CN102915263A - Data backup method, system and equipment - Google Patents
Data backup method, system and equipment Download PDFInfo
- Publication number
- CN102915263A CN102915263A CN2012104014606A CN201210401460A CN102915263A CN 102915263 A CN102915263 A CN 102915263A CN 2012104014606 A CN2012104014606 A CN 2012104014606A CN 201210401460 A CN201210401460 A CN 201210401460A CN 102915263 A CN102915263 A CN 102915263A
- Authority
- CN
- China
- Prior art keywords
- key
- backed
- data
- ciphertext
- obtains
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a data backup method, a data backup system and data backup equipment. The data backup method comprises the following steps of: acquiring data to be backed up; encrypting the data to be backed up by virtue of a key acquired in advance, thus obtaining a cipher text; and storing the cipher text to a storage card, wherein the key acquired in advance is stored in a position with preset authority access. According to the invention, the data to be backed up is encrypted by the key acquired in advance, and encrypted backup files are stored in the storage card; the key is stored in the position with the preset authority access, so that a third application program without authority cannot acquire the key, and the data to be backed up cannot be decrypted; and therefore, the safety of the backup data is improved.
Description
Technical field
The present invention relates to technical field of information processing, more specifically, relate to a kind of data back up method, system and equipment.
Background technology
Existing portable terminal (such as mobile phone, panel computer etc.) is because intelligent degree is more and more higher, therefore has increasing function, therefore, a large amount of data have also been stored in the portable terminal, comprise the files such as photo that the user stores, document, and address list, note, mail, for data such as arranging of mobile phone, these data are extremely important for the user, yet, owing to the existence of the labile factors such as brush machine, factory reset operation, mobile phone viruses, malicious application, the situation of user data loss, loss may occur.
The existing method that prevents that user data from losing is the software that has backup functionality by installation, extract the data that the user need to back up, with the Backup Data copying and saving in the storage card of portable terminal, carrying out data for the user recovers, storage card for example comprises SD card (Secure Digital Memory Card, safe digital card), TF card (Trans Flash Card is called again micro SD Card), mmc card (Multimedia Card, multimedia card).
In existing mobile terminal operating system (for example Android operating system), when third party application is installed, the general storage card authority that all can give third party application access portable terminal, third party application can read the content in the storage card like this.Therefore, the situation of third party application Backup Data of calling party in without the situation of subscriber authorisation may occur, cause the leakage of Backup Data, affect the security of user data.
Summary of the invention
The proposition of the embodiment of the invention a kind of data back up method, system and equipment, the security that can improve Backup Data.
In order to achieve the above object, the embodiment of the invention proposes a kind of data back up method, may further comprise the steps:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
The embodiment of the invention is by using data to be backed up the secret key encryption of obtaining in advance, and the backup file of encrypting is kept in the storage card, because key storage is in the position that needs the default access access, therefore, the third party application that does not have authority can't obtain key, can't decipher and obtain data to be backed up, thus the security that improves Backup Data.
Preferred as technique scheme, the key that described use is obtained in advance is encrypted before the step that obtains ciphertext described data to be backed up, and described method also comprises:
From the key of the described position reading pre-stored that needs default access access as the described key that obtains in advance; Or be that described data to be backed up generate key as the described key that obtains in advance.
This programme provides the possibility that obtains key.
Preferred as technique scheme is that described data to be backed up generate key, adopts following arbitrary mode:
Unique identification according to portable terminal is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
This programme provides the optional mode that generates key.
Preferred as technique scheme, described to need the position of default access access be the default store path of portable terminal this locality.The position of this programme default access access is set to the default store path of portable terminal this locality, can realize need not the safely encrypted backup file of just networking.
Preferred as technique scheme uses the key that obtains in advance that described data to be backed up are encrypted after the step that obtains ciphertext, and described method also comprises:
Described key is sent to server, also be key identification corresponding to described encryption key distribution so that described server is preserved described key;
Receive the key identification that described server sends;
The local described key of preserving of deletion.
This programme be in fact with key storage to server, improved key safety, thereby further improved the security of Backup Data.
Preferred as technique scheme describedly is stored in described ciphertext in the storage card, in the following way: described key identification and described ciphertext are stored in the storage card.
Preferred as technique scheme describedly is stored in described key identification and described ciphertext backup file after the step in the storage card, and described method also comprises:
Read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
This programme has further provided the method for the Backup Data deciphering that will encrypt, and the method can't not obtain Backup Data so that do not have third party's application or other users of authority.
