1. Technical Field
The present disclosure relates to a method and a system of securing electronic device and, particularly, to a method and a system of securing electronic device in a network.
2. Description of Related Art
An electronic device has some important data information stored therein for users. A user can obtain the data information from the electronic device after the user is authorized. However, the data information may be obtained by others unauthorized. The data information stored in the electronic device is not safe. The data information may easily be obtained by others.
Many aspects of the embodiments can be better understood with references to the following drawings. The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the embodiments. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
The disclosure is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean at least one.
In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language, such as, for example, Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as an EPROM. It will be appreciated that modules may comprised connected logic units, such as gates and flip-flops, and may comprise programmable units, such as programmable gate arrays or processors. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of computer-readable medium or other computer storage device.
Referring to
Referring to
In block S01, the first electronic device 10 connects to the Internet 50 through the wireless access point 30 (or the gateway 60). The first electronic device 10 saves a plurality of initial network environment parameters.
In block S02, the detecting module of the first electronic device 10 detects a plurality of actual network environment parameters between the Intranet 20 and the Internet 50. The initial and actual network environment parameters include:
1. a name of the wireless access point 30 or a Media Access Control (MAC) address of the wireless access point 30.
2. all IP addresses in the Intranet 20 and at least one public IP address in the Internet 50 of a route path between the first electronic device 10 and the second electronic device 70. When one IP address in the Intranet 20 is changed, the actual network environment parameter is not different from the initial network environment parameter.
3. a MAC address of the gateway 60.
4. a domain name of the first electronic device 10 by the inquiring DNS server 80.
5. the actual network environment parameter comprising sudden disconnected network, the initial network environment parameter comprising normal connected and disconnected network.
In block S03, when the actual network environment parameter is different from the initial network environment parameter, the uploading module of the first electronic device 10 uploads data information stored therein to the second electronic device 70 through the Internet 50. The network environment parameters generally can not be changed except when someone intends to change the network environment parameters. When the first electronic device 10 detects the initial network environment parameter changed, the uploading module of the first electronic device 10 uploads data information stored therein to the second electronic device 70. The data information includes MAC address, photos, music, and movie and so on in the first electronic device 10. The first electronic device 10 may upload the data information through a protocol, for example, FTP protocol, EMAIL protocol, MMS protocol, HTTP protocol. When the first electronic device 10 disconnects with the network 50, the first electronic device 10 uploads the data information via WiFi.
In block S04, the deleting module of the first electronic device 10 deletes the data information stored in therein to protect the data information from obtaining by others. If a user uses the first electronic device 10 again, the second electronic device 70 must authorize the user to obtain the data information from the first electronic device 10.
It is to be understood, however, that even though numerous characteristics and advantages of the disclosure have been set forth in the foregoing description, together with details of the structure and function of the invention, the disclosure is illustrative only, and changes may be made in detail, especially in matters of shape, size, and arrangement of parts within the principles of the invention to the full extent indicated by the broad general meaning of the terms in which the appended claims are expressed.
It is also to be understood that the above description and the claims drawn to a method may include some indication in reference to certain steps. However, the indication used is only to be viewed for identification purposes and not as a suggestion as to an order for the steps.
Number | Date | Country | Kind |
---|---|---|---|
200910302212.4 | May 2009 | CN | national |