Application installation control method, related system and related device

An application and installation package technology, applied in the field of information security, can solve the problems of enterprise data leakage, sensitive enterprise information leakage, hidden dangers of enterprise leakage, etc., and achieve the effect of ensuring safety and reliability and protecting enterprise information security.

Inactive Publication Date: 2014-03-19
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. Mixed use of personal applications and enterprise applications brings information security risks to enterprises
Such as office emails, documents, pictures, communication records, and short messages related to business content stored in mobile phones. The leakage of these sensitive corporate information brings great information security risks to enterprises.
[0007] 3. Lost or stolen mobile terminals will bring hidden dangers to enterprises
[0008] Mobile terminals are easy to lose, and the enterprise data stored in the mobile terminal is also exposed to the risk of leakage. The loss of equipment not only means the leakage and loss of sensitive enterprise information, but the lost equipment may also become a springboard for attacking the enterprise network.
[0009] 4. Mobile phone viruses are growing exponentially, and mobile terminals have become a springboard for infiltrating corporate intranets
At the same time, due to the abuse of Root (super user) rights and new hacking techniques, mobile terminals have become a new breeding ground for information security risks, and can easily become a springboard for hackers to infiltrate corporate intranets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application installation control method, related system and related device
  • Application installation control method, related system and related device
  • Application installation control method, related system and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to solve the information security problem brought by BYOD to enterprises, the embodiment of the present invention provides a mobile terminal enterprise management system, based on the mobile terminal enterprise management system, the embodiment of the present invention also provides an application program installation control The method, related system and device are used to implement security management on application programs on mobile terminals, thereby effectively protecting enterprise information security. The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[005...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an application installation control method, a related system and a related device, which are used to achieve safety management of applications on a mobile terminal. The application installation control method includes the following steps: an enterprise management client on the mobile terminal receives an installation request for an application listed in a list of applications for free installation; in case the enterprise management client is for sure configured with an application blacklist, whether the application to be installed is in the application blacklist is judged, the installation of the application is prohibited if the application to be installed is in the application blacklist, and the installation of the application proceeds if the application to be installed is not in the application blacklist; in case the enterprise management client is for sure configured with an application whitelist, whether the application to be installed is in the application whitelist is judged, the installation of the application proceeds if the application to be installed is in the application whitelist, and the installation of the application is prohibited if the application to be installed is not in the application whitelist. The invention adopting the technical scheme can effectively protect the information security of enterprises.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an application program installation control method, a related system and a device. Background technique [0002] With the maturity and popularity of mobile terminals, personal mobile terminal devices represented by smart phones and tablet computers have gradually entered the enterprise field. According to the prediction of Gartner, an international authoritative consulting company, by 2014, 90% of enterprises will support employees to run corporate office applications on personal mobile terminal devices. Employees using personal mobile terminal devices for office work has become an irreversible trend. This phenomenon known as BYOD (Bring Your Own Device) brings new challenges to enterprise information security: [0003] 1. The enterprise network boundary becomes blurred, and the original boundary defense system cannot effectively protect enterprise information securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56
CPCG06F21/51
Inventor 王鹏程苏云琳窦文科王力
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products