Equipment access method and user equipment and device in data security protection and control
A technology for data security and equipment access, applied in computer security devices, electrical digital data processing, instruments, etc., can solve problems such as inability to access equipment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It should be noted that the described embodiments are only part of the embodiments of the present invention, not all of them. Example. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0031] Embodiment 1 of the present invention provides a device access method in data security prevention and control, the specific implementation method is as follows figure 1 shown, including:
[0032] Step S101, detecting whether the communication with the server is normal.
[0033] Step S102, when it is detected that the communication is normal, if the interface of the accessible device is open, record the access request ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 