The embodiment of the invention also proposes a kind of data backup system, comprising: portable terminal;
Described portable terminal comprises:
Acquisition module is used for obtaining data to be backed up;
Encrypting module is used for using the key that obtains in advance that described data to be backed up are encrypted and obtains ciphertext;
Memory module is used for described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferred as technique scheme, described portable terminal also comprises:
Key Acquisition Module is used for key from the described position reading pre-stored that needs the default access access as the described key that obtains in advance, or, for described data to be backed up generate key as the described key that obtains in advance.
Preferred as technique scheme, described encrypting module is used for:
Unique identification according to portable terminal is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Preferred as technique scheme, described to need the position of default access access be the default store path of portable terminal this locality.
Preferred as technique scheme, described system also comprises server;
Described portable terminal also comprises:
The first sending module is used for after described encrypting module uses the key that obtains in advance that described data to be backed up are encrypted to obtain ciphertext described key being sent to described server;
The first receiver module is used for receiving the key identification that described server sends;
The first processing module is used for the local described key of preserving of deletion;
Described server comprises:
The second receiver module is used for the key that mobile terminal receive sends;
The second processing module is used to key identification corresponding to described encryption key distribution;
The second sending module is used for described key identification is sent to described portable terminal.
Preferred as technique scheme, described memory module is used for:
Described key identification and described ciphertext are stored in the storage card.
Preferred as technique scheme, described portable terminal also comprises:
The 3rd sending module is used for reading described key identification, and sends to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
The 3rd receiver module is used for receiving key corresponding to described key identification that described server returns;
Deciphering module is used for using key corresponding to described key identification that described ciphertext is decrypted, and obtains data to be backed up;
Described server also comprises:
The 4th receiver module is used for the key identification that mobile terminal receive sends;
The 4th sending module is used for key behind the described key identification authentication success that described key identification is corresponding is sent to described portable terminal.
The embodiment of the invention also proposes a kind of equipment, and described equipment comprises:
One or more processors;
Storer; With
One or more modules, described one or more module stores are in described storer and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
The further feature of the embodiment of the invention and advantage will be set forth in the following description, and, partly from instructions, become apparent, perhaps understand by implementing the embodiment of the invention.The purpose of the embodiment of the invention and other advantages can realize and obtain by specifically noted structure in the instructions of writing, claims and accompanying drawing.
Below by drawings and Examples, the technical scheme of the embodiment of the invention is described in further detail.
Description of drawings
Accompanying drawing is used to provide the further understanding to the embodiment of the invention, and consists of the part of instructions, is used for together with embodiments of the present invention explaining the present invention, does not consist of the restriction to the embodiment of the invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of the data back up method of preferred embodiment of the present invention proposition;
Fig. 2 is the process flow diagram of the data back up method of the present invention's one specific embodiment proposition;
Fig. 3 is the process flow diagram of the data restoration method of another specific embodiment proposition of the present invention;
Fig. 4 is the process flow diagram of the data back up method of another specific embodiment proposition of the present invention;
Fig. 5 is the process flow diagram of the data restoration method of the another specific embodiment proposition of the present invention;
Fig. 6 is the structural representation of the data backup system of preferred embodiment of the present invention proposition;
Fig. 7 is the structural representation of the data backup system of the present invention's one specific embodiment proposition.
Embodiment
Below in conjunction with accompanying drawing the embodiment of the invention is described, should be appreciated that embodiment described herein only is used for the description and interpretation embodiment of the invention, is not intended to limit the present invention embodiment.
Be illustrated in figure 1 as a kind of data back up method that the preferred embodiment of the present invention proposes, comprise:
Step S11: obtain data to be backed up;
Step S12: use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Step S13: described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
The embodiment of the invention is by using data to be backed up the secret key encryption of obtaining in advance, and the backup file of encrypting is kept in the storage card, because key storage is in the position that needs the default access access, therefore, the third party application that does not have authority can't obtain key, can't decipher and obtain data to be backed up, thus the security that improves Backup Data.
As shown in Figure 2, present embodiment provides a kind of data back up method, is another preferred embodiment that the embodiment of the invention provides, and in this embodiment, take mobile phone as example, may further comprise the steps:
Step S21: the user opens the backup tool in the mobile phone.
Backup tool in the mobile phone can be the function that carries in the mobile phone, also the application program of user installation.
Step S22: user right is verified.
For example, judge by the method that password is set whether the user can open this backup tool.
Particularly, when the user opens backup tool, need the user to input correct password, only have the user to input correct password, think that just the user can use this backup tool.
Step S23: the user plays backup request by verifying rear selection Data Concurrent to be backed up.
Step S24: obtain key S according to this backup request.
This key S can be formed and stored in the position that needs the default access access in advance, for example is stored in the storer of mobile phone, when the user initiates backup request, needs the position of default access access to read key from this.
