Unlock instant, AI-driven research and patent intelligence for your innovation.

A terminal security method and device for layered information management

A terminal security and information management technology, applied in the terminal security field of layered information management, can solve problems such as unrealization, achieve the effects of reducing burden, improving security, and reducing steps and processing time

Active Publication Date: 2021-11-02
HENGBAO
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In many applications, this assumption cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A terminal security method and device for layered information management
  • A terminal security method and device for layered information management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] The invention provides a terminal security method for layered information management, which is mainly applied to user terminals to ensure the security of user terminal access and internal data security.

[0030] The above method is divided into three parts:

[0031] 1. Hierarchical design of content data

[0032] According to the attributes of the internal data itself, related parameters or preset settings, the above-mentioned internal data is classifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a terminal security method for layered information management, which is mainly applied to user terminals to ensure the security of user terminal access and internal data security. The above method is divided into three parts: hierarchical design of content data, generation of main security code and layered security code, user terminal operation and access, and security protection of internal data. It also relates to a terminal security device for layered information management, which includes a layered unit, a main security code unit, a layered security code unit, a verification unit, an access unit, a record unit and an internal database.

Description

technical field [0001] The invention belongs to the field of information management security, in particular to a terminal security method and device for layered information management. Background technique [0002] When users conduct financial transactions, most of the security protection devices such as U-Shield operate and manage independently, but with the improvement of smart terminal technology and the diversification of operation methods, it poses challenges to the security of data in smart terminals. [0003] The society puts forward higher requirements for the confidentiality, integrity and availability of terminal information security. In this situation, how to ensure that each access terminal, especially a user terminal, is securely connected to a server or other terminal on the network, and at the same time ensures that user privacy data will not be leaked. At the same time, adapting to the more complex access environment of future smart payment, diverse and flex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/62G06F21/60
CPCG06F21/44G06F21/602G06F21/6245
Inventor 崔可
Owner HENGBAO