Terminal and server for applying security policy and control method thereof
A security policy, server technology, applied in subscription services, security devices, service provisioning, etc., can solve problems such as vulnerability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] discussed below Figure 1 to Figure 7 And the various embodiments used to describe the principles of the disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented by any suitably arranged telecommunications technology. Hereinafter, various embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. It should be noted that the same components are designated by the same reference numerals throughout the figures. In the following description of the present disclosure, a detailed description of well-known functions and configurations contained herein will be omitted when it may make the subject matter of the present disclosure very unclear.
[0026] figure 1 is a block diagram illustrating a mobile device management (MDM) solut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


