Security configuration method, security control apparatus and security configuration apparatus
A security configuration and security technology, applied in the field of communication, can solve problems such as complex procedures, poor user experience, and inability of end users to choose applications individually, so as to simplify procedures and improve user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.
[0078] An embodiment of the present invention provides a security configuration method for a terminal, and the terminal may be a mobile phone, a tablet computer, etc., which is not limited in this embodiment of the present invention. like figure 1 As shown, the security configuration method includes:
[0079] Step 101. Receive a marking instruction input by a user.
[0080] For example, the terminal can refer to figure 2 As shown, it includes a user configuration module 201, a signature mapping module 202, and a SeLinux security policy protection module 203, wherein the user configuration module 201 is connected to the signature mapping module 202, and the signature mapping module 202 is connected to the SeLinux security policy protection module. The module 203 is connecte...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


