A Smartphone Security Protection Method Based on Security Scenarios
A smart phone and security protection technology, applied in the field of smart phone security protection based on security scenarios, can solve problems such as lack of research and achieve the effect of protecting information security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0042] The present invention provides a smart phone security protection method based on security scenarios, such as figure 1 As shown, the method includes the following steps:
[0043] 1) The user defines a new security scenario or selects a common security scenario, and specifies to run a security scenario; defining a new security scenario includes defining scenario data and security rules;
[0044] 2) The equipment collects scenario data, and judges whether the actual scenario data is consistent with the scenario data defined in the designated operation safety scenario; if so, executes the security rules corresponding to the security scenario; The scenario data defined by the non-running security scenario is consistent, and if so, execute the security rules corresponding to the security scenario; if it does not match the scenario data of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


