Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal and server for applying security policy and control method thereof

A security policy, server technology, applied in subscription services, security devices, service provisioning, etc., can solve problems such as vulnerability

Active Publication Date: 2018-05-11
SAMSUNG ELECTRONICS CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in addition to the APIs used for MDM solutions, restrictions on some permissions that are not normally used in Android may be vulnerable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and server for applying security policy and control method thereof
  • Terminal and server for applying security policy and control method thereof
  • Terminal and server for applying security policy and control method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] discussed below Figure 1 to Figure 7 And the various embodiments used to describe the principles of the disclosure in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. Those skilled in the art will understand that the principles of the present disclosure may be implemented by any suitably arranged telecommunications technology. Hereinafter, various embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. It should be noted that the same components are designated by the same reference numerals throughout the figures. In the following description of the present disclosure, a detailed description of well-known functions and configurations contained herein will be omitted when it may make the subject matter of the present disclosure very unclear.

[0026] figure 1 is a block diagram illustrating a mobile device management (MDM) solut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A terminal and a server for applying a security policy and a control method thereof are disclosed. A method of operating a terminal by using a mobile device management (MDM) solution includes: installing an application; requesting registration through a license key received from an enterprise license management (ELM) server; receiving a license key corresponding to the license key and including Rights Object (R / O) of the rights list; setting at least one right based on the rights list included in the received R / O; executing the set rights. A terminal using MDM includes: an MDM application configured to control installed applications to obtain required permissions; an ELM agent configured to request registration through a license key from an ELM server, and receive license keys associated with them. The R / O corresponding to the key and including the permission list; the ELM permission executor configured to set at least one permission based on the permission list included in the received R / O.

Description

technical field [0001] The present disclosure relates to a terminal and a server for applying a security policy and a control method thereof. More particularly, the present disclosure relates to a terminal and a server to which a security policy can be applied through Mobile Device Management (MDM) and a control method thereof. Background technique [0002] In recent years, smart phones, tablet personal computers (PCs), and portable electronic devices have been widely used, and related technologies have also been developed. Accordingly, workers in enterprises frequently enter and exit business places with their smartphones or tablet PCs. Due to this, enterprises establish various security policies to solve security problems such as information leakage through smartphones or tablet PCs, and research solutions or services in order to realize the established security policies. As a solution for implementing security policies, mobile device management (MDM) solutions limit the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/35H04W12/04H04W4/50H04W4/60
CPCG06F21/121G06F21/51H04W12/04G06F2221/033H04W12/08H04L63/062H04L2463/103H04W4/50H04W4/60H04W12/37G06F21/1077G06F21/10G06F21/604H04L63/205H04L63/06
Inventor 任昶贤俞锡满黄皙俊金碤圭白宗承张东镐
Owner SAMSUNG ELECTRONICS CO LTD