Wherein, the storer of mobile phone includes but not limited to EEPROM (Electrically Erasable Programmable Read Only Memo) (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash memory (Flash) etc.; This memory location only has ROOT(computer realm term, in Unix system and class unix system and Android, the general called after root of the power user of system, root is power user unique in the system, has authorities all in the system, as start or stop a process, deletion or increase user, increasing or forbidding hardware etc.) authority is just addressable, other third party applications can't be accessed, user with ROOT authority is power user unique in the mobile phone operating system, has authorities all in the system, can access and revise the file in the mobile phone.
This key S generates in real time.
Wherein, the mode that generates key can adopt the following any mode that includes but not limited to:
Unique identification according to portable terminal is that described data to be backed up generate key, and this mode is the same key of the backup setting of same terminal; Perhaps using default Generating Random Number is that described data to be backed up generate key, and this mode all can generate a key S at random for backup request each time, to increase security; The time of perhaps sending the instruction that described data to be backed up are backed up according to the user is that described data to be backed up generate key, and this mode is chosen time factor with time correlation as the basis that generates key S, to guarantee the randomness of S.
The generation method that those skilled in the art will appreciate that key S can be used the technology of any one existing generation key, is not construed as limiting in the present embodiment.
Step S25: the data to be backed up of user selection are packed obtains packet to be backed up.
Here, some Backup Datas of user selection can be compressed into a packet, wherein, needing the data of backup can be the application program of note, message registration, note, calendar item, installation and data wherein and for the parameters of system or software etc.
Step S26: use key S to treat backup data package and be encrypted and obtain ciphertext, the backup file that this ciphertext is namely encrypted.
Step S27: this ciphertext is stored to the storage card of mobile phone, key S is stored to the default store path of mobile phone this locality.
The default store path of this mobile phone this locality is default to be the position that needs default access to access in mobile phone this locality, is the storer of mobile phone in the present embodiment, and user or third party that this memory location only has the ROOT authority use just addressable.
Preferably, when ciphertext being stored in the storage card of mobile phone, also be included as the process that backup file distributes title, distribute title method can for: the time according to current backup is distributed title, or distributes title according to current backup number of times.
The embodiment of the data restoration method corresponding with above-mentioned data back up method comprises as shown in Figure 3:
Step S31: the user opens the backup tool in the mobile phone.
Step S32: the user inputs password to carry out Authority Verification.
For example, judge by the method that password is set whether the user can open this backup tool.
Particularly, when the user opens backup tool, need the user to input correct password, only have the user to input correct password, think that just the user can use this backup tool.
Step S33: the user is by the rear initiation of checking data reduction request, and selecting ciphertext is the backup file of encrypting before.
Step S34: whether authentication of users has the ROOT authority, if continue execution in step S35; If not, then finish.
Step S35: the corresponding key S of ciphertext that from the storer of mobile phone, reads user selection.
Step S36: use key S to ciphertext be decrypted, decompressing obtains Backup Data.
Present embodiment is with the default store path of key storage to portable terminal this locality; be in the storer of mobile phone; this storage space only has the user with ROOT authority just can access; also be; the user or the third party application that only have the ROOT authority just can obtain this key; therefore this key can be protected well, and the security of Backup Data also improves greatly.
As shown in Figure 4, another specific embodiment provides a kind of data back up method, is another preferred embodiment that the embodiment of the invention provides, and in this embodiment, take panel computer as example, may further comprise the steps:
Step S41: the user obtains primary account number by applying for the registration of to server.
Wherein, primary account number is community's account alternatively, is specifically as follows cell-phone number, mailbox, the pet name etc., and each main account is provided with corresponding password, need to be by the cipher authentication of server when the user logins.
Step S42: the user is by the primary account number game server.
Step S43: the user initiates backup request by the backup tool in the panel computer, and selects data to be backed up.
Step S44: generate a random cipher as key S according to this backup request.
Step S45: the data to be backed up of user selection are compressed be packaged into packet to be backed up.
Step S46: use key S to treat backup data package and be encrypted, the backup file that obtains encrypting is ciphertext.
Step S47: key S is sent to server.
Preferably, can select escape way during transmission, for example Secure Hypertext Transfer Protocol (Hypertext Transfer Protocol over Secure Socket Layer, https).
Step S48: after server is received key S, generate a pair of key that can be used for asymmetric arithmetic pair: PKI PK and private key SK.
Step S49: server is this key pair primary account number, key S association store with the user, and the PKI PK of cipher key pair is sent to terminal.
Step S410: terminal is with PK and ciphertext association store, and the key S of the local storage of deletion.
Particularly, PK and ciphertext can be kept in the file, also can be packaged as a file storage.
As the second preferred embodiment, in step S410 can also for:
Terminal uses PK that PKI is encrypted, and preserves the key S after encrypting, deletion key S expressly.
The embodiment of the data restoration method corresponding with above-mentioned data back up method comprises as shown in Figure 5:
Step S51: the user is by the primary account number game server.
Step S52: the user initiates the request of reduction backup by the backup tool in the panel computer, and the backup file of selecting ciphertext to encrypt namely.
Step S53: obtain the PKI PK with this ciphertext association store, and PK is sent to server.
For the second embodiment among the step S410, this step S53 also comprises:
Key S after the PK encryption that uses public-key is sent to server.
Step S54: server verifies whether have the authority of obtaining key S to judge this user to PK, if, execution in step S55.
Preferably, server method that PK is verified can be in the following way:
Step S541: server expressly uses the PK that receives to be encrypted with any one section, obtains ciphertext.
Step S542: the private key SK of whois lookup and this user's primary account number association store, use this SK that above-mentioned ciphertext is decrypted, if can access original plaintext, then the explanation checking is legal.
Step S55: the key S of whois lookup and this PKI PK association store, and S is sent to terminal; Preferably, when sending S, can select escape way, for example use https.
For the second embodiment among the step S410, this step S55 can replace with:
Server uses the private key S corresponding with this PKI PK that the key S after encrypting is decrypted, and obtains key S expressly, and sends to terminal.
Step S56: use S to ciphertext be decrypted, decompressing obtains Backup Data.
Present embodiment is that key storage is extremely carried out will obtaining this key in the server of authentication to the user, at first will carry out authentication to the user; secondly, verify the PKI that the user provides, therefore; can protect well this key, thereby improve the security of Backup Data.
The embodiment of the invention also proposes a kind of data backup system, and as shown in Figure 6, this data backup system comprises: portable terminal 700;
Described portable terminal 700 comprises:
Encrypting module 702 is used for using the key that obtains in advance that described data to be backed up are encrypted and obtains ciphertext;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferably, portable terminal 700 also comprises:
Key Acquisition Module is used for key from the described position reading pre-stored that needs the default access access as the described key that obtains in advance, or, for described data to be backed up generate key as the described key that obtains in advance.
Preferably, encrypting module 702 is used for:
Unique identification according to portable terminal is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Wherein, the described location optimization that needs default access to access is the default store path of portable terminal this locality.
As shown in Figure 7, described system also comprises server 800;
The first sending module 705 is used for after described encrypting module uses the key that obtains in advance that described data to be backed up are encrypted to obtain ciphertext described key being sent to described server;
The first receiver module 706 is used for receiving the key identification that described server sends;
The first processing module 707 is used for the local described key of preserving of deletion;
The second receiver module 801 is used for the key that mobile terminal receive sends;
The second processing module 802 is used to key identification corresponding to described encryption key distribution;
The second sending module 803 is used for described key identification is sent to described portable terminal.
Preferably, memory module 703 is used for: described key identification and described ciphertext are stored in storage card.
Preferably, portable terminal 700 also comprises:
The 3rd sending module is used for reading described key identification, and sends to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
The 3rd receiver module is used for receiving key corresponding to described key identification that described server returns;
Deciphering module is used for using key corresponding to described key identification that described ciphertext is decrypted, and obtains data to be backed up;
Described server 800 also comprises:
The 4th receiver module is used for the key identification that mobile terminal receive sends;
The 4th sending module is used for key behind the described key identification authentication success that described key identification is corresponding is sent to described portable terminal.
The embodiment of the invention also proposes a kind of equipment, and described equipment comprises:
One or more processors;
Storer; With
One or more modules (programs), described one or more module stores are in described storer and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferably, described one or more module can also comprise following function:
Before using the key obtain in advance that described data to be backed up are encrypted to obtain ciphertext, from the key of the described position reading pre-stored that needs the default access access as the described key that obtains in advance; Or, for described data to be backed up generate key as the described key that obtains in advance.
Preferably, the key that described use is obtained in advance is encrypted described data to be backed up and obtains ciphertext, in the following way:
Unique identification according to described equipment is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Preferably, the described position that needs default access to access is the default store path of described storer.
Preferably, described one or more module can also comprise following function:
The key that described use is obtained in advance described data to be backed up are encrypted obtain ciphertext after, described key is sent to server, so that described server is preserved described key and for key identification corresponding to described encryption key distribution;
Receive the key identification that described server sends;
Delete the described key that described equipment is preserved.
Preferably, described described ciphertext is stored to storage card with described equipment connection, in the following way:
Described key identification and described ciphertext are stored in the storage card with described equipment connection.
Preferably, described one or more module can also comprise following function:
After in the described storage card that described key identification and described ciphertext backup file is stored in described equipment connection, read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
In addition, present embodiment also provides a kind of non-volatile readable storage medium, store one or more modules (programs) in this storage medium, when these one or more modules are used in the equipment with one or more processors, can be so that this equipment be carried out the instruction (instructions) of following steps:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferably, described one or more module is all right so that this equipment is carried out the instruction of following steps:
Before using the key obtain in advance that described data to be backed up are encrypted to obtain ciphertext, from the key of the described position reading pre-stored that needs the default access access as the described key that obtains in advance; Or, for described data to be backed up generate key as the described key that obtains in advance.
Preferably, the key that described use is obtained in advance is encrypted described data to be backed up and obtains ciphertext, in the following way:
Unique identification according to described equipment is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Preferably, the described position that needs default access to access is the default store path of described storer.
Preferably, described one or more module is all right so that this equipment is carried out the instruction of following steps:
The key that described use is obtained in advance described data to be backed up are encrypted obtain ciphertext after, described key is sent to server, so that described server is preserved described key and for key identification corresponding to described encryption key distribution;
Receive the key identification that described server sends;
Delete the described key that described equipment is preserved.
Preferably, described described ciphertext is stored to storage card with described equipment connection, in the following way:
Described key identification and described ciphertext are stored in the storage card with described equipment connection.
Preferably, described one or more module is all right so that this equipment is carried out the instruction of following steps:
After in the described storage card that described key identification and described ciphertext backup file is stored in described equipment connection, read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
Those skilled in the art should understand that embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, complete implement software example or in conjunction with the form of the embodiment of software and hardware aspect.And the present invention can adopt the form of the computer program of implementing in one or more computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) that wherein include computer usable program code.
The present invention is that reference is described according to process flow diagram and/or the block scheme of method, equipment (system) and the computer program of the embodiment of the invention.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or the block scheme and/or square frame and process flow diagram and/or the block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device producing a machine, so that the instruction of carrying out by the processor of computing machine or other programmable data processing device produces the device of the function that is used for being implemented in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, so that the instruction that is stored in this computer-readable memory produces the manufacture that comprises command device, this command device is implemented in the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame.
These computer program instructions also can be loaded on computing machine or other programmable data processing device, so that carry out the sequence of operations step producing computer implemented processing at computing machine or other programmable devices, thereby be provided for being implemented in the step of the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame in the instruction that computing machine or other programmable devices are carried out.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.
Claims (15)
1. a data back up method is characterized in that, may further comprise the steps:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
2. method according to claim 1 is characterized in that, the key that described use is obtained in advance is encrypted before the step that obtains ciphertext described data to be backed up, and described method also comprises:
From the key of the described position reading pre-stored that needs default access access as the described key that obtains in advance; Or,
For described data to be backed up generate key as the described key that obtains in advance.
3. method according to claim 2 is characterized in that, for described data to be backed up generate key, adopts following arbitrary mode:
Unique identification according to portable terminal is that described data to be backed up generate key; Or,
Using default Generating Random Number is that described data to be backed up generate key; Or,
The time of sending the instruction that described data to be backed up are backed up according to the user is that described data to be backed up generate key.
4. method according to claim 1 is characterized in that, the described position that needs default access to access is the default store path of portable terminal this locality.
5. method according to claim 1 is characterized in that, the key that use is obtained in advance is encrypted after the step that obtains ciphertext described data to be backed up, and described method also comprises:
Described key is sent to server, also be key identification corresponding to described encryption key distribution so that described server is preserved described key;
Receive the key identification that described server sends;
The local described key of preserving of deletion.
6. method according to claim 5 is characterized in that, described described ciphertext is stored in the storage card, in the following way:
Described key identification and described ciphertext are stored in the storage card.
7. method according to claim 6 is characterized in that, described described key identification and described ciphertext backup file is stored in after the step in the storage card, and described method also comprises:
Read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
8. a data backup system is characterized in that, comprising: portable terminal;
Described portable terminal comprises:
Acquisition module is used for obtaining data to be backed up;
Encrypting module is used for using the key that obtains in advance that described data to be backed up are encrypted and obtains ciphertext;
Memory module is used for described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
9. system according to claim 8 is characterized in that, described portable terminal also comprises:
Key Acquisition Module is used for key from the described position reading pre-stored that needs the default access access as the described key that obtains in advance, or, for described data to be backed up generate key as the described key that obtains in advance.
10. system according to claim 9 is characterized in that, described encrypting module is used for:
Unique identification according to portable terminal is that described data to be backed up generate key; Or,
Using default Generating Random Number is that described data to be backed up generate key; Or,
The time of sending the instruction that described data to be backed up are backed up according to the user is that described data to be backed up generate key.
