CN114764350A - Method for critical configuration of electronic devices - Google Patents

Method for critical configuration of electronic devices Download PDF

Info

Publication number
CN114764350A
CN114764350A CN202110039594.7A CN202110039594A CN114764350A CN 114764350 A CN114764350 A CN 114764350A CN 202110039594 A CN202110039594 A CN 202110039594A CN 114764350 A CN114764350 A CN 114764350A
Authority
CN
China
Prior art keywords
electronic device
port
critical
configuration
ports
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110039594.7A
Other languages
Chinese (zh)
Inventor
阮荣斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Arris Enterprises LLC
Original Assignee
Arris Enterprises LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Arris Enterprises LLC filed Critical Arris Enterprises LLC
Priority to CN202110039594.7A priority Critical patent/CN114764350A/en
Publication of CN114764350A publication Critical patent/CN114764350A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting

Abstract

The present disclosure relates to a method for critical configuration of an electronic device. The present disclosure provides an electronic device including a plurality of ports and a method for the same. The electronic device includes: one or more processors, and a memory. The memory is coupled to the one or more processors and includes executable instructions stored thereon that, when executed by the one or more processors, cause the electronic device to: receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of an electronic device; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, performing a first critical configuration.

Description

Method for critical configuration of electronic devices
Technical Field
The present disclosure relates to the field of electronic technology, and more particularly, to a method for critical configuration of an electronic device.
Background
With the development of communication technology, users have made various configurations of electronic devices using software, such as hiding, enabling or disabling one or more functions at runtime of the electronic devices. However, software operations are not applicable to critical configurations performed on the electronic device (herein, critical configurations of the electronic device include settings associated with the security of the electronic device), such as factory reset, password modification, firewall settings modification, and the like. This is because software operations are more vulnerable to hacking, especially if the user performs remote operations. Thus, for security reasons, users are often required to perform important critical configurations on electronic devices using hardware locally. It should be understood that some key configurations may require further authentication of the user's identity, such as determining that the user has an administrator identity before allowing the user to perform one or more key configurations corresponding to the administrator identity.
Disclosure of Invention
In a practical application scenario, the more common hardware used for the key configuration of an electronic device includes hardware buttons. For example, when a user desires the electronic device to restore factory settings, a "reset" button may be pressed and held for a period of time (e.g., 15 seconds). Since the above process involves adding hardware components (such as hardware buttons) and their corresponding interfaces on the electronic device, the hardware overhead increases as the number of critical configurations increases. Moreover, when the key configuration corresponding to the hardware button needs to be updated or modified, the update or modification of the hardware needs to consume a great deal of time and effort. Therefore, there is a need for an efficient, convenient and flexible approach for critical configuration of electronic devices.
According to a first aspect of the present disclosure, there is provided an electronic device comprising a plurality of ports, the electronic device comprising: one or more processors; and memory coupled to the one or more processors and including executable instructions stored thereon that, when executed by the one or more processors, cause the electronic device to perform operations comprising: receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of the electronic device; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, performing a first critical configuration.
In some embodiments, the electronic device is a wireless router, and the wireless router includes an embedded ethernet switch; and the plurality of ports of the electronic device are ethernet ports.
In some embodiments, for the electronic device described above, detecting that the first port and the second port of the electronic device are connected is achieved by detecting that the first port and the second port of the electronic device form a loop back.
In some embodiments, for the electronic device described above, receiving the trigger for the first key configuration includes detecting that a user clicks on an element associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device.
In some embodiments, for the electronic device described above, the plurality of key configurations includes some or all of: restore factory settings, modify passwords, and modify firewall settings.
In some embodiments, for the electronic device described above, one or more of the plurality of critical configurations can be updated or modified by software.
In some embodiments, for the above electronic device, the plurality of ports of the electronic device is four ports, and the plurality of critical configurations is six critical configurations. In this case, the executable instructions, when executed by the one or more processors, further cause the electronic device to: receiving a trigger for a second critical configuration of the plurality of critical configurations; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a third port within a threshold time after the trigger, performing a second critical configuration.
