WO2019033374A1 - Procédé et système de récupération de sauvegarde - Google Patents
Procédé et système de récupération de sauvegarde Download PDFInfo
- Publication number
- WO2019033374A1 WO2019033374A1 PCT/CN2017/097943 CN2017097943W WO2019033374A1 WO 2019033374 A1 WO2019033374 A1 WO 2019033374A1 CN 2017097943 W CN2017097943 W CN 2017097943W WO 2019033374 A1 WO2019033374 A1 WO 2019033374A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- backup
- terminal device
- information
- preset
- backup information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a backup recovery method and system.
- the terminal in order to avoid data loss, the terminal generally backs up some important information on the server.
- the server When the terminal obtains its backup information from the server, the server only needs to send its own identification information to obtain the backup information from the server, and the server directly sends the backup information corresponding to the identifier to the terminal.
- the backup information of the terminal in this mode is often easily stolen, such as stealing directly in the process of sending backup information to the terminal by the server, or stealing the identifier of the terminal, and the fake terminal steals the backup information from the server. Poor sex.
- the embodiment of the invention provides a backup and recovery method and system, which can improve the security of information acquisition through two-way encryption of the terminal device and the server.
- an embodiment of the present invention provides a backup and recovery method, where the method includes:
- the terminal device sends a backup recovery request to the server, where the backup recovery request carries the identity identifier of the terminal device, and the identity identifier has been encrypted by using a preset first public key;
- the terminal device receives the backup information sent by the server, where the backup information is that the server decrypts the backup recovery request by using a preset first private key, and acquires the identity identifier when the decryption succeeds. Corresponding backup information, and encrypting the backup information by using a preset second public key, and sending the backup information to the terminal device;
- the terminal device decrypts the backup information by using a preset second private key, and acquires the backup information when the decryption succeeds;
- the first public key and the first private key are pre-generated first key pairs
- the second public key and the second private key are pre-generated second key pairs
- the first key pair and the second key pair are different in key.
- the method further includes:
- the terminal device sends an information backup request to the server, where the information backup request includes backup information of the terminal device and an identity identifier of the terminal device, so that the server uses the identity identifier and the backup information. Perform associative storage.
- the terminal device sends an information backup request to the server, including:
- the terminal device encrypts the backup information by using a preset encryption manner, and sends an information backup request including the encrypted backup information and the identity identifier of the terminal device to the server;
- the terminal device decrypts the backup information by using a preset second private key, and obtains the backup information when the decryption succeeds, including:
- the terminal device decrypts the backup information by using a preset second private key, and decrypts the backup information by using a preset decryption manner to obtain the backup information;
- the preset encryption mode corresponds to the preset decryption mode.
- the preset encryption manner includes at least one of a password encryption method, a fingerprint string encryption method, a voiceprint encryption method, and an iris encryption method;
- the preset decryption method includes at least one of a password decryption method, a fingerprint string decryption method, a voiceprint decryption method, and an iris decryption method.
- the embodiment of the present invention further provides a backup and recovery system, where the system includes: a terminal device and a server;
- the terminal device is configured to send a backup and restore request to the server, where the backup and recovery request carries an identity identifier of the terminal device, and the identity identifier is encrypted by using a preset first public key;
- the server is configured to receive the backup recovery request sent by the terminal device, and decrypt the backup recovery request by using a preset first private key, and obtain the identity identifier and search when the decryption succeeds And generating the backup information corresponding to the identity identifier, and encrypting the backup information by using a preset second public key, and sending the backup information to the terminal device;
- the terminal device is further configured to decrypt the backup information by using a preset second private key, and obtain the backup information when the decryption succeeds;
- the first public key and the first private key are pre-generated first key pairs
- the second public key and the second private key are pre-generated second key pairs
- the first key pair and the second key pair are different in key.
- the terminal device is further configured to send an information backup request to the server, where the information backup request includes backup information of the terminal device and an identity identifier of the terminal device;
- the server is further configured to receive the information backup request sent by the terminal device, and store the identity identifier and the backup information in association.
- the terminal device is specifically configured to encrypt the backup information by using a preset encryption manner, and send an information backup request including the encrypted backup information and the identity identifier of the terminal device to the server.
- the terminal device is configured to decrypt the backup information by using a preset second private key, and decrypt the backup information by using a preset decryption manner to obtain the The backup information, wherein the preset encryption mode corresponds to the preset decryption mode.
- the preset encryption manner includes at least one of a password encryption method, a fingerprint string encryption method, a voiceprint encryption method, and an iris encryption method;
- the preset decryption method includes at least one of a password decryption method, a fingerprint string decryption method, a voiceprint decryption method, and an iris decryption method.
- the server is configured to determine, according to the identity identifier, whether the identity of the terminal device is legal, and associate the identity identifier with the backup information when determining that the identity of the terminal device is legal. storage.
- an embodiment of the present invention provides a terminal device, where the terminal device includes: a communication unit and a processing unit, and the terminal device performs some or all of the steps of the method of the first aspect by using the foregoing unit.
- an embodiment of the present invention provides a server, where the server includes: a communication unit and a processing unit, and the server performs some or all of the steps performed by the server of the second aspect by using the foregoing unit.
- an embodiment of the present invention provides another terminal device, including a processor, a transceiver, and a memory, where the processor, the transceiver, and the memory are connected to each other, wherein the memory is used to store the supporting terminal device to perform the foregoing.
- An application code of a method the processor being configured to perform the method of the first aspect above.
- an embodiment of the present invention provides another server, including a processor, a transceiver, and a memory, where the processor, the transceiver, and the memory are connected to each other, wherein the memory is used for storing
- the application code executing the above method by the server, the processor being configured to perform some or all of the steps of the server of the second aspect above.
- an embodiment of the present invention provides a computer readable storage medium, where the computer storage medium stores a computer program, where the computer program includes program instructions, and the program instructions, when executed by a processor, cause the processing The method of the first aspect described above is performed.
- an embodiment of the present invention provides a computer readable storage medium, where the computer storage medium stores a computer program, where the computer program includes program instructions, and the program instructions, when executed by a processor, cause the processing The method of executing the server of the second aspect above is performed.
- the present application also provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method described in the above aspects.
- the present application further provides a chip system including a processor for supporting a terminal device or a server to implement the functions involved in the above aspects.
- the chip system further comprises a memory for storing program instructions and data necessary for the terminal device or the server.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- the terminal device may send a backup recovery request carrying the identity identifier encrypted by using the preset first public key to the server, so that the server can decrypt the backup recovery request by using the preset first private key. And when the decryption succeeds, the identifier is obtained, and the backup information corresponding to the identifier is found, and the backup information is encrypted by using the preset second public key, and then sent to the terminal device, so that the terminal device can pass the The backup information is decrypted by using the preset second private key, and when the decryption is successful, the backup information is obtained, thereby improving the security of information acquisition through two-way encryption of the terminal device and the server.
- FIG. 1 is a schematic diagram of interaction of a backup and recovery method according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a backup and recovery system according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a terminal device according to another embodiment of the present invention.
- the term “if” can be interpreted as “when” or “on” or “in response to determining” or “in response to detecting” depending on the context. .
- the phrase “if determined” or “if detected [condition or event described]” may be interpreted in context to mean “once determined” or “in response to determining” or “once detected [condition or event described] ] or “in response to detecting [conditions or events described]”.
- the embodiment of the invention discloses a backup and recovery method, a system and a terminal device, which can improve the security of information acquisition through two-way encryption of the terminal device and the server. The details are explained below.
- FIG. 1 is a schematic diagram of interaction of a backup recovery method according to an embodiment of the present invention. Specific As shown in FIG. 1, the backup recovery method of the embodiment of the present invention may include the following steps:
- the terminal device sends a backup recovery request to the server, where the backup recovery request carries the identity identifier of the terminal device, and the identity identifier has been encrypted by using a preset first public key.
- the terminal device stores a pre-configured first public key and a second private key
- the server stores a pre-configured first private key and a second public key.
- the first public key and the first private key are pre-generated first key pairs
- the second public key and the second private key are pre-generated second key pairs
- the first key The key corresponding to the second key pair is different. That is to say, the first public key and the first private key are mutually encrypted and decrypted keys
- the second public key and the second private key are mutually encrypted and decrypted keys.
- the server decrypts the backup recovery request by using a preset first private key, and obtains the identity identifier when the decryption succeeds, and searches for backup information corresponding to the identity identifier.
- the server may store backup information uploaded by each terminal device, and each backup information may be stored in association with the identity identifier of the terminal device. Therefore, when receiving the backup recovery request carrying the identity identifier, the server can obtain the identity of the terminal device by performing a program for the backup recovery request, and then search for the associated backup information according to the identity identifier.
- the server encrypts the backup information by using a preset second public key, and sends the backup information to the terminal device.
- the terminal device decrypts the backup information by using a preset second private key, and obtains the backup information when the decryption succeeds.
- the server may encrypt the backup information by using the second public key, and then send the encrypted backup information to the terminal device instead of directly sending the backup information to the terminal device. Therefore, when receiving the backup information returned by the server for the backup recovery request, the terminal device may decrypt the encrypted backup information by using the second private key to obtain the backup information. This effectively prevents the backup information from being stolen by illegal molecules and improves information security.
- the terminal device may further send an information backup request to the server, where the information backup request includes backup information of the terminal device and an identity identifier of the terminal device.
- the server may receive the information backup request sent by the terminal device, and store the identity identifier and the backup information in association. That is, each terminal device can perform information backup on the server in advance, so that the terminal device can recover the backed up information from the server in time when the information is lost.
- the backup information when the terminal device sends an information backup request to the server, the backup information may be encrypted by using a preset encryption manner, and the information including the encrypted backup information and the identity identifier of the terminal device is sent to the server. Backup request. Further, the terminal device decrypts the backup information by using a preset second private key, and when the decryption is successful, the terminal information may be specifically used to adopt a preset second private key pair. The backup information is decrypted, and when the decryption is successful, the backup information is decrypted by using a preset decryption manner to obtain the backup information. That is to say, when uploading the backup information, the terminal device can encrypt the backup information, that is, store the encrypted backup information at the server. Therefore, when the terminal device performs backup and recovery, and receives the encrypted backup information returned by the server, the backup information can be successfully decrypted by using the second private key and the preset decryption manner to obtain the backup information. This further enhances safety performance.
- the preset encryption method may include at least one of a password encryption method, a fingerprint string encryption method, a voiceprint encryption method, and an iris encryption method.
- the preset decryption method may include a password decryption method and a fingerprint. At least one of a string decryption method, a voiceprint decryption method, and an iris decryption method.
- the preset encryption mode corresponds to the preset decryption mode.
- the preset decryption mode is also a password decryption mode
- the password encryption mode is the same as the password corresponding to the password decryption mode; for example, the preset encryption mode is fingerprint string encryption.
- the preset decryption mode is also a fingerprint string decryption mode
- the fingerprint string encryption mode is the same as the corresponding fingerprint string of the fingerprint string decryption mode, including the same fingerprint and the same fingerprint input order.
- the server may further determine, according to the identity identifier, whether the identity of the terminal device is legal, and associate the identity identifier with the backup information when determining that the identity of the terminal device is legal. Thereby improving safety performance.
- the server may store the identifier list of the legal user. If the identity of the terminal device is in the identifier list, the identity of the terminal device may be determined. For the manner of determining whether the identity of the terminal device is legal, the embodiment of the present invention Not limited.
- the terminal device may further receive the to-be-verified information input for the user operation, determine whether the to-be-verified information matches the preset verification information, and when the to-be-verified information matches the verification information, , send a backup recovery request to the server. That is to say, if it is determined that the terminal device needs to send a backup recovery request, the user identity may be verified, and when the verification is successful, the backup recovery request is sent to improve the reliability of information recovery.
- the information to be verified may include password information, fingerprint string information, voiceprint information, and iris information. At least one of them.
- the information to be verified may include fingerprint string information, where the fingerprint string information includes at least one fingerprint and an input sequence of the fingerprint. Further, the terminal device may determine whether the fingerprint included in the fingerprint string information matches the fingerprint in the preset verification information, and whether the input sequence of the fingerprint included in the fingerprint string information is in the verification information. The input order of the fingerprints is the same, and when the fingerprints match and the input order of the fingerprints is the same, it is determined that the information to be verified matches the verification information.
- the information to be verified may include voiceprint information. Further, the terminal device may determine whether the voiceprint information included in the to-be-verified information matches the voiceprint information in the preset verification information, and determine the to-be-verified information and the verification information when matching Match.
- the terminal device may send a backup recovery request carrying the identity identifier encrypted by using the preset first public key to the server, so that the server can restore the backup request by using the preset first private key.
- the decryption is performed, and when the decryption is successful, the identity identifier is obtained, and the backup information corresponding to the identity identifier is found, and the backup information is encrypted by using the preset second public key, and then sent to the terminal device, so that the terminal device is
- the backup information can be decrypted by using the preset second private key, and when the decryption is successful, the backup information is obtained, thereby improving the security of information acquisition through two-way encryption of the terminal device and the server.
- the backup and recovery system of the embodiment of the present invention may include: a terminal device 201 and a server 202;
- the terminal device 201 is configured to send a backup recovery request to the server 202, where the backup recovery request carries an identity identifier of the terminal device 201, and the identity identifier is encrypted by using a preset first public key. ;
- the server 202 is configured to receive the backup recovery request sent by the terminal device 201, and decrypt the backup recovery request by using a preset first private key, and obtain the identity identifier when the decryption is successful. And searching for the backup information corresponding to the identity identifier, and encrypting the backup information by using a preset second public key, and sending the backup information to the terminal device 201;
- the terminal device 201 is further configured to decrypt the backup information by using a preset second private key, and obtain the backup information when the decryption succeeds;
- the first public key and the first private key are pre-generated first key pairs
- the second public key and the second private key are pre-generated second key pairs
- the first key pair and the second key pair are different in key.
- the terminal device 201 is further configured to send an information backup request to the server 202, where the information backup request includes backup information of the terminal device 201 and an identity identifier of the terminal device 201;
- the server 202 is further configured to receive the information backup request sent by the terminal device 201, and store the identity identifier and the backup information in association.
- the terminal device 201 may be specifically configured to encrypt the backup information by using a preset encryption manner, and send the encrypted backup information and the identity identifier of the terminal device 201 to the server 202. Information backup request.
- the terminal device 201 is specifically configured to decrypt the backup information by using a preset second private key, and decrypt the backup information by using a preset decryption manner when the decryption is successful, Obtaining the backup information, where the preset encryption manner corresponds to the preset decryption manner.
- the preset encryption mode includes at least one of a password encryption mode, a fingerprint string encryption mode, a voiceprint encryption mode, and an iris encryption mode; and correspondingly, the preset decryption mode includes a password decryption mode and a fingerprint string. At least one of a decryption method, a voiceprint decryption method, and an iris decryption method.
- the server 202 is specifically configured to determine, according to the identity identifier, whether the identity of the terminal device 201 is legal, and when determining that the identity of the terminal device 201 is legal, the identity identifier and the Backup information is stored in association.
- the terminal device 201 can refer to the related description of the terminal device in the embodiment shown in FIG. 1
- the server 202 can refer to the related description of the server in the embodiment shown in FIG. 1 , and details are not described herein.
- FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- the terminal device 300 of the embodiment of the present invention may include a communication unit 301 and a processing unit 302. Wherein, these units can perform corresponding functions of the terminal device in the above method example, for example,
- the communication unit 301 is configured to send a backup recovery request to the server, where the backup recovery request carries the identity identifier of the terminal device, and the identity identifier has been encrypted by using a preset first public key;
- the communication unit 301 is further configured to receive backup information sent by the server, where the backup information is that the server decrypts the backup recovery request by using a preset first private key, and when the decryption succeeds, acquiring The backup information corresponding to the identity identifier, and the backup information is encrypted by using a preset second public key, and then sent to the terminal device;
- the processing unit 302 is configured to decrypt the backup information by using a preset second private key, and obtain the backup information when the decryption succeeds;
- the first public key and the first private key are pre-generated first key pairs
- the second public key and the second private key are pre-generated second key pairs
- the first key pair and the second key pair are different in key.
- the communication unit 301 is further configured to send an information backup request to the server, where the information backup request includes backup information of the terminal device and an identity identifier of the terminal device, so that the server The identity identifier and the backup information are stored in association.
- the communication unit 301 when the communication unit 301 sends an information backup request to the server, the communication unit 301 may be specifically configured to:
- the processing unit 302 decrypts the backup information by using a preset second private key, and when the decryption is successful, the backup information may be specifically used for:
- the preset encryption mode corresponds to the preset decryption mode.
- the preset encryption method may include at least one of a password encryption method, a fingerprint string encryption method, a voiceprint encryption method, and an iris encryption method.
- the preset decryption method may include a password decryption method. At least one of a fingerprint decryption method, a voiceprint decryption method, and an iris decryption method.
- the terminal device may implement some or all of the steps in the backup recovery method in the foregoing embodiment shown in FIG. 1 by using the foregoing unit.
- the embodiments of the present invention are device embodiments corresponding to the method embodiments, and the description of the method embodiments is also applicable to the embodiments of the present invention.
- FIG. 4 is a schematic structural diagram of a terminal device according to another embodiment of the present invention.
- the terminal device 400 of the embodiment of the present invention may include: one or more processors 401; and optionally include one or more transceivers 402, a user interface 403, a memory 404, and the like. Wait.
- the processor 401, the transceiver 402, the user interface 403, and the memory 404 may be connected by a bus 405, or may be connected by other means.
- Memory 404 can be used to store instructions, and processor 401 can be used to execute instructions stored by memory 404.
- the processor 401 may be a central processing unit (CPU), and the processor may also be another general-purpose processor, a digital signal processor (DSP). , Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the transceiver 402 can be used to receive and/or transmit information.
- the user interface 403 may include a touchpad, a fingerprint sensor (for collecting fingerprint information of the user), a microphone, etc., and may also include a display (LCD or the like), a speaker, and the like.
- the memory 404 can include read only memory and random access memory and provides instructions and data to the processor 401.
- a portion of memory 404 may also include non-volatile random access memory.
- the processor 401 is specifically configured to: send, by using the transceiver 402, a backup and recovery request to the server, where the backup and recovery request carries the identity identifier of the terminal device, and the identity identifier has adopted a preset a public key encryption; receiving, by the transceiver 402, backup information sent by the server, where the backup information is that the server decrypts the backup recovery request by using a preset first private key, and when the decryption is successful Obtaining the backup information corresponding to the identity identifier, and encrypting the backup information by using a preset second public key, and sending the backup information to the terminal device; using the preset second private key to the backup information Decrypting, and when the decryption is successful, acquiring the backup information; wherein the first public key and the first private key are pre-generated first key pairs, the second public key and the first The second private key is a pre-generated second key pair, and the first key pair and the second key pair correspond to different keys.
- processor 401 is further configured to perform the following steps:
- the information backup request And including the backup information of the terminal device and the identity identifier of the terminal device, so that the server associates the identity identifier and the backup information in association.
- processor 401 is further configured to perform the following steps:
- the processor 401 decrypts the backup information by using a preset second private key, and when the decryption is successful, the backup information may be specifically used for:
- the preset encryption mode corresponds to the preset decryption mode.
- the preset encryption mode includes at least one of a password encryption mode, a fingerprint string encryption mode, a voiceprint encryption mode, and an iris encryption mode; and correspondingly, the preset decryption mode includes a password decryption mode and a fingerprint string. At least one of a decryption method, a voiceprint decryption method, and an iris decryption method.
- the processor 401, the transceiver 402, the user interface 03, and the memory 404 described in the embodiment of the present invention may implement the implementation described in the backup recovery method in the embodiment shown in FIG. 1, and may also perform the present invention.
- the implementation manner of the terminal device described in the embodiment is not described herein again.
- a computer readable storage medium storing a computer program, the computer program being executed by a processor to implement a backup recovery method of the embodiment shown in FIG. .
- the computer readable storage medium may be an internal storage unit of the terminal device described in any of the foregoing embodiments, such as a hard disk or a memory of the terminal device.
- the computer readable storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk equipped on the terminal device, a smart memory card (SMC), and a secure digital (Secure Digital, SD) ) cards, flash cards, etc.
- the computer readable storage medium may also include both an internal storage unit of the terminal device and an external storage device.
- the computer readable storage medium is for storing the computer program and other programs and data required by the terminal device.
- the computer readable storage medium can also be used to temporarily store data that has been output or is about to be output.
- the disclosed system, terminal device, and server and method may be implemented in other manners.
- the division of the unit in the embodiment of the present invention is schematic, and is only a logical function division, and the actual implementation may have another division manner.
- Each functional unit in the embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated in one unit, or some features may be ignored or not executed.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, or an electrical, mechanical or other form of connection.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- a computer readable storage medium including instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the various aspects of the present invention. All or part of the steps of the method described in the examples.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Abstract
Le procédé de la présente invention comprend les étapes suivantes : un dispositif terminal (201) envoie une demande de récupération de sauvegarde à un serveur (202); la demande de récupération de sauvegarde contient l'identifiant d'identité du dispositif terminal (201) et l'identifiant d'identité ayant été chiffré à l'aide d'une première clé publique prédéfinie (101); le serveur (202) reçoit la demande de récupération de sauvegarde envoyée par le dispositif terminal (201); déchiffre la demande de récupération de sauvegarde à l'aide d'une première clé privée prédéfinie, et, lorsque le déchiffrement réussit, obtient l'identifiant d'identité et rechercher des informations de sauvegarde correspondant à l'identifiant d'identité (102), et envoie les informations de sauvegarde au dispositif terminal (201) après avoir chiffré des informations de sauvegarde à l'aide d'une seconde clé publique prédéfinie (103 ); le dispositif terminal (201) déchiffre les informations de sauvegarde à l'aide d'une seconde clé privée prédéfinie, et acquiert les informations de sauvegarde lorsque le déchiffrement réussit (104). Ledit procédé peut améliorer la sécurité de l'acquisition d'informations en effectuant un chiffrement bidirectionnel du dispositif terminal (201) et du serveur (202).
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/097943 WO2019033374A1 (fr) | 2017-08-17 | 2017-08-17 | Procédé et système de récupération de sauvegarde |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/097943 WO2019033374A1 (fr) | 2017-08-17 | 2017-08-17 | Procédé et système de récupération de sauvegarde |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019033374A1 true WO2019033374A1 (fr) | 2019-02-21 |
Family
ID=65362613
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/097943 Ceased WO2019033374A1 (fr) | 2017-08-17 | 2017-08-17 | Procédé et système de récupération de sauvegarde |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2019033374A1 (fr) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
| CN101006428A (zh) * | 2004-06-21 | 2007-07-25 | 摩托罗拉公司 | 安全数据备份和恢复 |
| CN101325785A (zh) * | 2008-07-28 | 2008-12-17 | 深圳华为通信技术有限公司 | 数据备份与恢复方法及装置、移动设备 |
| CN101483513A (zh) * | 2009-02-09 | 2009-07-15 | 上海爱数软件有限公司 | 一种网络备份系统及其数据备份和数据恢复方法 |
| CN106126373A (zh) * | 2016-06-21 | 2016-11-16 | 青岛海信传媒网络技术有限公司 | 数据备份方法及装置、数据恢复方法及装置 |
-
2017
- 2017-08-17 WO PCT/CN2017/097943 patent/WO2019033374A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040236958A1 (en) * | 2003-05-25 | 2004-11-25 | M-Systems Flash Disk Pioneers, Ltd. | Method and system for maintaining backup of portable storage devices |
| CN101006428A (zh) * | 2004-06-21 | 2007-07-25 | 摩托罗拉公司 | 安全数据备份和恢复 |
| CN101325785A (zh) * | 2008-07-28 | 2008-12-17 | 深圳华为通信技术有限公司 | 数据备份与恢复方法及装置、移动设备 |
| CN101483513A (zh) * | 2009-02-09 | 2009-07-15 | 上海爱数软件有限公司 | 一种网络备份系统及其数据备份和数据恢复方法 |
| CN106126373A (zh) * | 2016-06-21 | 2016-11-16 | 青岛海信传媒网络技术有限公司 | 数据备份方法及装置、数据恢复方法及装置 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110798315B (zh) | 基于区块链的数据处理方法、装置及终端 | |
| JP6239788B2 (ja) | 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体 | |
| CN107590025A (zh) | 一种备份恢复方法及系统 | |
| CN106612259B (zh) | 身份识别、业务处理以及生物特征信息的处理方法和设备 | |
| WO2020237868A1 (fr) | Procédé de transmission de données, dispositif électronique, serveur et support de stockage | |
| CN113316915B (zh) | 解锁数据存储设备 | |
| US11366933B2 (en) | Multi-device unlocking of a data storage device | |
| US11334677B2 (en) | Multi-role unlocking of a data storage device | |
| EP2628133B1 (fr) | Authentification d'une image d'empreinte digitale | |
| CN105117658B (zh) | 一种基于指纹认证的密码安全管理方法与设备 | |
| US20210218558A1 (en) | Enrolment of pre-authorized device | |
| TWI724684B (zh) | 用於執行經過身分驗證的加密操作的方法、系統及裝置 | |
| CN111242611B (zh) | 一种用于恢复数字钱包密钥的方法及系统 | |
| CN106487758B (zh) | 一种数据安全签名方法、业务终端以及私钥备份服务器 | |
| CN107395589A (zh) | 指纹信息获取方法及终端 | |
| CN115529591B (zh) | 基于令牌的认证方法、装置、设备及存储介质 | |
| WO2018166484A1 (fr) | Procédés et appareils de chiffrement et de déchiffrement de données, dispositif électronique, et support de stockage lisible | |
| WO2018076163A1 (fr) | Procédé d'authentification de liaison entre une bibliothèque d'algorithmes d'empreintes digitales et un capteur d'empreintes digitales, et système de reconnaissance d'empreintes digitales | |
| CN102446140B (zh) | 数据处理方法和移动存储设备 | |
| US20170330177A1 (en) | Payment terminal authentication | |
| CN117932582A (zh) | 一种结合设备认证的人脸识别验证方法及装置 | |
| WO2019033374A1 (fr) | Procédé et système de récupération de sauvegarde | |
| WO2015131585A1 (fr) | Procédé et dispositif permettant d'assurer la sécurité d'une carte sd | |
| CN106603237B (zh) | 一种安全支付方法及装置 | |
| CN116318750A (zh) | 用于控制家电设备的方法及装置、电子设备、存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17921552 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 24.09.2020) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17921552 Country of ref document: EP Kind code of ref document: A1 |