11. system according to claim 8 is characterized in that, the described position that needs default access to access is the default store path of portable terminal this locality.
12. system according to claim 8 is characterized in that, described system also comprises server;
Described portable terminal also comprises:
The first sending module is used for after described encrypting module uses the key that obtains in advance that described data to be backed up are encrypted to obtain ciphertext described key being sent to described server;
The first receiver module is used for receiving the key identification that described server sends;
The first processing module is used for the local described key of preserving of deletion;
Described server comprises:
The second receiver module is used for the key that mobile terminal receive sends;
The second processing module is used to key identification corresponding to described encryption key distribution;
The second sending module is used for described key identification is sent to described portable terminal.
13. system according to claim 12 is characterized in that, described memory module is used for:
Described key identification and described ciphertext are stored in the storage card.
14. system according to claim 13 is characterized in that, described portable terminal also comprises:
The 3rd sending module is used for reading described key identification, and sends to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
The 3rd receiver module is used for receiving key corresponding to described key identification that described server returns;
Deciphering module is used for using key corresponding to described key identification that described ciphertext is decrypted, and obtains data to be backed up;
Described server also comprises:
The 4th receiver module is used for the key identification that mobile terminal receive sends;
The 4th sending module is used for key behind the described key identification authentication success that described key identification is corresponding is sent to described portable terminal.
15. an equipment is characterized in that, described equipment comprises:
One or more processors;
Storer; With
One or more modules, described one or more module stores are in described storer and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210401460.6A CN102915263B (en) | 2012-10-19 | 2012-10-19 | A kind of data back up method, system and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210401460.6A CN102915263B (en) | 2012-10-19 | 2012-10-19 | A kind of data back up method, system and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102915263A true CN102915263A (en) | 2013-02-06 |
CN102915263B CN102915263B (en) | 2016-05-11 |
Family
ID=47613636
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210401460.6A Active CN102915263B (en) | 2012-10-19 | 2012-10-19 | A kind of data back up method, system and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102915263B (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103176864A (en) * | 2013-03-11 | 2013-06-26 | 广东欧珀移动通信有限公司 | Backup method, backup device and mobile terminal based on Android system |
CN103617005A (en) * | 2013-11-28 | 2014-03-05 | 中国联合网络通信集团有限公司 | Access method, device and system for intelligent card |
CN104144174A (en) * | 2013-05-06 | 2014-11-12 | 华为技术有限公司 | Method for protecting user private data, user equipment and server |
CN104699559A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Distributed data backup method and system |
WO2015090155A1 (en) * | 2013-12-17 | 2015-06-25 | 北京网秦天下科技有限公司 | Mobile terminal and method |
CN105071927A (en) * | 2015-07-17 | 2015-11-18 | 上海众人网络安全技术有限公司 | Mobile device data local storage method |
CN105843701A (en) * | 2015-01-14 | 2016-08-10 | 小米科技有限责任公司 | Data backup method and device |
CN106357678A (en) * | 2016-10-24 | 2017-01-25 | 宇龙计算机通信科技(深圳)有限公司 | Cloud encryption storage method for intelligent terminal and intelligent terminal |
CN107025408A (en) * | 2017-03-29 | 2017-08-08 | 宁夏宁信信息科技有限公司 | Mobile hard disk key generation method and system based on cloud platform verification technique |
CN107102913A (en) * | 2017-04-01 | 2017-08-29 | 广东欧珀移动通信有限公司 | Data back up method, device and computer equipment |
CN107273725A (en) * | 2017-05-14 | 2017-10-20 | 四川盛世天成信息技术有限公司 | A kind of data back up method and system for classified information |
CN107704743A (en) * | 2017-08-23 | 2018-02-16 | 深圳市优品壹电子有限公司 | Device and Related product with data backup function |
CN109240849A (en) * | 2018-08-09 | 2019-01-18 | 苏州市科远软件技术开发有限公司 | Data back up method, device and the multipoint control unit for video conferencing system |
CN109684129A (en) * | 2018-11-20 | 2019-04-26 | 北京深思数盾科技股份有限公司 | Data backup restoration method, storage medium, encryption equipment, client and server |
CN110275801A (en) * | 2019-06-21 | 2019-09-24 | 珠海格力电器股份有限公司 | Data restoration method, device, system, computer equipment and storage medium |
CN110431557A (en) * | 2017-01-09 | 2019-11-08 | 交互数字Ce专利控股公司 | Method and apparatus for executing carrying out safety backup and recovery |
CN110704243A (en) * | 2019-09-25 | 2020-01-17 | Oppo(重庆)智能科技有限公司 | Data recovery method and device, terminal equipment and storage medium |
CN110865905A (en) * | 2019-09-24 | 2020-03-06 | 平安科技(深圳)有限公司 | Data restoration method and device, computer equipment and storage medium |
CN111414628A (en) * | 2019-01-08 | 2020-07-14 | 阿里巴巴集团控股有限公司 | Data storage method and device and computing equipment |
CN112733130A (en) * | 2021-01-18 | 2021-04-30 | 成都质数斯达克科技有限公司 | Account registration method and device, electronic equipment and readable storage medium |
CN113094212A (en) * | 2021-04-30 | 2021-07-09 | 杭州海康威视数字技术股份有限公司 | Video backup method and device and video backup system |
CN114896219A (en) * | 2022-07-15 | 2022-08-12 | 深圳市沃特沃德信息有限公司 | Method and device for storing resource data, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134660A (en) * | 1997-06-30 | 2000-10-17 | Telcordia Technologies, Inc. | Method for revoking computer backup files using cryptographic techniques |
US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
CN1992746A (en) * | 2005-12-28 | 2007-07-04 | 集嘉通讯股份有限公司 | Data backup and reduction method |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN102387209A (en) * | 2011-10-24 | 2012-03-21 | 深圳市智慧宇宙管理咨询有限公司 | System and method for obtaining call information, device and method for sending call information as well as mobile terminal |
CN102662798A (en) * | 2012-04-12 | 2012-09-12 | 青岛海信移动通信技术股份有限公司 | Data recovery method and terminal for Android system |
-
2012
- 2012-10-19 CN CN201210401460.6A patent/CN102915263B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6134660A (en) * | 1997-06-30 | 2000-10-17 | Telcordia Technologies, Inc. | Method for revoking computer backup files using cryptographic techniques |
US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
CN1992746A (en) * | 2005-12-28 | 2007-07-04 | 集嘉通讯股份有限公司 | Data backup and reduction method |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN102387209A (en) * | 2011-10-24 | 2012-03-21 | 深圳市智慧宇宙管理咨询有限公司 | System and method for obtaining call information, device and method for sending call information as well as mobile terminal |
CN102662798A (en) * | 2012-04-12 | 2012-09-12 | 青岛海信移动通信技术股份有限公司 | Data recovery method and terminal for Android system |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103176864A (en) * | 2013-03-11 | 2013-06-26 | 广东欧珀移动通信有限公司 | Backup method, backup device and mobile terminal based on Android system |
CN104144174A (en) * | 2013-05-06 | 2014-11-12 | 华为技术有限公司 | Method for protecting user private data, user equipment and server |
CN104144174B (en) * | 2013-05-06 | 2017-11-24 | 华为技术有限公司 | Protect method, user equipment and the server of privacy of user data |
CN103617005A (en) * | 2013-11-28 | 2014-03-05 | 中国联合网络通信集团有限公司 | Access method, device and system for intelligent card |
CN104699559A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Distributed data backup method and system |
CN104699559B (en) * | 2013-12-04 | 2019-03-26 | 腾讯科技(深圳)有限公司 | Backing up distributed data method and system |
WO2015090155A1 (en) * | 2013-12-17 | 2015-06-25 | 北京网秦天下科技有限公司 | Mobile terminal and method |
CN105843701A (en) * | 2015-01-14 | 2016-08-10 | 小米科技有限责任公司 | Data backup method and device |
CN105071927B (en) * | 2015-07-17 | 2018-12-28 | 上海众人网络安全技术有限公司 | Method is locally stored in a kind of mobile device data |
CN105071927A (en) * | 2015-07-17 | 2015-11-18 | 上海众人网络安全技术有限公司 | Mobile device data local storage method |
CN106357678A (en) * | 2016-10-24 | 2017-01-25 | 宇龙计算机通信科技(深圳)有限公司 | Cloud encryption storage method for intelligent terminal and intelligent terminal |
CN110431557B (en) * | 2017-01-09 | 2023-09-26 | 交互数字麦迪逊专利控股公司 | Method and apparatus for performing secure backup and restore |
CN110431557A (en) * | 2017-01-09 | 2019-11-08 | 交互数字Ce专利控股公司 | Method and apparatus for executing carrying out safety backup and recovery |
CN107025408A (en) * | 2017-03-29 | 2017-08-08 | 宁夏宁信信息科技有限公司 | Mobile hard disk key generation method and system based on cloud platform verification technique |
CN107102913B (en) * | 2017-04-01 | 2019-02-22 | Oppo广东移动通信有限公司 | Data back up method, device and computer equipment |
CN107102913A (en) * | 2017-04-01 | 2017-08-29 | 广东欧珀移动通信有限公司 | Data back up method, device and computer equipment |
CN107273725A (en) * | 2017-05-14 | 2017-10-20 | 四川盛世天成信息技术有限公司 | A kind of data back up method and system for classified information |
CN107273725B (en) * | 2017-05-14 | 2020-07-07 | 四川盛世天成信息技术有限公司 | Data backup method and system for confidential information |
CN107704743A (en) * | 2017-08-23 | 2018-02-16 | 深圳市优品壹电子有限公司 | Device and Related product with data backup function |
CN109240849B (en) * | 2018-08-09 | 2021-05-18 | 苏州市科远软件技术开发有限公司 | Data backup method and device and multipoint control unit for video conference system |
CN109240849A (en) * | 2018-08-09 | 2019-01-18 | 苏州市科远软件技术开发有限公司 | Data back up method, device and the multipoint control unit for video conferencing system |
CN109684129A (en) * | 2018-11-20 | 2019-04-26 | 北京深思数盾科技股份有限公司 | Data backup restoration method, storage medium, encryption equipment, client and server |
CN111414628B (en) * | 2019-01-08 | 2024-01-02 | 阿里巴巴集团控股有限公司 | Data storage method and device and computing equipment |
CN111414628A (en) * | 2019-01-08 | 2020-07-14 | 阿里巴巴集团控股有限公司 | Data storage method and device and computing equipment |
CN110275801A (en) * | 2019-06-21 | 2019-09-24 | 珠海格力电器股份有限公司 | Data restoration method, device, system, computer equipment and storage medium |
CN110865905A (en) * | 2019-09-24 | 2020-03-06 | 平安科技(深圳)有限公司 | Data restoration method and device, computer equipment and storage medium |
CN110704243A (en) * | 2019-09-25 | 2020-01-17 | Oppo(重庆)智能科技有限公司 | Data recovery method and device, terminal equipment and storage medium |
CN112733130A (en) * | 2021-01-18 | 2021-04-30 | 成都质数斯达克科技有限公司 | Account registration method and device, electronic equipment and readable storage medium |
CN112733130B (en) * | 2021-01-18 | 2022-11-29 | 成都质数斯达克科技有限公司 | Account registration method and device, electronic equipment and readable storage medium |
CN113094212A (en) * | 2021-04-30 | 2021-07-09 | 杭州海康威视数字技术股份有限公司 | Video backup method and device and video backup system |
CN113094212B (en) * | 2021-04-30 | 2024-04-02 | 杭州海康威视数字技术股份有限公司 | Video backup method and device and video backup system |
CN114896219A (en) * | 2022-07-15 | 2022-08-12 | 深圳市沃特沃德信息有限公司 | Method and device for storing resource data, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN102915263B (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102915263A (en) | Data backup method, system and equipment | |
CN111191286B (en) | HyperLegger Fabric block chain private data storage and access system and method thereof | |
US10601801B2 (en) | Identity authentication method and apparatus | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN105812332A (en) | Data protection method | |
CN113067699B (en) | Data sharing method and device based on quantum key and computer equipment | |
US8621189B2 (en) | System and method for hardware strengthened passwords | |
CN104123506B (en) | Data access method, device, data encryption, storage and access method, device | |
CN104852925A (en) | Method for leakproof, secure storage and backup of data of mobile smart terminal | |
CN107920052B (en) | Encryption method and intelligent device | |
CN106452770A (en) | Data encryption method and apparatus, data decryption method and apparatus, and system | |
CN108199847B (en) | Digital security processing method, computer device, and storage medium | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN104283668A (en) | Method and device for obtaining application password based on mobile terminal | |
CN105101183A (en) | Method and system for protecting private contents at mobile terminal | |
CN105653986A (en) | Micro SD card-based data protection method and device | |
CN105117635A (en) | Local data security protection system and method | |
CN104468562A (en) | Portable transparent data safety protection terminal oriented to mobile applications | |
WO2014169610A1 (en) | Data encryption and decryption method and device, and protection system of mobile terminal | |
WO2020123926A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
CN102819702A (en) | File encryption operation method and file encryption operation system | |
CN102726028A (en) | Encryption method, decryption method, and corresponding device and system | |
CN104994095A (en) | Equipment authentication method, clients, server and system | |
CN110166403A (en) | A kind of safety method of key and ciphertext separated transmission | |
CN104978542A (en) | Secure data storage and data access method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: 100085 Beijing city Haidian District Qinghe Street No. 68 Huarun colorful city shopping center two floor 13 Applicant after: Xiaomi Technology Co., Ltd. Address before: 100102, No. 50, block B, building No. 12, winding stone world building, Wangjing West Road, Beijing, Chaoyang District Applicant before: Beijing Xiaomi Technology Co., Ltd. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |