CN102857526A - System and method for synchronizing mobile phone and computer - Google Patents
System and method for synchronizing mobile phone and computer Download PDFInfo
- Publication number
- CN102857526A CN102857526A CN201110178087.8A CN201110178087A CN102857526A CN 102857526 A CN102857526 A CN 102857526A CN 201110178087 A CN201110178087 A CN 201110178087A CN 102857526 A CN102857526 A CN 102857526A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- computer
- identification number
- hardware identification
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a system and a method for synchronizing a mobile phone and a computer. The system comprises a linking module, an encryption computation module, a character string storing module, a character string reading module, a character string judging module and a synchronizing module, wherein the linking module is used for carrying out data linking on the mobile phone and the computer, and reading a hardware identification number from the mobile phone; the encryption computation module is used for computing an encrypted character string with a specific length by an encryption computation manner according to the hardware identification number in the mobile phone and the hardware identification number in the computer; the character string storing module is used for respectively storing the encrypted character strings in the mobile phone and the computer; the character string reading module is used for reading the encrypted character string in the mobile phone and the encrypted character string in the computer; the character string judging module is used for judging whether the encrypted character string in the mobile phone is accordant with the encrypted character string in the computer; and the synchronizing module is used for synchronizing contents in the computer with the mobile phone. According to the system and the method for synchronizing the mobile phone with the computer, the synchronous management of the mobile phone is simple, convenient and feasible, the system safety is high, and the steps are concise.
Description
Technical field
The present invention relates to a kind of system and method for mobile terminal safety, particularly relate to the synchronous system and method for a kind of mobile phone and computer security.
Background technology
Along with the raising of people's living standard and the development of mechanics of communication, mobile phone is more and more universal in people's life, becomes also more and more important simultaneously in people's life.Along with popularizing and the enhancing of cell-phone function of mobile phone, mobile phone has developed into a kind of Portable electronic equipment of Multifunctional multimedia from a kind of simple communication tool.Thereby for consumers in general's daily life and use provides many convenience.
A lot of mobile phones all provide the PC (PC) that is complementary synchronizing software when dispatching from the factory, the user can use the PC synchronizing software to carry out schedule, calendar, song, picture, the contents such as note synchronously, the PC synchronizing software has been simplified the use of mobile phone, is convenient for people to fast the song on the own PC, novel, the content synchronization such as picture keep the content on the mobile phone consistent with the content of the upper storage of PC to mobile phone.But the PC synchronizing software has also increased the risk of information leakage, temporarily drop on when mobile phone outside holder's the control range, other user who then controlled at that time mobile phone can be connected to mobile phone on the PC of oneself easily, use the PC synchronizing software that the PC that contents all in the mobile phone all is synchronized to oneself is got on, the content in the mobile phone has just leaked out like this.Those skilled in the art is devoted to develop a kind of mobile phone can carry out synchronous system and method with PC safely.
Summary of the invention
The technical problem to be solved in the present invention is in order to overcome in the prior art, when mobile phone drops on outside user's control range, others may carry out synchronously mobile phone content and computer without authorization, thereby reveal the deficiency of user profile, provide a kind of mobile phone and computer synchronous system and method, make the user carry out management by synchronization to mobile phone safely.
The present invention solves above-mentioned technical problem by following technical proposals:
A kind of mobile phone and computer synchronous system, its characteristics be, described system comprises: link block is used for a mobile phone and is connected computer and carries out data and connect, and reads a hardware identification number from mobile phone; The computations module is used for the encrypted characters string of calculating a length-specific in the mode of computations according to hardware identification number and the hardware identification number in the computer of mobile phone; The character string memory module is used for depositing respectively described encrypted characters string in mobile phone and computer; The character string read module is used for reading the encrypted characters string of mobile phone and the encrypted characters string in the computer; The character string judge module is used for judging whether the encrypted characters string of mobile phone is consistent with the encrypted characters string in the computer; Synchronization module is used for the content on the computer and mobile phone are carried out synchronously.
Preferably, the hardware identification number on the described mobile phone is the IMEI code.
Preferably, the hardware identification number on the described computer is MAC Address.
Preferably, the mode of described computations refers to be encrypted calculating according to the MD5 algorithm.
Preferably, it is characterized in that, there is an invisible storage area in the memory portion of described mobile phone, is used for storing described encrypted characters string.
