CN113641662B - Credit database migration verification method - Google Patents
Credit database migration verification method Download PDFInfo
- Publication number
- CN113641662B CN113641662B CN202111208087.8A CN202111208087A CN113641662B CN 113641662 B CN113641662 B CN 113641662B CN 202111208087 A CN202111208087 A CN 202111208087A CN 113641662 B CN113641662 B CN 113641662B
- Authority
- CN
- China
- Prior art keywords
- data
- migration
- database
- node
- creation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/214—Database migration support
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for verifying the migration of a trusted database, which relates to the technical field of computers, wherein a first migration node, a second migration node and a third migration node are respectively arranged in a transition path, the first migration nodes on all the migration paths are communicated, the second migration nodes on all the migration paths are communicated, the third migration nodes on all the migration paths are communicated, then in the process of migrating data, when the data reaches the first migration node, the second migration node or the third migration node, the data is backed up and verified, when the data is missing, the migration nodes on other migration paths are reselected, thereby ensuring the smooth migration of the data, the data is verified by the migration paths, and when the data is missing, the migration paths are immediately replaced, thereby ensuring the smooth migration of the data, meanwhile, the defect that the data can be found to have missing condition after the data is migrated can be avoided.
Description
Technical Field
The invention belongs to the technical field of computers, and particularly relates to a trust and creation database migration and verification method.
Background
With the great development of enterprises, when the existing database cannot meet the requirement of business development, the requirement of database migration exists, namely, data is transferred from the original database to a new database. Wherein, the original database and the new database may be located in two machine rooms in different regions. In the process of data migration, because the service is continuous, that is, there are no storage requests of new data and no reading requests of data in the database, the data generated by the service also needs to be migrated from the old database to the new database during the period;
in the prior art, data loss often occurs during migration of a database, so that the integrity of the data cannot be guaranteed, and the data loss can be found only after the data migration is performed, so that the data cannot be retrieved.
Disclosure of Invention
The invention aims to provide a trust and creation database migration and verification method.
The purpose of the invention can be realized by the following technical scheme: a trust and creation database migration checking method comprises the following steps:
the method comprises the following steps: reading all data in the information creating database, acquiring basic information of the data, and setting a data tag for each piece of data;
step two: processing the read data, encrypting the trusted database by an MD5 algorithm, and generating a first encryption value;
step three: selecting a migration path and a target database, and implementing blocking protection on the selected migration path;
step four: in the data migration process, the migrated data is verified, then the complete migration of the data is completed, and the migrated data is encrypted through the MD5 algorithm, so that a second encryption value is obtained.
Further, the process of reading the basic information of all the data in the creation database comprises: setting a data label library, creating a plurality of data labels in the data label library, and setting a retrieval serial number according to each data label; reading all data in the information creating database, and endowing the data with corresponding data labels according to the characteristics of each data; establishing a credit creation database corresponding to the data tag according to the data tag, and importing the data into the corresponding credit creation database through the retrieval serial number; and marking the credit creation database with saturated capacity, and acquiring the size of each data in the credit creation database.
Further, the process of processing the read data includes: marking the size of each data in the credit creation database with saturated capacity, and calculating to obtain the total value of all data sizes in the credit creation database; and reading the size of the credit creation database, and comparing the size of the credit creation database with the total value of all data sizes in the credit creation database to obtain a data tolerance value.
Furthermore, the capacity of the information creating database is a fixed value, and when the number of data in the information creating database does not reach saturation, a plurality of filling data streams are generated in the information creating database, and the number of the filling data streams is recorded, so that the number of data in the information creating database reaches saturation.
Further, the process of encrypting the trusted database by the MD5 algorithm includes: marking the credit creation databases in the credit creation database, and acquiring the retrieval serial number of each credit creation database; generating a first binary code group according to the retrieval serial number of the credit database; marking each data in the innovation database, and randomly generating an independent code; generating a second binary code group according to the data tolerance value of the credit creation data sub-database; and generating a first encryption code group according to the first binary code group, the second binary code group and the independent codes, then generating a first encryption value, and binding the first encryption value and the first encryption code group.
Further, the process of blocking and protecting the migration path includes: selecting all corresponding migration paths according to the data labels of the information creation database, and marking the selected migration paths; respectively setting a first migration node, a second migration node and a third migration node in each migration path; communicating the first migration nodes on all migration paths, communicating the second migration nodes on all migration paths, and communicating the third migration nodes on all migration paths; and implementing unidirectional blocking protection on all the first migration node, the second migration node and the third migration node.
Further, the migration process of the data is as follows: the data in the original trust creation database is backed up, the backed-up trust creation database is marked as first backup data, and then the data in the original trust creation database is migrated to a first migration node; after the data in the original trust creation database reaches the first migration node, verifying the data in the first migration node, after the verification is successful, removing the first backup data, simultaneously backing up the data in the original trust creation database in the first migration node to generate second backup data, and then migrating the data in the original trust creation database to the second migration node; after the data in the original trust creation database reaches the second migration node, verifying the data in the second migration node, after the verification is successful, removing the second backup data, simultaneously backing up the data in the original trust creation database in the second migration node to generate third backup data, and then migrating the data in the original trust creation database to the third migration node; and after the data in the original trust creation database reaches the third migration node, verifying the data in the third migration node, clearing the third backup data after the verification is successful, and then migrating the data in the original trust creation database to the target database.
Further, the process of verifying the data includes: marking all the credit creation databases arriving at the first migration node, and obtaining corresponding retrieval serial numbers; matching the obtained retrieval serial number with the retrieval serial numbers corresponding to all the credit creation data sub-databases in the first backup data, and judging whether the credit creation data sub-databases are missing or not; when the information creating database is not missing, all the information creating database is migrated to a second migration node; and when the created data sub-database is missing, judging that the data is missing in the migration process, clearing all the data in the first migration node, and reselecting the migration path.
Further, after the data are migrated into the target database, encrypting the data in the target database through an MD5 algorithm, wherein the encryption process is consistent with the process of encrypting the trusted database, obtaining a second encryption value, comparing whether the first encryption value is consistent with the second encryption value, when the first encryption value is consistent with the second encryption value, indicating that the data are completely migrated, and when the first encryption value is greater than the second encryption value, indicating that the data are missing in the data migration process; and when the first encryption value is smaller than the second encryption value, judging that illegal data enter in the data migration process, verifying and checking independent codes of each piece of data to determine the position of the illegal data, and clearing the illegal data.
The invention has the beneficial effects that: by respectively setting a first migration node, a second migration node and a third migration node in the migration path, the first migration nodes on all migration paths are communicated, the second migration nodes on all migration paths are communicated, the third migration nodes on all migration paths are communicated, then, in the process of data migration, when the data arrives in the first migration node, the second migration node or the third migration node, the data is backed up and checked, when the data is missing, the migration nodes on other migration paths are reselected, thereby ensuring the smooth migration of data, checking the data in the migration path, and immediately replacing the migration path when the data is missing, therefore, smooth migration of the data is guaranteed, and the defect that the data is lost after the data is migrated can be avoided.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic block diagram of a trust and creation database migration and verification method.
Detailed Description
As shown in fig. 1, a trust creation database migration verification method includes the following steps:
the method comprises the following steps: reading all data in the information creating database, acquiring basic information of the data, and setting a data tag for each piece of data;
step two: processing the read data, encrypting the trusted database by an MD5 algorithm, and generating a first encryption value;
step three: selecting a migration path and a target database, and implementing blocking protection on the selected migration path;
step four: in the data migration process, the migrated data is verified, then the complete migration of the data is completed, and the migrated data is encrypted through the MD5 algorithm, so that a second encryption value is obtained.
It should be further noted that, in the implementation process, the specific process of reading the basic information of all the data in the creation database includes the following steps:
step S1: setting a data label library, creating a plurality of data labels in the data label library, and setting a retrieval serial number according to each data label; it is further noted that, in the implementation process, the data tag includes a base tag, an encryption tag, an urgency tag, and compressed data;
step S2: reading all data in the information creating database, and endowing the data with corresponding data labels according to the characteristics of each data;
step S3: establishing a credit creation database corresponding to the data tag according to the data tag, and importing the data into the corresponding credit creation database through the retrieval serial number; it should be further noted that, in the specific implementation process, the capacity in the creation database is fixed, that is, the number of data that can be accommodated by the creation database is fixed, and after the data is imported into the creation database and the capacity of the creation database reaches saturation, a creation database corresponding to the data tag is established again, and the creation database with the saturated capacity is sealed;
step S4: and marking the credit creation database with saturated capacity, and acquiring the size of each data in the credit creation database.
It should be further explained that, in the specific implementation process, after the data in the creation database is read, the read data is processed, and the specific processing process includes the following steps:
step C1: marking the size of each data in the credit creation database with saturated capacity, and calculating to obtain the total value of all data sizes in the credit creation database;
step C2: reading the size of the credit creation database, and comparing the size of the credit creation database with the total value of all data sizes in the credit creation database to obtain a data tolerance value;
step C3: marking the data tolerance value and the data quantity in the credit creation data sub-library, and then encrypting through an MD5 algorithm;
it should be further noted that, in the specific implementation process, the capacity of the creation data sub-library is a fixed value, and when the number of data in the creation data sub-library does not reach saturation, a plurality of padding data streams are generated in the creation data sub-library, and the number of the padding data streams is recorded, so that the number of data in the creation data sub-library reaches saturation, and the size of each padding data stream is consistent.
The process of encrypting the trusted database by the MD5 algorithm specifically comprises the following steps:
step M1: marking the credit creation databases in the credit creation database, and acquiring the retrieval serial number of each credit creation database;
step M2: generating a first binary code group according to the retrieval serial number of the credit database;
step M3: marking each data in the innovation database, and randomly generating an independent code; it should be further noted that, in the specific implementation process, uniqueness exists between each independent code, and the independent codes may be numbers, letters, or a combination of numbers and letters, and when the independent codes are numbers, they are not 00; when the credit database contains the filling data stream, the independent codes of the filling data stream are 00;
step M4: generating a second binary code group according to the data tolerance value of the credit creation data sub-database;
step M5: and taking the first binary code group as the start and the second binary code group as the end, randomly sequencing the independent codes between the first binary code group and the second binary code group to obtain a first encryption code group, generating a first encryption value, and binding the first encryption value and the first encryption code group to finish the encryption of the trusted data bank.
It should be further explained that, in the specific implementation process, after the data in each innovation database is encrypted, a corresponding migration path is selected according to the data tag corresponding to the innovation database, and in the data migration process, blocking protection is performed on the migration path, and the specific process includes the following steps:
step Q1: selecting all corresponding migration paths according to the data labels of the information creation database, and marking the selected migration paths;
step Q2: respectively setting a first migration node, a second migration node and a third migration node in each migration path;
step Q3: communicating the first migration nodes on all migration paths, communicating the second migration nodes on all migration paths, and communicating the third migration nodes on all migration paths;
step Q4: and implementing unidirectional blocking protection on all the first migration node, the second migration node and the third migration node.
It should be further explained that, in the specific implementation process, the specific contents of the unidirectional blocking protection are as follows: data in the trusted database needs to sequentially pass through a first migration node, a second migration node and a third migration node in a migration path, and the specific migration process of the data is as follows:
step Y1: the data in the original trust creation database is backed up, the backed-up trust creation database is marked as first backup data, and then the data in the original trust creation database is migrated to a first migration node;
step Y2: after the data in the original information creation database reaches the first migration node, the data is verified in the first migration node, and the specific verification process comprises the following steps:
step Y21: marking all the credit creation databases arriving at the first migration node, and obtaining corresponding retrieval serial numbers;
step Y22: matching the obtained retrieval serial number with the retrieval serial numbers corresponding to all the credit creation data sub-databases in the first backup data, and judging whether the credit creation data sub-databases are missing or not;
step Y23: when the information creating database is not missing, all the information creating database is migrated to a second migration node; when the trusted data sub-database is missing, judging that the data is missing in the migration process, clearing all the data in the first migration node, and reselecting a migration path;
step Y3: after the verification is successful, the first backup data is removed, meanwhile, the data in the original message creation database is backed up in the first migration node to generate second backup data, and then the data in the original message creation database is migrated to the second migration node;
step Y4: after the data in the original trust database reach the second migration node, verifying the data in the second migration node, wherein the verification process is the steps Y21-Y23;
step Y5: after the verification is successful, the second backup data is removed, meanwhile, the data in the original message creation database is backed up in the second migration node to generate third backup data, and then the data in the original message creation database is migrated to the third migration node;
step Y6: after the data in the original trust database reaches the third migration node, verifying the data in the third migration node, wherein the verification process is the steps Y21-Y23;
step Y7: and after the verification is successful, clearing the third backup data, and then migrating the data in the original information and creation database to the target database.
It should be further explained that, when the created database is located in the second migration node and there is no deletion, all created databases are migrated to the third migration node; when the credit creation database is missing, judging that the data is missing in the migration process, clearing all the data in the second migration node, and sending the data in the original credit creation database in the first migration node to the second migration node on the other migration path;
when the credit creation database is located in the third migration node and is not missing, migrating all the credit creation databases to the target database; and when the original trust database in the second migration node is lost, judging that the data is lost in the migration process, clearing all the data in the third migration node, and sending the data in the original trust database in the second migration node to the third migration node on the other migration path.
In a specific implementation process, after data are migrated into a target database, encrypting the data in the target database through an MD5 algorithm, wherein the encryption process is consistent with the encryption process of the trusted database, obtaining a second encryption value, comparing whether a first encryption value is consistent with the second encryption value, when the first encryption value is consistent with the second encryption value, indicating that the data are completely migrated, and when the first encryption value is greater than the second encryption value, indicating that data are missing in the data migration process; and when the first encryption value is smaller than the second encryption value, judging that illegal data enter in the data migration process, verifying and checking independent codes of each piece of data to determine the position of the illegal data, and clearing the illegal data.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and there may be other divisions when the actual implementation is performed; the modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the method of the embodiment.
Finally, it should be noted that the above examples are only intended to illustrate the technical process of the present invention and not to limit the same, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical process of the present invention without departing from the spirit and scope of the technical process of the present invention.
Claims (4)
1. A trust and creation database migration verification method is characterized by comprising the following steps:
the method comprises the following steps: reading all data in the information creating database, acquiring basic information of the data, and setting a data tag for each piece of data;
step two: processing the read data, encrypting the trusted database by an MD5 algorithm, and generating a first encryption value;
step three: selecting a migration path and a target database, and implementing blocking protection on the selected migration path;
step four: in the data migration process, verifying the migrated data, then completing the complete migration of the data, and encrypting the migrated data through an MD5 algorithm to obtain a second encryption value;
the process of encrypting the trusted database by the MD5 algorithm comprises the following steps: marking the credit creation databases in the credit creation database, and acquiring the retrieval serial number of each credit creation database; generating a first binary code group according to the retrieval serial number of the credit database; marking each data in the innovation database, and randomly generating an independent code; generating a second binary code group according to the data tolerance value of the credit creation data sub-database; generating a first encryption code group according to the first binary code group, the second binary code group and the independent codes, then generating a first encryption value, and binding the first encryption value and the first encryption code group;
the process of blocking and protecting the migration path comprises the following steps: selecting all corresponding migration paths according to the data labels of the information creation database, and marking the selected migration paths; respectively setting a first migration node, a second migration node and a third migration node in each migration path; communicating the first migration nodes on all migration paths, communicating the second migration nodes on all migration paths, and communicating the third migration nodes on all migration paths; unidirectional blocking protection is carried out on all the first migration node, the second migration node and the third migration node;
the migration process of the data is as follows: the data in the original trust creation database is backed up, the backed-up trust creation database is marked as first backup data, and then the data in the original trust creation database is migrated to a first migration node; after the data in the original trust database reaches the first migration node, the data is verified in the first migration node, after the verification is successful, the first backup data is removed, meanwhile, second backup data is generated in the first migration node, and then the data in the original trust database is migrated to the second migration node; after the data in the original trust database reaches the second migration node, the data is verified in the second migration node, after the verification is successful, the second backup data is removed, meanwhile, third backup data is generated in the second migration node, and then the data in the original trust database is migrated to the third migration node; after the data in the original trust creation database reaches the third migration node, the data is verified in the third migration node, after the verification is successful, the third backup data is removed, and then the data in the original trust creation database is migrated to the target database;
the process of verifying the data comprises the following steps: marking all the credit creation databases arriving at the first migration node, and obtaining corresponding retrieval serial numbers; matching the obtained retrieval serial number with the retrieval serial numbers corresponding to all the credit creation data sub-databases in the first backup data, and judging whether the credit creation data sub-databases are missing or not; when the information creating database is not missing, all the information creating database is migrated to a second migration node; when the trusted data sub-database is missing, judging that the data is missing in the migration process, clearing all the data in the first migration node, and reselecting a migration path;
and after the data are migrated into the target database, encrypting the data in the target database through an MD5 algorithm to obtain a second encrypted value, and comparing whether the first encrypted value is consistent with the second encrypted value.
2. The method for verifying the migration of the trusted database as claimed in claim 1, wherein the step of reading the basic information of all the data in the trusted database comprises: setting a data label library, creating a plurality of data labels in the data label library, and setting a retrieval serial number according to each data label; reading all data in the information creating database, and endowing the data with corresponding data labels according to the characteristics of each data; establishing a credit creation database corresponding to the data tag according to the data tag, and importing the data into the corresponding credit creation database through the retrieval serial number; and marking the credit creation database with saturated capacity, and acquiring the size of each data in the credit creation database.
3. The trust and creation database migration verification method according to claim 1, wherein the process of processing the read data comprises: marking the size of each data in the credit creation database with saturated capacity, and calculating to obtain the total value of all data sizes in the credit creation database; and reading the size of the credit creation database, and comparing the size of the credit creation database with the total value of all data sizes in the credit creation database to obtain a data tolerance value.
