Method, system and device for locking working region of mobile terminal

A mobile terminal and work area technology, applied in the network field, can solve problems such as hidden enterprise leakage, leakage and loss of sensitive enterprise information, etc.

Inactive Publication Date: 2014-03-19
BEIJING QIHOO TECH CO LTD +1
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 2. Lost or stolen mobile terminals will bring hidden dangers to enterprises
[0008] Mobile terminals are easy to lose, and the enterprise data stored in the mobile terminal is also exposed to t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for locking working region of mobile terminal
  • Method, system and device for locking working region of mobile terminal
  • Method, system and device for locking working region of mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] In order to effectively ensure the security of enterprise information, the embodiments of the present invention provide a method, system and device for locking a work area of ​​a mobile terminal.

[0080] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0081] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0082] First, the system architecture of the mobile terminal enterprise management system provided by t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for locking a working region of a mobile terminal, which is used for guaranteeing the information safety of the working region. According to the method, a server determines whether an enterprise management client is a compliant client according to a compliance detection rule stored by the server after receiving login information transmitted by the enterprise management client on the mobile terminal, and controls the enterprise management client to lock the working region when determining that the enterprise management client is non-compliant client. The embodiment of the invention also provides a corresponding device and system. In the embodiment of the invention, when the enterprise management client logins in every time, the server detects whether the enterprise management client is the compliant client, so that illegal users can be prohibited from entering the working region, uploading, sharing and leakage of data of the working region under the illegal condition can be avoided, and the safety of enterprise information is effectively protected.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a method, system and device for locking a work area of ​​a mobile terminal. Background technique [0002] With the maturity and popularity of mobile terminals, personal mobile terminal devices represented by smart phones and tablet computers have gradually entered the enterprise field. According to the prediction of Gartner, an international authoritative consulting company, by 2014, 90% of enterprises will support employees to run corporate office applications on personal mobile terminal devices. Employees using personal mobile terminal devices for office work has become an irreversible trend. [0003] In BYOD, there are both personal applications and data and enterprise applications and data on the same mobile terminal. The enterprise applications are set in the enterprise management client, and the data of the enterprise applications are also stored in the enterprise ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31H04L29/08
CPCG06F21/31G06F21/45H04L67/025
Inventor 苏云琳张晨刘伟鹿亮
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products