Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data migration method for encrypted database

A database and data technology, applied in the field of data migration of encrypted databases, can solve problems such as affecting user usage, slow data migration and transmission, and long downtime, so as to reduce wasted transmission time, improve data migration speed, and reduce user loss. Effect

Pending Publication Date: 2022-01-07
BEIJING UXSINO SOFTWARE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing data migration method has a long downtime during use. During the downtime, the database cannot be used, which affects the use of users and causes certain economic losses. The existing data migration transmission speed is slow, and there is a possibility of data leakage during the transmission process. The performance is poor; when the existing data is migrated, there may be power outages or other accidents that may cause data loss during transmission, and retransmission wastes a lot of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data migration method for encrypted database
  • Data migration method for encrypted database
  • Data migration method for encrypted database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] see figure 2 , a kind of data migration method for encrypted database, the data migration method of described encrypted database comprises the following steps:

[0039] (1) Use a temporary server to build a temporary database based on the old database, and switch the old server to run on the temporary server.

[0040] (2) Establish an independent server, divide common files into data, obtain several common file packages, and use the data comparison module to generate a comparison directory.

[0041] (3) Send several ordinary file packages to the storage unit in the new server through the web, and use the splicing module to splice the several ordinary file packages into an integrated file.

[0042] (4) When using the import module to import the complete file into the new database, use the update module to import the temporary file in the temporary database into the new database to complete the data migration of the encrypted database.

[0043] Specifically, in the ste...

Embodiment 2

[0050] see image 3 , a kind of data migration method for encrypted database, the data migration method of described encrypted database comprises the following steps:

[0051] (1) Use a temporary server to build a temporary database based on the old database, and switch the old server to run on the temporary server.

[0052] (2) Establish an independent server, divide the data of sensitive data files, obtain several sensitive data packets, and use the data comparison module to generate a comparison directory. Sensitive data refers to data that may cause serious harm to society or individuals after leakage, including Personal privacy data, such as name, ID number, address, telephone number, bank account number, email address, password, medical information, educational background, etc., also includes data that is not suitable for publication by enterprises or social institutions, such as the business situation of the enterprise, the network of the enterprise structure, list of IP...

Embodiment 3

[0094] see figure 1 , a kind of data migration method for encrypted database, the data migration method of described encrypted database comprises the following steps:

[0095] (1) Use a temporary server to build a temporary database based on the old database, and switch the old server to run on the temporary server.

[0096] (2) Establish an independent server to use the data segmentation module to classify the data information in the old database, classify the data information in the old database into ordinary files and sensitive data files, and divide the sensitive data files and ordinary files into data to obtain several sensitive files. For data packages and ordinary file packages, use the data comparison module to generate a comparison directory; sensitive data refers to data that may cause serious harm to society or individuals after leakage, including personal privacy data, such as name, ID number, address, phone number, Bank account numbers, email addresses, passwords...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data migration method for an encrypted database. The storage method for vehicle data without being tampered comprises the following steps: establishing a temporary database by using a temporary server on the basis of an old database; establishing an independent server, and classifying and segmenting data; encrypting and compressing the common file and the sensitive data file; transmitting data through a web; receiving the file, decompressing, decrypting and integrating the file; comparing and feeding back; and completing database migration. The encryption module is used for encrypting the sensitive data packets respectively, leakage of data information is avoided, safety is high, the temporary database is established by using the temporary server and relying on the old database, the old server is switched to the temporary server for operation, server shutdown maintenance is avoided, user loss is reduced, inconvenience brought to users is avoided, waste of transmission time caused by interruption in the file transmission process is reduced, and the data migration speed is increased due to the fact that the independent server is arranged.

Description

technical field [0001] The invention relates to a data migration method for a database, in particular to a data migration method for an encrypted database, and belongs to the technical field of data migration methods for databases. Background technique [0002] A database is a "warehouse that organizes, stores and manages data according to the data structure". The storage space is very large, and can store millions or even hundreds of millions of data, but the database does not store data randomly, there are certain rules, otherwise the query efficiency will be very low, and there are many sources of data, such as Travel records, consumption records, web pages browsed, messages sent, etc., in addition to text-type data, images, music, and sounds are all data. With the development of technology, equipment needs to be updated, and the database also needs to be replaced with new storage. unit, so the data in the database needs to be migrated, but the existing data migration me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/21G06F16/28G06F21/60G06F21/62G06F16/174
CPCG06F16/214G06F16/285G06F21/6218G06F21/602G06F16/1744G06F2221/2107
Inventor 逯瑶
Owner BEIJING UXSINO SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products