The invention still further relates to and a kind of mobile phone and computer content are carried out synchronous method, its characteristics are, said method comprising the steps of:
Step S1 is connected computer with mobile phone;
Step S2 reads the hardware identification number of mobile phone and the hardware identification number of computer, calculates the encrypted characters string of a length-specific in the mode of computations according to the hardware identification number in the mobile phone and the hardware identification number in the computer;
Step S3 deposits described encrypted characters string respectively in mobile phone and the computer;
Step S4 judges whether the encrypted characters string in the described mobile phone is consistent with the encrypted characters string in the computer;
Step S5 determines whether the content on the computer and mobile phone are carried out synchronously.
Preferably, described computer is connected by data wire or wireless mode with described mobile phone.
Preferably, the hardware identification number on the described mobile phone is the IMEI code.
Preferably, the hardware identification number on the described computer is MAC Address.
Preferably, the mode of described computations refers to be encrypted calculating according to the MD5 algorithm.
Positive progressive effect of the present invention is: under the technical scheme that the present invention discloses mobile phone is managed synchronously simple and easy to doly, security of system is high, and method step is succinct.
Description of drawings
Fig. 1 is mobile phone according to an embodiment of the invention and the synchronous system construction drawing of computer.
The flow chart that Fig. 2 arranges during for mobile phone according to one embodiment of present invention and computer first connection.
Fig. 3 is for mobile phone and computer carry out synchronous flow chart according to one embodiment of present invention.
The flow chart of Fig. 4 for according to one embodiment of present invention mobile phone encrypted characters string being managed.
Embodiment
Embodiments of the invention describe with reference to the accompanying drawings.In Figure of description, the element with similar structures or function will represent with identical component symbol.Accompanying drawing is each embodiment of the present invention for convenience of explanation just, is not to carry out to the present invention the explanation of exhaustive, neither limit scope of the present invention.
Fig. 1 is mobile phone according to an embodiment of the invention and the synchronous system construction drawing of computer.Be appreciated that ground, Fig. 1 has only shown the part of module in this synchro system 100, so that describe the system configuration of mobile terminal system 100 according to a preferred embodiment of the present invention.For instance, system 100 can also comprise gps system, radio, audio system, video system etc.Simultaneously, mobile terminal system 100 can be mobile phone, also can be other mobile terminal device.
Mobile terminal system 100 comprises answers link block 110, computations module 120, character string memory module 130, character string read module 140, character string judge module 150 and synchronization module 160.Wherein, link block 110 is used for mobile phone and connects with computer, and this connection can be the data wire form, also can be the wireless network access form.Computations module 120 is for the encrypted characters string of calculating a length-specific in the mode of computations according to hardware identification number and the hardware identification number in the computer of mobile phone.In one embodiment, the hardware identification number in the mobile phone can be the IMEI code, and the hardware identification number in the computer can be MAC Address.Those skilled in the art will appreciate that other suitable hardware identification number all can be brought use in mobile phone and the computer.Character string memory module 130 is used for the encrypted characters string that calculates is stored in zone, the specific place of mobile phone one ROM, and this zone should be sightless for the user, only has the computer synchronizing software to read and write it.Simultaneously, character string memory module 130 is deposited into the encrypted characters string in the particular space that arranges in computer.Character string read module 140 is used for being connected with computer when connecting when mobile phone, and the encrypted characters string in the BOT machine reads.Character string judge module 150 compares for the encrypted characters string of storing in the encrypted characters string that mobile phone is read and the computer.160 of synchronization modules are used for carrying out mobile phone and computer content are carried out synchronous action.
The flow chart that Fig. 2 arranges during for mobile phone according to one embodiment of present invention and computer first connection.In step 210, mobile phone links to each other first with computer.In step 220, computer reads a hardware identification number in the mobile phone, in a preferred embodiment, this hardware identification number can be mobile phone IMEI code, computer reads a hardware identification number of computer self simultaneously, and in a preferred embodiment, this computer hardware identification number can be MAC Address.Subsequently, the encrypted characters string of a length-specific is calculated by system in the mode of computations according to the hardware identification number in the mobile phone and the hardware identification number in the computer, and in a preferred embodiment, this cryptographic algorithm is the MD5 algorithm.In step 230, deposit the encrypted characters string of calculating in the mobile phone particular memory region, in general, this zone is to divide out from the interior of mobile phone memory space, this zone is invisible for the user, system's this document is set to hide, and only has system synchronization software to read and write it.In step 240, this encrypted characters string is stored in the hard-disc storage space of computer equally, and system can read at any time to this character string.Like this, mobile phone and computer first connection arrange successfully, withdraw from setting in step 250.
