Network hard disk backup file data safe system and method based on virtual disk
A technology of virtual disk and backup file, applied to the redundancy in computing for data error detection, transmission system, electrical components, etc. The effect of improved safety and convenience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] The invention discloses a network hard disk backup file data security system based on a virtual disk. The system includes a network hard disk server end and a client end communicating with each other.
[0040] Using the method and system of the present invention, each client can log in to the network hard disk server after verification of the account name and password, and can read the backup files of its own friends, but does not have the authority to read and modify files of non-friends. Has read and modify permissions on its own files.
[0041] The user encrypts and transmits the files that need to be backed up locally to the network hard disk server end through the client, and sets other users' access rights to their own backup files; saves the user's rights information in an access rights index table (such as figure 1 shown). Preferably, the user can respectively set the access rights of other users to each backup file of the user through its client, such as a cer...
Embodiment 2
[0056] This embodiment discloses a network hard disk backup file data security method based on a virtual disk.
[0057] The client can set the friends who can share the backup files as ordinary users, set itself as a super user, and set all non-friends as guest users, which prevents every client on the network hard disk from being able to read the backup files. Take operations to ensure that backup files are not obtained by illegal users.
[0058] The operation of the local network disk client is:
[0059] (1) The operating system loads the driver of the virtual disk.
[0060] (2) Set the accounts of super users, ordinary users and guest users, determine the access rights of these three types of users to the backup files (including readable, unreadable and modifiable three kinds of rights), and form an access right index table.
[0061] (3) The files and index tables to be backed up are transmitted to the server on the network disk through 128-bit SSL encryption.
[0062] T...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 