CN102915263A - Data backup method, system and equipment - Google Patents

Data backup method, system and equipment Download PDF

Info

Publication number
CN102915263A
CN102915263A CN2012104014606A CN201210401460A CN102915263A CN 102915263 A CN102915263 A CN 102915263A CN 2012104014606 A CN2012104014606 A CN 2012104014606A CN 201210401460 A CN201210401460 A CN 201210401460A CN 102915263 A CN102915263 A CN 102915263A
Authority
CN
China
Prior art keywords
key
backed
data
ciphertext
obtains
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104014606A
Other languages
Chinese (zh)
Other versions
CN102915263B (en
Inventor
万钰臻
孙鹏
林俊琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Original Assignee
Beijing Xiaomi Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Technology Co Ltd filed Critical Beijing Xiaomi Technology Co Ltd
Priority to CN201210401460.6A priority Critical patent/CN102915263B/en
Publication of CN102915263A publication Critical patent/CN102915263A/en
Application granted granted Critical
Publication of CN102915263B publication Critical patent/CN102915263B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a data backup method, a data backup system and data backup equipment. The data backup method comprises the following steps of: acquiring data to be backed up; encrypting the data to be backed up by virtue of a key acquired in advance, thus obtaining a cipher text; and storing the cipher text to a storage card, wherein the key acquired in advance is stored in a position with preset authority access. According to the invention, the data to be backed up is encrypted by the key acquired in advance, and encrypted backup files are stored in the storage card; the key is stored in the position with the preset authority access, so that a third application program without authority cannot acquire the key, and the data to be backed up cannot be decrypted; and therefore, the safety of the backup data is improved.

Description

A kind of data back up method, system and equipment
Technical field
The present invention relates to technical field of information processing, more specifically, relate to a kind of data back up method, system and equipment.
Background technology
Existing portable terminal (such as mobile phone, panel computer etc.) is because intelligent degree is more and more higher, therefore has increasing function, therefore, a large amount of data have also been stored in the portable terminal, comprise the files such as photo that the user stores, document, and address list, note, mail, for data such as arranging of mobile phone, these data are extremely important for the user, yet, owing to the existence of the labile factors such as brush machine, factory reset operation, mobile phone viruses, malicious application, the situation of user data loss, loss may occur.
The existing method that prevents that user data from losing is the software that has backup functionality by installation, extract the data that the user need to back up, with the Backup Data copying and saving in the storage card of portable terminal, carrying out data for the user recovers, storage card for example comprises SD card (Secure Digital Memory Card, safe digital card), TF card (Trans Flash Card is called again micro SD Card), mmc card (Multimedia Card, multimedia card).
In existing mobile terminal operating system (for example Android operating system), when third party application is installed, the general storage card authority that all can give third party application access portable terminal, third party application can read the content in the storage card like this.Therefore, the situation of third party application Backup Data of calling party in without the situation of subscriber authorisation may occur, cause the leakage of Backup Data, affect the security of user data.
Summary of the invention
The proposition of the embodiment of the invention a kind of data back up method, system and equipment, the security that can improve Backup Data.
In order to achieve the above object, the embodiment of the invention proposes a kind of data back up method, may further comprise the steps:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
The embodiment of the invention is by using data to be backed up the secret key encryption of obtaining in advance, and the backup file of encrypting is kept in the storage card, because key storage is in the position that needs the default access access, therefore, the third party application that does not have authority can't obtain key, can't decipher and obtain data to be backed up, thus the security that improves Backup Data.
Preferred as technique scheme, the key that described use is obtained in advance is encrypted before the step that obtains ciphertext described data to be backed up, and described method also comprises:
From the key of the described position reading pre-stored that needs default access access as the described key that obtains in advance; Or be that described data to be backed up generate key as the described key that obtains in advance.
This programme provides the possibility that obtains key.
Preferred as technique scheme is that described data to be backed up generate key, adopts following arbitrary mode:
Unique identification according to portable terminal is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
This programme provides the optional mode that generates key.
Preferred as technique scheme, described to need the position of default access access be the default store path of portable terminal this locality.The position of this programme default access access is set to the default store path of portable terminal this locality, can realize need not the safely encrypted backup file of just networking.
Preferred as technique scheme uses the key that obtains in advance that described data to be backed up are encrypted after the step that obtains ciphertext, and described method also comprises:
Described key is sent to server, also be key identification corresponding to described encryption key distribution so that described server is preserved described key;
Receive the key identification that described server sends;
The local described key of preserving of deletion.
This programme be in fact with key storage to server, improved key safety, thereby further improved the security of Backup Data.
Preferred as technique scheme describedly is stored in described ciphertext in the storage card, in the following way: described key identification and described ciphertext are stored in the storage card.
Preferred as technique scheme describedly is stored in described key identification and described ciphertext backup file after the step in the storage card, and described method also comprises:
Read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
This programme has further provided the method for the Backup Data deciphering that will encrypt, and the method can't not obtain Backup Data so that do not have third party's application or other users of authority.
The embodiment of the invention also proposes a kind of data backup system, comprising: portable terminal;
Described portable terminal comprises:
Acquisition module is used for obtaining data to be backed up;
Encrypting module is used for using the key that obtains in advance that described data to be backed up are encrypted and obtains ciphertext;
Memory module is used for described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferred as technique scheme, described portable terminal also comprises:
Key Acquisition Module is used for key from the described position reading pre-stored that needs the default access access as the described key that obtains in advance, or, for described data to be backed up generate key as the described key that obtains in advance.
Preferred as technique scheme, described encrypting module is used for:
Unique identification according to portable terminal is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Preferred as technique scheme, described to need the position of default access access be the default store path of portable terminal this locality.
Preferred as technique scheme, described system also comprises server;
Described portable terminal also comprises:
The first sending module is used for after described encrypting module uses the key that obtains in advance that described data to be backed up are encrypted to obtain ciphertext described key being sent to described server;
The first receiver module is used for receiving the key identification that described server sends;
The first processing module is used for the local described key of preserving of deletion;
Described server comprises:
The second receiver module is used for the key that mobile terminal receive sends;
The second processing module is used to key identification corresponding to described encryption key distribution;
The second sending module is used for described key identification is sent to described portable terminal.
Preferred as technique scheme, described memory module is used for:
Described key identification and described ciphertext are stored in the storage card.
Preferred as technique scheme, described portable terminal also comprises:
The 3rd sending module is used for reading described key identification, and sends to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
The 3rd receiver module is used for receiving key corresponding to described key identification that described server returns;
Deciphering module is used for using key corresponding to described key identification that described ciphertext is decrypted, and obtains data to be backed up;
Described server also comprises:
The 4th receiver module is used for the key identification that mobile terminal receive sends;
The 4th sending module is used for key behind the described key identification authentication success that described key identification is corresponding is sent to described portable terminal.
The embodiment of the invention also proposes a kind of equipment, and described equipment comprises:
One or more processors;
Storer; With
One or more modules, described one or more module stores are in described storer and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
The further feature of the embodiment of the invention and advantage will be set forth in the following description, and, partly from instructions, become apparent, perhaps understand by implementing the embodiment of the invention.The purpose of the embodiment of the invention and other advantages can realize and obtain by specifically noted structure in the instructions of writing, claims and accompanying drawing.
Below by drawings and Examples, the technical scheme of the embodiment of the invention is described in further detail.
Description of drawings
Accompanying drawing is used to provide the further understanding to the embodiment of the invention, and consists of the part of instructions, is used for together with embodiments of the present invention explaining the present invention, does not consist of the restriction to the embodiment of the invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of the data back up method of preferred embodiment of the present invention proposition;
Fig. 2 is the process flow diagram of the data back up method of the present invention's one specific embodiment proposition;
Fig. 3 is the process flow diagram of the data restoration method of another specific embodiment proposition of the present invention;
Fig. 4 is the process flow diagram of the data back up method of another specific embodiment proposition of the present invention;
Fig. 5 is the process flow diagram of the data restoration method of the another specific embodiment proposition of the present invention;
Fig. 6 is the structural representation of the data backup system of preferred embodiment of the present invention proposition;
Fig. 7 is the structural representation of the data backup system of the present invention's one specific embodiment proposition.
Embodiment
Below in conjunction with accompanying drawing the embodiment of the invention is described, should be appreciated that embodiment described herein only is used for the description and interpretation embodiment of the invention, is not intended to limit the present invention embodiment.
Be illustrated in figure 1 as a kind of data back up method that the preferred embodiment of the present invention proposes, comprise:
Step S11: obtain data to be backed up;
Step S12: use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Step S13: described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
The embodiment of the invention is by using data to be backed up the secret key encryption of obtaining in advance, and the backup file of encrypting is kept in the storage card, because key storage is in the position that needs the default access access, therefore, the third party application that does not have authority can't obtain key, can't decipher and obtain data to be backed up, thus the security that improves Backup Data.
As shown in Figure 2, present embodiment provides a kind of data back up method, is another preferred embodiment that the embodiment of the invention provides, and in this embodiment, take mobile phone as example, may further comprise the steps:
Step S21: the user opens the backup tool in the mobile phone.
Backup tool in the mobile phone can be the function that carries in the mobile phone, also the application program of user installation.
Step S22: user right is verified.
For example, judge by the method that password is set whether the user can open this backup tool.
Particularly, when the user opens backup tool, need the user to input correct password, only have the user to input correct password, think that just the user can use this backup tool.
Step S23: the user plays backup request by verifying rear selection Data Concurrent to be backed up.
Step S24: obtain key S according to this backup request.
This key S can be formed and stored in the position that needs the default access access in advance, for example is stored in the storer of mobile phone, when the user initiates backup request, needs the position of default access access to read key from this.
Wherein, the storer of mobile phone includes but not limited to EEPROM (Electrically Erasable Programmable Read Only Memo) (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash memory (Flash) etc.; This memory location only has ROOT(computer realm term, in Unix system and class unix system and Android, the general called after root of the power user of system, root is power user unique in the system, has authorities all in the system, as start or stop a process, deletion or increase user, increasing or forbidding hardware etc.) authority is just addressable, other third party applications can't be accessed, user with ROOT authority is power user unique in the mobile phone operating system, has authorities all in the system, can access and revise the file in the mobile phone.
This key S generates in real time.
Wherein, the mode that generates key can adopt the following any mode that includes but not limited to:
Unique identification according to portable terminal is that described data to be backed up generate key, and this mode is the same key of the backup setting of same terminal; Perhaps using default Generating Random Number is that described data to be backed up generate key, and this mode all can generate a key S at random for backup request each time, to increase security; The time of perhaps sending the instruction that described data to be backed up are backed up according to the user is that described data to be backed up generate key, and this mode is chosen time factor with time correlation as the basis that generates key S, to guarantee the randomness of S.
The generation method that those skilled in the art will appreciate that key S can be used the technology of any one existing generation key, is not construed as limiting in the present embodiment.
Step S25: the data to be backed up of user selection are packed obtains packet to be backed up.
Here, some Backup Datas of user selection can be compressed into a packet, wherein, needing the data of backup can be the application program of note, message registration, note, calendar item, installation and data wherein and for the parameters of system or software etc.
Step S26: use key S to treat backup data package and be encrypted and obtain ciphertext, the backup file that this ciphertext is namely encrypted.
Step S27: this ciphertext is stored to the storage card of mobile phone, key S is stored to the default store path of mobile phone this locality.
The default store path of this mobile phone this locality is default to be the position that needs default access to access in mobile phone this locality, is the storer of mobile phone in the present embodiment, and user or third party that this memory location only has the ROOT authority use just addressable.
Preferably, when ciphertext being stored in the storage card of mobile phone, also be included as the process that backup file distributes title, distribute title method can for: the time according to current backup is distributed title, or distributes title according to current backup number of times.
The embodiment of the data restoration method corresponding with above-mentioned data back up method comprises as shown in Figure 3:
Step S31: the user opens the backup tool in the mobile phone.
Step S32: the user inputs password to carry out Authority Verification.
For example, judge by the method that password is set whether the user can open this backup tool.
Particularly, when the user opens backup tool, need the user to input correct password, only have the user to input correct password, think that just the user can use this backup tool.
Step S33: the user is by the rear initiation of checking data reduction request, and selecting ciphertext is the backup file of encrypting before.
Step S34: whether authentication of users has the ROOT authority, if continue execution in step S35; If not, then finish.
Step S35: the corresponding key S of ciphertext that from the storer of mobile phone, reads user selection.
Step S36: use key S to ciphertext be decrypted, decompressing obtains Backup Data.
Present embodiment is with the default store path of key storage to portable terminal this locality; be in the storer of mobile phone; this storage space only has the user with ROOT authority just can access; also be; the user or the third party application that only have the ROOT authority just can obtain this key; therefore this key can be protected well, and the security of Backup Data also improves greatly.
As shown in Figure 4, another specific embodiment provides a kind of data back up method, is another preferred embodiment that the embodiment of the invention provides, and in this embodiment, take panel computer as example, may further comprise the steps:
Step S41: the user obtains primary account number by applying for the registration of to server.
Wherein, primary account number is community's account alternatively, is specifically as follows cell-phone number, mailbox, the pet name etc., and each main account is provided with corresponding password, need to be by the cipher authentication of server when the user logins.
Step S42: the user is by the primary account number game server.
Step S43: the user initiates backup request by the backup tool in the panel computer, and selects data to be backed up.
Step S44: generate a random cipher as key S according to this backup request.
Step S45: the data to be backed up of user selection are compressed be packaged into packet to be backed up.
Step S46: use key S to treat backup data package and be encrypted, the backup file that obtains encrypting is ciphertext.
Step S47: key S is sent to server.
Preferably, can select escape way during transmission, for example Secure Hypertext Transfer Protocol (Hypertext Transfer Protocol over Secure Socket Layer, https).
Step S48: after server is received key S, generate a pair of key that can be used for asymmetric arithmetic pair: PKI PK and private key SK.
Step S49: server is this key pair primary account number, key S association store with the user, and the PKI PK of cipher key pair is sent to terminal.
Step S410: terminal is with PK and ciphertext association store, and the key S of the local storage of deletion.
Particularly, PK and ciphertext can be kept in the file, also can be packaged as a file storage.
As the second preferred embodiment, in step S410 can also for:
Terminal uses PK that PKI is encrypted, and preserves the key S after encrypting, deletion key S expressly.
The embodiment of the data restoration method corresponding with above-mentioned data back up method comprises as shown in Figure 5:
Step S51: the user is by the primary account number game server.
Step S52: the user initiates the request of reduction backup by the backup tool in the panel computer, and the backup file of selecting ciphertext to encrypt namely.
Step S53: obtain the PKI PK with this ciphertext association store, and PK is sent to server.
For the second embodiment among the step S410, this step S53 also comprises:
Key S after the PK encryption that uses public-key is sent to server.
Step S54: server verifies whether have the authority of obtaining key S to judge this user to PK, if, execution in step S55.
Preferably, server method that PK is verified can be in the following way:
Step S541: server expressly uses the PK that receives to be encrypted with any one section, obtains ciphertext.
Step S542: the private key SK of whois lookup and this user's primary account number association store, use this SK that above-mentioned ciphertext is decrypted, if can access original plaintext, then the explanation checking is legal.
Step S55: the key S of whois lookup and this PKI PK association store, and S is sent to terminal; Preferably, when sending S, can select escape way, for example use https.
For the second embodiment among the step S410, this step S55 can replace with:
Server uses the private key S corresponding with this PKI PK that the key S after encrypting is decrypted, and obtains key S expressly, and sends to terminal.
Step S56: use S to ciphertext be decrypted, decompressing obtains Backup Data.
Present embodiment is that key storage is extremely carried out will obtaining this key in the server of authentication to the user, at first will carry out authentication to the user; secondly, verify the PKI that the user provides, therefore; can protect well this key, thereby improve the security of Backup Data.
The embodiment of the invention also proposes a kind of data backup system, and as shown in Figure 6, this data backup system comprises: portable terminal 700;
Described portable terminal 700 comprises:
Acquisition module 701 is used for obtaining data to be backed up;
Encrypting module 702 is used for using the key that obtains in advance that described data to be backed up are encrypted and obtains ciphertext;
Memory module 703 is used for described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferably, portable terminal 700 also comprises:
Key Acquisition Module is used for key from the described position reading pre-stored that needs the default access access as the described key that obtains in advance, or, for described data to be backed up generate key as the described key that obtains in advance.
Preferably, encrypting module 702 is used for:
Unique identification according to portable terminal is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Wherein, the described location optimization that needs default access to access is the default store path of portable terminal this locality.
As shown in Figure 7, described system also comprises server 800;
Portable terminal 700 also comprises:
The first sending module 705 is used for after described encrypting module uses the key that obtains in advance that described data to be backed up are encrypted to obtain ciphertext described key being sent to described server;
The first receiver module 706 is used for receiving the key identification that described server sends;
The first processing module 707 is used for the local described key of preserving of deletion;
Server 800 comprises:
The second receiver module 801 is used for the key that mobile terminal receive sends;
The second processing module 802 is used to key identification corresponding to described encryption key distribution;
The second sending module 803 is used for described key identification is sent to described portable terminal.
Preferably, memory module 703 is used for: described key identification and described ciphertext are stored in storage card.
Preferably, portable terminal 700 also comprises:
The 3rd sending module is used for reading described key identification, and sends to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
The 3rd receiver module is used for receiving key corresponding to described key identification that described server returns;
Deciphering module is used for using key corresponding to described key identification that described ciphertext is decrypted, and obtains data to be backed up;
Described server 800 also comprises:
The 4th receiver module is used for the key identification that mobile terminal receive sends;
The 4th sending module is used for key behind the described key identification authentication success that described key identification is corresponding is sent to described portable terminal.
The embodiment of the invention also proposes a kind of equipment, and described equipment comprises:
One or more processors;
Storer; With
One or more modules (programs), described one or more module stores are in described storer and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferably, described one or more module can also comprise following function:
Before using the key obtain in advance that described data to be backed up are encrypted to obtain ciphertext, from the key of the described position reading pre-stored that needs the default access access as the described key that obtains in advance; Or, for described data to be backed up generate key as the described key that obtains in advance.
Preferably, the key that described use is obtained in advance is encrypted described data to be backed up and obtains ciphertext, in the following way:
Unique identification according to described equipment is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Preferably, the described position that needs default access to access is the default store path of described storer.
Preferably, described one or more module can also comprise following function:
The key that described use is obtained in advance described data to be backed up are encrypted obtain ciphertext after, described key is sent to server, so that described server is preserved described key and for key identification corresponding to described encryption key distribution;
Receive the key identification that described server sends;
Delete the described key that described equipment is preserved.
Preferably, described described ciphertext is stored to storage card with described equipment connection, in the following way:
Described key identification and described ciphertext are stored in the storage card with described equipment connection.
Preferably, described one or more module can also comprise following function:
After in the described storage card that described key identification and described ciphertext backup file is stored in described equipment connection, read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
In addition, present embodiment also provides a kind of non-volatile readable storage medium, store one or more modules (programs) in this storage medium, when these one or more modules are used in the equipment with one or more processors, can be so that this equipment be carried out the instruction (instructions) of following steps:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
Preferably, described one or more module is all right so that this equipment is carried out the instruction of following steps:
Before using the key obtain in advance that described data to be backed up are encrypted to obtain ciphertext, from the key of the described position reading pre-stored that needs the default access access as the described key that obtains in advance; Or, for described data to be backed up generate key as the described key that obtains in advance.
Preferably, the key that described use is obtained in advance is encrypted described data to be backed up and obtains ciphertext, in the following way:
Unique identification according to described equipment is that described data to be backed up generate key; Or the default Generating Random Number of use is that described data to be backed up generate key; Or be that described data to be backed up generate key according to the time that the user sends the instruction that described data to be backed up are backed up.
Preferably, the described position that needs default access to access is the default store path of described storer.
Preferably, described one or more module is all right so that this equipment is carried out the instruction of following steps:
The key that described use is obtained in advance described data to be backed up are encrypted obtain ciphertext after, described key is sent to server, so that described server is preserved described key and for key identification corresponding to described encryption key distribution;
Receive the key identification that described server sends;
Delete the described key that described equipment is preserved.
Preferably, described described ciphertext is stored to storage card with described equipment connection, in the following way:
Described key identification and described ciphertext are stored in the storage card with described equipment connection.
Preferably, described one or more module is all right so that this equipment is carried out the instruction of following steps:
After in the described storage card that described key identification and described ciphertext backup file is stored in described equipment connection, read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
Those skilled in the art should understand that embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, complete implement software example or in conjunction with the form of the embodiment of software and hardware aspect.And the present invention can adopt the form of the computer program of implementing in one or more computer-usable storage medium (including but not limited to magnetic disk memory and optical memory etc.) that wherein include computer usable program code.
The present invention is that reference is described according to process flow diagram and/or the block scheme of method, equipment (system) and the computer program of the embodiment of the invention.Should understand can be by the flow process in each flow process in computer program instructions realization flow figure and/or the block scheme and/or square frame and process flow diagram and/or the block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device producing a machine, so that the instruction of carrying out by the processor of computing machine or other programmable data processing device produces the device of the function that is used for being implemented in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, so that the instruction that is stored in this computer-readable memory produces the manufacture that comprises command device, this command device is implemented in the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame.
These computer program instructions also can be loaded on computing machine or other programmable data processing device, so that carry out the sequence of operations step producing computer implemented processing at computing machine or other programmable devices, thereby be provided for being implemented in the step of the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame in the instruction that computing machine or other programmable devices are carried out.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs within the scope of claim of the present invention and equivalent technologies thereof, then the present invention also is intended to comprise these changes and modification interior.

Claims (15)

1. a data back up method is characterized in that, may further comprise the steps:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
2. method according to claim 1 is characterized in that, the key that described use is obtained in advance is encrypted before the step that obtains ciphertext described data to be backed up, and described method also comprises:
From the key of the described position reading pre-stored that needs default access access as the described key that obtains in advance; Or,
For described data to be backed up generate key as the described key that obtains in advance.
3. method according to claim 2 is characterized in that, for described data to be backed up generate key, adopts following arbitrary mode:
Unique identification according to portable terminal is that described data to be backed up generate key; Or,
Using default Generating Random Number is that described data to be backed up generate key; Or,
The time of sending the instruction that described data to be backed up are backed up according to the user is that described data to be backed up generate key.
4. method according to claim 1 is characterized in that, the described position that needs default access to access is the default store path of portable terminal this locality.
5. method according to claim 1 is characterized in that, the key that use is obtained in advance is encrypted after the step that obtains ciphertext described data to be backed up, and described method also comprises:
Described key is sent to server, also be key identification corresponding to described encryption key distribution so that described server is preserved described key;
Receive the key identification that described server sends;
The local described key of preserving of deletion.
6. method according to claim 5 is characterized in that, described described ciphertext is stored in the storage card, in the following way:
Described key identification and described ciphertext are stored in the storage card.
7. method according to claim 6 is characterized in that, described described key identification and described ciphertext backup file is stored in after the step in the storage card, and described method also comprises:
Read described key identification, and send to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
Receive key corresponding to described key identification that described server returns;
Use key corresponding to described key identification that described ciphertext is decrypted, obtain data to be backed up.
8. a data backup system is characterized in that, comprising: portable terminal;
Described portable terminal comprises:
Acquisition module is used for obtaining data to be backed up;
Encrypting module is used for using the key that obtains in advance that described data to be backed up are encrypted and obtains ciphertext;
Memory module is used for described ciphertext is stored to storage card;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
9. system according to claim 8 is characterized in that, described portable terminal also comprises:
Key Acquisition Module is used for key from the described position reading pre-stored that needs the default access access as the described key that obtains in advance, or, for described data to be backed up generate key as the described key that obtains in advance.
10. system according to claim 9 is characterized in that, described encrypting module is used for:
Unique identification according to portable terminal is that described data to be backed up generate key; Or,
Using default Generating Random Number is that described data to be backed up generate key; Or,
The time of sending the instruction that described data to be backed up are backed up according to the user is that described data to be backed up generate key.
11. system according to claim 8 is characterized in that, the described position that needs default access to access is the default store path of portable terminal this locality.
12. system according to claim 8 is characterized in that, described system also comprises server;
Described portable terminal also comprises:
The first sending module is used for after described encrypting module uses the key that obtains in advance that described data to be backed up are encrypted to obtain ciphertext described key being sent to described server;
The first receiver module is used for receiving the key identification that described server sends;
The first processing module is used for the local described key of preserving of deletion;
Described server comprises:
The second receiver module is used for the key that mobile terminal receive sends;
The second processing module is used to key identification corresponding to described encryption key distribution;
The second sending module is used for described key identification is sent to described portable terminal.
13. system according to claim 12 is characterized in that, described memory module is used for:
Described key identification and described ciphertext are stored in the storage card.
14. system according to claim 13 is characterized in that, described portable terminal also comprises:
The 3rd sending module is used for reading described key identification, and sends to described server, so that described server returns key corresponding to described key identification after to described key identification authentication success;
The 3rd receiver module is used for receiving key corresponding to described key identification that described server returns;
Deciphering module is used for using key corresponding to described key identification that described ciphertext is decrypted, and obtains data to be backed up;
Described server also comprises:
The 4th receiver module is used for the key identification that mobile terminal receive sends;
The 4th sending module is used for key behind the described key identification authentication success that described key identification is corresponding is sent to described portable terminal.
15. an equipment is characterized in that, described equipment comprises:
One or more processors;
Storer; With
One or more modules, described one or more module stores are in described storer and be configured to be carried out by described one or more processors, and wherein, described one or more modules have following function:
Obtain data to be backed up;
Use the key that obtains in advance that described data to be backed up are encrypted and obtain ciphertext;
Described ciphertext is stored to storage card with described equipment connection;
Wherein, the described key storage that obtains in advance is in the position that needs the default access access.
CN201210401460.6A 2012-10-19 2012-10-19 A kind of data back up method, system and equipment Active CN102915263B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210401460.6A CN102915263B (en) 2012-10-19 2012-10-19 A kind of data back up method, system and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210401460.6A CN102915263B (en) 2012-10-19 2012-10-19 A kind of data back up method, system and equipment

Publications (2)

Publication Number Publication Date
CN102915263A true CN102915263A (en) 2013-02-06
CN102915263B CN102915263B (en) 2016-05-11

Family

ID=47613636

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210401460.6A Active CN102915263B (en) 2012-10-19 2012-10-19 A kind of data back up method, system and equipment

Country Status (1)

Country Link
CN (1) CN102915263B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103176864A (en) * 2013-03-11 2013-06-26 广东欧珀移动通信有限公司 Backup method, backup device and mobile terminal based on Android system
CN103617005A (en) * 2013-11-28 2014-03-05 中国联合网络通信集团有限公司 Access method, device and system for intelligent card
CN104144174A (en) * 2013-05-06 2014-11-12 华为技术有限公司 Method for protecting user private data, user equipment and server
CN104699559A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Distributed data backup method and system
WO2015090155A1 (en) * 2013-12-17 2015-06-25 北京网秦天下科技有限公司 Mobile terminal and method
CN105071927A (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 Mobile device data local storage method
CN105843701A (en) * 2015-01-14 2016-08-10 小米科技有限责任公司 Data backup method and device
CN106357678A (en) * 2016-10-24 2017-01-25 宇龙计算机通信科技(深圳)有限公司 Cloud encryption storage method for intelligent terminal and intelligent terminal
CN107025408A (en) * 2017-03-29 2017-08-08 宁夏宁信信息科技有限公司 Mobile hard disk key generation method and system based on cloud platform verification technique
CN107102913A (en) * 2017-04-01 2017-08-29 广东欧珀移动通信有限公司 Data back up method, device and computer equipment
CN107273725A (en) * 2017-05-14 2017-10-20 四川盛世天成信息技术有限公司 A kind of data back up method and system for classified information
CN107704743A (en) * 2017-08-23 2018-02-16 深圳市优品壹电子有限公司 Device and Related product with data backup function
CN109240849A (en) * 2018-08-09 2019-01-18 苏州市科远软件技术开发有限公司 Data back up method, device and the multipoint control unit for video conferencing system
CN109684129A (en) * 2018-11-20 2019-04-26 北京深思数盾科技股份有限公司 Data backup restoration method, storage medium, encryption equipment, client and server
CN110275801A (en) * 2019-06-21 2019-09-24 珠海格力电器股份有限公司 Data restoration method, device, system, computer equipment and storage medium
CN110431557A (en) * 2017-01-09 2019-11-08 交互数字Ce专利控股公司 Method and apparatus for executing carrying out safety backup and recovery
CN110704243A (en) * 2019-09-25 2020-01-17 Oppo(重庆)智能科技有限公司 Data recovery method and device, terminal equipment and storage medium
CN110865905A (en) * 2019-09-24 2020-03-06 平安科技(深圳)有限公司 Data restoration method and device, computer equipment and storage medium
CN111414628A (en) * 2019-01-08 2020-07-14 阿里巴巴集团控股有限公司 Data storage method and device and computing equipment
CN112733130A (en) * 2021-01-18 2021-04-30 成都质数斯达克科技有限公司 Account registration method and device, electronic equipment and readable storage medium
CN113094212A (en) * 2021-04-30 2021-07-09 杭州海康威视数字技术股份有限公司 Video backup method and device and video backup system
CN114896219A (en) * 2022-07-15 2022-08-12 深圳市沃特沃德信息有限公司 Method and device for storing resource data, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134660A (en) * 1997-06-30 2000-10-17 Telcordia Technologies, Inc. Method for revoking computer backup files using cryptographic techniques
US20040236958A1 (en) * 2003-05-25 2004-11-25 M-Systems Flash Disk Pioneers, Ltd. Method and system for maintaining backup of portable storage devices
CN1992746A (en) * 2005-12-28 2007-07-04 集嘉通讯股份有限公司 Data backup and reduction method
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN102387209A (en) * 2011-10-24 2012-03-21 深圳市智慧宇宙管理咨询有限公司 System and method for obtaining call information, device and method for sending call information as well as mobile terminal
CN102662798A (en) * 2012-04-12 2012-09-12 青岛海信移动通信技术股份有限公司 Data recovery method and terminal for Android system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6134660A (en) * 1997-06-30 2000-10-17 Telcordia Technologies, Inc. Method for revoking computer backup files using cryptographic techniques
US20040236958A1 (en) * 2003-05-25 2004-11-25 M-Systems Flash Disk Pioneers, Ltd. Method and system for maintaining backup of portable storage devices
CN1992746A (en) * 2005-12-28 2007-07-04 集嘉通讯股份有限公司 Data backup and reduction method
CN101400060A (en) * 2007-06-15 2009-04-01 捷讯研究有限公司 A method and devices for providing secure data backup from a mobile communication device to an external computing device
CN102387209A (en) * 2011-10-24 2012-03-21 深圳市智慧宇宙管理咨询有限公司 System and method for obtaining call information, device and method for sending call information as well as mobile terminal
CN102662798A (en) * 2012-04-12 2012-09-12 青岛海信移动通信技术股份有限公司 Data recovery method and terminal for Android system

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103176864A (en) * 2013-03-11 2013-06-26 广东欧珀移动通信有限公司 Backup method, backup device and mobile terminal based on Android system
CN104144174A (en) * 2013-05-06 2014-11-12 华为技术有限公司 Method for protecting user private data, user equipment and server
CN104144174B (en) * 2013-05-06 2017-11-24 华为技术有限公司 Protect method, user equipment and the server of privacy of user data
CN103617005A (en) * 2013-11-28 2014-03-05 中国联合网络通信集团有限公司 Access method, device and system for intelligent card
CN104699559A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Distributed data backup method and system
CN104699559B (en) * 2013-12-04 2019-03-26 腾讯科技(深圳)有限公司 Backing up distributed data method and system
WO2015090155A1 (en) * 2013-12-17 2015-06-25 北京网秦天下科技有限公司 Mobile terminal and method
CN105843701A (en) * 2015-01-14 2016-08-10 小米科技有限责任公司 Data backup method and device
CN105071927B (en) * 2015-07-17 2018-12-28 上海众人网络安全技术有限公司 Method is locally stored in a kind of mobile device data
CN105071927A (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 Mobile device data local storage method
CN106357678A (en) * 2016-10-24 2017-01-25 宇龙计算机通信科技(深圳)有限公司 Cloud encryption storage method for intelligent terminal and intelligent terminal
CN110431557B (en) * 2017-01-09 2023-09-26 交互数字麦迪逊专利控股公司 Method and apparatus for performing secure backup and restore
CN110431557A (en) * 2017-01-09 2019-11-08 交互数字Ce专利控股公司 Method and apparatus for executing carrying out safety backup and recovery
CN107025408A (en) * 2017-03-29 2017-08-08 宁夏宁信信息科技有限公司 Mobile hard disk key generation method and system based on cloud platform verification technique
CN107102913B (en) * 2017-04-01 2019-02-22 Oppo广东移动通信有限公司 Data back up method, device and computer equipment
CN107102913A (en) * 2017-04-01 2017-08-29 广东欧珀移动通信有限公司 Data back up method, device and computer equipment
CN107273725A (en) * 2017-05-14 2017-10-20 四川盛世天成信息技术有限公司 A kind of data back up method and system for classified information
CN107273725B (en) * 2017-05-14 2020-07-07 四川盛世天成信息技术有限公司 Data backup method and system for confidential information
CN107704743A (en) * 2017-08-23 2018-02-16 深圳市优品壹电子有限公司 Device and Related product with data backup function
CN109240849B (en) * 2018-08-09 2021-05-18 苏州市科远软件技术开发有限公司 Data backup method and device and multipoint control unit for video conference system
CN109240849A (en) * 2018-08-09 2019-01-18 苏州市科远软件技术开发有限公司 Data back up method, device and the multipoint control unit for video conferencing system
CN109684129A (en) * 2018-11-20 2019-04-26 北京深思数盾科技股份有限公司 Data backup restoration method, storage medium, encryption equipment, client and server
CN111414628B (en) * 2019-01-08 2024-01-02 阿里巴巴集团控股有限公司 Data storage method and device and computing equipment
CN111414628A (en) * 2019-01-08 2020-07-14 阿里巴巴集团控股有限公司 Data storage method and device and computing equipment
CN110275801A (en) * 2019-06-21 2019-09-24 珠海格力电器股份有限公司 Data restoration method, device, system, computer equipment and storage medium
CN110865905A (en) * 2019-09-24 2020-03-06 平安科技(深圳)有限公司 Data restoration method and device, computer equipment and storage medium
CN110704243A (en) * 2019-09-25 2020-01-17 Oppo(重庆)智能科技有限公司 Data recovery method and device, terminal equipment and storage medium
CN112733130A (en) * 2021-01-18 2021-04-30 成都质数斯达克科技有限公司 Account registration method and device, electronic equipment and readable storage medium
CN112733130B (en) * 2021-01-18 2022-11-29 成都质数斯达克科技有限公司 Account registration method and device, electronic equipment and readable storage medium
CN113094212A (en) * 2021-04-30 2021-07-09 杭州海康威视数字技术股份有限公司 Video backup method and device and video backup system
CN113094212B (en) * 2021-04-30 2024-04-02 杭州海康威视数字技术股份有限公司 Video backup method and device and video backup system
CN114896219A (en) * 2022-07-15 2022-08-12 深圳市沃特沃德信息有限公司 Method and device for storing resource data, computer equipment and storage medium

Also Published As

Publication number Publication date
CN102915263B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN102915263A (en) Data backup method, system and equipment
CN111191286B (en) HyperLegger Fabric block chain private data storage and access system and method thereof
US10601801B2 (en) Identity authentication method and apparatus
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN105812332A (en) Data protection method
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
US8621189B2 (en) System and method for hardware strengthened passwords
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN107920052B (en) Encryption method and intelligent device
CN106452770A (en) Data encryption method and apparatus, data decryption method and apparatus, and system
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN104283668A (en) Method and device for obtaining application password based on mobile terminal
CN105101183A (en) Method and system for protecting private contents at mobile terminal
CN105653986A (en) Micro SD card-based data protection method and device
CN105117635A (en) Local data security protection system and method
CN104468562A (en) Portable transparent data safety protection terminal oriented to mobile applications
WO2014169610A1 (en) Data encryption and decryption method and device, and protection system of mobile terminal
WO2020123926A1 (en) Decentralized computing systems and methods for performing actions using stored private data
CN102819702A (en) File encryption operation method and file encryption operation system
CN102726028A (en) Encryption method, decryption method, and corresponding device and system
CN104994095A (en) Equipment authentication method, clients, server and system
CN110166403A (en) A kind of safety method of key and ciphertext separated transmission
CN104978542A (en) Secure data storage and data access method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 100085 Beijing city Haidian District Qinghe Street No. 68 Huarun colorful city shopping center two floor 13

Applicant after: Xiaomi Technology Co., Ltd.

Address before: 100102, No. 50, block B, building No. 12, winding stone world building, Wangjing West Road, Beijing, Chaoyang District

Applicant before: Beijing Xiaomi Technology Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant