Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, client and system for securely controlling PC-related operations by mobile terminal

A security control and mobile terminal technology, applied in the direction of digital data protection, internal/peripheral computer component protection, etc., can solve problems such as user property loss, user private information leakage, and unskilled operation

Active Publication Date: 2016-09-28
BEIJING QILI SOFTWARE TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the popularity of PC technology and especially Internet technology, the types of people who can use PC are becoming wider and wider, with differences in terms of gender, age, education level and occupation. Children, teenagers, middle-aged people, and the elderly have different proficiency levels for PC operations. The most obvious example is that among the elderly, a considerable number of users are not proficient in PC operations.
[0003] With the development of PC technology and Internet technology today, if no precautions are taken, various viruses, malicious software and junk software will invade the user's PC, causing various unsafe factors, such as malicious software that allows users to access unprotected A secure website will lead to the leakage of the user's private information and even the loss of the user's property. Obviously, for users who are not proficient in PC operation, how to ensure their safety in the process of using the PC has become an urgent problem to be solved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, client and system for securely controlling PC-related operations by mobile terminal
  • Method, client and system for securely controlling PC-related operations by mobile terminal
  • Method, client and system for securely controlling PC-related operations by mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0041] For users who are not proficient in PC operation, how to ensure their safety in the process of using PC, in the embodiment of the present invention, a solution to control PC through mobile terminals is proposed, so that those who are proficient in operating PC The user can remotely control some security settings on the PC through the mobile terminal, so as to achieve the purpose of security control on the PC. For example, yo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, a client and a system of safely controlling related operations of a PC (Personal Computer) by a mobile terminal. The method includes the steps of initiating a request used for drawing installed software list information and starting item information in the PC bound with the mobile terminal, receiving the installed software list information and the starting item information in the returned PC, and extracting the list information to generate one or a plurality of control inlet elements displayed for a user; generating corresponding safe control information after the user safely sets the installed software in the PC based on one or the plurality of control inlet elements, and transmitting the safe control information to a client on the PC, so that the client in the PC executes the corresponding safe control operation on the installed software and starting items according to instructions in the safe control information. According to the method, after the mobile terminal and the PC are bound, the safe control of the mobile terminal on the PC can be realized, and the safety of the operation of the PC can be guaranteed by unloading the software and / or modifying the starting items.

Description

technical field [0001] The present invention relates to the technical field of computer security, in particular to a method, client and system for securely controlling PC-related operations by a mobile terminal. Background technique [0002] With the popularity of PC technology and especially Internet technology, the types of people who can use PC are becoming wider and wider, with differences in terms of gender, age, education level and occupation. Children, teenagers, middle-aged people, and the elderly have different levels of proficiency in PC operations. The most obvious example is that among the elderly, a considerable number of users are not proficient in PC operations. [0003] With the development of PC technology and Internet technology today, if no precautions are taken, various viruses, malicious software and junk software will invade the user's PC, causing various unsafe factors, such as malicious software that allows users to access unprotected A secure websit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/71
Inventor 程凯帅维灿徐肇虎方伯君
Owner BEIJING QILI SOFTWARE TECH CO LTD