Terminal device, terminal protecting method for same, and terminal managing server device

A terminal device and terminal management technology, applied in security devices, digital data protection, program control devices, etc., can solve problems such as locking and erasing not working, password exposure, etc., to achieve high security and prevent leakage

Active Publication Date: 2016-04-20
SK TELECOM CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Therefore, if a hacker breaks into a terminal device for malicious and selfish purposes, passwords stored in the terminal device may be exposed, and methods for protecting personal information (for example, locking and erasing) do not work in this case. Work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal device, terminal protecting method for same, and terminal managing server device
  • Terminal device, terminal protecting method for same, and terminal managing server device
  • Terminal device, terminal protecting method for same, and terminal managing server device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The advantages and features of the exemplary embodiments of the present disclosure and methods of achieving them will be clearly understood from the following description of the embodiments taken in conjunction with the accompanying drawings. However, the present disclosure is not limited to these embodiments, and can be implemented in various forms. It is to be noted that these embodiments are provided to make the disclosure complete and to enable those skilled in the art to appreciate the full scope of the disclosure.

[0034] In the following description, known functions and / or configurations will not be described in detail if they would unnecessarily obscure the features of the present disclosure. In addition, terms to be described below are defined in consideration of their functions in the embodiments of the present disclosure, and vary depending on user or operator's intention or practice. Therefore, the definition is made on the basis of the content of the enti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a terminal device, a terminal protecting method for the same, and a terminal managing server device. When a terminal device meets preset terminal protecting requirements, the terminal device is locked and altered to a locked state. Since an unlocking key needed to unlock the locked state of the terminal is completely deleted from the terminal device, the possibility of the unlocking key being uncovered through hacking or the like is fundamentally prevented, and a high level of security is provided.

Description

technical field [0001] The present disclosure relates to a terminal device for locking a terminal device to protect personal information, a terminal management server for remotely managing the terminal device, and a method for locking itself for protection of the terminal device. Background technique [0002] Generally speaking, since users may store important personal information on their terminal devices (eg, smart phones or tablet computers), a method for protecting the information is required. [0003] In the prior art for protecting personal information, if a terminal device is lost, the terminal device is remotely locked, or the personal information is erased. [0004] A prior art method for protecting personal information based on the Open Mobile Alliance (OMA) Device Management (DM) standard is to install a terminal management application for performing lock and wipe in the terminal device to protect data stored in the terminal device. information on the end device....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/30
CPCG06F21/60G06F9/44G06F11/30H04W12/08G06F9/4416G06F15/16G06F21/604G06F21/6218H04L63/083H04L63/0853
Inventor 李应硕
Owner SK TELECOM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products