For instance, the IMEI number of mobile phone is 256963427852369, the MAC Address of computer is F0-12-33-55-0C-EF, the time that connects is 20110412163256, the MD5 key that then generates is fglk256526df398h, and this key is written to respectively the region of memory of interior of mobile phone memory space and PC synchronizing software.
Fig. 3 is for mobile phone and computer carry out synchronous flow chart according to one embodiment of present invention.In step 310, computer is connected with mobile phone.In step 320, read in the interior specific region of mobile phone and the encrypted characters string in the computer specific region, described two encrypted characters strings are compared, whether unanimously check.If, then entering step 330, the BOT machine carries out the content synchronization operation; If not, then enter step 340, forbid simultaneous operation.
The flow chart of Fig. 4 for according to one embodiment of present invention mobile phone encrypted characters string being managed.In step 410, computer is connected with mobile phone.In step 420, read in the interior specific region of mobile phone and the encrypted characters string in the computer specific region, described two encrypted characters strings are compared, whether unanimously check.If, then enter step 430, allow the encrypted characters string of specific region in the BOT machine to operate, this operation can be copy backup, deletion or only browse; If not, then enter step 440, forbid that the encrypted characters string conducts interviews in the BOT machine.
In general, for careful consideration, system user can copy out with the encrypted characters string in the mobile phone as individual secret file and preserve, and causes and can not carry out synchronous trouble to mobile phone in case the accidental damage of PC operating system or computer are lost.Like this, when the another one computer was connected with mobile phone, the user directly carried out the input of character string in the hard-disc storage space to computer, thereby continues safely the mobile phone content to be carried out simultaneous operation.
Although more than described the specific embodiment of the present invention, it will be understood by those of skill in the art that these only illustrate, protection scope of the present invention is limited by appended claims.Those skilled in the art can make various changes or modifications to these execution modes under the prerequisite that does not deviate from principle of the present invention and essence, but these changes and modification all fall into protection scope of the present invention.
Claims (10)
1. a mobile phone and computer synchronous system is characterized in that, described system comprises:
Link block is used for a mobile phone and is connected computer and carries out data and connect, and reads a hardware identification number from mobile phone;
The computations module is used for the encrypted characters string of calculating a length-specific in the mode of computations according to hardware identification number and the hardware identification number in the computer of mobile phone;
The character string memory module is used for depositing respectively described encrypted characters string in mobile phone and computer;
The character string read module is used for reading the encrypted characters string of mobile phone and the encrypted characters string in the computer;
The character string judge module is used for judging whether the encrypted characters string of mobile phone is consistent with the encrypted characters string in the computer;
Synchronization module is used for the content on the computer and mobile phone are carried out synchronously.
2. synchro system as claimed in claim 1 is characterized in that, the hardware identification number on the described mobile phone is the IMEI code.
3. synchro system as claimed in claim 1 is characterized in that, the hardware identification number on the described computer is MAC Address.
4. synchro system as claimed in claim 1 is characterized in that, the mode of described computations refers to be encrypted calculating according to the MD5 algorithm.
5. such as the described synchro system of claim 1 to 4 any one, it is characterized in that, there is an invisible storage area in the memory portion of described mobile phone, is used for storing described encrypted characters string.
6. one kind is carried out synchronous method to mobile phone and computer content, it is characterized in that, said method comprising the steps of:
Step S
1, computer is connected with mobile phone;
Step S
2, read the hardware identification number of mobile phone and the hardware identification number of computer, calculate the encrypted characters string of a length-specific in the mode of computations according to the hardware identification number in the mobile phone and the hardware identification number in the computer;
Step S
3, described encrypted characters string is deposited in respectively in mobile phone and the computer;
Step S
4, judge whether the encrypted characters string in the described mobile phone is consistent with the encrypted characters string in the computer;
Step S
5, determine whether the content on the computer and mobile phone are carried out synchronously.
7. method as claimed in claim 6 is characterized in that, described computer is connected by data wire or wireless mode with described mobile phone.
8. method as claimed in claim 6 is characterized in that, the hardware identification number on the described mobile phone is the IMEI code.
9. method as claimed in claim 6 is characterized in that, the hardware identification number on the described computer is MAC Address.
10. such as the described method of claim 6 to 9 any one, it is characterized in that, the mode of described computations refers to be encrypted calculating according to the MD5 algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110178087.8A CN102857526A (en) | 2011-06-28 | 2011-06-28 | System and method for synchronizing mobile phone and computer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110178087.8A CN102857526A (en) | 2011-06-28 | 2011-06-28 | System and method for synchronizing mobile phone and computer |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102857526A true CN102857526A (en) | 2013-01-02 |
Family
ID=47403719
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110178087.8A Pending CN102857526A (en) | 2011-06-28 | 2011-06-28 | System and method for synchronizing mobile phone and computer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102857526A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318935A (en) * | 2014-10-16 | 2015-01-28 | 深圳市凯祥源科技有限公司 | Method for controlling mobile hard disk drive through mobile equipment |
CN104462948A (en) * | 2013-09-25 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN107404585A (en) * | 2017-07-30 | 2017-11-28 | 安徽云帮邦网络技术有限公司 | A kind of method that smart mobile phone updates to the PC ends time |
CN104462948B (en) * | 2013-09-25 | 2018-06-01 | 联想(北京)有限公司 | A kind of information processing method and a kind of electronic equipment |
-
2011
- 2011-06-28 CN CN201110178087.8A patent/CN102857526A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462948A (en) * | 2013-09-25 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104462948B (en) * | 2013-09-25 | 2018-06-01 | 联想(北京)有限公司 | A kind of information processing method and a kind of electronic equipment |
CN104318935A (en) * | 2014-10-16 | 2015-01-28 | 深圳市凯祥源科技有限公司 | Method for controlling mobile hard disk drive through mobile equipment |
CN104318935B (en) * | 2014-10-16 | 2017-07-11 | 深圳市凯祥源科技有限公司 | A kind of method that mobile hard disk is controlled by mobile device |
CN107404585A (en) * | 2017-07-30 | 2017-11-28 | 安徽云帮邦网络技术有限公司 | A kind of method that smart mobile phone updates to the PC ends time |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101600208A (en) | Mobile phone storage data auto-destruct system and method | |
CN101296457A (en) | Screen operation method and device | |
CN103533011A (en) | Intelligent terminal data configuration method and system based on cloud terminal | |
CN104182662A (en) | Mobile terminal, system and method for hiding and starting hidden application programs | |
US9323908B2 (en) | Authentication method and electronic device | |
CN102378155A (en) | System and method for remotely controlling mobile terminal | |
CN108289129A (en) | Block chain ecological environment creation method, system and computer readable storage medium | |
Meletiou et al. | Design and Implementation of an E-exam System Based on the Android Platform | |
CN101610500A (en) | Mobile phone data retrieving method, mobile phone and mobile phone data retrieving system | |
US20080102894A1 (en) | Mobile terminal and data display method by individual sim cards | |
CN109088914A (en) | Generation method, the block chain ecosystem and the computer readable storage medium of block | |
CN107241449A (en) | Method of data synchronization and device, hand-held mobile terminal and storage medium | |
CN104796967B (en) | Wireless network data restoring method and device | |
CN102857526A (en) | System and method for synchronizing mobile phone and computer | |
CN109614600A (en) | Report methods of exhibiting, device and computer storage medium | |
CN102185955A (en) | Mobile terminal with security function and security method thereof | |
US20060104445A1 (en) | Systems and methods for hiding a data group | |
CN103679045A (en) | File security control system and method | |
CN105739907A (en) | Data storage method | |
CN105740920A (en) | Data reading method under wireless environment | |
CN104346417B (en) | A kind of synchronous method of bookmark information and device | |
CN103052060A (en) | Method for improving information security of mobile terminal and mobile terminal | |
CN101150398A (en) | A method, system and communication terminal for updating communication secret key | |
CN102938804A (en) | Contact information managing method and device | |
CN101909114A (en) | Method, device and mobile terminal for hiding information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130102 |