Software whitelist management method and system
A management method and whitelist technology, applied in the field of network management, can solve problems such as data theft, impact on terminal device 30 operation performance, and increased risk of data leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.
[0066] Aiming at the problems caused by the need to install the client detection software on the detected device in the prior art, the software whitelist management method provided by the embodiment of the present invention migrates the verification function of the software installed in the terminal to the server in the network . figure 2 A schematic diagram of the deployment architecture of t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