4. The method for verifying the migration of the trusted database according to claim 3, wherein the capacity of the trusted database is a fixed value, and when the amount of data in the trusted database is not saturated, a plurality of padding data streams are generated in the trusted database, and the amount of the padding data streams is recorded, so that the amount of data in the trusted database is saturated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111208087.8A CN113641662B (en) | 2021-10-18 | 2021-10-18 | Credit database migration verification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111208087.8A CN113641662B (en) | 2021-10-18 | 2021-10-18 | Credit database migration verification method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113641662A CN113641662A (en) | 2021-11-12 |
CN113641662B true CN113641662B (en) | 2022-02-11 |
Family
ID=78427214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111208087.8A Active CN113641662B (en) | 2021-10-18 | 2021-10-18 | Credit database migration verification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113641662B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103324592A (en) * | 2013-06-24 | 2013-09-25 | 华为技术有限公司 | Data migration control method, data migration method and data migration device |
CN105872053A (en) * | 2016-03-30 | 2016-08-17 | 中国联合网络通信集团有限公司 | Data migration method and system |
CN106682534A (en) * | 2017-01-23 | 2017-05-17 | 郑州云海信息技术有限公司 | Method and device for verifying data integrity in data migration process |
CN111104392A (en) * | 2019-12-12 | 2020-05-05 | 京东数字科技控股有限公司 | Database migration method and device, electronic equipment and storage medium |
CN113392090A (en) * | 2021-06-29 | 2021-09-14 | 未鲲(上海)科技服务有限公司 | Data verification method, device, equipment and medium based on database migration |
-
2021
- 2021-10-18 CN CN202111208087.8A patent/CN113641662B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103324592A (en) * | 2013-06-24 | 2013-09-25 | 华为技术有限公司 | Data migration control method, data migration method and data migration device |
CN105872053A (en) * | 2016-03-30 | 2016-08-17 | 中国联合网络通信集团有限公司 | Data migration method and system |
CN106682534A (en) * | 2017-01-23 | 2017-05-17 | 郑州云海信息技术有限公司 | Method and device for verifying data integrity in data migration process |
CN111104392A (en) * | 2019-12-12 | 2020-05-05 | 京东数字科技控股有限公司 | Database migration method and device, electronic equipment and storage medium |
CN113392090A (en) * | 2021-06-29 | 2021-09-14 | 未鲲(上海)科技服务有限公司 | Data verification method, device, equipment and medium based on database migration |
Also Published As
Publication number | Publication date |
---|---|
CN113641662A (en) | 2021-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11321431B2 (en) | Data processing, watermark embedding and watermark extraction | |
CN103034564B (en) | Data disaster tolerance drilling method, data disaster tolerance practice device and system | |
CN111415254B (en) | IP derivative digital asset method and system based on blockchain communication | |
CN106951345A (en) | A kind of conformance test method and device of magnetic disk of virtual machine data | |
CN110018924A (en) | A kind of file damage preventing method based on block chain and correcting and eleting codes | |
CN108733516A (en) | Cloudy secure storage dynamic equilibrium backup method and system | |
CN113377401A (en) | Method and tool for packaging version file of embedded device | |
CN111163126A (en) | Remote backup recovery method based on Ceph distributed storage | |
CN105302665A (en) | Improved copy-on-write snapshot method and system | |
CN114860745B (en) | Database expansion method based on artificial intelligence and related equipment | |
CN110232080B (en) | Rapid retrieval method based on block chain | |
CN102402470A (en) | flash program automatic error correction repairing method and device | |
CN102971984B (en) | Method for authenticating a storage device and host device | |
CN110555682B (en) | Multi-channel implementation method based on alliance chain | |
CN105678190A (en) | Data storage auditing system | |
CN100386737C (en) | Data recovery technique based on packet structure | |
CN113641662B (en) | Credit database migration verification method | |
CN102624545A (en) | Data backup method, data backup device, data recovery method and data recovery device of network management system | |
CN113642020A (en) | Dynamic encryption method and device for configuration file, electronic equipment and storage medium | |
CN117933239A (en) | Contract and equipment information association method, device, equipment and storage medium | |
CN106294017B (en) | A kind of information security back-up method | |
CN108536822A (en) | Data migration method, device, system and storage medium | |
CN108280097A (en) | A kind of fault handling method and device of Database Systems | |
CN113821820B (en) | Method, device, medium and equipment for encrypting and decrypting resources in splitting mode | |
CN109582646A (en) | A kind of redundancy and restoration methods and system for file declustering |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |