CN101222527A - Method and system for protecting terminal key configuration - Google Patents
Method and system for protecting terminal key configuration Download PDFInfo
- Publication number
- CN101222527A CN101222527A CNA2008100568870A CN200810056887A CN101222527A CN 101222527 A CN101222527 A CN 101222527A CN A2008100568870 A CNA2008100568870 A CN A2008100568870A CN 200810056887 A CN200810056887 A CN 200810056887A CN 101222527 A CN101222527 A CN 101222527A
- Authority
- CN
- China
- Prior art keywords
- configuration
- key configuration
- terminal
- key
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a method for protecting the key configuration of a terminal and a system thereof, wherein the method includes the following that: the first step is that the key configuration and the common configuration of the terminal are stored as a common configuration file; the second step is that when the key configuration of the terminal needs to be modified, the preset key configuration in the common configuration file is obtained, and the preset key configuration is backed up for generating a key configuration backup file; the third step is that when the leave-factory value of the terminal is restored or the analysis of the common configuration file goes wrong, the key configuration backup file is obtained and covers the common configuration file. In the invention, when a terminal user restores the leave-factory value of the terminal or the common configuration file is damaged, the terminal user can still normally use the terminal.
Description
Technical field
The present invention relates to terminal, particularly relate to a kind of method and system thereof that protects the terminal key configuration not lose.
Background technology
The user thinks normally to use multimedia terminal, IPTV (Internet Protocol Television, network protocol television), before the end product such as gateway, all need to do some configurations, if lack these configurations, terminal can't normally be moved, and these configurations are called key configuration.WAN (Wide AreaNetwork such as gateway, wide area network) the account number cipher information of link information, telemanagement information, operator, if lack the WAN link information, terminal can't link to each other with Internet so, will cause the terminal use normally to surf the Net like this; If lack telemanagement information, operator can't carry out long-range unified management to countless terminals so, can not do maintenances such as edition upgrading, diagnostic test, fault eliminating, if the number of the account secret information of the operator of terminal inner is lost, even the attendant inputs right user name and password, terminal is not because there is the foundation of verification to make the attendant to login, and the attendant can not do and make house calls.At first, these key configuration must guarantee whenever it can not lose; Secondly, these key configuration just again do not need to dispose later on after generally carrying out configuration before using for the first time, such as telemanagement information, so need to accomplish these configurations to be remained when recovering factory-said value yet yet, and the terminal use need not reconfigure.
General terminal use can do these basic but very crucial configurations before using, terminal can remain these configurations, like this when restarting at every turn, can both load these configurations, the terminal use has to reconfigure these key configuration under following two kinds of situations but have in follow-up use.
First kind is that the configuration that terminal is preserved damages because of abnormal conditions;
Second kind, be after recovering factory-said value, general terminal use all wish can be foolproof the use product, that is to say that the terminal use does not wish to go the same operation of repetition again, therefore also need a kind of method can allow the terminal use after doing key configuration just once and for all.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of method and system thereof that protects the terminal key configuration, is used for solving prior art and does not dispose the problem that key configuration just can't normally be used terminal after the end-user recovery Default Value or under the situation of common configuration file corruption.
To achieve these goals, the invention provides a kind of method of protecting the terminal key configuration, it is characterized in that, comprising:
Step 2 when the described key configuration of described terminal modifications, is obtained predefined key configuration in the described common configuration file, and described predefined key configuration is backed up, and generates the backup file of described key configuration;
Step 3 when described terminal is recovered factory-said value or resolved described common configuration document lending, is obtained the backup file of described key configuration, and is covered described common configuration file with the backup file of described key configuration.
The method of described protection terminal key configuration wherein, in the described step 1, further comprises:
Form with relation table saves as described common configuration file with described key configuration, described common configuration.
The method of described protection terminal key configuration wherein, in the described step 1, further comprises:
Determine the step of described key configuration by the tabulation of forming by table name, recording mechanism, parameter name.
The method of described protection terminal key configuration wherein, in the described step 2, further comprises:
By increasing, revise and/or delete the step that the mode that writes down in described relation table and/or the described relation table is revised described key configuration, described common configuration.
The method of described protection terminal key configuration wherein, in the described step 2, further comprises:
By traversal key configuration tabulation, take out the parameter value of designated parameter name of the designated recorder of specified relationship table, the step that table name, recording mechanism, parameter name, the parameter value of correspondence backed up described predefined key configuration as 4 tuples.
To achieve these goals, the present invention also provides a kind of system that protects the terminal key configuration, it is characterized in that, comprising:
The database nucleus module is arranged on the described terminal, is used for the key configuration and the common configuration of described terminal are saved as the common configuration file;
The key configuration module is arranged on the described terminal, is used for when the described key configuration of described terminal modifications the predefined key configuration of obtaining from described common configuration file being backed up, and generates the backup file of described key configuration; And when described terminal is recovered factory-said value or described database nucleus module and resolved described common configuration document lending, obtain the backup file of described key configuration, and cover described common configuration file with the backup file of described key configuration.
The system of described protection terminal key configuration, wherein, described database nucleus module is preserved described key configuration, described common configuration with the form of relation table, and described relation table has table name, and contains a plurality of parameters that have parameter name.
The system of described protection terminal key configuration, wherein, described key configuration module is obtained described predefined key configuration by the interface of described database nucleus module from described common configuration file.
The system of described protection terminal key configuration; wherein; described key configuration module is by the tabulation of traversal key configuration; take out the parameter value of designated parameter name of the designated recorder of specified relationship table from described database nucleus module, and table name, recording mechanism, parameter name, the parameter value of correspondence backed up described predefined key configuration as 4 tuples.
The system of described protection terminal key configuration, wherein, described terminal is multimedia terminal, network protocol television or gateway.
Useful technique effect of the present invention:
The present invention not only can just can not continue normally to use terminal as any configuration after the end-user recovery Default Value, can also the key configuration of terminal be backed up, guarantee that the key configuration of terminal do not lose, under the situation of common configuration file corruption, the terminal use still can continue to use normally terminal.
Describe the present invention below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Description of drawings
Fig. 1 is the system construction drawing that the present invention protects the terminal key configuration;
Fig. 2 is the method flow diagram that the present invention protects the terminal key configuration.
Embodiment
Below in conjunction with the drawings and specific embodiments technical scheme of the present invention is made further more detailed description.
As shown in Figure 1, be the system construction drawing that the present invention protects the terminal key configuration; This system 100 is arranged on the terminal 200, comprising: database nucleus module 10,20 two administration modules of key configuration module.
The configuration of terminal 200 is divided into following two classes:
The first kind, key configuration is meant terminal 200 after lacking these configurations, the configuration that can not normally use;
Second class, common configuration is meant terminal 200 after lacking these configurations, the configuration that can normally move still.
The preservation file of configuration is divided into following two classes:
The first kind, the common configuration file is meant complete or collected works of all configurations, comprise: key configuration and common configuration, after the terminal use has done configuration to revise, configuration at first can be kept in the common configuration file, when starting, each terminal 200 all reads the common configuration file;
Second class, the backup file of key configuration just when having revised key configuration, just is saved in key configuration in the backup file of key configuration.
Only made the recovery factory-said value or when resolving the common configuration document lending, just derived the backup file of the key configuration of backup in advance, and covered the common configuration file with this backup file the terminal use.
Each relation table is made up of many records, every record all has a recording mechanism, every record all comprises defined these parameters in advance, and after the terminal use revised configuration, database nucleus module 10 can increase, revise, delete the record in these relation tables or the relation table newly.
When preserving key configuration, need know in advance that it is key configuration which configuration is arranged, key configuration module 20 need be provided with a key configuration tabulation like this, key configuration module 20 is by the tabulation of traversal key configuration, take out the parameter value of designated parameter name of the designated recorder of specified relationship tables from database nucleus module 10, these numerical value are backed up as one 4 tuple (table name, recording mechanism, parameter name, parameter value).
When terminal 200 is recovered factory-said values or database nucleus module 10 when loading the document lending of (parsing) common configuration, notice key configuration module 20, key configuration module 20 is read the backup file of key configuration at once, according to 4 tuples (table name, recording mechanism, parameter name, parameter value) of key configuration, cover the common configuration file with backup.
As shown in Figure 2, be the method flow diagram that the present invention protects the terminal key configuration.This method is a kind of method of guaranteeing that the terminal key configuration is not lost, and this flow process has been described the process of protection terminal key configuration, and concrete steps are as follows:
Step S201 determines key configuration;
In this step, need know in advance which configuration is a key configuration for the terminal use, form a tabulation of forming by table name, recording mechanism, parameter name 3 tuples then.
Step S202 preserves configuration;
In this step, in use the terminal use can revise the configuration of terminal 200, and after the terminal use revised these configurations, database nucleus module 10 can get off the real-time preservation of these configurations.
Step S203, the backup key configuration;
In this step, after the terminal use revises key configuration, the prior defined key configuration tabulation of key configuration module 20 traversals, the four-tuple that key configuration is formed with table name, recording mechanism, parameter name, parameter value backs up.
Step S204 recovers key configuration;
In this step, when the end-user recovery Default Value, perhaps database nucleus module 10 is when loading the document lending of (parsing) common configuration, then notify key configuration module 20, key configuration module 20 is taken out the four-tuple of table name, recording mechanism, parameter name, parameter value composition one by one at this moment, and covers the common configuration file with it.
The inventive method guarantees that the terminal use is when using terminal, some key configuration are not lost when the common configuration file goes wrong, perhaps when recovering factory-said value, the required key configuration of the normal use of terminal is remained, save the problem that the terminal use frequently disposes key configuration.These terminals relate to fields such as multimedia terminal, IPTV, gateway.
Employing the invention enables after the end-user recovery Default Value or under the situation of common configuration file corruption, the terminal use still can continue to use normally terminal.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.
Claims (10)
1. a method of protecting the terminal key configuration is characterized in that, comprising:
Step 1 saves as the common configuration file with key configuration, the common configuration of described terminal;
Step 2 when the described key configuration of described terminal modifications, is obtained predefined key configuration in the described common configuration file, and described predefined key configuration is backed up, and generates the backup file of described key configuration;
Step 3 when described terminal is recovered factory-said value or resolved described common configuration document lending, is obtained the backup file of described key configuration, and is covered described common configuration file with the backup file of described key configuration.
2. the method for protection terminal key configuration according to claim 1 is characterized in that, in the described step 1, further comprises:
Form with relation table saves as described common configuration file with described key configuration, described common configuration.
3. the method for protection terminal key configuration according to claim 2 is characterized in that, in the described step 1, further comprises:
Determine the step of described key configuration by the tabulation of forming by table name, recording mechanism, parameter name.
4. the method for protection terminal key configuration according to claim 2 is characterized in that, in the described step 2, further comprises:
By increasing, revise and/or delete the step that the mode that writes down in described relation table and/or the described relation table is revised described key configuration, described common configuration.
5. according to the method for claim 2,3 or 4 described protection terminal key configurations, it is characterized in that, in the described step 2, further comprise:
By traversal key configuration tabulation, take out the parameter value of designated parameter name of the designated recorder of specified relationship table, the step that table name, recording mechanism, parameter name, the parameter value of correspondence backed up described predefined key configuration as 4 tuples.
6. a system that protects the terminal key configuration is characterized in that, comprising:
The database nucleus module is arranged on the described terminal, is used for the key configuration and the common configuration of described terminal are saved as the common configuration file;
The key configuration module is arranged on the described terminal, is used for when the described key configuration of described terminal modifications the predefined key configuration of obtaining from described common configuration file being backed up, and generates the backup file of described key configuration; And when described terminal is recovered factory-said value or described database nucleus module and resolved described common configuration document lending, obtain the backup file of described key configuration, and cover described common configuration file with the backup file of described key configuration.
7. the system of protection terminal key configuration according to claim 6; it is characterized in that; described database nucleus module is preserved described key configuration, described common configuration with the form of relation table, and described relation table has table name, and contains a plurality of parameters that have parameter name.
8. according to the system of claim 6 or 7 described protection terminal key configurations, it is characterized in that described key configuration module is obtained described predefined key configuration by the interface of described database nucleus module from described common configuration file.
9. the system of protection terminal key configuration according to claim 6; it is characterized in that; described key configuration module is by the tabulation of traversal key configuration; take out the parameter value of designated parameter name of the designated recorder of specified relationship table from described database nucleus module, and table name, recording mechanism, parameter name, the parameter value of correspondence backed up described predefined key configuration as 4 tuples.
10. according to the system of claim 6,7 or 9 described protection terminal key configurations, it is characterized in that described terminal is multimedia terminal, network protocol television or gateway.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100568870A CN101222527B (en) | 2008-01-25 | 2008-01-25 | Method and system for protecting terminal key configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2008100568870A CN101222527B (en) | 2008-01-25 | 2008-01-25 | Method and system for protecting terminal key configuration |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101222527A true CN101222527A (en) | 2008-07-16 |
CN101222527B CN101222527B (en) | 2011-12-07 |
Family
ID=39632092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2008100568870A Active CN101222527B (en) | 2008-01-25 | 2008-01-25 | Method and system for protecting terminal key configuration |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101222527B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104484240A (en) * | 2014-12-09 | 2015-04-01 | 青岛海信宽带多媒体技术有限公司 | Method and device for storing terminal data |
CN104932955A (en) * | 2015-05-29 | 2015-09-23 | 深圳市创维电器科技有限公司 | Method for backing up data during factory setting restoring of mobile terminal, and mobile terminal |
CN105100896A (en) * | 2014-05-19 | 2015-11-25 | 中兴通讯股份有限公司 | Method and device for restoring configuration of set top box from damage |
CN105260215A (en) * | 2015-11-04 | 2016-01-20 | 福建星海通信科技有限公司 | Method of updating vehicle-mounted automobile data recorder terminal by USB flash disk |
CN106445745A (en) * | 2016-10-09 | 2017-02-22 | 青岛海信移动通信技术股份有限公司 | Terminal device and method for recovering factory settings |
CN108255938A (en) * | 2017-12-07 | 2018-07-06 | 中国航空工业集团公司西安航空计算技术研究所 | A kind of airborne Embedded Main Memory Database image generation and loading method |
CN110417582A (en) * | 2019-07-03 | 2019-11-05 | 华为技术有限公司 | A kind of method for configuring routers, terminal and router |
CN111405322A (en) * | 2020-03-05 | 2020-07-10 | 青岛聚看云科技有限公司 | Method and device for acquiring login information |
WO2022032561A1 (en) * | 2020-08-13 | 2022-02-17 | Arris Enterprises Llc | System and method for back-up and restoration of a media gateway apparatus |
WO2023155702A1 (en) * | 2022-02-16 | 2023-08-24 | 上海美控智慧建筑有限公司 | Parameter backup method and apparatus for air conditioning unit, and electronic device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104268033B (en) * | 2014-09-22 | 2018-05-15 | 北京数字天域科技有限责任公司 | The storage method of terminal data, the method and device for recovering terminal default setting |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100373385C (en) * | 2003-01-17 | 2008-03-05 | 中兴通讯股分有限公司 | Method for back-up and restoring important data |
KR20050020033A (en) * | 2003-08-20 | 2005-03-04 | 엘지전자 주식회사 | Management method for program list in mobile terminal |
CN100391291C (en) * | 2005-08-10 | 2008-05-28 | 华为技术有限公司 | Data backing-up and recovering method and system |
CN100581113C (en) * | 2005-11-16 | 2010-01-13 | 华为技术有限公司 | Method for recovering primary coufiguration performance of network terminal |
-
2008
- 2008-01-25 CN CN2008100568870A patent/CN101222527B/en active Active
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100896A (en) * | 2014-05-19 | 2015-11-25 | 中兴通讯股份有限公司 | Method and device for restoring configuration of set top box from damage |
CN104484240A (en) * | 2014-12-09 | 2015-04-01 | 青岛海信宽带多媒体技术有限公司 | Method and device for storing terminal data |
CN104932955A (en) * | 2015-05-29 | 2015-09-23 | 深圳市创维电器科技有限公司 | Method for backing up data during factory setting restoring of mobile terminal, and mobile terminal |
CN105260215A (en) * | 2015-11-04 | 2016-01-20 | 福建星海通信科技有限公司 | Method of updating vehicle-mounted automobile data recorder terminal by USB flash disk |
CN106445745A (en) * | 2016-10-09 | 2017-02-22 | 青岛海信移动通信技术股份有限公司 | Terminal device and method for recovering factory settings |
CN108255938A (en) * | 2017-12-07 | 2018-07-06 | 中国航空工业集团公司西安航空计算技术研究所 | A kind of airborne Embedded Main Memory Database image generation and loading method |
CN110417582A (en) * | 2019-07-03 | 2019-11-05 | 华为技术有限公司 | A kind of method for configuring routers, terminal and router |
CN111405322A (en) * | 2020-03-05 | 2020-07-10 | 青岛聚看云科技有限公司 | Method and device for acquiring login information |
CN111405322B (en) * | 2020-03-05 | 2022-08-02 | 青岛聚看云科技有限公司 | Method and device for acquiring login information |
WO2022032561A1 (en) * | 2020-08-13 | 2022-02-17 | Arris Enterprises Llc | System and method for back-up and restoration of a media gateway apparatus |
WO2023155702A1 (en) * | 2022-02-16 | 2023-08-24 | 上海美控智慧建筑有限公司 | Parameter backup method and apparatus for air conditioning unit, and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN101222527B (en) | 2011-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101222527B (en) | Method and system for protecting terminal key configuration | |
US20220004521A1 (en) | Log file management | |
US10122575B2 (en) | Log collection, structuring and processing | |
US20110314148A1 (en) | Log collection, structuring and processing | |
US20210133702A1 (en) | Data processing method and apparatus, computer device, and storage medium | |
Shapiro | Privacy risk analysis based on system control structures: Adapting system-theoretic process analysis for privacy engineering | |
CN104679772A (en) | Method, device, equipment and system for deleting files in distributed data warehouse | |
CN102937926A (en) | Method and device for recovering deleted sqlite files on mobile terminal | |
CN104850407A (en) | Desktop screen capture system and method | |
CN101272275A (en) | Network management equipment, method and system for acquiring network appliance configuration information | |
CN101697520A (en) | Method and device for processing system logs | |
CN105389314A (en) | Log file query system and query method | |
CN107402870A (en) | The processing method and processing device of daily record section in a kind of meta data server | |
CN112084154A (en) | Cross-platform multi-host joint log compression method | |
CN113064760A (en) | Database synthesis backup method and device, computer equipment and storage medium | |
CN109582504A (en) | A kind of data reconstruction method and device for apple equipment | |
US20200125544A1 (en) | Method and Apparatus of Collecting and Reporting Database Application Incompatibilities | |
DE112012000305T5 (en) | Joint restoration of data sources | |
CN107491538B (en) | Storage process command and parameter value extraction method of DB2 database | |
CN1874253A (en) | Method for managing system log | |
CN103117892B (en) | Add method and the device of website visiting record | |
CN111061593B (en) | Electronic evidence obtaining system and method | |
CN104424234A (en) | Method and device for detecting change of file system and corresponding electronic device | |
CN111177133A (en) | Processing insertion method for multivariate data | |
CN106302388A (en) | A kind of configurable information system security auditing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |