Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud desktop mobile device security management method

A mobile device and security management technology, applied in the transmission system, electrical components, etc., can solve problems such as restrictions on the use of mobile devices, cloud desktop data leakage, cloud desktop poisoning, etc., to prevent data leakage, reduce channels, and reduce the probability of poisoning Effect

Active Publication Date: 2018-10-19
SHANGHAI YOVOLE COMP NETWORK CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Data reading and writing between mobile devices (mobile storage) and cloud desktops may easily cause data leakage on cloud desktops
Mobile devices have their own security risks, such as viruses
Direct connection can easily lead to cloud desktop poisoning, and cannot restrict the use of mobile devices well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud desktop mobile device security management method
  • Cloud desktop mobile device security management method
  • Cloud desktop mobile device security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0023] During the data transmission process between the cloud desktop and the mobile terminal, a device authority control module is set to control the data transmission between the mobile terminal and the cloud desktop.

[0024] Such as figure 1 and figure 2 As shown, the method of restricting data interaction between the thin terminal external mobile device and the cloud desktop:

[0025] Initial step: encrypt and encapsulate the thin terminal system, load the cloud desktop client when the thin terminal starts, and shield the underlying system of the thin terminal. Prevent users from operating the thin terminal system.

[0026] Step A. Device identification control

[0027] Make restrictions on the system driver layer of the thin terminal, interact with the device authority control module when the thin terminal starts, and control whether...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a cloud desktop mobile device security management method. During the data transmission process between the cloud desktop and the mobile terminal, a device authority control module is set to control the data transmission between the mobile terminal and the cloud desktop. Its advantage is that it restricts the use of cloud desktop mobile devices, which can enhance the data security of cloud desktop and prevent data leakage of cloud desktop; reduce the channel of viruses transmitted through mobile devices, and reduce the chance of cloud desktop poisoning; flexible operation: in special cases, When it is necessary to copy cloud desktop data, the administrator can selectively enable the mobile device interface of the specified cloud desktop to facilitate data interaction.

Description

technical field [0001] The invention discloses a safety management method for restricting data transmission, and in particular relates to a safety management method for a cloud desktop mobile device. Background technique [0002] Now the use of mobile devices (mobile storage) is becoming more and more common, the reading and writing speed is getting faster and faster, and the storage space is also getting larger and larger, which greatly facilitates the storage of enterprise computer file information and facilitates work needs; [0003] But on the other hand, it also allows employees to easily copy a large number of computer files through USB flash drives, mobile hard disks and other mobile storage devices, which poses a greater risk to the security of corporate computer files. [0004] Data reading and writing between mobile devices (mobile storage) and cloud desktops can easily cause data leakage on cloud desktops. Mobile devices have their own security risks, such as vir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/145H04L67/10
Inventor 安柯
Owner SHANGHAI YOVOLE COMP NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products