CN101625654B - Method and system for restoring encrypted backup of embedded systems - Google Patents
Method and system for restoring encrypted backup of embedded systems Download PDFInfo
- Publication number
- CN101625654B CN101625654B CN2008100713944A CN200810071394A CN101625654B CN 101625654 B CN101625654 B CN 101625654B CN 2008100713944 A CN2008100713944 A CN 2008100713944A CN 200810071394 A CN200810071394 A CN 200810071394A CN 101625654 B CN101625654 B CN 101625654B
- Authority
- CN
- China
- Prior art keywords
- backup
- subregion
- electric board
- embedded system
- restoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000009467 reduction Effects 0.000 claims description 27
- 239000012467 final product Substances 0.000 claims description 6
- 238000005192 partition Methods 0.000 claims description 5
- 230000008901 benefit Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000011946 reduction process Methods 0.000 description 2
- 230000002950 deficient Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a method for restoring encrypted backup of embedded systems. The method comprises the following steps carried out in turn: inserting an electronic disk provided with a system backup-restoring module into an embedded system, wherein the system backup-restoring module comprises a backup unit and a restoring unit; starting the embedded system, entering an expanded BIOS and choosing to start up from the electronic disk; choosing whether to back up or restore a system; running the backup unit in the system backup-restoring module, choosing a disk or a subarea needing to be backed up, specifying the subarea saving backup files and clicking a 'Backup' button if the system is to be backed up; running the restoring unit in the system backup-restoring module, choosing the disk or the subarea needing to be restored, specifying the subarea backing up files and clicking a 'Restore' button if the system is to be restored. The invention has the advantages of no need for PC to restore backup, simple operation and high data security of backup.
Description
[technical field]
The present invention relates to a kind of embedded system, be meant a kind of embedded system encrypted backup method of reducing and system especially.
[background technology]
Present data backup and restore mainly usefulness be the software of ghost and so on, can realize backup and reduction through ghost to data in magnetic disk.But existing backup and restore method has drawback: 1. data backup and restore complicated operating process; 2. the backed up data security is not high, the leakage of significant data possibly occur; 3. such software is mainly based on the PC platform, and backup and reduction each time all will be realized through PC, be difficult to realize its function in the place that does not have PC.The present invention is directed to above defective has carried out improving targetedly.
[summary of the invention]
One of technical matters to be solved by this invention is to provide a kind of embedded system and easy operating, safe embedded system encrypted backup method of reducing that is applicable to.
Two of technical matters to be solved by this invention is to provide a kind of embedded system and easy operating, safe embedded system encrypted backup restoring system that is applicable to.
The present invention one of solves the problems of the technologies described above through following technical scheme: a kind of embedded system encrypted backup method of reducing comprises the following steps of carrying out successively:
Step 1: the electric board that small-sized system and restoring system backup module will be housed is inserted in the embedded system, and said restoring system backup module comprises backup units and reduction unit;
Step 2: open embedded system, and get into the expanded BIOS selection, the mini system of operation electric board the inside from the electric board startup;
Step 3: start-up system backup and reduction module;
Step 4: selection is to carry out system backup or system reducing, as carrying out system backup, then gets into step 5, as carrying out system reducing, then gets into step 6;
Step 5: the backup units in the operational system backup and reduction module, selection needs the disk or the subregion of backup, and specifies the subregion of preserving backup file; Go back original code if be provided with; Then click " password is set ", click " backup " afterwards and get final product, get into step 7 then;
Step 6: the reduction unit in the operational system backup and reduction module, selection needs the disk or the subregion of reduction, and specifies the subregion of backup file; Clicking " reduction " gets final product; Go back original code if backup file has to be provided with, then eject the password input frame, if the password mistake of input; Then can not carry out restoring operation, get into step 7 then;
Step 7: finish.
This invention further is specially:
Backup units in the said step 5 restoring system backup module specifically comprises the following steps of carrying out successively:
Step 502: backup procedure begins;
Step 504: all subregions of carry embedded system;
Step 506: select subregion to back up;
Step 508: storage directory and file name that backup file is set;
Step 510: secret grade is set;
Step 512: be provided with and go back original code;
Step 514: according to certain algorithm subregion is divided into the n piece, and writes down size, reference position and the numbering of each piece, said certain algorithm is: whether the size of judging subregion is greater than 1G; If greater than 1G; Then get n=100, otherwise, n=partition size/10M+1 got;
Step 516: according to the order of subregion, according to the data of set secret grade with each piece subregion of different encrypted algorithm for encryption;
Step 518: data encrypted is write backup file, and write down its size and reference position;
Step 520: the head that fileinfo is written to backup file;
Step 522: the data that judge whether all pieces of subregion all back up and finish, and in this way, get into step 524, otherwise return step 516;
Step 524: finish.
Reduction unit in the said step 6 restoring system backup module specifically comprises the following steps of carrying out successively:
Step 602: reduction process begins;
Step 604: all subregions of carry embedded system;
Step 606: select the subregion that will reduce;
Step 608: select backup file;
Step 610: read the backup file header;
Step 612: judged whether to be provided with and gone back original code, in this way, got into step 614, otherwise directly get into step 618;
Step 614: authentication password;
Step 616: judge whether password is correct, in this way, then get into step 618, otherwise, get into step 628;
Step 618: judge the partition size that will reduce whether enough? If, then get into step 620, otherwise, step 628 got into;
Step 620: according to certain algorithm subregion is divided into the n piece, and writes down size, reference position and the numbering of each piece;
Step 622: according to the order of subregion, according to the data of secret grade with different each piece subregions of decipherment algorithm deciphering;
Step 624: the data after will deciphering write the subregion that will reduce, file header has the information of this block size of record and position;
Step 626: the data that judge whether all pieces of subregion are all reduced and are finished, and in this way, get into step 628, otherwise return step 622;
Step 628: finish.
The present invention through following technical scheme solve the problems of the technologies described above two: a kind of system that moves aforesaid embedded system encrypted backup method of reducing; Comprise embedded system and electric board; The interface that comprises electric board in the said embedded system, said electric board is inserted in the embedded system through said interface.
Said interface is the ide slot.
Said electric board is the DOM electric board.
The advantage of embedded system encrypted backup method of reducing of the present invention and system is: need not realize during backup and reduction through PC, and simple to operate, backed up data is safe.
[description of drawings]
Combine embodiment that the present invention is done further description with reference to the accompanying drawings.
Fig. 1 is the general flow chart of embedded system encrypted backup method of reducing of the present invention.
Fig. 2 is the system backup process flow diagram of embedded system encrypted backup method of reducing of the present invention.
Fig. 3 is the system reducing process flow diagram of embedded system encrypted backup method of reducing of the present invention.
[embodiment]
Embedded system encrypted backup method of reducing of the present invention mainly is made up of three parts: embedded system, electric board, and BIOS (Basic Input Output System, Basic Input or Output System (BIOS)).Wherein embedded system comprises its hardware platform and data to back up; The interface that should comprise electric board in the hardware platform of embedded system; Like IDE (Integrated Drive Electronics; Ide) slot etc. is equipped with small-sized system and backup and reduction software in the electric board, BIOS realizes the system in the guiding electric board.This electric board can be DOM (Disk On Module) electric board.
When will backing up or during the restoring system data, at first electric board received in the embedded system through the interface in the hardware platform of embedded system, and select to start the mini system of operation electric board the inside at BIOS from electric board; Use the software in this mini system to realize backup-and-restore to goal systems.
See also Fig. 1, this embedded system encrypted backup method of reducing comprises the following steps of carrying out successively:
Step 1: the electric board that small-sized system and restoring system backup module will be housed is inserted in the embedded system, and said restoring system backup module comprises backup units and reduction unit;
Step 2: open embedded system, and get into the expanded BIOS selection, the mini system of operation electric board the inside from the electric board startup;
Step 3: start-up system backup and reduction module;
Step 4: selection is to carry out system backup or system reducing, as carrying out system backup, then gets into step 5, as carrying out system reducing, then gets into step 6;
Step 5: the backup units in the operational system backup and reduction module, selection needs the disk or the subregion of backup, and specifies the subregion of preserving backup file; Go back original code if be provided with; Then click " password is set ", click " backup " afterwards and get final product, get into step 7 then;
Step 6: the reduction unit in the operational system backup and reduction module, selection needs the disk or the subregion of reduction, and specifies the subregion of backup file; Clicking " reduction " gets final product; Go back original code if backup file has to be provided with, then eject the password input frame, if the password mistake of input; Then can not carry out restoring operation, get into step 7 then;
Step 7: finish.
See also Fig. 2, the backup units in the said step 5 restoring system backup module specifically comprises the following steps of carrying out successively:
Step 502: backup procedure begins;
Step 504: all subregions of carry embedded system;
Step 506: select subregion to back up;
Step 508: storage directory and file name that backup file is set;
Step 510: secret grade is set;
Step 512: be provided with and go back original code;
Step 514: according to certain algorithm subregion is divided into the n piece, and writes down size, reference position and the numbering of each piece, the algorithm that adopts in the present embodiment is: whether the size of judging subregion is greater than 1G; If greater than 1G; Then get n=100, otherwise, n=partition size/10M+1 got;
Step 516: according to the order of subregion, according to the data of set secret grade, in the present embodiment with each piece subregion of different encrypted algorithm for encryption; Secret grade is divided into three grades, and wherein 3rd level is not encrypted, directly storage; The 2nd grade of simple encryption storage; Being about to the data negate preservation that the data block meta is changed to odd number, is that 0000FFFF... will save as FF0000FF... like data block, and the 1st grade is adopted the common des encryption decipherment algorithm of more complicated to preserve data;
Step 518: data encrypted is write backup file, and write down its size and reference position;
Step 520: the head that fileinfo is written to backup file; This document information comprises the size of extension set to back up, the piece number that is divided into; Encryption is preferably also carried out with file header in the size of each piece, reference position, numbering, secret grade, data encrypted size, memory location etc.;
Step 522: the data that judge whether all pieces of subregion all back up and finish, and in this way, get into step 524, otherwise return step 516;
Step 524: finish.
See also Fig. 3, the reduction unit in the said step 6 restoring system backup module specifically comprises the following steps of carrying out successively:
Step 602: reduction process begins;
Step 604: all subregions of carry embedded system;
Step 606: select the subregion that will reduce;
Step 608: select backup file;
Step 610: read the backup file header;
Step 612: judged whether to be provided with and gone back original code, in this way, got into step 614, otherwise directly get into step 618;
Step 614: authentication password;
Step 616: judge whether password is correct, in this way, then get into step 618, otherwise, get into step 628;
Step 618: judge the partition size that will reduce whether enough? If, then get into step 620, otherwise, step 628 got into;
Step 620: according to certain algorithm subregion is divided into the n piece, and writes down size, reference position and the numbering of each piece;
Step 622: according to the order of subregion, according to the data of secret grade with different each piece subregions of decipherment algorithm deciphering;
Step 624: the data after will deciphering write the subregion that will reduce, file header has the information of this block size of record and position;
Step 626: the data that judge whether all pieces of subregion are all reduced and are finished, and in this way, get into step 628, otherwise return step 622;
Step 628: finish.
The invention also discloses a kind of system that moves above-mentioned backup and restore method, comprise embedded system and electric board, said electric board inserts in the said embedded system.
Though more than described embodiment of the present invention; But the technician who is familiar with the present technique field is to be understood that; We described concrete embodiment is illustrative; Rather than being used for qualification to scope of the present invention, those of ordinary skill in the art are in the modification and the variation of the equivalence of doing according to spirit of the present invention, all should be encompassed in the scope that claim of the present invention protects.
Claims (5)
1. embedded system encrypted backup method of reducing is characterized in that: comprise the following steps of carrying out successively:
Step 1: the electric board that small-sized system and restoring system backup module will be housed is inserted in the embedded system, and said restoring system backup module comprises backup units and reduction unit;
Step 2: open embedded system, and get into the expanded BIOS selection, the mini system of operation electric board the inside from the electric board startup;
Step 3: start-up system backup and reduction module;
Step 4: selection is to carry out system backup or system reducing, as carrying out system backup, then gets into step 5, as carrying out system reducing, then gets into step 6;
Step 5: the backup units in the operational system backup and reduction module, selection needs the disk or the subregion of backup, and specifies the subregion of preserving backup file; Go back original code if be provided with; Then click " password is set ", click " backup " afterwards and get final product, get into step 7 then;
Step 6: the reduction unit in the operational system backup and reduction module, selection needs the disk or the subregion of reduction, and specifies the subregion of backup file; Clicking " reduction " gets final product; Go back original code if backup file has to be provided with, then eject the password input frame, if the password mistake of input; Then can not carry out restoring operation, get into step 7 then;
Step 7: finish.
2. embedded system encrypted backup method of reducing as claimed in claim 1 is characterized in that: the backup units in the said step 5 restoring system backup module specifically comprises the following steps of carrying out successively:
Step 502: backup procedure begins;
Step 504: all subregions of carry embedded system;
Step 506: select subregion to back up;
Step 508: storage directory and file name that backup file is set;
Step 510: secret grade is set;
Step 512: be provided with and go back original code;
Step 514: according to certain algorithm subregion is divided into the n piece, and writes down size, reference position and the numbering of each piece, said certain algorithm is: whether the size of judging subregion is greater than 1G; If greater than 1G; Then get n=100, otherwise, n=partition size/10M+1 got;
Step 516: according to the order of subregion, according to the data of set secret grade with each piece subregion of different encrypted algorithm for encryption;
Step 518: data encrypted is write backup file, and write down its size and reference position;
Step 520: the head that fileinfo is written to backup file;
Step 522: the data that judge whether all pieces of subregion all back up and finish, and in this way, get into step 524, otherwise return step 516;
Step 524: finish.
One kind the operation embedded system encrypted backup method of reducing as claimed in claim 1 system; It is characterized in that: comprise embedded system and electric board; The interface that comprises electric board in the said embedded system, said electric board is inserted in the embedded system through said interface.
4. system as claimed in claim 3 is characterized in that: said interface is the ide slot.
5. system as claimed in claim 4 is characterized in that: said electric board is the DOM electric board.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100713944A CN101625654B (en) | 2008-07-10 | 2008-07-10 | Method and system for restoring encrypted backup of embedded systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100713944A CN101625654B (en) | 2008-07-10 | 2008-07-10 | Method and system for restoring encrypted backup of embedded systems |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101625654A CN101625654A (en) | 2010-01-13 |
CN101625654B true CN101625654B (en) | 2012-01-11 |
Family
ID=41521509
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008100713944A Expired - Fee Related CN101625654B (en) | 2008-07-10 | 2008-07-10 | Method and system for restoring encrypted backup of embedded systems |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101625654B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102495670A (en) * | 2011-12-09 | 2012-06-13 | 山东大学 | Systematic one-key reset device applicable to embedded Linux operating system |
CN105376051A (en) * | 2014-08-29 | 2016-03-02 | 宇龙计算机通信科技(深圳)有限公司 | Encryption method and apparatus, and terminal |
CN108062261B (en) * | 2016-11-09 | 2021-11-19 | 中标软件有限公司 | Backup restoration method for Linux desktop operating system |
CN108874584B (en) * | 2018-05-04 | 2021-06-01 | 上海达梦数据库有限公司 | Data backup method, data recovery method, device, equipment and storage medium |
CN111898163A (en) * | 2020-09-30 | 2020-11-06 | 南京信同诚信息技术有限公司 | Big data center level protection safety coefficient |
CN112764965A (en) * | 2020-12-25 | 2021-05-07 | 芜湖翼讯飞行智能装备有限公司 | Data recovery system for network software development |
CN112711764A (en) * | 2020-12-30 | 2021-04-27 | 南方电网科学研究院有限责任公司 | Data reading and writing method and device and electronic equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1963786A (en) * | 2005-11-08 | 2007-05-16 | 英业达股份有限公司 | Method for executing backup and rerun routine to backup and rerun data in hard disk |
CN101140537A (en) * | 2007-10-24 | 2008-03-12 | 国电南京自动化股份有限公司 | Backup and recovery operation method of built-in operating system |
-
2008
- 2008-07-10 CN CN2008100713944A patent/CN101625654B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1963786A (en) * | 2005-11-08 | 2007-05-16 | 英业达股份有限公司 | Method for executing backup and rerun routine to backup and rerun data in hard disk |
CN101140537A (en) * | 2007-10-24 | 2008-03-12 | 国电南京自动化股份有限公司 | Backup and recovery operation method of built-in operating system |
Also Published As
Publication number | Publication date |
---|---|
CN101625654A (en) | 2010-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101625654B (en) | Method and system for restoring encrypted backup of embedded systems | |
CN102932621B (en) | Method and device for storing data | |
CN101615231A (en) | Recording medium, license management apparatus and record and playback reproducer | |
CN102982274A (en) | Management method of intelligent terminal system and intelligent terminal | |
WO2008019259A3 (en) | Architecture for back up and/or recovery of electronic data | |
CN101617323A (en) | Right information moving method, content player, semiconductor device | |
EP0745934A3 (en) | File system for a data storage device having a power fail recovery mechanism for write/replace operations | |
CN1924835A (en) | Dynamic key based hardware data enciphering method and device thereof | |
CN101895542B (en) | Verification code acquiring method and device | |
CN101521782B (en) | Method for fast-forward and fast-backward browsing video, system and multimedia equipment | |
CN101042683A (en) | Method and apparatus for binding computer memory to motherboard | |
CN200990077Y (en) | Low power digital audio frequency decoding and playing system for computing equipment | |
CN110826099A (en) | Safe storage method and system suitable for embedded real-time operating system | |
CN101551838B (en) | Identity authentication method and system of memory card | |
CN103092719B (en) | A kind of power-off protection method of file system | |
CN110673863B (en) | Intelligent lock system supporting pluggable external storage and intelligent upgrading method | |
CN101354684A (en) | Method and system for accessing finance data | |
US7600151B2 (en) | RAID capacity expansion interruption recovery handling method and system | |
CN102929806B (en) | Be applicable to progress record method and the restoration methods of the encoding operation of memory storage | |
US9552855B2 (en) | Accessing a serial number of a removable non-volatile memory device | |
CN102034040A (en) | Log implementation method in encryption card | |
WO2001031444A3 (en) | Method for preventing repeating non-recoverable read errors at same physical location on data storage media | |
CN101004919B (en) | Testing storage system electronics using loopback | |
CN101201882B (en) | Operating system protection method | |
CN1949383A (en) | Hard disk capable of instant restoring of stored data, apparatus and using method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120111 |