Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal, server and terminal safety management method

A management method and terminal security technology, applied in electrical components, transmission systems, etc., can solve problems such as information leakage, limited control of mobile terminals, and inability to bind information security controls, to ensure information security, convenient access control, and protection of enterprise information. safe effect

Active Publication Date: 2013-09-18
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the control on mobile terminals is very limited. Existing information security controls cannot be organically tied to mobile terminals, which may lead to information leakage from mobile terminals.
Enterprises often achieve the purpose of ensuring information security by restricting employees and customers from using mobile terminals, but this often causes a lot of inconvenience to employees and customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal, server and terminal safety management method
  • Terminal, server and terminal safety management method
  • Terminal, server and terminal safety management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0025] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.

[0026] figure 1 A block diagram of a terminal according to an embodiment of the present invention is shown.

[0027] Such as figure 1 As shown, the present invention provides a terminal 100, including: a communication unit 102, which sends verification request information to a server, and receives permission setting information corresponding to the verification request information from the server; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal which comprises a communication unit and a processing unit, wherein the communication unit is used for sending verification request information into a server and receiving permission setting information corresponding to the verification request information from the server; the processing unit is used for configuring the corresponding terminal permission setting according to the permission setting information coming from the communication unit. Correspondingly, the invention also provides the server and a terminal safety management method. After the technical scheme is adopted, the information security problem caused by the mobile terminal can be solved, and information of an area to be protected can be effectively guaranteed to be safe.

Description

technical field [0001] The present invention relates to the technical field of electronic security, in particular to a terminal, a server and a terminal security management method. Background technique [0002] With the development of science and technology, modern enterprises pay more and more attention to information security, and various enterprises try various methods to prevent information leakage, such as desktop security, email filtering, etc. However, the control on mobile terminals is very limited. Existing information security controls cannot be organically tied to mobile terminals, which may lead to information leakage from mobile terminals. Enterprises often achieve the purpose of ensuring information security by restricting employees and customers from using mobile terminals, but this often causes a lot of inconvenience to employees and customers. [0003] Therefore, a new security management technology is needed, which can effectively solve the information sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘灵新
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products