CN113641535A - Data backup system, data backup method, electronic device, and storage medium - Google Patents

Data backup system, data backup method, electronic device, and storage medium Download PDF

Info

Publication number
CN113641535A
CN113641535A CN202110781932.4A CN202110781932A CN113641535A CN 113641535 A CN113641535 A CN 113641535A CN 202110781932 A CN202110781932 A CN 202110781932A CN 113641535 A CN113641535 A CN 113641535A
Authority
CN
China
Prior art keywords
equipment
mobile phone
data
password
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110781932.4A
Other languages
Chinese (zh)
Other versions
CN113641535B (en
Inventor
曹义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honor Device Co Ltd
Original Assignee
Honor Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honor Device Co Ltd filed Critical Honor Device Co Ltd
Priority to CN202110781932.4A priority Critical patent/CN113641535B/en
Publication of CN113641535A publication Critical patent/CN113641535A/en
Application granted granted Critical
Publication of CN113641535B publication Critical patent/CN113641535B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a data backup system, a data backup method, an electronic device and a storage medium, relates to the technical field of data backup, and can solve the problem that a touch screen of the electronic device is required to be relied on when data in the electronic device is backed up. The system comprises: a first device, a second device, and a third device; the third equipment is used for authenticating the serial port of the second equipment; the second equipment is used for opening the first authority of the serial port of the second equipment after the serial port of the second equipment is successfully authenticated; the first device is used as a communication proxy of the second device and the third device when the third device authenticates the serial port of the second device; the first equipment is also used for opening an android debugging bridge port of the second equipment through the serial port of the second equipment after the serial port of the second equipment is opened by the second equipment, and backing up data stored in the second equipment through the android debugging bridge port of the second equipment.

Description

Data backup system, data backup method, electronic device, and storage medium
Technical Field
The present application relates to the field of data backup technologies, and in particular, to a data backup system, a data backup method, an electronic device, and a storage medium.
Background
With the development of electronic devices, the functions of the electronic devices are becoming more powerful, such as a photographing function, a document processing function, and the like. Accordingly, more and more data is stored in electronic devices. The user's manipulation of the electronic device is usually implemented based on a touch screen of the electronic device. When a user uses the electronic device, the touch screen of the electronic device may be damaged when the electronic device falls, and in order to avoid data loss of the user, the user needs to export and backup data stored in the electronic device.
At present, under the condition that the electronic device can be started and a partial area of the touch screen is damaged and cannot be operated, the content displayed on the touch screen of the electronic device can be zoomed, and the zoomed content is displayed in the area of the touch screen, which can be operated normally, so as to backup the data stored in the electronic device. In the case that the touch screen of the electronic device is completely damaged (e.g., the area capable of normal operation is too small, normal operation is completely impossible, the screen is dark, etc.), the data stored in the electronic device cannot be backed up. Therefore, when backing up data in the electronic device, the data needs to be backed up by using a touch screen of the electronic device.
Disclosure of Invention
The application provides a data backup system, a data backup method, an electronic device and a storage medium, which solve the problem that a touch screen of the electronic device is required to be relied on when data stored in the electronic device is backed up.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, the present application provides a data backup system, including: a first device and a second device having a USB connection with the first device;
the first device is used for receiving first authentication information sent by the second device; sending the first authentication information to third equipment, wherein the first authentication information is used for indicating the third equipment to obtain second authentication information based on the first authentication information;
the first device is further configured to receive the second authentication information; sending the second authentication information to the second device;
the second device is used for opening a first permission of a serial port of the second device based on the second authentication information, wherein the first permission comprises a permission of opening an android debugging bridge port of the second device;
the first device is further configured to send a first serial port command to the second device;
the second device is further configured to receive the first serial port command; opening an android debug bridge port of the second device based on the first serial port command;
the first device is further configured to send a first port command to the second device, where the first port command is used to instruct the second device to backup data in the second device to the first device through an android debug bridge port of the second device.
In the application, the second device can backup data in the second device to the first device based on an android debug bridge port of the second device. Under the condition of not depending on a display screen of the second equipment, the first equipment can open an android debugging bridge port of the second equipment through a serial port of the second equipment; and then the first equipment controls the second equipment to send the stored data to the first equipment through the android debugging bridge port. Because the serial port of the second device is usually in an encrypted state, the second device sends first authentication information to the third device through the first device without depending on the display screen of the second device; the third equipment processes the first authentication information to obtain second authentication information; the third equipment sends second authentication information to the second equipment through the first equipment; the second equipment can open the serial port of the second equipment based on the second authentication information, so that the data security is improved.
In a possible implementation manner of the first aspect, the first device is further configured to:
acquiring a device unique identifier of the first device, and sending third authentication information carrying the device unique identifier to the third device, where the third authentication information is used to instruct the third device to authenticate the device unique identifier in the third authentication information;
the first device is further to: receiving a first authentication result; if the first authentication result shows that the equipment unique identifier is successfully authenticated, a first request is sent to the second equipment;
the second device is further to: receiving the first request; transmitting the first authentication information to the first device based on the first request.
In the implementation manner, the third device authenticates the device unique identifier of the first device, and after the authentication is passed, the first device can forward the first authentication information and the second authentication information; the first authentication information and the second authentication information are used for authenticating the serial port of the second equipment; the authentication information related to the serial port of the second device is forwarded through the specific first device, and the data security is improved.
In a possible implementation manner of the first aspect, the first device is further configured to:
before the unique device identifier of the first device is obtained, a first account and a first password are received through a first display interface displayed by the first device; sending fourth authentication information carrying the first account and the first password to the third device, wherein the fourth authentication information is used for indicating the third device to return a second authentication result after authenticating the first account and the first password;
the first device is further to: receiving the second authentication result; and if the second authentication result shows that the first account and the first password are successfully authenticated, acquiring the equipment unique identifier of the first equipment.
In the implementation mode, the first account and the first password are authenticated through the third equipment, and the first equipment can perform equipment unique identification after the authentication is passed; the data backup process is completed through the specific account number, and the data safety is improved.
In a possible implementation manner of the first aspect, the second device is further configured to:
after opening an android debugging bridge port of the second device, sending first information to the first device, wherein the first information is used for indicating that the android debugging bridge port of the second device is opened;
the first device is further to: after receiving the first information, receiving a second password through a second display interface displayed by the first equipment; sending a second port command carrying the second password to the second device;
the second device is further to: receiving the second port command, and authenticating the second password carried in the second port command; if the second password authentication is successful, sending a third authentication result to the first equipment;
the first device is further to: and after receiving the third authentication result, sending a first port command to the second device.
In this implementation, the user may input a second password (for example, a mobile phone password) on the first device, the first device sends the second password to the second device, and the second device may perform data backup after successfully authenticating the second password. Therefore, data security is improved through the second password authentication, data in the second device is prevented from being backed up under the condition that other users do not know the second password, and data security is improved.
In a possible implementation manner of the first aspect, the second device is further configured to:
after sending a third authentication result to the first device, monitoring for confirmation operation; sending second information to the third device, wherein the second information is used for indicating that the second device starts a monitoring confirmation operation;
the first device is further to: after receiving the second information, generating prompt information, wherein the prompt information is used for prompting that a confirmation operation is executed on the second equipment;
the second device is further to: authenticating the monitored confirmation operation, and if the confirmation operation is successfully authenticated, sending third information to the first equipment, wherein the third information is used for indicating that the confirmation operation is successfully authenticated;
the first device is further to: and after receiving the third information, sending a first port command to the second device.
In this implementation, the user may be instructed by the first device to perform a confirmation operation (physical key related operation) on the second device; the user performs confirmation operation on the second device; after the confirmation operation authentication is successful, data backup can be performed. The user performs the confirmation operation on the second device, so that the service personnel of the service network site are prevented from directly copying the data in the second device through the first device when the user performs non-backup service (connects USB) on the second device through the service personnel at the service network site.
In a possible implementation manner of the first aspect, the first device is further configured to: after receiving the third authentication result, sending a first application to the second device;
the second device is further to: installing the first application after receiving the first application; after the first application is successfully installed, starting the first application and monitoring confirmation operation; the first application is used for authenticating the confirmation operation.
In this implementation, if the first application is not present in the second device, the first application may be installed to authenticate the confirmation operation.
In a possible implementation manner of the first aspect, the first port command carries a third password;
the first device is further to: receiving a third password through a third display interface displayed by the first device, and sending the first port command carrying the third password to the second device;
the second device is further to: receiving the first port command, and encrypting the data to be backed up through a third password in the first port command to obtain encrypted backup data; and sending the encrypted backup data to the first device.
In the implementation mode, the third password is set to encrypt the data, so that the safety of the data is improved.
In a possible implementation manner of the first aspect, the second device is further configured to: and under the condition that the USB connection between the second equipment and the first equipment is monitored to be disconnected, closing an android debugging bridge port of the second equipment and closing a first permission of a serial port of the second equipment.
In the implementation mode, under the condition that the USB connection between the second device and the first device is broken, the android debugging bridge port of the second device and the first permission for closing the serial port of the second device are closed, and even if the serial port needs to be backed up again, the serial port needs to be authenticated again so as to open the android debugging bridge port for data backup.
In a possible implementation manner of the first aspect, the first authentication information includes first encrypted data, and the second authentication information includes second encrypted data;
the first device is further to: sending a first request to a serial port of the second device;
the second device is further to: receiving the first request, and generating a first random number based on the first request; encrypting the first random number through a first public key to obtain first encrypted data; sending the first encrypted data to the first device;
the first device is further to: receiving the first encrypted data, and sending the first encrypted data to the third device; the first encrypted data is used for instructing the third device to decrypt the first encrypted data through a first private key corresponding to the first public key to obtain a second random number; encrypting the second random number through a second public key to obtain second encrypted data; sending the second encrypted data to the first device;
the first device is further to: receiving the second encrypted data, and sending the second encrypted data to the second device;
the second device is further to: receiving the second encrypted data, and decrypting the second encrypted data through a second private key corresponding to the second public key to obtain a third random number; and if the third random number is the same as the first random number, opening a first permission of the serial port of the second device.
In a second aspect, a data backup method is provided, including:
the method comprises the steps that first equipment receives first authentication information sent by second equipment, and sends the first authentication information to third equipment, wherein the first authentication information is used for indicating the third equipment to obtain second authentication information based on the first authentication information;
the first equipment receives the second authentication information and sends the second authentication information to the second equipment, the second authentication information is used for indicating the second equipment to open a first permission of a serial port of the second equipment, and the first permission comprises a permission of opening an android debugging bridge port of the second equipment;
the first device sends a first serial port command to the second device, wherein the first serial port command is used for instructing the second device to open an android debugging bridge port of the second device;
the first equipment sends a first port command to the second equipment, wherein the first port command is used for instructing the second equipment to backup data in the second equipment to the first equipment through an android debugging bridge port of the second equipment.
In one possible implementation manner of the second aspect, the method further includes:
the first device acquires a device unique identifier of the first device, and sends third authentication information carrying the device unique identifier to the third device, wherein the third authentication information is used for indicating the third device to authenticate the device unique identifier in the third authentication information;
the first device receives a first authentication result, and if the first authentication result shows that the device unique identifier is successfully authenticated, a first request is sent to the second device, wherein the first request is used for indicating the second device to send the first authentication information to the first device.
In a possible implementation manner of the second aspect, before the first device acquires the device unique identifier of the first device, the method further includes:
the first equipment receives a first account and a first password through a first display interface displayed by the first equipment, and sends fourth authentication information carrying the first account and the first password to the third equipment, wherein the fourth authentication information is used for indicating the third equipment to authenticate the first account and the first password and then return a second authentication result;
the first device receives the second authentication result;
correspondingly, the obtaining, by the first device, the device unique identifier of the first device includes:
and if the second authentication result shows that the authentication of the first account and the first password is successful, the first device acquires the device unique identifier of the first device.
In a possible implementation manner of the second aspect, the first serial port command is further used to instruct the second device to return first information after opening an android debug bridge port of the second device;
before the first device sends the first port command to the second device, the method further comprises:
after receiving the first information, the first device receives a second password through a second display interface displayed by the first device, and sends a second port command carrying the second password to the second device; the second port command is used for indicating the second equipment to authenticate the second password, and sending a third authentication result to the first equipment under the condition that the second password is successfully authenticated;
correspondingly, the sending, by the first device, the first port command to the second device includes:
and after receiving the third authentication result, the first device sends a first port command to the second device.
In a possible implementation manner of the second aspect, the second port command is further configured to instruct the second device to listen for a confirmation operation and send second information to the third device, where the second information is used to indicate that the second device has started to listen for a confirmation operation, if the second password authentication is successful;
before the first device sends the first port command to the second device, the method further comprises:
the first equipment generates prompt information after receiving the second information, wherein the prompt information is used for prompting the second equipment to execute confirmation operation;
correspondingly, the second port command is further used for indicating the second device to send third information to the first device under the condition that the monitored confirmation operation authentication is successful;
the first device sending a first port command to the second device comprises:
and after receiving the third information, the first equipment sends a first port command to the second equipment.
In a possible implementation manner of the second aspect, after the first device receives the third authentication result, the method further includes:
the first device sends a first application to the second device, wherein the first application is used for indicating the second device to install the first application and starting the first application after the first application is successfully installed; the first application is configured to authenticate the confirmation operation monitored by the second device.
In a possible implementation manner of the second aspect, the sending, by the first device, the first port command to the second device includes:
the first equipment receives a third password through a third display interface displayed by the first equipment, and sends the first port command carrying the third password to the second equipment; and the first port command is used for instructing the second equipment to encrypt the data to be backed up through the third password to obtain encrypted backup data and then sending the encrypted backup data to the first equipment.
In a possible implementation manner of the second aspect, the first authentication information includes first encrypted data, and the second authentication information includes second encrypted data;
before the first device receives the first authentication information sent by the second device, the method further includes:
the first equipment sends a first request to a serial port of the second equipment; the first request is used for indicating the second equipment to generate a first random number based on the first request, encrypting the first random number through a first public key to obtain first encrypted data, and then sending the first encrypted data to the first equipment;
correspondingly, the receiving, by the first device, the first authentication information sent by the second device, and sending the first authentication information to the third device includes:
the first equipment receives the first encrypted data and sends the first encrypted data to the third equipment; the first encrypted data is used for instructing the third device to decrypt the first encrypted data through a first private key corresponding to the first public key to obtain a second random number; encrypting the second random number through a second public key to obtain second encrypted data; sending the second encrypted data to the first device;
the first device receives the second authentication information, and the sending the second authentication information to the second device includes:
the first equipment receives the second encrypted data and sends the second encrypted data to the second equipment; the second encrypted data is used for instructing the second device to decrypt the second encrypted data through a second private key corresponding to the second public key to obtain a third random number; and opening the first authority of the serial port of the second equipment under the condition that the third random number is the same as the first random number.
In a third aspect, a data backup method is provided, including:
the second equipment receives a first request, and sends the first authentication information to the first equipment based on the first request, wherein the first authentication information is used for obtaining second authentication information;
the second equipment receives the second authentication information, and a first authority of a serial port of the second equipment is opened based on the second authentication information, wherein the first authority comprises an authority of opening an android debugging bridge port of the second equipment;
the second equipment receives a first serial port instruction, and an android debugging bridge port of the second equipment is opened based on the first serial port instruction;
the second equipment receives a first port command, and data in the second equipment is backed up to the first equipment through an android debugging bridge port of the second equipment based on the first port command.
In a possible implementation manner of the third aspect, after opening an android debug bridge port of the second device based on the first serial port command, the method further includes:
the second equipment sends first information to the first equipment, wherein the first information is used for indicating that an android debugging bridge port of the second equipment is opened;
in a possible implementation manner of the third aspect, the method further includes:
the second equipment receives a second port command and authenticates the second password carried in the second port command; if the second password authentication is successful, sending a third authentication result to the first equipment;
in a possible implementation manner of the third aspect, after sending the third authentication result to the first device, the method further includes:
the second device monitors the confirmation operation and sends second information to the third device, wherein the second information is used for indicating that the second device starts the monitoring confirmation operation;
the second equipment authenticates the monitored confirmation operation, and if the confirmation operation is successfully authenticated, third information is sent to the first equipment, wherein the third information is used for indicating that the confirmation operation is successfully authenticated;
in a possible implementation manner of the third aspect, the method further includes:
the second device receives the first application and installs the first application; after the first application is successfully installed, starting the first application; the first application is used for authenticating the confirmation operation.
In a possible implementation manner of the third aspect, the first port command carries a third password; the method further comprises the following steps:
the second equipment receives the first port command, and encrypts the data to be backed up through a third password in the first port command to obtain encrypted backup data; and sending the encrypted backup data to the first device.
In a possible implementation manner of the third aspect, the method further includes:
and the second equipment closes the android debugging bridge port of the second equipment and closes the first authority of the serial port of the second equipment under the condition that the second equipment monitors that the USB connection between the second equipment and the first equipment is disconnected.
In a possible implementation manner of the third aspect, the first authentication information includes first encrypted data, the second authentication information includes second encrypted data, and the second encrypted data is obtained by: decrypting the first encrypted data through a first private key corresponding to the first public key to obtain a second random number; encrypting the second random number through a second public key to obtain second encrypted data;
the second equipment opens a first permission of a serial port of the second equipment based on the second authentication information;
the second device decrypts the second encrypted data through a second private key corresponding to the second public key to obtain a third random number; if the third random number is the same as the first random number, opening a first authority of the serial port of the second device;
in a fourth aspect, an electronic device is provided, comprising a processor for executing a computer program stored in a memory, implementing the method of any of the second aspects of the present application.
In a fifth aspect, an electronic device is provided, comprising a processor configured to execute a computer program stored in a memory, and to implement the method of any of the third aspects of the present application.
In a sixth aspect, a chip system is provided, comprising a processor coupled to a memory, the processor executing a computer program stored in the memory to implement the method of any of the second or third aspects of the present application.
In a seventh aspect, there is provided a computer readable storage medium storing a computer program which, when executed by one or more processors, performs the method of any one of the second or third aspects of the present application.
In an eighth aspect, the present application provides a computer program product for causing an apparatus to perform the method of any two of the first aspect or the method of any one of the third aspect of the present application when the computer program product is run on the apparatus.
It is understood that the beneficial effects of the second aspect to the eighth aspect can be referred to the related description of the first aspect, and are not described herein again.
Drawings
Fig. 1 is a schematic view of an application scenario of a data backup method according to an embodiment of the present application;
fig. 2 is a schematic diagram of a hardware structure of an electronic device executing a data backup method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a technical architecture of a data backup method according to an embodiment of the present application;
FIG. 4 is a timing diagram illustrating data interaction between a computer and a server before data backup according to an embodiment of the present disclosure;
FIG. 5 is a timing diagram illustrating another data interaction between a computer and a server before data backup according to an embodiment of the present disclosure;
FIG. 6 is a timing diagram illustrating data interaction among a computer, a server, and a mobile phone according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of an interface displayed by a computer for data backup according to an embodiment of the present disclosure;
fig. 8 is a schematic view of another interface displayed by a computer for data backup according to an embodiment of the present disclosure.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that in the embodiments of the present application, "one or more" means one, two, or more than two; "and/or" describes the association relationship of the associated objects, indicating that three relationships may exist; for example, a and/or B, may represent: a alone, both A and B, and B alone, where A, B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," "fourth," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
Referring to fig. 1, a schematic view of an application scenario of the data backup method provided in the embodiment of the present application is shown.
As shown in fig. 1, the mobile phone is an electronic device with data to be backed up, and a display screen of the mobile phone may be in a damaged state, for example, a touch function of the display screen of the mobile phone is not available, the display screen of the mobile phone is in a black screen state, and the like. In the application, data in the backup mobile phone is taken as an example for description, and in practical application, the electronic device to be backed up is not limited to the mobile phone.
A computer connected to the mobile phone via a Universal Serial Bus (USB) is an electronic device for assisting the mobile phone in implementing data backup. Because the display screen of the mobile phone is damaged, establishing connection between the mobile phone and the computer through the USB data line is a relatively simple, effective and feasible data connection mode. The user can operate on the computer and transmit information through a USB data line connecting the computer and the mobile phone; therefore, the control of the mobile phone is realized through the computer, so that the data stored in the mobile phone is backed up on the computer. In practical applications, the computer is only used as an example, and the assisting device may also be a personal notebook, a tablet computer, or other electronic devices.
In addition, in order to improve the security of data, the data backup method provided in the embodiment of the present application may be opened to only some people, for example, may be opened to service personnel of a service network of a mobile phone manufacturer. The service personnel need to apply for the service account number in advance. After the service personnel successfully logs in the service account number on the computer, the service personnel can obtain the authority of backing up the data stored in the mobile phone connected with the current computer.
In the scenario shown in fig. 1, a server provides application and rights management for a service account. That is, the service person can apply for the service account number from the server. After the service account is successfully applied, the service personnel can select a related application on the computer to log in the service account, so that the server can communicate with the related application installed on the computer, and the authority for backing up data stored in a mobile phone connected with the current computer is obtained.
Fig. 1 shows an application scenario of the embodiment of the present application, in which a mobile phone, a computer, and a server form a data backup system, and a specific process of the data backup system implementing the data backup method may refer to specific descriptions in subsequent embodiments.
In addition, it needs to be explained that the embodiment provided by the application can solve the problem that the display screen of the electronic device needs to be relied on when the data in the electronic device is backed up. Although the embodiment of the present application is described by taking an example in which the display screen of the electronic device to be backed up is in a damaged state. However, it is not intended that the data backup method provided by the embodiment of the present application can only be applied to backup data in an electronic device with a damaged display screen.
In the application scenario shown in fig. 1, the computer backs up data stored in the mobile phone to the computer. The computer is used as an electronic device for assisting backup, and the mobile phone is used as an electronic device for data to be backed up. The electronic device for assisting backup may further be: tablet computers, notebook computers, ultra-mobile personal computers (UMPCs), netbooks, Personal Digital Assistants (PDAs), and the like. The electronic device for backing up data may also be: mobile phones, tablet computers, etc. The embodiment of the application does not limit the electronic equipment for assisting the backup and the electronic equipment for the data to be backed up.
Fig. 2 shows a schematic structural diagram of an electronic device for backing up data. The electronic device 200 for data to be backed up includes: a processor 210, an internal memory 221, a Universal Serial Bus (USB) interface 230, a serial port 231, a sensor module 280, a button 290, a display 294, and the like. Wherein the sensor module 280 may include a touch sensor 280K, etc.
It is to be understood that the illustrated structure of the embodiment of the present application does not specifically limit the electronic device 200. In other embodiments of the present application, the electronic device 200 may include more or fewer components than shown, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 210 may include an Application Processor (AP), and the processor 210 is configured to execute a data backup method in an embodiment of the present application.
A memory may also be provided in the processor 210 for storing data. In some embodiments, the memory in the processor 210 is a cache memory. The memory may hold data that has just been used by the processor 210. If the processor 210 needs to reuse the data, it can retrieve it directly from memory.
As an example, the mobile phone is used as an electronic device of data to be backed up, and the memory provided in the processor of the mobile phone may store the random number before encryption in the embodiment shown in fig. 6, so as to compare the random number before encryption with the random number obtained by 2B decryption.
In some embodiments, processor 210 may include one or more interfaces. The interfaces may include a Universal Serial Bus (USB) interface 230, a serial port (android/serial port)231, and the like, and the USB interface and the serial port may be physically the same interface, but conform to different specifications.
The USB interface 230 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 230 may be used to transfer data between the electronic device 200 and a peripheral device.
As an example, a mobile phone, as an electronic device of data to be backed up, may be connected to a computer through a USB interface of the mobile phone, so as to establish a hardware line connection between the mobile phone and the computer.
As another example, the computer may open an Android Debug Bridge (ADB) port of the mobile phone through a serial port of the mobile phone, and the mobile phone transmits data to the computer through the ADB port of the mobile phone for backup.
Internal memory 221 may be used to store computer-executable program code, which includes instructions. The processor 210 executes instructions stored in the internal memory 221 to execute various functional applications (e.g., the backup assistant application in the embodiment shown in fig. 3) of the electronic device 200 and data processing, so as to implement the data backup method provided by the embodiment of the present application.
The internal memory 221 may also be used to store personal data of the user.
As an example, personal data of a user stored in an internal memory of a cellular phone may be backed up to the computer through the computer.
The touch sensor 280K is also referred to as a "touch panel". The touch sensor 280K may be disposed on the display screen 294, and the touch sensor 280K and the display screen 294 form a touch screen, which is also called a "touch screen". The touch sensor 280K is used to detect a touch operation applied thereto or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display screen 294.
In the embodiment of the application, the touch screen formed by the touch sensor and the display screen can be in a damaged state.
The keys 290 include a power-on key, a volume key, etc. The keys 290 may be mechanical keys.
As an example, the user may perform a confirmation operation in the embodiment shown in fig. 6 later by pressing a key.
The electronic device assisting in backing up data stored in the electronic device 200 in the embodiment of the present application may include a processor, an internal memory, a plurality of Universal Serial Bus (USB) interfaces, a network interface, a display screen, and the like.
Wherein the processor may run the cell phone assistant application in the embodiments shown in subsequent figures 3 and 6. The internal memory can store data backed up by the mobile phone to the computer. The USB interface may be connected to peripheral devices (e.g., the electronic device 200, a mouse and a keyboard provided in the embodiments of the present application). A connection may be established with a server in the application scenario shown in fig. 1 through a network interface. The display screen may display a user interface provided by the cell phone assistant application, such as an interface for entering a service account number and password in subsequent embodiments, an interface for a user to enter a cell phone password, and so on.
The embodiment of the present application does not particularly limit a specific structure of an execution main body of a data backup method, and communication may be performed by the data backup method provided in the embodiment of the present application by running a program recorded with the data backup method of the embodiment of the present application. For example, an execution subject of the data backup method provided in the embodiments of the present application may be a functional module capable of calling a program and executing the program in the electronic device, or a communication device, such as a chip, applied in the electronic device.
Fig. 3 is a technical architecture diagram of a data backup method implemented by the data backup system in the application scenario shown in fig. 1. The implementation of the data backup method needs to be realized through a mobile phone, a server and a computer.
As shown in the hardware structure diagram of fig. 2, a USB interface is provided in the mobile phone, and the mobile phone establishes a hardware line connection with the computer through the USB interface on the mobile phone. Accordingly, in the technical architecture diagram shown in fig. 3, the USB driver exists in the mobile phone. And the USB drive controls the USB interface of the mobile phone to establish hardware line connection with the computer.
If the data stored in the mobile phone is backed up to the computer through the computer, the computer is required to control the mobile phone, so that the data stored in the mobile phone is transmitted to the computer.
In a specific implementation, the control of the computer to the mobile phone and the data transmission between the computer and the mobile phone are generally implemented through an Android Debug Bridge (ADB) port. Therefore, an ADB port is also required in the mobile phone.
As an example, after establishing a hardware line connection between the computer and the mobile phone through the USB data line, the computer may request the mobile phone to report the ADB port of the mobile phone. The computer can send some control instructions through the ADB port; the computer can also install an Android application package (apk) in the computer into the mobile phone through the ADB port; files can be transmitted between the computer and the mobile phone through the ADB port. Therefore, in the embodiment of the application, the data in the mobile phone is backed up to the computer through the ADB port of the mobile phone.
However, the ADB port in the handset is normally off. When the display screen of the mobile phone is damaged, the ADB port in the mobile phone needs to be opened through the computer.
After the computer detects that the mobile phone is connected to the computer through the USB data line, the computer can request the mobile phone to report the USB interface name, the serial port (serial port) name and the ADB port name of the mobile phone. Therefore, the ADB port in the mobile phone can be opened through the serial port arranged on the mobile phone in the embodiment of the application. Therefore, a serial port driver is also needed to be arranged in the mobile phone, and the serial port of the mobile phone is controlled to be communicated with the computer through the serial port driver.
As an example, after receiving a serial port name reported by a mobile phone, the computer may send a serial port command to the mobile phone, where the serial port command is used to instruct the mobile phone to open an ADB port of the mobile phone. Of course, in practical applications, the service person may open the ADB port in the mobile phone through the computer in other manners. The embodiment of the present application does not limit this.
The method for opening the ADB port of the mobile phone by adopting the serial port of the mobile phone is based on the data security. Before the mobile phone leaves a factory, a mobile phone manufacturer can encrypt the serial port of the mobile phone. Therefore, the serial port of the mobile phone after leaving the factory is an encrypted serial port. Namely, the serial port of the mobile phone which is currently connected with the computer is in an encrypted state, and the computer cannot directly communicate with the mobile phone through the serial port of the mobile phone. Even if the computer sends a serial port command for instructing the mobile phone to open the ADB port of the mobile phone to the mobile phone, the mobile phone cannot recognize the serial port command.
Based on the understanding, the data backup method adopted in the embodiment of the application needs the computer to acquire the authority to open the encrypted serial port of the mobile phone, then the ADB port of the mobile phone can be opened through the serial port of the mobile phone, and finally the data stored in the mobile phone can be backed up to the computer based on the ADB port of the mobile phone, so that the data security can be improved.
In order to further improve the data security, a backup assistant application is further provided in the mobile phone, and the backup assistant application includes: an operation authentication module, configured to authenticate a backup operation (e.g., a confirmation operation related to a physical key in the embodiment shown in fig. 6) of a user; and the data backup module is used for providing data backup service so as to backup the data in the mobile phone to the computer. The authentication before backup can also comprise mobile phone password authentication, so a password verification module can be arranged in the mobile phone and used for authenticating the mobile phone password sent by the computer.
As mentioned above, the serial port in the mobile phone is encrypted before leaving the factory. In the embodiment of the application, a network dongle (namely, the dongle is arranged on the server and can also be named as a dongle) in the server can be used for encrypting the serial port of the mobile phone.
Correspondingly, the server is provided with an encryption authentication module. The encryption authentication module can encrypt the serial port of the mobile phone before leaving the factory through an encryption algorithm in a network dongle in the server; when the serial port of the mobile phone needs to be opened, the encryption authentication module can also authenticate the encrypted serial port of the mobile phone through an authentication algorithm in the network dongle.
In a specific implementation, in an encryption stage before the mobile phone leaves a factory, the public key 1A in the key of the network dongle needs to be set in the mobile phone. Namely, the mobile phone stores the public key 1A in the key of the network dongle. The network dongle in the server stores the corresponding private key 1B. Meanwhile, the public key 2A in the secret key of the mobile phone is set in the network dongle of the server, that is, the network dongle of the server stores the public key 2A in the secret key of the mobile phone, and the mobile phone stores the corresponding private key 2B. In addition, a random number generator is arranged in the mobile phone, and the random number generator can generate random numbers. The random number is used for subsequent authentication, and after the authentication is successful, the serial port of the mobile phone is opened by the mobile phone, so that other electronic equipment can communicate with the mobile phone through the serial port of the mobile phone.
In the authentication stage, after a random number generator in the mobile phone generates a random number, the mobile phone encrypts the random number through a public key 1A of a network dongle arranged in the mobile phone to obtain a 1A encrypted random number, then the 1A encrypted random number is sent to the network dongle in the server, the network dongle in the server decrypts the 1A encrypted random number by using a private key 1B of the network dongle to obtain a random number plaintext, the server encrypts the random number plaintext through a public key 2A in a secret key of the mobile phone to obtain a 2A encrypted random number, the server returns the 2A encrypted random number to the mobile phone, the mobile phone decrypts the 2A encrypted random number received by the mobile phone through the private key 2B of the mobile phone to obtain a random number, and the clear phone compares the random number obtained by the 2B currently with the random number before the initial encryption, if the comparison is consistent, the authentication is successful, and the mobile phone can open the serial port of the mobile phone. Reference may be made specifically to steps A8 through a14 in the embodiment shown in fig. 6.
The example is only one example of a way of opening an encrypted serial port of a mobile phone, and in practical application, the permission of opening the serial port of the mobile phone can be obtained in other ways, which is not limited in the embodiment of the present application.
As described above, the mobile phone obtains the public key in a pair of keys of the network dongle, and the public key is made public, that is, multiple mobile phones produced by the manufacturer can obtain the public key in the pair of keys.
Any mobile phone encrypts the random number generated by the random number generator in the mobile phone through the obtained public key, and the network dongle in the server authorized by the mobile phone manufacturer only has the private key corresponding to the public key. The network dongle in the server authorized by the mobile phone manufacturer encrypts the correct random number plaintext again through the public key of the mobile phone to obtain an encrypted random number, the encrypted random number is sent to the corresponding mobile phone, and the correct random number plaintext obtained after the mobile phone decrypts the encrypted random number through the private key of the mobile phone is the same as the random number sent at first. Therefore, the mobile phone will open the serial port of the mobile phone. By the method, the data security can be improved; and the serial ports of a plurality of mobile phones produced by the mobile phone manufacturer can be encrypted and authenticated through a network dongle.
As can be understood from this example, the server stores an encryption algorithm when the network dongle encrypts the serial port of the mobile phone and an authentication algorithm when the serial port of the mobile phone is authenticated. The encryption authentication module in the server can realize the encryption process and the authentication process through an encryption algorithm and an authentication algorithm. The encryption process and the authentication process are only a simple description, and in practical applications, the encryption process and the authentication process may be more complicated than the above-described embodiment.
The server is also provided with an account application module and a permission management module, the account application module is used for providing an entrance for service account application, and the permission management module can manage each service account.
The service account can be a registered account applied by a service person of a service network of a mobile phone manufacturer according to personal information of the service person (for example, a job number of the service person, a work mailbox allocated by the mobile phone manufacturer for the service person, a personal mobile phone number and a personal identification number registered by the user 2 at the mobile phone manufacturer, etc.), and the service person with the personal information meeting the requirement can successfully register the service account. The service account number can also be an account number allocated by a mobile phone manufacturer for service personnel.
In addition, the authority management module can also manage the functions of the authority validity period, the use frequency limitation, the safety certificate generation and the like of each service account. In practical applications, in order to improve data security and avoid misuse of the service account, an expiration date may be set for each service account, for example, 1 month, 3 months, 6 months, etc. may be set, and after the expiration date is exceeded, re-authentication is required to prolong the expiration date. The number of uses may also be set for each service account, for example, 10, 15, 20, etc., and after the number of uses is exceeded, re-authentication is required to extend the number of uses.
Certainly, in practical application, the server responsible for providing application and authority management of the service account and the server provided with the cryptographic authentication module of the network dongle may be the same server or different servers, which is not limited in this embodiment of the application.
As described above, since the display screen of the mobile phone is damaged in the embodiment of the present application, in the stage of authenticating the serial port, the communication process between the mobile phone and the network dongle in the server needs to be implemented by a computer. I.e. the computer acts as a communication proxy between the handset and the server.
The computer is provided with a mobile phone assistant application which comprises a black screen backup module, an account management module, a security authentication component, a password verification module, a User Interface (UI) module and an equipment management module. The black screen backup module provides black screen backup service. And the account management module is used for managing a service account which logs in the mobile phone assistant application and uses the black screen backup service. The safety certification component is used for certifying a safety certificate preset in the computer, and the safety certification component is used for using the computer as a communication agent between the mobile phone and the server after the safety certificate passes the certification, so that the serial port of the mobile phone is certified. The password verification module is used for receiving the mobile phone password input by the user so as to assist the mobile phone to verify the mobile phone password. The UI interface module is used for managing each interface displayed on the computer by the mobile phone assistant application, and the equipment management module is used for managing the mobile phone connected with the computer.
The security certificate in the computer can be obtained by the following steps:
for security reasons, not every computer can act as a proxy for communication between the handset and the server. In specific implementation, a computer can apply for a security certificate from a network dongle in a server, the security certificate can be preset in the computer, and the computer with the preset security certificate can be used as a communication agent between a mobile phone and the network dongle of the server.
As an example, the service person may report a media access control address (MAC address) of a computer for backing up data, and the mobile phone manufacturer may use the computer corresponding to the reported MAC address as a computer on which an application related to the backed up data can be registered.
And the service personnel logs in the mobile phone assistant application through the service account on the computer corresponding to the MAC address which is approved by the approval. The service person may obtain the security credentials from the server's network dongle through a logged-on cell phone assistant application. The security certificate carries the MAC address of the computer that applied for the security certificate. The security certificate is preset in the computer corresponding to the MAC address carried by the security certificate. In a computer with preset security certificate (the MAC address of the computer needs to be consistent with the MAC address in the security certificate), the service personnel can log in the mobile phone assistant application through the service account number to communicate with the network dongle in the server through the mobile phone assistant application in the computer. The steps of specifically obtaining the security certificate may refer to the embodiment shown in fig. 4 and the embodiment shown in fig. 5.
Certainly, the computer is also provided with an equipment driver, after the mobile phone is connected with the computer through a USB data line, the equipment driver reports the serial port and the ADB port of the mobile phone to the mobile phone assistant application after receiving the serial port and the ADB port of the mobile phone, so that the mobile phone assistant application in the computer can communicate with the mobile phone through the serial port and the ADB port of the mobile phone.
Each functional module in the server in the technical architecture shown in fig. 3 may be a software module. In practical applications, two or more functional modules in the server may be integrated into one functional module. Or one functional module in the server is further split into a plurality of functional modules.
Similarly, each functional module in the computer may also be a software module, and in practical applications, two or more functional modules in the computer may also be integrated into one functional module. Or one functional module in the computer is further divided into a plurality of functional modules.
Similarly, each functional module in the mobile phone may also be a software module, and in practical application, two or more functional modules in the mobile phone may also be integrated into one functional module. Or further splitting one functional module in the mobile phone into a plurality of functional modules.
It should be noted that, in the embodiment of the present application, the division of the function module in the server, the division of the function module in the computer, and the division of the function module in the mobile phone are schematic, and are only a logic function division, and when the actual implementation is performed, another division manner may be provided.
After describing the technical architecture shown in fig. 3, a detailed process of the data backup method provided by the embodiment of the present application will be described in detail.
Work before backup:
the first mode is as follows: the service account number is an account number specially used for data backup, namely, the service account number can only be registered and logged in on a computer with a specific MAC address.
Referring to fig. 4, in step P1, the service personnel at the service site report the MAC address of the computer for data backup to the staff of the mobile phone manufacturer; after the staff of the mobile phone manufacturer checks the MAC addresses of the computers for data backup, the staff sets that the computers corresponding to the MAC addresses can have the authority to register and log in a black screen backup module in the computers. The staff is provided with personal information of the service staff who have permission to apply for the service account. That is, a specific person can register and log in the black screen backup module on a specific computer and use the related services provided by the black screen backup module. Of course, the relevant services provided by the blank screen backup module need to be implemented by matching with other modules in the mobile phone assistant application.
And step P2, the service personnel installs the mobile phone assistant application on the computer corresponding to the reported MAC address. When the mobile phone assistant application is installed, mobile phone driver software is installed on the computer.
In step P3, the service person operates on the mobile phone assistant app installed on the computer corresponding to the reported MAC address, so that the mobile phone assistant app displays a registration interface.
At step P4, the service person enters personal information (e.g., mailbox, real name, mobile phone number, etc.) and password into the registration interface. Some information (e.g., a work mailbox, a mobile phone number, etc.) in the personal information may serve as a service account for subsequently logging in the application.
In step P5, the cell phone assistant application in the computer sends the personal information and password of the service person to the server to request for a service account.
Of course, the above is only an example of obtaining the service account, and in practical applications, the service staff may also register through a web registration webpage provided by the server to obtain the service account. And a service account can be distributed to corresponding service personnel by a mobile phone manufacturer.
In step P6, after the server successfully verifies the received registration information (personal information and MAC address), it generates a service account, and stores the service account and the corresponding password for verification during subsequent login.
At step P7, the server sends a message to the computer indicating that the registration was successful.
In step P8, after receiving the message indicating that the registration is successful, the cell phone assistant application in the computer may jump to the login interface.
At step P9, the service person enters the service account number and password in the login interface.
At step P10, the computer sends the received service account number, password and MAC address to the server.
At step P11, the server verifies the received login information (service account number, password, and MAC address).
In step P12, after the server successfully verifies the received login information (service account, password and MAC address), it sends a message indicating that the login of the service account is successful to the computer.
And step P13, the service personnel selects corresponding space in the mobile phone assistant application to apply for the network dongle authority.
In step P14, the computer sends the service account and the MAC address of the computer to the server to apply for the network dongle permission from the server.
At step P15, the server verifies the received service account number and MAC address.
And step P16, after the server successfully verifies the received service account number and the MAC address, sending a security certificate carrying the MAC address to the computer.
In step P17, the computer presets the security certificate in the storage area of the computer.
As another embodiment of the present application, a second mode is also provided. The service account is not an account dedicated to data backup, and may provide other service jobs. Other service jobs may not need to be implemented on computers with specific MAC addresses. When the authority of the network dongle needs to be acquired so as to open the serial port of the mobile phone to perform service work of backing up data in the mobile phone, the service work needs to be realized by a computer with a specific MAC address through a service account number.
Referring to fig. 5, the differences from the embodiment shown in fig. 4 include:
in step P1, the staff of the mobile phone manufacturer only needs to set personal information of the authority application service account in the server. The MAC address does not need to be set as the MAC address corresponding to the computer which has the authority to apply and log in the service account.
In steps P5 and P10, the computer does not need to send the MAC address of the computer to the server for authentication when the service person registers and logs in the service account.
Before the service personnel applies for the authority of the network dongle through the currently logged-in service account in the step P13, the staff of the mobile phone manufacturer in the step P1' needs to set the MAC addresses of some computers as the MAC addresses corresponding to the computers having the authority to apply for the authority of the network dongle.
It should be noted that, the step P1' may be any time before the step P13, which is not limited by the embodiment of the present application.
Other steps in the embodiment shown in fig. 5 can refer to the description in the embodiment shown in fig. 4, and are not described again here.
When the display screen of the mobile phone of the user is damaged, the user wants to perform data backup on data stored in the mobile phone, and the user can carry the mobile phone to a service network provided by a mobile phone manufacturer.
And (3) backup process:
the backup process provided by the embodiment of the present application may refer to the timing chart provided by the embodiment shown in fig. 6.
Step a1, the service personnel at the service network site can connect the mobile phone to the computer which has reported the MAC address and preset the security certificate in the above embodiment through the USB data line. When the computer is pre-installed with the mobile phone assistant application, the computer is also installed with the mobile phone driver software, and the mobile phone driver software can request the mobile phone to report the serial port of the mobile phone. Therefore, the computer can recognize the serial port of the mobile phone connected to the computer, and only the serial port of the mobile phone is in an encrypted state.
Step A2, the service person opens the mobile phone assistant application installed in the computer on the computer, the display interface of the mobile phone assistant application has a black screen backup control, the service person selects the black screen backup control, the mobile phone assistant application on the computer displays a black screen backup login interface, and the service person inputs the service account and the corresponding password on the black screen backup login interface.
In step a3, the black screen backup service in the computer sends the service account number and the corresponding password (which may also include the MAC address) to the server via the network.
In step a4, the server authenticates the service account and password. When the received login information includes the MAC address, the MAC address can be authenticated together. Of course, the server may also authenticate information such as a predetermined validity period and the number of times of use, so as to ensure that the currently logged-in service account also has a right to backup data in the mobile phone.
In step a5, after the service account and the password are successfully authenticated, the server may return information indicating that the authentication is successful to the computer through the network. After the computer receives the information indicating the successful authentication, the computer can start the authentication of the serial port of the mobile phone.
As described above, only if there is a security certificate in the computer corresponding to the specific MAC address, the security certificate can be used as a communication proxy between the server and the mobile phone, so that the mobile phone opens the encrypted serial port of the mobile phone.
The mobile phone assistant application in the computer is provided with a safety authentication component, the black screen backup service can call the safety authentication component to authenticate the safety certificate in the computer, and the computer can be used as a communication agent of the mobile phone and the server under the condition that the safety certificate in the computer passes the authentication.
In step a6, the security authentication component obtains the MAC address in the security certificate stored in the computer, and then sends the MAC address to the authentication server, so as to determine whether the MAC address in the security authentication of the computer has the authority to access the server through the authentication server, where the authentication server may be the server in the above embodiment.
Step A7, after the server successfully authenticates the MAC address, it returns a message indicating successful authentication to the security authentication component in the computer. The computer can act as a communication proxy between the handset and the server.
Step A8, the computer sends request information to the serial port of the mobile phone through the USB data line, and the request information is used for requesting the mobile phone to send the authentication information of the serial port.
As mentioned above, the serial port of the mobile phone may be in an encrypted state, and the serial port of the mobile phone is not completely unable to communicate with other electronic devices when the serial port of the mobile phone is in the encrypted state. For some information with lower security level sent by other electronic devices, the serial port of the mobile phone can be identified. However, for some information with higher security level sent by other electronic devices, the serial port of the mobile phone cannot be identified.
