Terminal security management and authentication method and system
A technology of terminal security and management method, applied in the field of terminal security management, which can solve the problems of unfavorable resource security, inability to know the use of equipment, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] How the present invention is implemented will be described in detail below in conjunction with the accompanying drawings.
[0014] The terminal security management system of the present invention includes: a plurality of terminals connected to the intranet; a switch or router connected to the local area network for providing access to the terminals; a terminal manager system connected to the local area network are connected to each other, and perform security management on the terminal through the switch or the router.
[0015] The local area network is a wired Ethernet local area network or a wireless local area network that meets the 802.1X standard series. Preferably, different usage permissions are set in the system of the terminal. For ordinary employees, it is a computer with limited permissions. The limited permissions refer to Users who use this computer only have the authority to use power users, that is, they can only use some functions and programs of the sys...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com