Terminal and terminal security management method

A management method and terminal security technology, applied in the field of security management, can solve problems such as affecting user experience and cumbersome use.

Active Publication Date: 2013-08-14
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In related technologies, data protection is often carried out through a single unlocking, private mode, etc. These methods often require users to manually set up, etc., which are cumbersome to use and affect the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and terminal security management method
  • Terminal and terminal security management method
  • Terminal and terminal security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0022] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0023] figure 1 A block diagram of a terminal according to the invention is shown.

[0024] Such as figure 1 As shown, the terminal 100 according to the present invention includes: a positioning unit 102, which acquires the real-time location of the terminal 100; a judging unit 104, which judges whether the real-time location is on a safe path; a processing unit 106, which determines whether the jud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal which comprises a positioning unit which is used for obtaining a real-time position of the terminal, a judging unit which is used for judging whether the real-time position is located in a safe path or not and a processing unit which is used for locking the terminal under the condition that a judgment result of the judging unit is no. Accordingly, the invention also provides a terminal security management method. According to the terminal and the terminal security management method, the terminal can be normally utilized in the safe path and losing, theft and the like of the terminal possibly happen when the terminal is deviated from the safe path, so that the terminal is locked to prevent leakages of identities, data and the like of users.

Description

technical field [0001] The present invention relates to the technical field of security management, in particular, to a terminal and a method for terminal security management. Background technique [0002] In related technologies, data protection is often performed through a single unlocking, private mode, etc. These methods often require users to perform manual settings, etc., which are cumbersome to use and affect the user experience. [0003] Therefore, a new terminal security management technology is needed, which can enable the terminal to be used normally on the safe path, and when it deviates from the safe path, it is considered that the terminal may be lost or stolen, and it will be locked to prevent users from Leakage of identities, data, etc. Contents of the invention [0004] Based on the above problems, the present invention proposes a new terminal security management technology, which can enable the terminal to be used normally on the safe path, and when it d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88G06F21/31
Inventor 罗亚龙
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products