CN100444109C - Circumstance rebuilding method of application software - Google Patents
Circumstance rebuilding method of application software Download PDFInfo
- Publication number
- CN100444109C CN100444109C CNB2005101014799A CN200510101479A CN100444109C CN 100444109 C CN100444109 C CN 100444109C CN B2005101014799 A CNB2005101014799 A CN B2005101014799A CN 200510101479 A CN200510101479 A CN 200510101479A CN 100444109 C CN100444109 C CN 100444109C
- Authority
- CN
- China
- Prior art keywords
- module
- storage device
- data file
- movable storage
- applied logic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention provides a software environment reconstruction method and system, including the application logic modules, mobile storage device driver modules, mobile storage devices. A mobile storage device access module is added between the application logic module and mobile storage device driver modules. Writing-data modules automatically write the environmental data into the mobile storage devices or network servers before the user exiting. Reading-data modules automatically load the said environmental data from mobile storage devices or network servers, and reconstruct the environment after the user landing. The invention customs features of the application software interface, application logic and the historical data, and software users can reconstruct the specific software environment at any computers, to get fully consistent user experience. Meanwhile, the invention can be avoided the usage of user information by other people.
Description
Technical field
The present invention relates to a kind of DASE formulating method, relate in particular to a kind of DASE method for reconstructing and system.
Background technology
Along with the appearance of popularizing and widely applying software of computing machine and computer network, people have been accustomed to utilizing various application software to satisfy the demand of oneself in work, studying and living.But when switching, the user run into more such problems between many computing machines:
1, the interface of application software does not meet the use habit of oneself, and the user has to software interface is disposed item by item, to satisfy the use habit of oneself.This process is not only loaded down with trivial details consuming time, and effect and bad, because if need the project of configuration various, and the software interface that the reconstruction oneself that the user may entirely accurate is accustomed to.
2, only be kept on the computing machine of current use with software required applied logic or historical data, the user must be manual with these data upload to server or copy in the movable storage device, when using other computing machines, download or from movable storage device, copy out the work that is placed on again before just can continuing under the application software specific directory then from server.
3, some personal sensitive informations (number of the account, password, Visitor Logs etc.) still keep on computers after the user uses software, the domestic consumer that does not possess certain professional knowledge is difficult to these information are thoroughly removed, thereby stay opportunity to the disabled user, cause damage to the user.
The existing practice generally is: manual configuration data file and the user's history data file etc. with application software of user uploads to transfer server or copies in the movable storage device, downloads or copy out the work of leaving in again before just can continuing under the application software designated directory from movable storage device from transfer server when using other computing machines then.In order to guarantee the safety of personal data, the user must be left the various personal data under each catalogue on the hard disk in by manual removal before leaving computing machine simultaneously.
There is following shortcoming in the above-mentioned practice:
1, this kind scheme complex operation relies on manually-operated fully, not only inefficiency but also make mistakes easily.
2, the user's computer application level has higher requirement, and there is technical threshold in domestic consumer, can't protect all users' interests.
3, the user uploads to transfer server or copies personal data in the movable storage device to does not have the security protection, has increased the risk that user data is stolen.
As seen, it is a new problem that occurs along with computing machine and development of computer network that DASE is rebuild, and for the more diversified user of those computed environment, this problem is even more important.But the present solution of system without comparison also in this field.
Summary of the invention
Technical matters to be solved by this invention provides a kind of DASE method for reconstructing and system, the features such as interface, applied logic and historical data of using software are customized, make software users on any computing machine, rebuild specific software environment, to obtain on all four user experience.
Further, the present invention can avoid user profile to be utilized by other people.
On solving the problems of the technologies described above, the invention provides a kind of DASE method for reconstructing, between applied logic and movable storage device driving or network-driven movable storage device access modules or network server access module are set, this method also comprises the steps:
Write data step: before the user withdraws from, start environmental data and preserve process, the build environment data file, and with the configuration information of software interface and applied logic, and user's historical data information write the environmental data file, afterwards, applied logic is submitted to described access modules with described environmental data file, the environmental data file that described access modules automatic reception applied logic module is submitted to, and the environmental data file driven via movable storage device or network-driven writes in the movable storage device or the webserver; Read data step: behind User login, described access modules receives the environment data file request of reading of applied logic, via movable storage device driving or network-driven the described environmental data file in the movable storage device or the webserver is returned to applied logic, and by applied logic reconstruction application software environment.
Further, the present invention also comprised before the write data step:
Encryption key obtaining step: utilize other information of user cipher or user to generate an encryption key;
Encrypting step: utilize this key that the environmental data file is encrypted, generate the file after encrypting, the environmental data file that writes the movable storage device or the webserver is encrypted.
Further, the present invention also comprises after the read data step:
Decruption key obtaining step: utilize other information generating solution decryption key of user cipher or user;
Decryption step: utilize this key that the environmental data file is decrypted, generate the file after deciphering, the file after will deciphering then returns to applied logic.
Further, method of the present invention also comprises the detection step: check whether movable storage device exists, and if there is no just returns mistake, if exist then carry out the key obtaining step.
Further, after the write data step, also comprise:
Remove step: just all are kept at local ephemeral data and remove, the user withdraws from then.
Correspondingly, the present invention also provides a kind of DASE reconstructing system, comprise that applied logic module, movable storage device driver module, movable storage device also are provided with the movable storage device access modules between applied logic module and movable storage device driver module;
Described applied logic module, before the user withdraws from, start environmental data and preserve process, the build environment data file, and with the configuration information of software interface and applied logic, and user's historical data information write the environmental data file, afterwards, described environmental data file is submitted to described movable storage device access modules; Behind User login, send the environment data file request of reading to described movable storage device access modules;
Described movable storage device access modules further comprises: the write data module, be used for before the user withdraws from, the environmental data file that automatic reception applied logic module is submitted to, and the environmental data file write in the movable storage device via the movable storage device driver module; The read data module, be used for behind User login, receive the environment data file request of reading of applied logic module, the described environmental data file in the movable storage device is returned to the applied logic module via the movable storage device driver module, and by applied logic module reconstruction application software environment.
Further, described movable storage device can be USB flash drive, portable hard drive, memory stick, CF card, SmartMedia card, common floppy disk, high capacity floppy disk and light medium memory device.
Simultaneously, the present invention also provides a kind of DASE reconstructing system, comprises that applied logic module, network-driven module, the webserver also are provided with the network server access module between applied logic module and network-driven module;
Described applied logic module, before the user withdraws from, start environmental data and preserve process, the build environment data file, and with the configuration information of software interface and applied logic, and user's historical data information write the environmental data file, afterwards, described environmental data file is submitted to described network server access module; Behind User login, send the environment data file request of reading to described network server access module;
Described network server access module comprises: the write data module: before the user withdraws from, and the environmental data file that automatic reception applied logic module is submitted to, and the environmental data file write in the webserver via the network-driven module; Read data module: behind User login, receive the environment data file request of reading of applied logic module, via the network-driven module the described environmental data file in the webserver is returned to the applied logic module, and by applied logic module reconstruction application software environment.
By DASE method for reconstructing of the present invention and system, the user uses on the various computing machine in the same software, just can obtain on all four user experience automatically, and needn't worry that personal sensitive information stolen by other people and utilize again.Whole process is realized automatically by software, and is simple and efficient and safe and reliable.Different application software or same application software but the environmental data that belongs to the different software user can be stored in (or in webserver) on the same movable storage device, every kind of application software or each user are merely able to obtain the environmental data of oneself when reading.
Description of drawings
Fig. 1 is software system framework figure of the present invention.
Fig. 2 is the process flow diagram that DASE data of the present invention are preserved process.
Fig. 3 is the process flow diagram of environment rebuilt process of the present invention.
Fig. 4 is that the DASE data of a specific embodiment of the present invention are preserved the interacting message figure of process.
Fig. 5 is the interacting message figure of the DASE process of reconstruction of a specific embodiment of the present invention.
Embodiment
As shown in Figure 1, specific embodiment of the present invention is: utilize the movable storage device of day by day popularizing to realize the reconstruction of DASE.Total system comprises: applied logic module, movable storage device driver module, movable storage device, between applied logic module and movable storage device driver module, increase the movable storage device access modules, and it comprises:
AIM, it is connected with the applied logic module, and the interface with the applied logic module is provided;
The key acquisition module, it utilizes user cipher or user other information generating solution decryption key or encryption keys;
Encrypting module, it is connected with key acquisition module, AIM, utilizes key that the environmental data file is encrypted, and generates the file after encrypting, and the environmental data that writes movable storage device is encrypted;
Deciphering module, it is connected with key acquisition module, AIM, utilizes key that the environmental data file is decrypted, and generates the file after deciphering, and the file after will deciphering then returns to the applied logic module.
The write data module, it is connected with encrypting module and movable storage device driver module, is used for before the user withdraws from, and environmental data is write in the movable storage device or the webserver automatically;
The read data module, it is connected with deciphering module and movable storage device driver module, is used for behind User login, is written into described environmental data and rebuilds environment from the movable storage device or the webserver.
Detection module, it is connected with AIM and movable storage device driver module, is used to check whether movable storage device exists.
Described movably memory device includes but not limited to USB flash drive, portable hard drive, memory stick (MemoryStick),, CF card, SmartMedia card, common floppy disk and high capacity floppy disk, MO magneto-optic disk, light medium memory device (CD-R/CD-RW) etc.
Correspondingly, as shown in Figure 2: environmental data preservation process of the present invention comprises the steps:
Detect step: check whether movable storage device exists, and if there is no just returns error code, continue if exist;
Encryption key obtaining step: utilize other information of user cipher or user to generate an encryption key;
Encrypting step: utilize this key that the environmental data file is encrypted, generate the file after encrypting, the environmental data that writes the movable storage device or the webserver is encrypted.
Write data step: before the user withdraws from, environmental data is write in the movable storage device or the webserver automatically;
Correspondingly, as shown in Figure 3: environment rebuilt process of the present invention comprises the steps:
Detect step: check whether movable storage device exists, and if there is no just returns error code, continue if exist;
Decruption key obtaining step: utilize other information generating solution decryption key of user cipher or user;
Decryption step: utilize this key that the environmental data file is decrypted, generate the file after deciphering, the file after will deciphering then returns to the applied logic module.
Read data step: from the movable storage device or the webserver, be written into described environmental data and rebuild environment.
In conjunction with shown in Figure 4, in this specific embodiment, the message interaction process when the user closes application software is as follows:
Step 2, the environmental data preservation process that starts;
Step 3, build environment data file, application software will be with the configuration informations of software interface and applied logic, and user's historical data information writes the environmental data file.
Step 4, applied logic are submitted to the movable storage device access modules with the environmental data file, require this file is write movable storage device.
Step 5, movable storage device access modules check whether movable storage device exists, and if there is no just returns mistake, if exist then continuation.
Step 6, movable storage device access modules utilize user cipher or other information of user generate a key;
Step 7, utilize this key that the environmental data file is encrypted, generate the file after encrypting.
Step 8, movable storage device access modules are submitted write data requests to the movable storage device driver, and the file transfers after will encrypting is given the movable storage device driver.
Step 9, movable storage device driver are carried out the I/O operation to movable storage device, and data are write movable storage device;
Step 10, mobile device memory device return confirmation to the movable storage device driver module after finishing data write operation.
Step 11, movable storage device driver module return confirmation to the movable storage device access modules.
Step 12, movable storage device access modules are received that write data is returned after confirming again and are write the environmental data file and confirm to the applied logic module.
Step 13, applied logic are received after writing environment file confirms and just all are kept at local ephemeral data removing;
Step 14, application software withdraw from.
As shown in Figure 5, in this specific embodiment, the message interaction process after application software initiated is as follows:
Step 2, User login;
Step 3, user starts application software environment process of reconstruction;
Step 4, applied logic are submitted the environment data file request of reading to the movable storage device access modules;
Step 5, movable storage device access modules check whether movable storage device exists, and if there is no just returns mistake, if exist then continuation.
Step 6, movable storage device access modules are to movable storage device driver requests read data;
Step 7, movable storage device driver are carried out the I/O operation to movable storage device;
Step 8,9, movable storage device reads the specific data in the movable storage device, and these data are returned to the movable storage device access modules.
Step 10, movable storage device access modules are utilized user cipher or other information generating solution decryption key of user;
Step 11,12, utilize this key that the environmental data file is decrypted, generate the file after the deciphering, the file after will deciphering then returns to applied logic.
Step 13, applied logic utilize the data in the environmental data file to come the reconstruction application software environment;
Step 14, give the user with control after finishing reconstruction operation, the user can bring into use application software.
Described above only is a preferred embodiment of the present invention, and the present invention is not limited to above-mentioned specific embodiment, such as, the present invention can also utilize the webserver to realize the reconstruction of DASE.Wherein, substitute movable storage device with the webserver, with the network-driven module for looking for the movable storage device driver module, substitute the movable storage device access modules with the network server access module, wherein the structure composition of network server access module and function are consistent with the movable storage device access modules, just repeated no more at this, its working method is basically identical also: after the user logins application software, the just request of obtaining the environmental data file to webserver initiation, then the environmental data file is downloaded to local and utilization data reconstruction application software environment wherein, and, when the user withdrawed from application software, application software is build environment data file and uploading on the webserver automatically also.
Claims (10)
1, a kind of DASE method for reconstructing is characterized in that, between applied logic and movable storage device driving or network-driven movable storage device access modules or network server access module is set, and this method also comprises the steps:
Write data step: before the user withdraws from, start environmental data and preserve process, the build environment data file, and with the configuration information of software interface and applied logic, and user's historical data information write the environmental data file, afterwards, applied logic is submitted to described access modules with described environmental data file, the environmental data file that described access modules automatic reception applied logic module is submitted to, and the environmental data file driven via movable storage device or network-driven writes in the movable storage device or the webserver;
Read data step: behind User login, described access modules receives the environment data file request of reading of applied logic, via movable storage device driving or network-driven the described environmental data file in the movable storage device or the webserver is returned to applied logic, and by applied logic reconstruction application software environment.
2, DASE method for reconstructing according to claim 1 is characterized in that, also comprises before the write data step:
Encryption key obtaining step: utilize other information of user cipher or user to generate an encryption key;
Encrypting step: utilize this key that the environmental data file is encrypted, generate the file after encrypting, the environmental data file that writes the movable storage device or the webserver is encrypted.
3, DASE method for reconstructing according to claim 2 is characterized in that, also comprises before the read data step:
Decruption key obtaining step: utilize other information generating solution decryption key of user cipher or user;
Decryption step: utilize this key that the environmental data file is decrypted, generate the file after deciphering, the file after will deciphering then returns to applied logic.
4, DASE method for reconstructing according to claim 3 is characterized in that, is also comprising before the write data step and before the read data step:
Detect step: check whether movable storage device exists, and if there is no just returns mistake, if exist then carry out the key obtaining step.
5, DASE method for reconstructing according to claim 1 is characterized in that, also comprises after the write data step:
Remove step: just all are kept at local ephemeral data and remove, the user withdraws from then.
6, a kind of DASE reconstructing system, comprise, applied logic module, movable storage device driver module, movable storage device is characterized in that, also are provided with the movable storage device access modules between applied logic module and movable storage device driver module;
Described applied logic module, before the user withdraws from, start environmental data and preserve process, the build environment data file, and with the configuration information of software interface and applied logic, and user's historical data information write the environmental data file, afterwards, described environmental data file is submitted to described movable storage device access modules; Behind User login, send the environment data file request of reading to described movable storage device access modules;
Described movable storage device access modules further comprises:
The write data module is used for before the user withdraws from, the environmental data file that automatic reception applied logic module is submitted to, and the environmental data file write in the movable storage device via the movable storage device driver module;
The read data module, be used for behind User login, receive the environment data file request of reading of applied logic module, the described environmental data file in the movable storage device is returned to the applied logic module via the movable storage device driver module, and by applied logic module reconstruction application software environment.
7, DASE reconstructing system according to claim 6, it is characterized in that described movable storage device can be USB flash drive, portable hard drive, memory stick, CF card, SmartMedia card, common floppy disk, high capacity floppy disk and light medium memory device.
8, DASE reconstructing system according to claim 6 is characterized in that, also comprises:
The key acquisition module, it utilizes user cipher or user other information generating solution decryption key or encryption keys;
Encrypting module, it is connected with the key acquisition module, utilizes key that the environmental data file is encrypted, and generates the file after encrypting, and the environmental data file that writes movable storage device is encrypted;
Deciphering module, it is connected with the key acquisition module, utilizes key that the environmental data file is decrypted, and generates the file after deciphering, and the file after will deciphering then returns to the applied logic module.
9, DASE reconstructing system according to claim 6 is characterized in that, also comprises:
Detection module is used to check whether movable storage device exists.
10, a kind of DASE reconstructing system comprises, applied logic module, network-driven module, the webserver is characterized in that, also is provided with the network server access module between applied logic module and network-driven module;
Described applied logic module, before the user withdraws from, start environmental data and preserve process, the build environment data file, and with the configuration information of software interface and applied logic, and user's historical data information write the environmental data file, afterwards, described environmental data file is submitted to described network server access module; Behind User login, send the environment data file request of reading to described network server access module;
Described network server access module further comprises:
The write data module: before the user withdraws from, the environmental data file that automatic reception applied logic module is submitted to, and the environmental data file write in the webserver via the network-driven module;
Read data module: behind User login, receive the environment data file request of reading of applied logic module, via the network-driven module the described environmental data file in the webserver is returned to the applied logic module, and by applied logic module reconstruction application software environment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005101014799A CN100444109C (en) | 2005-11-16 | 2005-11-16 | Circumstance rebuilding method of application software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2005101014799A CN100444109C (en) | 2005-11-16 | 2005-11-16 | Circumstance rebuilding method of application software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1967472A CN1967472A (en) | 2007-05-23 |
CN100444109C true CN100444109C (en) | 2008-12-17 |
Family
ID=38076264
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB2005101014799A Active CN100444109C (en) | 2005-11-16 | 2005-11-16 | Circumstance rebuilding method of application software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100444109C (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100555298C (en) * | 2007-06-08 | 2009-10-28 | 北京飞天诚信科技有限公司 | The method and apparatus of virtulizing personal office environment |
CN102176695A (en) * | 2011-01-14 | 2011-09-07 | 北京格致璞科技有限公司 | Method and device for software environment among synchronous equipment |
CN102981811A (en) * | 2011-09-05 | 2013-03-20 | 北大方正集团有限公司 | Processing method and device of user option data |
CN104092704B (en) * | 2014-07-24 | 2017-06-20 | 福州瑞芯微电子股份有限公司 | Software generic method to set up and system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1531288A (en) * | 2003-03-11 | 2004-09-22 | 杨典翰 | Method for portable electronic acting mailbox |
-
2005
- 2005-11-16 CN CNB2005101014799A patent/CN100444109C/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1531288A (en) * | 2003-03-11 | 2004-09-22 | 杨典翰 | Method for portable electronic acting mailbox |
Non-Patent Citations (2)
Title |
---|
小型计算机网络建设的解决方案. 杜建华.电脑知识与技术,第20期. 2004 |
小型计算机网络建设的解决方案. 杜建华.电脑知识与技术,第20期. 2004 * |
Also Published As
Publication number | Publication date |
---|---|
CN1967472A (en) | 2007-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101246530A (en) | System and method of storage device data encryption and data access via a hardware key | |
CN202009402U (en) | Portable storage device and system supporting cloud storage | |
CN101408916B (en) | Internet software internet privacy protection method | |
US20060053308A1 (en) | Secured redundant memory subsystem | |
EP2135186B1 (en) | System and method for providing a secure computing environment | |
CN100432960C (en) | Electronic data management device, control program, and data management method | |
US8219766B1 (en) | Systems and methods for identifying the presence of sensitive data in backups | |
CN101499027A (en) | Intelligent memory system based on independent kernel and distributed architecture | |
US20150244778A1 (en) | Assembling of Isolated Remote Data | |
CN101167058B (en) | Apparatus, method and system for restoring files | |
US20040230817A1 (en) | Method and system for disaster recovery of data from a storage device | |
US7818567B2 (en) | Method for protecting security accounts manager (SAM) files within windows operating systems | |
CN102882923A (en) | Secure storage system and method for mobile terminal | |
US20120237024A1 (en) | Security System Using Physical Key for Cryptographic Processes | |
WO2016154476A1 (en) | Techniques for securing and controlling access to data | |
CN103488481A (en) | Application program control method, terminal equipment and remote control system | |
CN100552690C (en) | Data managing method | |
US8769627B1 (en) | Systems and methods for validating ownership of deduplicated data | |
CN100511187C (en) | Safety mobile hard disc | |
CN104361297B (en) | A kind of file encryption-decryption method based on (SuSE) Linux OS | |
CN100444109C (en) | Circumstance rebuilding method of application software | |
KR20010043582A (en) | Copy-protection on a storage medium by randomizing locations and keys upon write access | |
CN109376119B (en) | Method for creating disk image file encrypted snapshot, method for using disk image file encrypted snapshot and storage medium | |
US20160125196A1 (en) | Secured data storage on a hard drive | |
CN104200173A (en) | Electronic document trust and security control method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |