Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and apparatus for protecting terminal data

A data protection and terminal technology, applied in security devices, electronic digital data processing, special data processing applications, etc., can solve the problems of poor user experience and unreasonable server authority control mechanism, and achieve the effect of good user experience

Active Publication Date: 2009-04-22
HUAWEI TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a method, system and device for terminal data protection to solve the unreasonable server authority control mechanism existing in the prior art, and the user Problems with poor experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and apparatus for protecting terminal data
  • Method, system and apparatus for protecting terminal data
  • Method, system and apparatus for protecting terminal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0035] As shown in Figure 2(a), Figure 2(b) and Figure 2(c), it is a schematic structural diagram of a system for protecting terminal data in Embodiment 1 of the present invention, the system includes: a first device management server 11 and a terminal 12 , wherein, the first device management server 11 includes a locking command issuing module 21, which is used to issue a locking command, and the command includes locking information indicating that the terminal locks all or part of the functions; the terminal 12 includes a first receiving module 31 and a locking module 32, wherein the first receiving module 31 is configured to receive the locking command; the locking module 32 is configured to lock all or part of the functions according to the locking information.

[0036] There are three situations for locking all information and partially locking information:

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting terminal data and the method comprises that a first equipment management server gives out a lock command to a terminal, and the command comprises lock information that instructs the terminal to lock all or part of functions and is loaded by an equipment management DM protocol; the terminal locks all or part of functions according to the lock information. Using the method, a user can conduct lockup according to requirements and get wonderful experience. The invention also discloses a system for protecting the terminal data.

Description

technical field [0001] The present invention relates to the field of Device Management (Device Management, DM), in particular to a method, system and device for protecting terminal data in DM. Background technique [0002] The DM (hereinafter referred to as the DM specification) of the Open Mobile Alliance (OMA) is the latest uniform standard specification for device management. The DM system provides a low-cost solution, mainly used for third-party management and setting of wireless networks The environment and configuration information of terminal devices (such as mobile terminals and functional objects in terminals), solve the problems encountered in the use of these network devices, and perform operations such as software and firmware installation and upgrade through wireless networks (OTA), And provide more humanized and personalized services to improve user experience. [0003] With the extensive use of mobile terminals, a large number of important assets of people ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W88/18
CPCH04W12/12H04W88/02H04W12/126G06F15/16G06F17/00H04L9/32
Inventor 崔首领柴晓前李克鹏田林一
Owner HUAWEI TECH CO LTD