In this example, the request information (information requesting to obtain the authentication information of the serial port of the mobile phone) sent by the computer to the serial port of the mobile phone can be interacted through the encrypted serial port of the mobile phone. For the command of opening the ADB port of the mobile phone, the encrypted serial port of the mobile phone cannot recognize the command.
Step A9, after the mobile phone receives the request message through the encrypted serial port of the mobile phone, the mobile phone encrypts the random number generated by the random number generator arranged in the mobile phone to obtain the encrypted random number. The encryption process is that the mobile phone encrypts the random number by adopting a public key 1A of a network dongle which is pre-configured in the mobile phone. For convenience of description, the random number before encryption may be denoted as random number 1. The mobile phone sends the 1A encrypted random number to the computer through the encrypted serial port of the mobile phone.
In step a10, after the computer acquires the 1A encrypted random number of the mobile phone, the computer sends the 1A encrypted random number to the server.
Step A11, after the network dongle in the server receives the 1A encrypted random number, the 1A encrypted random number is decrypted by the private key 1B of the network dongle to obtain the random number plaintext. For convenience of description, the random number plaintext obtained by decrypting by the network dongle through the private key 1B in the server may be referred to as the random number 2. The server encrypts the random number 2 through the public key 2A of the mobile phone to obtain the random number after 2A encryption.
In step a12, the server sends the 2A encrypted random number to the computer.
And step A13, the computer sends the 2A encrypted random number to the mobile phone through the serial port of the mobile phone.
Step A14, after the serial port of the mobile phone receives the 2A encrypted random number sent by the computer, the mobile phone decrypts the 2A encrypted random number through the private key 2B of the mobile phone to obtain a random number plaintext, and the random number plaintext is marked as random number 3. The handset compares random number 1 with random number 3. And under the condition that the random number 1 is the same as the random number 3, indicating that the serial port authentication of the mobile phone is successful. At this time, the mobile phone can open the serial port of the mobile phone. That is, at this time, the serial port of the mobile phone can recognize some higher-level information sent by other electronic devices.
Step A15, after the serial port of the mobile phone is opened, the mobile phone can send information to the computer through the serial port of the mobile phone, and the information is used for indicating that the serial port of the mobile phone has been opened by the mobile phone.
Step A16, after the computer receives the information, the computer sends a serial port command to the serial port of the mobile phone, and the serial port command is used for requesting the mobile phone to open the ADB port of the mobile phone.
In the embodiment of the application, the serial port is introduced to open the ADB port of the mobile phone, and in addition, the data transmission efficiency of the serial port is low. Therefore, after the serial port of the mobile phone is opened, the computer can control the mobile phone to open the ADB port of the mobile phone first, and the subsequent information transmission between the computer and the mobile phone adopts an ADB mode.
Of course, in practical applications, although the serial port transmission efficiency of the mobile phone is low, under the condition that the information amount of data interaction (for example, mobile phone password, response, and the like) performed before the mobile phone sends data to be backed up with a large data amount to the computer is small, the data interaction can also be performed between the mobile phone and the computer through the serial port of the mobile phone. When the data to be transmitted (for example, the data to be backed up) between the mobile phone and the computer is large, the ADB port of the mobile phone is opened, and then the data with large data volume is transmitted through the ADB port of the mobile phone.
The embodiment of the application does not limit when the ADB port of the mobile phone is opened through the serial port of the mobile phone.
Step A17, after the mobile phone receives the serial port command, the ADB port of the mobile phone is opened.
Step a18, after the mobile phone opens the ADB port of the mobile phone, the mobile phone may return information to the computer, the information being used to indicate that the mobile phone has opened the ADB port of the mobile phone.
In practical application, after the ADB port of the mobile phone is opened, the computer may request to backup data from the mobile phone, and the mobile phone may send the data to be backed up to the computer through the ADB port, so as to backup the data stored in the mobile phone to the computer.
In order to further improve the data security, one or more of the following authentications can be set before the data stored in the mobile phone is backed up to the computer:
the mobile phone password authentication means that a user inputs a mobile phone password on a computer, the computer can send the mobile phone password to a mobile phone, the mobile phone authenticates the mobile phone password, and data backup can be performed after the mobile phone password authentication is passed. Refer specifically to steps A19 through A24.
And confirming the operation authentication, namely authenticating the user on the mobile phone in a physical key operation mode, and performing data backup after the mobile phone successfully authenticates the physical key operation. Refer specifically to steps A27 through A32.
In step a19, after the computer receives the information, the cell phone assistant application of the computer displays a password input interface, which is used to input a cell phone password (e.g., a power-on password).
Step A20, a mobile phone password may be entered by a user in a password entry interface currently displayed by a mobile phone assistant application of a computer.
In step a21, the cell phone assistant application of the computer sends the received cell phone password input by the user to the cell phone in the form of an ADB command.
Step A22, after the mobile phone receives the mobile phone password sent by the computer, the mobile phone verifies the received mobile phone password.
And step A23, if the mobile phone password passes the verification, the mobile phone feeds back information for indicating that the mobile phone password is successfully verified to the computer.
In step a24, if the password of the mobile phone is verified, the mobile phone may decrypt a part of the memory space of the memory of the mobile phone to open a part of the memory space of the mobile phone. Of course, in practical application, all the storage space of the mobile phone can be opened.
It should be noted that the sequence of step a23 and step a24 may be set according to practical situations, and the execution sequence of step a23 and step a24 is not limited in the embodiment of the present application.
Step A25, after the mobile phone assistant application in the computer receives the information indicating that the mobile phone password verification is successful, the mobile phone assistant application in the computer sends an ADB command and a backup assistant application to the mobile phone, wherein the ADB command is used for controlling the mobile phone to install the received backup assistant application sent by the computer.
In practical applications, the computer may download the backup assistant application from the server, and the computer sends the backup assistant application to the mobile phone.
Step A26, after the mobile phone receives the backup assistant application and the ADB command for controlling the mobile phone to install the backup assistant application, the mobile phone installs the backup assistant application.
In step a27, after the mobile phone installs the backup assistant application, the mobile phone starts the data backup service in the backup assistant application. And starting monitoring and confirming operation after the data backup service in the mobile phone is started.
Step a28, after the data backup service in the mobile phone starts the monitoring confirmation operation, the mobile phone sends information to the computer, the information indicates that the data backup service in the mobile phone has started the monitoring confirmation operation, and the computer can prompt the user to make a confirmation operation on the mobile phone.
Step A29, after receiving the information, the computer prompts the user to execute confirmation operation on the mobile phone.
The confirmation operation may be an operation set in a backup assistant application installed on the handset. When a developer develops a cell phone assistant application for installation on a computer and a backup assistant application for installation on a cell phone, the confirmation operation in the cell phone assistant application and the confirmation operation in the backup assistant application may be set to the same operation. The mobile phone does not need to send the confirmation operation preset in the backup assistant application installed in the mobile phone to the computer, and the computer can acquire the confirmation operation from the installed mobile phone assistant application and prompt the user to make the confirmation operation on the mobile phone.
In practical application, one or more confirmation operations may exist in the backup assistant application installed in the mobile phone, one of the plurality of confirmation operations may be selected by the backup assistant application in the mobile phone, and the backup assistant application in the mobile phone sends the one or the selected one of the plurality of confirmation operations to the computer. And the computer prompts the user to perform the operation corresponding to the received confirmation operation on the mobile phone.
The interface displayed in the mobile phone assistant application of the computer for prompting the user to perform the confirmation operation on the mobile phone can refer to the display interface shown in fig. 7. This interface is for example only and not limiting of the present application.
Since the display screen of the mobile phone may be damaged, the confirmation operation may be an operation related to a physical key on the mobile phone, and may be, for example, a double short-press on-off key, a multiple short-press volume plus key, a multiple short-press volume minus key, or the like. Of course, the above listed confirmation operations are only examples, and in practical applications, the selection of the key, the manner of the key, and the number of times of the key may be different from the above examples.
Step A30, the user makes corresponding confirmation operation on the mobile phone based on the prompt information given by the computer.
Step A31, after the mobile phone monitors the confirmation operation, the mobile phone compares the confirmation operation with the preset confirmation operation.
In step a32, if the comparison is consistent, the mobile phone may send information indicating that the confirmation operation authentication is successful to the computer.
In step a33, after the computer receives the information indicating that the confirmation operation authentication is successful, the computer sends request information to the mobile phone, the request information being used to obtain information (e.g., identification, size, icon, etc.) of the data stored in the open storage space of the mobile phone.
Step a34, after the mobile phone receives the request message sent by the computer, the mobile phone can send the information of the data stored in the open storage space of the mobile phone to the computer.
Step A35, the computer displays the interface of the data stored in the storage space of the mobile phone through the mobile phone assistant application, and the interface can be generated by the information of the data stored in the storage space opened by the mobile phone received by the computer.
Step a36, a user may select data to be backed up in an interface displayed by a computer.
Referring to fig. 8, an interface of data stored in a storage space opened by a mobile phone is displayed for a mobile phone assistant application in a computer according to an embodiment of the present application. In this interface, files 2, 3, 5, and 6 are files selected by the user to be backed up. And a control for starting backup is also arranged in the interface, and the user enables the mobile phone to start to backup the data selected by the user into the computer by clicking the control for starting backup.
As described above, in order to further improve the security of data, after the user selects the data to be backed up, the user needs to input a backup password, where the backup password is used for encrypting the data to be backed up on the computer by the mobile phone, so as to improve the security of the data to be backed up by the user.
After the user clicks the backup control in the interface shown in fig. 8, the user may jump to the next interface where the user enters the backup password. The interface for entering the backup password will not be illustrated by way of example.
Step A37, the computer sends the identification of the data to be backed up selected by the user and the backup password to the mobile phone.
Step A38, the mobile phone encrypts the data represented by the identifier of the data to be backed up selected by the user through the backup password; after the data to be backed up is encrypted by the mobile phone, the encrypted data to be backed up is sent to the computer.
Step a39, after the mobile phone sends the encrypted data to be backed up to the computer, the mobile phone sends a message to the computer to indicate that the backup of the data to be backed up selected in this round is finished.
In a specific implementation, the data to be backed up by the user may be located in different storage areas. Thus, the user may select data to be backed up multiple times.
As an example, the user selects image 1 to image 5 as the data to be backed up in the first round in the image storage area displayed by the cell phone assistant application of the computer. While the user enters "123456" as a backup password on the computer. After the mobile phone encrypts and transmits the images 1 to 5 to the computer, the user can also select the images 6 to 20 as the data to be backed up in the image storage area displayed by the mobile phone assistant application of the computer. During the second round of backup, the user can no longer input the backup password on the computer. The mobile phone continuously encrypts the images 6 to 20 by using the backup passwords adopted when the images 1 to 5 are backed up, and the mobile phone sends the encrypted images 6 to 20 to the computer. Of course, the user may re-enter the backup password when the user backs up the image 20 in the image 6 in the second round. The mobile phone encrypts the images 6 to 20 by using the backup password input in the second round. The user may also select other files in other storage areas displayed by the cell phone assistant application. For example, the user selects document 1 through document 15 as the third round of data to be backed up in the document storage area displayed by the cell phone assistant application. Subsequent other operations embodiments of the present application are not described herein.
In step a40, a control exists in the display interface of the computer, and the name of the control may be the end of backup. And the user selects the control which represents the end of the backup, and the computer sends a serial port command to the mobile phone, wherein the serial port command is used for indicating the mobile phone to close the ADB port and switch the serial port of the mobile phone to be in an encrypted state.
Step A41, after the mobile phone receives the serial port command sent by the computer, the ADB port of the mobile phone is closed, and the serial port of the mobile phone is switched to be in an encrypted state.
Certainly, in practical application, the information that the computer instructs the mobile phone to close the ADB port and the information that the computer instructs the mobile phone to switch the serial port of the mobile phone to the encryption state may also be sent separately. For example, the computer first sends a serial command to the handset instructing the handset to close the ADB port. And after the mobile phone closes the ADB port, sending a message for indicating that the ADB port is closed to the computer. And after receiving the message which is sent by the mobile phone and used for indicating that the ADB port is closed, the computer sends a serial port command to the mobile phone again, wherein the serial port command is used for indicating that the serial port of the mobile phone is switched to be in an encrypted state. And after the mobile phone receives the information indicating that the serial port for switching the mobile phone is in the encryption state, switching the serial port of the mobile phone to be in the encryption state.
According to the steps, the user can back up the data stored in the mobile phone to the computer of the service network of the service manufacturer. The user may select a personal storage device (e.g., a usb disk, a mobile hard disk, etc.) to store the encrypted personal data stored in the computer of the service provider's service site in the personal storage device. Because personal data stored in a computer of a service network of a service manufacturer is encrypted data, the security of the data of a user in the backup process can be improved.
As another embodiment of the present application, in a process of transmitting data to be backed up from a mobile phone to a computer, for example, before a user selects a backup end control displayed in a mobile phone assistant application of the computer, if a hardware USB connection between the mobile phone and the computer is physically disconnected or a software process is in error, a mobile phone system may actively close an ADB port of the mobile phone and switch a serial port of the mobile phone to an encrypted state. If the user needs to continue the currently interrupted backup process, the data backup method provided by the embodiment of the present application needs to be executed again from step a 1.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the steps in the above-mentioned method embodiments may be implemented.
Embodiments of the present application further provide a computer program product, which when run on a first device, enables the first device to implement the steps in the above method embodiments.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer readable storage medium and used by a processor to implement the steps of the embodiments of the methods described above. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or apparatus capable of carrying computer program code to a first device, including recording media, computer Memory, Read-Only Memory (ROM), Random-Access Memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
An embodiment of the present application further provides a chip system, where the chip system includes a processor, the processor is coupled to the memory, and the processor executes a computer program stored in the memory to implement the steps of any of the method embodiments of the present application. The chip system may be a single chip or a chip module composed of a plurality of chips.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and method steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (19)

1. A data backup system, comprising: a first device and a second device having a USB connection with the first device;
the first device is used for receiving first authentication information sent by the second device; sending the first authentication information to third equipment, wherein the first authentication information is used for indicating the third equipment to obtain second authentication information based on the first authentication information;
the first device is further configured to receive the second authentication information; sending the second authentication information to the second device;
the second device is used for opening a first permission of a serial port of the second device based on the second authentication information, wherein the first permission comprises a permission of opening an android debugging bridge port of the second device;
the first device is further configured to send a first serial port command to the second device;
the second device is further configured to receive the first serial port command; opening an android debug bridge port of the second device based on the first serial port command;
the first device is further configured to send a first port command to the second device, where the first port command is used to instruct the second device to backup data in the second device to the first device through an android debug bridge port of the second device.
2. The system of claim 1, wherein the first device is further to:
acquiring a device unique identifier of the first device, and sending third authentication information carrying the device unique identifier to the third device, where the third authentication information is used to instruct the third device to authenticate the device unique identifier in the third authentication information;
the first device is further to: receiving a first authentication result; if the first authentication result shows that the equipment unique identifier is successfully authenticated, a first request is sent to the second equipment;
the second device is further to: receiving the first request; transmitting the first authentication information to the first device based on the first request.
3. The system of claim 2, wherein the first device is further to:
before the unique device identifier of the first device is obtained, a first account and a first password are received through a first display interface displayed by the first device; sending fourth authentication information carrying the first account and the first password to the third device, wherein the fourth authentication information is used for indicating the third device to return a second authentication result after authenticating the first account and the first password;
the first device is further to: receiving the second authentication result; and if the second authentication result shows that the first account and the first password are successfully authenticated, acquiring the equipment unique identifier of the first equipment.
4. The system of any of claims 1 to 3, wherein the second device is further to:
after opening an android debugging bridge port of the second device, sending first information to the first device, wherein the first information is used for indicating that the android debugging bridge port of the second device is opened;
the first device is further to: after receiving the first information, receiving a second password through a second display interface displayed by the first equipment; sending a second port command carrying the second password to the second device;
the second device is further to: receiving the second port command, and authenticating the second password carried in the second port command; if the second password authentication is successful, sending a third authentication result to the first equipment;
the first device is further to: and after receiving the third authentication result, sending a first port command to the second device.
5. The system of claim 4, wherein the second device is further to:
after sending a third authentication result to the first device, monitoring for confirmation operation; sending second information to the third device, wherein the second information is used for indicating that the second device starts a monitoring confirmation operation;
the first device is further to: after receiving the second information, generating prompt information, wherein the prompt information is used for prompting that a confirmation operation is executed on the second equipment;
the second device is further to: authenticating the monitored confirmation operation, and if the confirmation operation is successfully authenticated, sending third information to the first equipment, wherein the third information is used for indicating that the confirmation operation is successfully authenticated;
the first device is further to: and after receiving the third information, sending a first port command to the second device.
6. The system of claim 5, wherein the first device is further to: after receiving the third authentication result, sending a first application to the second device;
the second device is further to: installing the first application after receiving the first application; after the first application is successfully installed, starting the first application and monitoring confirmation operation; the first application is used for authenticating the confirmation operation.
7. The system of any of claims 1 to 6, wherein the first port command carries a third password;
the first device is further to: receiving a third password through a third display interface displayed by the first device, and sending the first port command carrying the third password to the second device;
the second device is further to: receiving the first port command, and encrypting the data to be backed up through a third password in the first port command to obtain encrypted backup data; and sending the encrypted backup data to the first device.
8. The system of any of claims 1 to 7, wherein the second device is further to: and under the condition that the USB connection between the second equipment and the first equipment is monitored to be disconnected, closing an android debugging bridge port of the second equipment and closing a first permission of a serial port of the second equipment.
9. The system of any one of claims 1 to 8, wherein the first authentication information includes first encryption data, and the second authentication information includes second encryption data;
the first device is further to: sending a first request to a serial port of the second device;
the second device is further to: receiving the first request, and generating a first random number based on the first request; encrypting the first random number through a first public key to obtain first encrypted data; sending the first encrypted data to the first device;
the first device is further to: receiving the first encrypted data, and sending the first encrypted data to the third device; the first encrypted data is used for instructing the third device to decrypt the first encrypted data through a first private key corresponding to the first public key to obtain a second random number; encrypting the second random number through a second public key to obtain second encrypted data; sending the second encrypted data to the first device;
the first device is further to: receiving the second encrypted data, and sending the second encrypted data to the second device;
the second device is further to: receiving the second encrypted data, and decrypting the second encrypted data through a second private key corresponding to the second public key to obtain a third random number; and if the third random number is the same as the first random number, opening a first permission of the serial port of the second device.
10. A method for data backup, comprising:
the method comprises the steps that first equipment receives first authentication information sent by second equipment, and sends the first authentication information to third equipment, wherein the first authentication information is used for indicating the third equipment to obtain second authentication information based on the first authentication information;
the first equipment receives the second authentication information and sends the second authentication information to the second equipment, the second authentication information is used for indicating the second equipment to open a first permission of a serial port of the second equipment, and the first permission comprises a permission of opening an android debugging bridge port of the second equipment;
the first device sends a first serial port command to the second device, wherein the first serial port command is used for instructing the second device to open an android debugging bridge port of the second device;
the first equipment sends a first port command to the second equipment, wherein the first port command is used for instructing the second equipment to backup data in the second equipment to the first equipment through an android debugging bridge port of the second equipment.
11. The method of claim 10, wherein the method further comprises:
the first device acquires a device unique identifier of the first device, and sends third authentication information carrying the device unique identifier to the third device, wherein the third authentication information is used for indicating the third device to authenticate the device unique identifier in the third authentication information;
the first device receives a first authentication result, and if the first authentication result shows that the device unique identifier is successfully authenticated, a first request is sent to the second device, wherein the first request is used for indicating the second device to send the first authentication information to the first device.
12. The method of claim 11, wherein prior to the first device obtaining the device unique identifier of the first device, the method further comprises:
the first equipment receives a first account and a first password through a first display interface displayed by the first equipment, and sends fourth authentication information carrying the first account and the first password to the third equipment, wherein the fourth authentication information is used for indicating the third equipment to authenticate the first account and the first password and then return a second authentication result;
the first device receives the second authentication result;
correspondingly, the obtaining, by the first device, the device unique identifier of the first device includes:
and if the second authentication result shows that the authentication of the first account and the first password is successful, the first device acquires the device unique identifier of the first device.
13. The method of any one of claims 10 to 12, wherein the first serial port command is further used to instruct the second device to return first information after opening an android debug bridge port of the second device;
before the first device sends the first port command to the second device, the method further comprises:
after receiving the first information, the first device receives a second password through a second display interface displayed by the first device, and sends a second port command carrying the second password to the second device; the second port command is used for indicating the second equipment to authenticate the second password, and sending a third authentication result to the first equipment under the condition that the second password is successfully authenticated;
correspondingly, the sending, by the first device, the first port command to the second device includes:
and after receiving the third authentication result, the first device sends a first port command to the second device.
14. The method of claim 13, wherein the second port command is further used for instructing the second device to listen for a confirmation operation and to send second information to the third device in case the second password authentication is successful, the second information being used for indicating that the second device has started to listen for a confirmation operation;
before the first device sends the first port command to the second device, the method further comprises:
the first equipment generates prompt information after receiving the second information, wherein the prompt information is used for prompting the second equipment to execute confirmation operation;
correspondingly, the second port command is further used for indicating the second device to send third information to the first device under the condition that the monitored confirmation operation authentication is successful;
the first device sending a first port command to the second device comprises:
and after receiving the third information, the first equipment sends a first port command to the second equipment.
15. The method of claim 14, wherein after the first device receives the third authentication result, the method further comprises:
the first device sends a first application to the second device, wherein the first application is used for indicating the second device to install the first application and starting the first application after the first application is successfully installed; the first application is configured to authenticate the confirmation operation monitored by the second device.
16. The method of any of claims 10 to 15, wherein the first device sending a first port command to the second device comprises:
the first equipment receives a third password through a third display interface displayed by the first equipment, and sends the first port command carrying the third password to the second equipment; and the first port command is used for instructing the second equipment to encrypt the data to be backed up through the third password to obtain encrypted backup data and then sending the encrypted backup data to the first equipment.
17. The method according to any one of claims 10 to 16, wherein the first authentication information includes first encryption data, and the second authentication information includes second encryption data;
before the first device receives the first authentication information sent by the second device, the method further includes:
the first equipment sends a first request to a serial port of the second equipment; the first request is used for indicating the second equipment to generate a first random number based on the first request, encrypting the first random number through a first public key to obtain first encrypted data, and then sending the first encrypted data to the first equipment;
correspondingly, the receiving, by the first device, the first authentication information sent by the second device, and sending the first authentication information to the third device includes:
the first equipment receives the first encrypted data and sends the first encrypted data to the third equipment; the first encrypted data is used for instructing the third device to decrypt the first encrypted data through a first private key corresponding to the first public key to obtain a second random number; encrypting the second random number through a second public key to obtain second encrypted data; sending the second encrypted data to the first device;
the first device receives the second authentication information, and the sending the second authentication information to the second device includes:
the first equipment receives the second encrypted data and sends the second encrypted data to the second equipment; the second encrypted data is used for instructing the second device to decrypt the second encrypted data through a second private key corresponding to the second public key to obtain a third random number; and opening the first authority of the serial port of the second equipment under the condition that the third random number is the same as the first random number.
18. An electronic device, characterized in that the electronic device comprises a processor for executing a computer program stored in a memory, so that the electronic device implements the method according to any of claims 10 to 17.
19. A computer-readable storage medium, in which a computer program is stored which, when run on a processor, implements the method of any one of claims 10 to 17.
CN202110781932.4A 2021-07-09 2021-07-09 Data backup system, data backup method, electronic device, and storage medium Active CN113641535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110781932.4A CN113641535B (en) 2021-07-09 2021-07-09 Data backup system, data backup method, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110781932.4A CN113641535B (en) 2021-07-09 2021-07-09 Data backup system, data backup method, electronic device, and storage medium

Publications (2)

Publication Number Publication Date
CN113641535A true CN113641535A (en) 2021-11-12
CN113641535B CN113641535B (en) 2022-10-25

Family

ID=78417058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110781932.4A Active CN113641535B (en) 2021-07-09 2021-07-09 Data backup system, data backup method, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN113641535B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117093969A (en) * 2023-08-22 2023-11-21 上海合芯数字科技有限公司 Debugging authorization method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140250324A1 (en) * 2011-07-05 2014-09-04 Sheng-Yuan SHIH Smartphone data backup and restoration system
CN104202185A (en) * 2014-08-25 2014-12-10 腾讯科技(深圳)有限公司 Backup method and backup device for communication data
CN112367165A (en) * 2020-10-19 2021-02-12 珠海格力电器股份有限公司 Serial port communication method and device, electronic equipment and computer readable medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140250324A1 (en) * 2011-07-05 2014-09-04 Sheng-Yuan SHIH Smartphone data backup and restoration system
CN104202185A (en) * 2014-08-25 2014-12-10 腾讯科技(深圳)有限公司 Backup method and backup device for communication data
CN112367165A (en) * 2020-10-19 2021-02-12 珠海格力电器股份有限公司 Serial port communication method and device, electronic equipment and computer readable medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117093969A (en) * 2023-08-22 2023-11-21 上海合芯数字科技有限公司 Debugging authorization method and system
CN117093969B (en) * 2023-08-22 2024-06-04 上海合芯数字科技有限公司 Debugging authorization method and system

Also Published As

Publication number Publication date
CN113641535B (en) 2022-10-25

Similar Documents

Publication Publication Date Title
EP2314090B1 (en) Portable device association
US20040168081A1 (en) Apparatus and method simplifying an encrypted network
US8099761B2 (en) Protocol for device to station association
KR100958110B1 (en) Apparatus of authentication gateway for accessing ubiquitous service and method thereof
KR101239297B1 (en) System for protecting information and method thereof
US20160119143A1 (en) User identity authenticating method, terminal, and server
CA2701061C (en) Method and system for recovering a security credential
CN108200078B (en) Downloading and installing method of signature authentication tool and terminal equipment
WO2009037700A2 (en) Remote computer access authentication using a mobile device
CN113992346A (en) Implementation method of security cloud desktop based on state password reinforcement
WO2017071296A1 (en) Vpn-based secure data access method, device and system
KR20180087543A (en) Key management method and fido authenticator software authenticator
CN113641535B (en) Data backup system, data backup method, electronic device, and storage medium
JP4409497B2 (en) How to send confidential information
CN106856471B (en) AD domain login authentication method under 802.1X
CN113542081B (en) Safe intelligent household control method and system
CN116032556A (en) Key negotiation method and device for applet application
EP3198398B1 (en) Access to software applications
CN114143067A (en) Instruction processing method and system of dial testing system
CN109067798B (en) Reverse interconnection authentication method and device
CN112214753A (en) Authentication method and device, electronic equipment and storage medium
JP2002016592A (en) Encryption key management system and encryption key management method
CN112131597A (en) Method and device for generating encrypted information and intelligent equipment
CN111079109A (en) Local security authorization login method and system compatible with multiple browsers
JP2008233965A (en) Portable terminal device and program thetreof, and alternation prevention system and alternation prevention method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant