Method, system and apparatus for protecting terminal data
A data protection and terminal technology, applied in security devices, electronic digital data processing, special data processing applications, etc., can solve the problems of poor user experience and unreasonable server authority control mechanism, and achieve the effect of good user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The present invention will be described in detail below in conjunction with the accompanying drawings.
[0035] As shown in Figure 2(a), Figure 2(b) and Figure 2(c), it is a schematic structural diagram of a system for protecting terminal data in Embodiment 1 of the present invention, the system includes: a first device management server 11 and a terminal 12 , wherein, the first device management server 11 includes a locking command issuing module 21, which is used to issue a locking command, and the command includes locking information indicating that the terminal locks all or part of the functions; the terminal 12 includes a first receiving module 31 and a locking module 32, wherein the first receiving module 31 is configured to receive the locking command; the locking module 32 is configured to lock all or part of the functions according to the locking information.
[0036] There are three situations for locking all information and partially locking information:
[...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 