identification as the target data from the data identification of the to-be-restored data Data identification;
    目标数据确认单元,用于接收所述客户端反馈的选取消息,并从所述选取消息获取目标数据的数据标识,并根据所述目标数据的数据标识,从所述待还原数据中确定所述目标数据。The target data confirmation unit is configured to receive the selection message fed back by the client, and obtain the data identifier of the target data from the selection message, and determine the data from the data to be restored according to the data identifier of the target data Target data.
  10. 如权利要求8所述的数据还原装置,其特征在于,所述用户身份验证模块包括:8. The data restoration device according to claim 8, wherein the user identity verification module comprises:
    声纹提取单元,用于对所述音频信息进行声纹提取,得到目标声纹信息;A voiceprint extraction unit, configured to perform voiceprint extraction on the audio information to obtain target voiceprint information;
    声纹验证单元,用于将所述目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果;A voiceprint verification unit, configured to compare and verify the target voiceprint information with the user voiceprint information of each preset client terminal to obtain a first verification result;
    语音转换单元,用于采用语音转换文本的方式,对所述音频信息进行转换,得到目标文本;The voice conversion unit is used to convert the audio information to obtain the target text by adopting a voice-to-text method;
    文本解析单元,用于对所述目标文本进行解析,得到当前验证码;A text parsing unit for parsing the target text to obtain the current verification code;
    文本验证单元,用于对所述当前验证码进行合法性验证,得到第二验证结果;The text verification unit is used to verify the legality of the current verification code to obtain a second verification result;
    结果确定单元,用于若所述第一验证结果和所述第二验证结果均为验证通过,则确认所述身份验证结果为验证通过。The result determining unit is configured to, if the first verification result and the second verification result are both verified, confirm that the identity verification result is verified.
  11. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时,实现如下数据还原方法:A computer device comprising a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, wherein the processor executes the computer-readable instructions to implement The following data restoration methods:
    若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识;If a data restoration request sent by the client is received, acquiring the initial data identifier included in the data restoration request;
    向所述客户端发送包含所述初始数据标识的路径查询请求,以使所述客户端根据所述路径查询请求,从所述客户端的存储介质中查询是否存在记录所述初始数据标识的路径,得到第一查询结果,并将所述第一查询结果发送给服务端;Sending a path query request including the initial data identifier to the client, so that the client may query from the storage medium of the client whether there is a path recording the initial data identifier according to the path query request, Obtain the first query result, and send the first query result to the server;
    接收所述客户端反馈的所述第一查询结果;Receiving the first query result fed back by the client;
    若所述第一查询结果为未查询到记录所述初始数据标识对应的存储路径,则获取所述客户端对应的用户信息;If the first query result is that the storage path corresponding to the initial data identifier has not been queried, obtain user information corresponding to the client;
    对所述用户信息进行云端服务器的身份验证,得到身份验证结果;Perform identity verification of the cloud server on the user information to obtain the identity verification result;
    若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据,其中,所述云端数据为通过热更新的方式,将客户端的即时数据同步到所述云端数据库存储的数据;If the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data, wherein the cloud data is a hot update method , Synchronizing the real-time data of the client to the data stored in the cloud database;
    将所述目标数据发送至所述客户端。Sending the target data to the client.
  12. 如权利要求11所述的计算机设备,其特征在于,所述若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据包括:The computer device according to claim 11, wherein if the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner, As target data include:
    若所述身份验证结果为验证通过,则获取所述用户信息对应的目标密钥,并使用所述目标密钥对云端数据进行解密,得到所述用户信息对应的云端数据;If the identity verification result is that the verification is passed, obtaining the target key corresponding to the user information, and decrypting the cloud data using the target key, to obtain the cloud data corresponding to the user information;
    在所述用户信息对应的云端数据的数据标识中,对所述初始数据标识执行查询处理,得到第二查询结果;In the data identifier of the cloud data corresponding to the user information, perform query processing on the initial data identifier to obtain a second query result;
    若所述第二查询结果为所述用户信息对应的云端备份数据的数据标识中,存在至少一条所述初始数据标识,则将所述存在所述初始数据标识的云端数据作为待还原数据;If the second query result is that there is at least one of the initial data identifiers in the data identifiers of the cloud backup data corresponding to the user information, then the cloud data with the initial data identifiers is used as the data to be restored;
    将所述待还原数据的数据标识发送给所述客户端,以使所述客户端的用户从所述待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识;Sending the data identification of the data to be restored to the client, so that the user of the client selects at least one data identification from the data identification of the data to be restored as the data identification of the target data;
    接收所述客户端反馈的选取消息,并从所述选取消息获取目标数据的数据标识,并根据所述目标数据的数据标识,从所述待还原数据中确定所述目标数据。Receive the selection message fed back by the client, obtain the data identifier of the target data from the selection message, and determine the target data from the data to be restored according to the data identifier of the target data.
  13. 如权利要求11所述的计算机设备,其特征在于,所述用户信息为包含验证码信息的音频信息,所述对所述用户信息进行云端服务器的身份验证,得到身份验证结果包括:The computer device of claim 11, wherein the user information is audio information including verification code information, and the performing identity verification of the cloud server on the user information to obtain the identity verification result comprises:
    对所述音频信息进行声纹提取,得到目标声纹信息;Performing voiceprint extraction on the audio information to obtain target voiceprint information;
    将所述目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果;Comparing and verifying the target voiceprint information with the user voiceprint information of each preset client terminal to obtain a first verification result;
    采用语音转换文本的方式,对所述音频信息进行转换,得到目标文本;Convert the audio information by means of voice-to-text to obtain the target text;
    对所述目标文本进行解析,得到当前验证码;Parse the target text to obtain the current verification code;
    对所述当前验证码进行合法性验证,得到第二验证结果;Performing legality verification on the current verification code to obtain a second verification result;
    若所述第一验证结果和所述第二验证结果均为验证通过,则确认所述身份验证结果为验证通过。If the first verification result and the second verification result are both verified, it is confirmed that the identity verification result is verified.
  14. 如权利要求11所述的计算机设备,其特征在于,在所述接收所述客户端反馈的第一查询结果之后,还包括:The computer device according to claim 11, wherein after the receiving the first query result fed back by the client terminal, the method further comprises:
    若所述第一查询结果为在所述客户端的存储介质中,查询到所述初始数据标识对应的存储路径,则向所述客户端发送数据还原指令,以使所述客户端根据所述数据还原指令执行修改所述存储路径的删除标志和建立文件索引的动作。If the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, then a data restoration instruction is sent to the client, so that the client can use the data The restore instruction executes the actions of modifying the deletion flag of the storage path and establishing the file index.
  15. 如权利要求11所述的计算机设备,其特征在于,在所述若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识之前,还包括:The computer device according to claim 11, characterized in that, before the obtaining the initial data identifier included in the data restoration request if the data restoration request sent by the client is received, the method further comprises:
    通过预设同步方式,从所述客户端获取更新数据文件和所述客户端的用户信息,其中,所述更新数据在所述云端服务器对应有原始备份数据;Obtain the updated data file and the user information of the client from the client through a preset synchronization method, wherein the updated data corresponds to the original backup data on the cloud server;
    将所述更新数据文件同步到所述更新数据文件对应的原始备份数据中,得到所述用户信息对应的备份数据,并对所述用户信息对应的备份数据进行加密处理,得到所述用户信息对应的目标密钥和所述用户信息对应的云端数据;The update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information, and the backup data corresponding to the user information is encrypted to obtain the user information corresponding The target key of and the cloud data corresponding to the user information;
    将所述用户信息对应的云端数据存储到所述云端服务器中。The cloud data corresponding to the user information is stored in the cloud server.
  16. 一种计算机非易失性可读存储介质,所述计算机非易失性可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下数据还原方法的步骤:A computer non-volatile readable storage medium, the computer non-volatile readable storage medium stores computer readable instructions, wherein the computer readable instructions are executed by a processor to implement the following data restoration method A step of:
    若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识;If a data restoration request sent by the client is received, acquiring the initial data identifier included in the data restoration request;
    向所述客户端发送包含所述初始数据标识的路径查询请求,以使所述客户端根据所述路径查询请求,从所述客户端的存储介质中查询是否存在记录所述初始数据标识的路径,得到第一查询结果,并将所述第一查询结果发送给服务端;Sending a path query request including the initial data identifier to the client, so that the client may query from the storage medium of the client whether there is a path recording the initial data identifier according to the path query request, Obtain the first query result, and send the first query result to the server;
    接收所述客户端反馈的所述第一查询结果;Receiving the first query result fed back by the client;
    若所述第一查询结果为未查询到记录所述初始数据标识对应的存储路径,则获取所述客户端对应的用户信息;If the first query result is that the storage path corresponding to the initial data identifier has not been queried, obtain user information corresponding to the client;
    对所述用户信息进行云端服务器的身份验证,得到身份验证结果;Perform identity verification of the cloud server on the user information to obtain the identity verification result;
    若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据,其中,所述云端数据为通过热更新的方式,将客户端的即时数据同步到所述云端数据库存储的数据;If the identity verification result is that the verification is passed, the cloud data corresponding to the initial data identifier is obtained from the cloud server in a preset manner as the target data, wherein the cloud data is a hot update method , Synchronizing the real-time data of the client to the data stored in the cloud database;
    将所述目标数据发送至所述客户端。Sending the target data to the client.
  17. 如权利要求16所述的计算机非易失性可读存储介质,其特征在于,所述若所述身份验证结果为验证通过,则通过预设的方式,从所述云端服务器中获取所述初始数据标识对应的云端数据,作为目标数据包括:The computer non-volatile readable storage medium according to claim 16, wherein if the identity verification result is that the authentication is passed, the initial method is obtained from the cloud server in a preset manner. The cloud data corresponding to the data identifier, as target data, includes:
    若所述身份验证结果为验证通过,则获取所述用户信息对应的目标密钥,并使用所述目标密钥对云端数据进行解密,得到所述用户信息对应的云端数据;If the identity verification result is that the verification is passed, obtaining the target key corresponding to the user information, and decrypting the cloud data using the target key, to obtain the cloud data corresponding to the user information;
    在所述用户信息对应的云端数据的数据标识中,对所述初始数据标识执行查询处理,得到第二查询结果;In the data identifier of the cloud data corresponding to the user information, perform query processing on the initial data identifier to obtain a second query result;
    若所述第二查询结果为所述用户信息对应的云端备份数据的数据标识中,存在至少一条所述初始数据标识,则将所述存在所述初始数据标识的云端数据作为待还原数据;If the second query result is that there is at least one of the initial data identifiers in the data identifiers of the cloud backup data corresponding to the user information, then the cloud data with the initial data identifiers is used as the data to be restored;
    将所述待还原数据的数据标识发送给所述客户端,以使所述客户端的用户从所述待还原数据的数据标识中,选取至少一条数据标识作为目标数据的数据标识;Sending the data identification of the data to be restored to the client, so that the user of the client selects at least one data identification from the data identification of the data to be restored as the data identification of the target data;
    接收所述客户端反馈的选取消息,并从所述选取消息获取目标数据的数据标识,并根据所述目标数据的数据标识,从所述待还原数据中确定所述目标数据。Receive the selection message fed back by the client, obtain the data identifier of the target data from the selection message, and determine the target data from the data to be restored according to the data identifier of the target data.
  18. 如权利要求16所述的计算机非易失性可读存储介质,其特征在于,所述用户信息为包含验证码信息的音频信息,所述对所述用户信息进行云端服务器的身份验证,得到身份验证结果包括:The computer non-volatile readable storage medium of claim 16, wherein the user information is audio information including verification code information, and the user information is authenticated by a cloud server to obtain the identity The verification results include:
    对所述音频信息进行声纹提取,得到目标声纹信息;Performing voiceprint extraction on the audio information to obtain target voiceprint information;
    将所述目标声纹信息与每个预设的客户端的用户声纹信息进行对比验证,得到第一验证结果;Comparing and verifying the target voiceprint information with the user voiceprint information of each preset client terminal to obtain a first verification result;
    采用语音转换文本的方式,对所述音频信息进行转换,得到目标文本;Convert the audio information by means of voice-to-text to obtain the target text;
    对所述目标文本进行解析,得到当前验证码;Parse the target text to obtain the current verification code;
    对所述当前验证码进行合法性验证,得到第二验证结果;Performing legality verification on the current verification code to obtain a second verification result;
    若所述第一验证结果和所述第二验证结果均为验证通过,则确认所述身份验证结果为验证通过。If the first verification result and the second verification result are both verified, it is confirmed that the identity verification result is verified.
  19. 如权利要求16所述的计算机非易失性可读存储介质,其特征在于,在所述接收所述客户端反馈的第一查询结果之后,还包括:15. The computer non-volatile readable storage medium according to claim 16, wherein after said receiving the first query result fed back by the client terminal, the method further comprises:
    若所述第一查询结果为在所述客户端的存储介质中,查询到所述初始数据标识对应的存储路径,则向所述客户端发送数据还原指令,以使所述客户端根据所述数据还原指令执行修改所述存储路径的删除标志和建立文件索引的动作。If the first query result is that the storage path corresponding to the initial data identifier is queried in the storage medium of the client, then a data restoration instruction is sent to the client, so that the client can use the data The restore instruction executes the actions of modifying the deletion flag of the storage path and establishing the file index.
  20. 如权利要求16所述的计算机非易失性可读存储介质,其特征在于,在所述若接收到客户端发送的数据还原请求,则获取所述数据还原请求中包含的初始数据标识之前,还包括:The computer non-volatile readable storage medium according to claim 16, wherein, before the data restoration request sent by the client is received, the initial data identifier included in the data restoration request is obtained, Also includes:
    通过预设同步方式,从所述客户端获取更新数据文件和所述客户端的用户信息,其中,所述更新数据在所述云端服务器对应有原始备份数据;Obtain the updated data file and the user information of the client from the client through a preset synchronization method, wherein the updated data corresponds to the original backup data on the cloud server;
    将所述更新数据文件同步到所述更新数据文件对应的原始备份数据中,得到所述用户信息对应的备份数据,并对所述用户信息对应的备份数据进行加密处理,得到所述用户信息对应的目标密钥和所述用户信息对应的云端数据;The update data file is synchronized to the original backup data corresponding to the update data file to obtain the backup data corresponding to the user information, and the backup data corresponding to the user information is encrypted to obtain the user information corresponding The target key of and the cloud data corresponding to the user information;
    将所述用户信息对应的云端数据存储到所述云端服务器中。The cloud data corresponding to the user information is stored in the cloud server.
PCT/CN2019/117247 2019-09-24 2019-11-11 Method and device for data restoration, computer device, and storage medium WO2021056726A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910902027.2 2019-09-24
CN201910902027.2A CN110865905A (en) 2019-09-24 2019-09-24 Data restoration method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2021056726A1 true WO2021056726A1 (en) 2021-04-01

Family

ID=69652076

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117247 WO2021056726A1 (en) 2019-09-24 2019-11-11 Method and device for data restoration, computer device, and storage medium

Country Status (2)

Country Link
CN (1) CN110865905A (en)
WO (1) WO2021056726A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734409A (en) * 2020-12-28 2021-04-30 中金数据(武汉)超算技术有限公司 Numerical value transfer statistical method and device based on private virtual resources
CN112685064B (en) * 2020-12-30 2024-03-22 南京擎盾信息科技有限公司 Processing method and device for equipment identification, storage medium and electronic device
CN113420050B (en) * 2021-06-28 2023-08-25 深圳华科讯通科技有限公司 Data query management method, device, computer equipment and readable storage medium
CN113572860B (en) * 2021-09-27 2022-01-25 广东电网有限责任公司 Method and device for tracking leaked data, storage system, equipment and storage medium
CN115509810B (en) * 2022-09-26 2024-04-05 广东保伦电子股份有限公司 Remote backup method and device for cloud data
CN116361860B (en) * 2022-12-27 2024-02-09 深圳市网新新思软件有限公司 Information storage and verification method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102810138A (en) * 2012-06-19 2012-12-05 北京奇虎科技有限公司 Method and system for restoring files of clients
CN105593839A (en) * 2013-12-17 2016-05-18 日立数据系统公司 Distributed disaster recovery file sync server system
CN106095624A (en) * 2016-06-28 2016-11-09 北京金山安全软件有限公司 Data recovery method and device, terminal equipment and server
US20170242871A1 (en) * 2016-02-18 2017-08-24 Commvault Systems, Inc. Data restoration operations based on network path information
CN107506265A (en) * 2017-08-30 2017-12-22 安徽天达网络科技有限公司 A kind of backup of otherness telefile and recovery system based on internet

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364192A (en) * 2007-08-09 2009-02-11 英华达(上海)电子有限公司 Recovery method and system after data being cancelled by mistake and electronic appliance
CN102915263B (en) * 2012-10-19 2016-05-11 小米科技有限责任公司 A kind of data back up method, system and equipment
CN104301382A (en) * 2014-09-03 2015-01-21 惠州Tcl移动通信有限公司 Cloud data backup and recovery method
CN105657056A (en) * 2016-03-15 2016-06-08 成都爆米花信息技术有限公司 Automatic cloud disc backing-up method
CN109857999A (en) * 2018-12-30 2019-06-07 广东一一五科技股份有限公司 A kind of document drafts store method, device, electronic equipment and storage medium
CN109739815B (en) * 2019-01-10 2021-08-17 北京达佳互联信息技术有限公司 File processing method, system, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102810138A (en) * 2012-06-19 2012-12-05 北京奇虎科技有限公司 Method and system for restoring files of clients
CN105593839A (en) * 2013-12-17 2016-05-18 日立数据系统公司 Distributed disaster recovery file sync server system
US20170242871A1 (en) * 2016-02-18 2017-08-24 Commvault Systems, Inc. Data restoration operations based on network path information
CN106095624A (en) * 2016-06-28 2016-11-09 北京金山安全软件有限公司 Data recovery method and device, terminal equipment and server
CN107506265A (en) * 2017-08-30 2017-12-22 安徽天达网络科技有限公司 A kind of backup of otherness telefile and recovery system based on internet

Also Published As

Publication number Publication date
CN110865905A (en) 2020-03-06

Similar Documents

Publication Publication Date Title
WO2021056726A1 (en) Method and device for data restoration, computer device, and storage medium
CN109361517B (en) Virtualized cloud password machine system based on cloud computing and implementation method thereof
WO2020237868A1 (en) Data transmission method, electronic device, server and storage medium
US8392709B1 (en) System and method for a single request—single response protocol with mutual replay attack protection
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
EP3146744B1 (en) Method, apparatus, and system for providing a security check
WO2018049940A1 (en) Network access method, related device and system
JP5711840B1 (en) Kernel program, method and apparatus incorporating relational database
US9781109B2 (en) Method, terminal device, and network device for improving information security
WO2019134361A1 (en) Method and device for calling an interface and responding to an interface call, electronic device, and medium
KR20190031989A (en) System and method for processing electronic contracts based on blockchain
US20180294965A1 (en) Apparatus, method and computer program product for authentication
CN109474583B (en) Data security management system
US20200213331A1 (en) Data service system
JP2018207433A (en) Computer system, verification method of confidential information, and computing machine
CN114500054A (en) Service access method, service access device, electronic device, and storage medium
WO2022042198A1 (en) Identity authentication method and apparatus, computer device, and storage medium
WO2015179640A1 (en) Method, apparatus, and system for providing a security check
CN114615031A (en) File storage method and device, electronic equipment and storage medium
US8751819B1 (en) Systems and methods for encoding data
CN113992432A (en) Message processing method, message bus system, computer device, and storage medium
WO2020044095A1 (en) File encryption method and apparatus, device, terminal, server, and computer-readable storage medium
US11893105B2 (en) Generating and validating activation codes without data persistence
KR101593675B1 (en) User data integrity verification method and apparatus
CN111327680A (en) Authentication data synchronization method, device, system, computer equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19946533

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19946533

Country of ref document: EP

Kind code of ref document: A1