According to a second aspect of the present disclosure, a method is provided for an electronic device comprising a plurality of ports. The method comprises the following steps: receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of the electronic device; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, performing a first critical configuration.
In some embodiments, in the above method, the electronic device is a wireless router, and the wireless router comprises an embedded ethernet switch; and the plurality of ports of the electronic device are ethernet ports.
In some embodiments, in the above method, detecting that the first port and the second port of the electronic device are connected is performed by detecting that the first port and the second port of the electronic device form a loop.
In some embodiments, in the above method, receiving the trigger for the first key configuration comprises detecting that a user clicks an element associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device.
In some embodiments, in the above method, the plurality of key configurations includes some or all of: restoring factory settings, modifying passwords and modifying firewall settings; and one or more of the plurality of critical configurations can be updated or modified by software.
In some embodiments, in the above method, the plurality of ports of the electronic device is four ports and the plurality of critical configurations is six critical configurations, the method further comprising: receiving a trigger for a second critical configuration of the plurality of critical configurations; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a third port within a threshold time after the trigger, performing a second critical configuration.
According to a third aspect of the present disclosure, there is provided a non-transitory computer-readable storage medium comprising executable instructions stored thereon, which, when executed by one or more processors of an electronic device comprising a plurality of ports, cause the electronic device to perform operations of: receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of the electronic device; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, performing a first critical configuration.
In some embodiments, with respect to the non-transitory computer readable storage medium above, the electronic device is a wireless router, and the wireless router includes an embedded ethernet switch; and the plurality of ports of the electronic device are ethernet ports.
In some embodiments, with respect to the non-transitory computer readable storage medium above, detecting that the first port and the second port of the electronic device are connected is accomplished by detecting that the first port and the second port of the electronic device form a loop back.
In some embodiments, with respect to the non-transitory computer readable storage medium described above, receiving the trigger for the first key configuration includes detecting that a user clicks on an element associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device.
In some embodiments, for the non-transitory computer readable storage medium above, the plurality of key configurations includes some or all of: factory settings are restored, passwords are modified, and firewall settings are modified; and one or more of the plurality of critical configurations can be updated or modified by software.
In some embodiments, with respect to the non-transitory computer-readable storage medium described above, the plurality of ports of the electronic device are four ports and the plurality of critical configurations are six critical configurations, the executable instructions, when executed by the one or more processors of the electronic device, cause the electronic device to perform operations comprising: receiving a trigger for a second critical configuration of the plurality of critical configurations; and in response to detecting that a first port of the plurality of ports of the electronic device is connected to a third port within a threshold time after the trigger, performing a second critical configuration.
According to a fourth aspect of the present disclosure, there is provided a computer program product comprising program instructions which, when executed by a computer, cause the computer to perform a method according to the present disclosure.
Drawings
For a better understanding of the present disclosure, and to show how the same may be carried into effect, reference will now be made, by way of example, to the accompanying drawings, in which:
FIG. 1 shows a schematic diagram of a system environment according to an embodiment of the present disclosure;
FIG. 2 shows a schematic diagram of an electronic device according to an embodiment of the present disclosure;
FIG. 3 shows a flow diagram of a method for critical configuration of an electronic device, in accordance with an embodiment of the present disclosure;
fig. 4 shows a schematic diagram of a key configuration for an electronic device according to one example of the present disclosure.
It should be noted that throughout the drawings, like reference numerals designate corresponding parts. Further, multiple instances of the same part are specified by a common prefix separated from the instance number by a dash.
Detailed Description
The following detailed description is made with reference to the accompanying drawings and is provided to assist in a comprehensive understanding of various exemplary embodiments of the disclosure. The following description includes various details to aid understanding, but these details are to be regarded as examples only and are not intended to limit the disclosure, which is defined by the appended claims and their equivalents. The words and phrases used in the following description are used only to provide a clear and consistent understanding of the disclosure. In addition, descriptions of well-known structures, functions, and configurations may be omitted for clarity and conciseness. Those of ordinary skill in the art will recognize that various changes and modifications of the examples described herein can be made without departing from the spirit and scope of the disclosure.
Fig. 1 is a schematic diagram 100 illustrating a system environment 100 according to an embodiment of the present disclosure.
In some embodiments, the example system environment 100 may include an electronic device 110 and a device 120 connected with the electronic device 110 (herein, the device 120 may also be referred to as a user device 120). By way of example, the electronic device 110 in fig. 1 is a wireless router that includes an embedded ethernet switch; and the user device 120 is a desktop computer. In some embodiments, the electronic device 110 and the user device 120 are wired by a cable or the like. In other embodiments, the electronic device 110 and the management device 120 are wirelessly connected using a protocol such as wireless communication. In particular, the User device 120 may be connected to a management Interface of the electronic device 110, such that a User can manage the configuration of the electronic device 110 through a Graphical User Interface (GUI) 130 on the User device.
It should be understood that the devices shown in FIG. 1 are merely examples and are not intended to limit the types of devices. For example, the electronic device 110 may include multiple types of devices, including but not limited to wireless routers, wireless access points, gateways, and devices that integrate one or more of the above (such as modems). Further, the user device 120 may include multiple types of devices, including, but not limited to, desktop computers, laptop computers, sub-notebook/netbook computers, servers, computers, mainframe computers, cloud-based computers, tablet computers, smartphones, cellular phones, wearable devices, consumer electronics devices, portable computing devices, communication devices, testing devices, and/or other electronic devices.
In a system environment 100 such as that of FIG. 1, an electronic device 110 includes one or more hardware buttons 102 (e.g., buttons 102-1, 102-2, and 102-3) in addition to a hardware switch 101. Generally speaking, the hardware buttons 102 may correspond to key configurations of the electronic device 110. The key configuration herein refers to more important configurations associated with the security of the electronic device 110, such as factory reset, password modification, firewall setting modification, and other security related important configurations. As an example, when the user forgets the login password of the GUI, the electronic device 110 may be restored to factory settings by pressing a hardware button (e.g., hardware button 102-1) of the electronic device 110 for reset and holding for a period of time (e.g., 15 seconds). However, the dedicated provision of a hardware button for each critical configuration would increase the hardware overhead and manufacturing costs of the electronic device. Furthermore, when a provider needs to update or modify the key configuration of an electronic device, hardware needs to be updated or modified, which takes a lot of time and effort. Therefore, to address these issues, embodiments of the present disclosure propose methods for performing critical configuration of an electronic device using multiple ports 103 (e.g., Ethernet ports 103-1, 103-2, 103-3, and 103-4) on the electronic device 110. This is because many users currently prefer wireless connections using wireless routers, and thus the multiple ports 103 (e.g., Ethernet ports 103-1, 103-2, 103-3, and 103-4) of the electronic device 110 are typically idle. Thus, the present disclosure utilizes these ports, enabling a user to efficiently and reliably implement one or more critical configurations for electronic device 110 without requiring hardware buttons.
It should be understood that, in practice, an electronic device may have a greater or lesser number of components than the components of the electronic device 110 shown in fig. 1 (e.g., hardware buttons 102, ports 103, etc.).
Fig. 2 shows a block diagram of an exemplary configuration of an electronic device 200 according to an embodiment of the present disclosure.
The electronic device 200 corresponds to, for example, the electronic device 110 in fig. 1.
The electronic device 200 may be, for example, a hardware electronic device capable of combining one or more of the functions of a modem, an access point, a gateway, and/or a router. The present disclosure also contemplates that electronic Device 200 may include, but is not limited to, The functionality of an IP/QAM Set Top Box (STB) or Smart Media Device (SMD) capable of decoding audio/video content and playing out ott (over The Top) or multi-system Operator (MSO) provided content.
As shown in FIG. 2, the electronic device 200 includes a user interface 201, a network interface 203, a power supply 205, a WAN interface 207, a memory 209, and a processor 211. The user interface 201 may include, but is not limited to, buttons, a keyboard, a keypad, a Liquid Crystal Display (LCD), a Cathode Ray Tube Display (CRT), a Thin Film Transistor Display (TFT), a Light Emitting Diode (LED), a High Definition Display (HD), or other similar Display devices, including Display devices having touch screen capabilities to enable interaction between a user and a gateway device. Network interface 203 may include various network cards and circuitry implemented in software and/or hardware to enable communication with wireless expander devices and client devices using a wireless protocol, such as any ieee802.11wi-Fi protocol, a Bluetooth protocol, Bluetooth Low Energy (BLE) or other short range protocol operating according to a wireless technology standard, for exchanging data over short distances using any licensed or unlicensed frequency band, such as the Citizens Broadband Radio Service (CBRS) band, 2.4GHz band, 5GHz band or 6GHz band, RF4CE protocol, ZigBee protocol, Z-Wave protocol or ieee802.15.4 protocol. The network interface 203 may also include an ethernet port or the like to enable communication with a device such as a client using a wired connection.
The power supply 205 provides power to the internal components of the electronic device 200 through the internal bus 213. The power source 205 may be a self-contained power source, such as a battery pack, whose interface is powered by a charger connected to an outlet (e.g., directly or through other equipment). The power source 205 may also include a rechargeable battery that is removable for replacement, such as a NiCd, NiMH, Li-ion or Li-pol battery. The WAN interface 207 may include various network cards and circuitry implemented in software and/or hardware to enable communication between the wireless device and an internet service provider or Multiple System Operator (MSO).
Memory 209 comprises a single memory or one or more memories or storage locations including, but not limited to, Random Access Memory (RAM), Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Read Only Memory (ROM), EPROM, EEPROM, flash memory, logic blocks of an FPGA, a hard disk, or any other layer of a memory hierarchy. The memory 209 may be used to store any type of program, instructions, software, or algorithm, including software 215 for controlling the general functionality and operation of the electronic device 200.
The processor 211 processes and controls the general operation of the electronic device 200 and performs management functions related to other devices in the network, such as expanders and client devices. The processor 211 may include, but is not limited to, a CPU, hardware microprocessor, hardware processor, multi-core processor, single-core processor, microcontroller, Application Specific Integrated Circuit (ASIC), DSP, or other similar processing device capable of executing any type of instructions, algorithms, or software for controlling the operation and function of the electronic device 200 according to embodiments described in this disclosure. Processor 211 may be various implementations of digital circuitry, analog circuitry, or mixed signal (a combination of analog and digital) circuitry that performs functions in a computing system. Processor 211 may include, for example, components such as an Integrated Circuit (IC), portions or circuits of an individual processor core, an entire processor core, an individual processor, a programmable hardware device such as a Field Programmable Gate Array (FPGA), and/or a system including multiple processors.
The internal bus 213 may be used to establish communication between components (e.g., 201, 203, 205, 209, and 211) of the electronic device 200.
Fig. 3 shows a flow diagram of a method 300 for critical configuration of an electronic device, in accordance with an embodiment of the present disclosure. As an example, the method may be performed by a processor in the electronic device 110 shown in fig. 1 (or correspondingly, the electronic device 200 shown in fig. 2) comprising a plurality of ports.
In step S301, a trigger is received for a first key configuration of a plurality of key configurations of an electronic device. As previously mentioned, the key configurations mainly include configurations associated with security of the electronic device, such as factory reset, password modification, firewall settings modification, and other security related important configurations. In this step, receiving a trigger for the first key configuration includes detecting that a user clicks an element (such as a graphical or textual icon) associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device, and the trigger may start a timer.
In step 302, a first critical configuration is performed in response to detecting that a first port of a plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger. Specifically, when two ports of the electronic device are detected to be connected within a threshold time at the timing of the timer, a key configuration corresponding to the connection may be executed. Detecting a port connection of an electronic device may be accomplished by a detection loopback (loopback). As an example, detecting that the first port of the electronic device is connected with the second port may be accomplished by detecting that the first port of the electronic device forms a loopback with the second port, where loopback means that the first port may receive data sent from the second port and the second port may receive data sent from the first port.
It should be appreciated that the threshold time may be a time value that is predetermined based on experience or related protocols. If the connection of the two ports of the electronic equipment is detected when the threshold time is exceeded, the corresponding key configuration is not executed, so that the wrong execution of the key configuration caused by misoperation of a user can be avoided.
It should be understood that an electronic device may include two ports, thus enabling a single port connection, so that a critical configuration may be performed. Generally, electronic devices may generally include a greater number of ports. For example, an electronic device may include four ports, thus enabling six port connections, so that correspondingly six critical configurations may be performed. It should also be understood that one key configuration may implement one function (e.g., factory reset) or multiple functions (e.g., factory reset and password modification).
Further, fig. 4 shows an example diagram 400 of a key configuration for an electronic device according to one example of the present disclosure. In this example, similar to electronic device 110 in FIG. 1, electronic device 410 includes four ports 403, namely Ethernet ports 403-1, 403-2, 403-3, and 403-4. It should be noted that the electronic device 410 in fig. 4 does not need to provide any additional hardware buttons in addition to the hardware switch 401.
According to this example of the present disclosure, four ports enable six port connections, namely, 403-1 and 403-2, 403-1 and 403-3, 403-1 and 403-4, 403-2 and 403-3, 403-2 and 403-4, and 403-3 and 403-4. These six port connections may correspond to six key configurations, respectively, numbered sequentially as a first key configuration (such as factory reset), a second key configuration (such as modify password), …, a sixth key configuration (such as modify firewall settings), as shown in the lower table in fig. 4.
It should be understood that the correspondence of port connections to key configurations may be pre-set by the provider of the electronic device and provided by providing the user with a file or document, such as an operating manual, for easy viewing by the user when desired. It should also be understood that the provider may update or modify the number and types of the key configurations (including updating or modifying the corresponding relationship between the port connection and the key configuration, etc.) periodically or aperiodically, and since only the update or modification of the software is involved, only the updated or modified operation instruction file or document needs to be provided to the user, which is very flexible and simple.
According to this example, first the electronic device 410 receives a trigger for one of a plurality of critical configurations, e.g. a first critical configuration, such as a factory reset. For example, a user forgets a login password of a Graphical User Interface (GUI)430 (similar to the graphical user interface 130 shown in fig. 1) of a user device 420 (similar to the user device 120 shown in fig. 1) for managing the electronic device 410, thereby clicking an element 404 on the GUI 430 associated with a first key configuration (e.g., restore factory settings), such that the electronic device 410 receives a trigger for the first key configuration. It should be understood that the elements on the GUI associated with the key configuration may include graphical or textual icons, as well as other types of icons or control elements. In this example, the triggering of the first critical configuration may start a corresponding timer.
According to this example, the electronic device 410 performs the first critical configuration in response to detecting that a first port (e.g., port 403-1) of the plurality of ports 403 of the electronic device 410 is connected to a second port (e.g., port 403-2) within a threshold time after the trigger described above (it being understood that the first port and the second port may correspond to any two ports of the plurality of ports of the electronic device). Specifically, the threshold time may be set for a timer, and it may be detected whether the port 403-1 and the port 403-2 of the electronic device 410 form a loop during the timing of the timer. If port 403-1 and port 403-2 of electronic device 410 are detected to form a loop back before the timer expires, it may be determined that port 403-1 and port 403-2 were detected to be connected within a threshold time after the trigger, and a first critical configuration may be performed to restore the password to a default value at factory settings. In this example, the user only needs one cable (such as an ethernet cable with a crystal header) to connect the two ports of the electronic device 410 to quickly perform the corresponding critical configuration.
Similarly, according to this example, if the user wishes to further enhance the security of the password, an element (such as a graphical or textual icon) associated with the second key configuration (e.g., modifying the password) may be clicked on GUI 430. Correspondingly, the electronic device 410 receives a trigger for the second critical configuration and detects whether the first port (e.g., port 403-1) and the third port (e.g., port 403-3) of the electronic device 410 are connected (specifically, whether the first port and the third port of the electronic device form a loop back) within a threshold time after the trigger. Thereafter, the electronic device 410 performs a second critical configuration in response to detecting that the first port of the electronic device 410 is connected to the third port within a threshold time after the trigger, such that the user achieves the goal of modifying the password.
It should be understood that the threshold time to wait after triggering for different critical configurations may be the same or different. In some embodiments, as an example, the first and second critical configurations may be performed separately upon detecting a connection to the corresponding port within the same threshold time (e.g., 10 seconds) after the triggering of the first and second critical configurations. In other embodiments, as an example, detecting a connection to a corresponding port within a first threshold time (e.g., 15 seconds) after a trigger to a first critical configuration may perform the first critical configuration, and detecting a connection to a corresponding port within a second threshold time (e.g., 20 seconds) after a trigger to a second critical configuration may perform the second critical configuration, where the first threshold time and the second threshold time are different, which may be due to different degrees of time urgency of the two critical configurations. It should also be understood that the threshold time may also be dynamically updated or modified as needed.
It should be appreciated that the triggering of the critical configuration may additionally include authenticating the user identity. For example, in the case of a key configuration to modify firewall settings, after a user clicks on an element (such as a graphic or text icon) associated with the key configuration on the GUI, an administrator password needs to be input to authenticate the identity of the administrator, and after the password authentication is successful, the corresponding two ports can be connected by the method disclosed in the present disclosure, so that the electronic device performs an operation of modifying firewall settings.
According to an embodiment of the present disclosure, with an electronic device including a plurality of ports and a method for the same provided by the present disclosure, a key configuration of the electronic device can be implemented with only one cable without requiring hardware buttons. The electronic device and method provided by the present disclosure can significantly reduce hardware costs and overhead and help reduce the volume and footprint of the electronic device, which is particularly advantageous in the case of a larger number of critical configurations of the electronic device, as compared to adding one hardware button for each critical configuration in conventional systems. Further, in accordance with the present disclosure, one or more key configurations of an electronic device may be updated or modified by software. Particularly, the number and the type of the key configuration and the corresponding relation connected with the port can be updated or modified through software, so that the updating or modifying process is very flexible and convenient, and the time and the energy are effectively saved. Further, by performing the critical configuration by detecting the port connection within a predetermined time, it is possible to prevent a user's misoperation, so that the performance of the system and the device is more stable.
The present disclosure may be implemented as any combination of apparatus, systems, integrated circuits, and computer programs on non-transitory computer readable media. One or more processors may be implemented as an Integrated Circuit (IC), an Application Specific Integrated Circuit (ASIC), or a large scale integrated circuit (LSI), a system LSI, or a super LSI, or as an ultra LSI package that performs some or all of the functions described in this disclosure.
The present disclosure includes the use of software, applications, computer programs or algorithms. Software, applications, computer programs, or algorithms may be stored on a non-transitory computer readable medium to cause a computer, such as one or more processors, to perform the steps described above and depicted in the figures. For example, one or more memories store software or algorithms in executable instructions and one or more processors may be associated with a set of instructions that execute the software or algorithms.
Software and computer programs (which may also be referred to as programs, software applications, components, or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural, object-oriented, functional, logical, or assembly or machine language. The term "computer-readable medium" refers to any computer program product, apparatus or device, such as magnetic disks, optical disks, solid state storage devices, memories, and Programmable Logic Devices (PLDs), used to provide machine instructions or data to a programmable data processor, including a computer-readable medium that receives machine instructions as a computer-readable signal.
By way of example, computer-readable media may comprise Dynamic Random Access Memory (DRAM), Random Access Memory (RAM), Read Only Memory (ROM), electrically erasable read only memory (EEPROM), compact disk read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which may be used to carry or store desired computer-readable program code in the form of instructions or data structures and which may be accessed by a general-purpose or special-purpose computer or a general-purpose or special-purpose processor. Disk or disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above are also included within the scope of computer-readable media.
In one or more embodiments, use of the terms "can," "operable" or "configured" refer to some apparatus, logic, hardware, and/or element that is designed to be used in a specified manner. The subject matter of the present disclosure is provided as examples of apparatus, systems, methods, and programs for performing the features described in the present disclosure. However, other features or variations are contemplated in addition to the features described above. It is contemplated that the implementation of the components and functions of the present disclosure may be accomplished with any emerging technology that may replace the technology of any of the implementations described above.
Additionally, the above description provides examples, and does not limit the scope, applicability, or configuration set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the spirit and scope of the disclosure. Various embodiments may omit, substitute, or add various procedures or components as appropriate. For example, features described with respect to certain embodiments may be combined in other embodiments.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous.

Claims (21)

1. An electronic device comprising a plurality of ports, the electronic device comprising:
one or more processors; and
a memory coupled to the one or more processors and including executable instructions stored thereon that, when executed by the one or more processors, cause the electronic device to:
receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of the electronic device; and
In response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, a first critical configuration is performed.
2. The electronic device of claim 1, wherein:
the electronic device is a wireless router and the wireless router includes an embedded Ethernet switch; and
the plurality of ports of the electronic device are Ethernet ports.
3. The electronic device of claim 1, wherein:
detecting that the first port and the second port of the electronic device are connected is achieved by detecting that the first port and the second port of the electronic device form a loop.
4. The electronic device of claim 1, wherein:
receiving a trigger for a first key configuration includes detecting that a user clicks on an element associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device.
5. The electronic device of claim 1, wherein:
the plurality of key configurations includes some or all of: restore factory settings, modify passwords, and modify firewall settings.
6. The electronic device of claim 1, wherein:
One or more of the plurality of critical configurations can be updated or modified by software.
7. The electronic device of claim 1, wherein:
the plurality of ports of the electronic device are four ports, and the plurality of key configurations are six key configurations.
8. The electronic device of claim 7, the executable instructions, when executed by the one or more processors, further cause the electronic device to:
receiving a trigger for a second critical configuration of the plurality of critical configurations; and
in response to detecting that a first port of the plurality of ports of the electronic device is connected to a third port within a threshold time after the trigger, performing a second critical configuration.
9. A method for an electronic device comprising a plurality of ports, the method comprising:
receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of the electronic device; and
in response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, a first critical configuration is performed.
10. The method of claim 9, wherein:
the electronic device is a wireless router and the wireless router includes an embedded Ethernet switch; and
the plurality of ports of the electronic device are Ethernet ports.
11. The method of claim 9, wherein:
detecting that the first port and the second port of the electronic device are connected is achieved by detecting that the first port and the second port of the electronic device form a loop.
12. The method of claim 9, wherein:
receiving a trigger for a first key configuration includes detecting that a user clicks on an element associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device.
13. The method of claim 9, wherein:
the plurality of key configurations includes some or all of: restoring factory settings, modifying passwords and modifying firewall settings; and
one or more of the plurality of critical configurations can be updated or modified by software.
14. The method of claim 9, wherein the plurality of ports of the electronic device are four ports and the plurality of critical configurations are six critical configurations, the method further comprising:
Receiving a trigger for a second critical configuration of the plurality of critical configurations; and
in response to detecting that a first port of the plurality of ports of the electronic device is connected to a third port within a threshold time after the trigger, performing a second critical configuration.
15. A non-transitory computer-readable storage medium having executable instructions stored thereon that, when executed by one or more processors of an electronic device comprising a plurality of ports, cause the electronic device to:
receiving a trigger for a first critical configuration of a plurality of critical configurations, wherein a critical configuration is a configuration associated with security of the electronic device; and
in response to detecting that a first port of the plurality of ports of the electronic device is connected to a second port within a threshold time after the trigger, a first critical configuration is performed.
16. The non-transitory computer-readable storage medium of claim 1, wherein:
the electronic device is a wireless router and the wireless router includes an embedded Ethernet switch; and
the plurality of ports of the electronic device are Ethernet ports.
17. The non-transitory computer-readable storage medium of claim 15, wherein:
Detecting that the first port and the second port of the electronic device are connected is achieved by detecting that the first port and the second port of the electronic device form a loop back.
18. The non-transitory computer-readable storage medium of claim 15, wherein:
receiving a trigger for a first key configuration includes detecting that a user clicks on an element associated with the first key configuration on a Graphical User Interface (GUI) for managing the electronic device.
19. The non-transitory computer-readable storage medium of claim 15, wherein:
the plurality of key configurations includes some or all of: restoring factory settings, modifying passwords and modifying firewall settings; and
one or more of the plurality of critical configurations can be updated or modified by software.
20. The electronic device of claim 15, wherein the plurality of ports of the electronic device are four ports and the plurality of critical configurations are six critical configurations, the executable instructions, when executed by the one or more processors of the electronic device, cause the electronic device to:
receiving a trigger for a second critical configuration of the plurality of critical configurations; and
In response to detecting that a first port of the plurality of ports of the electronic device is connected to a third port within a threshold time after the trigger, performing a second critical configuration.
21. A computer program product comprising program instructions which, when executed by a computer, cause the computer to perform the method of any one of claims 9 to 14.
CN202110039594.7A 2021-01-13 2021-01-13 Method for critical configuration of electronic devices Pending CN114764350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110039594.7A CN114764350A (en) 2021-01-13 2021-01-13 Method for critical configuration of electronic devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110039594.7A CN114764350A (en) 2021-01-13 2021-01-13 Method for critical configuration of electronic devices

Publications (1)

Publication Number Publication Date
CN114764350A true CN114764350A (en) 2022-07-19

Family

ID=82364334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110039594.7A Pending CN114764350A (en) 2021-01-13 2021-01-13 Method for critical configuration of electronic devices

Country Status (1)

Country Link
CN (1) CN114764350A (en)

Similar Documents

Publication Publication Date Title
US11902400B2 (en) System and method for improving internet communication by using intermediate nodes
CN106712932B (en) Key management method, apparatus and system
CN109413043B (en) Method and device for realizing dynamic configuration of database, electronic equipment and storage medium
US10438004B2 (en) Dual-system electronic apparatus and terminal
US20180234237A1 (en) Key updating method, apparatus, and system
US10601978B2 (en) Telecommunication device utilization based on heartbeat communication
CN107077567B (en) Identifying security boundaries on computing devices
WO2020023158A1 (en) Multi-user computing device configured for executing applications in multiple user contexts simultaneously
US9246949B2 (en) Secure capability negotiation between a client and server
JP6793667B2 (en) Application download method and equipment
US8898461B2 (en) Battery authentication method and apparatus
US11956239B2 (en) Identity misconfiguration detection for role-based access control
US11159568B2 (en) Account management using account activity usage restrictions
CN114258053A (en) Wireless device and method for automatic recovery from failure
WO2017161761A1 (en) Method and terminal for starting app
US10178087B2 (en) Trusted pin management
US10891385B2 (en) Encryption at rest for cloud-resourced virtual machines
CN114764350A (en) Method for critical configuration of electronic devices
WO2021189354A1 (en) Restoring functionality of a wireless device
CN111026800B (en) Data export method and device, electronic equipment and storage medium
US11190369B2 (en) Method and system for joining an online meeting
CN111353150B (en) Trusted boot method, trusted boot device, electronic equipment and readable storage medium
CN108737341A (en) Method for processing business, terminal and server
US9569433B1 (en) Mobile application analytics
WO2018095045A1 (en) Method and apparatus for processing information, and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication