Information processing method and system of terminal security

A terminal security and terminal technology, applied in transmission systems, electrical components, etc., can solve problems such as system resource utilization, achieve resource allocation, improve processing efficiency, and reduce system burden

Active Publication Date: 2013-05-08
STATE GRID JIBEI ELECTRIC POWER COMPANY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the system resource utilization problems caused by the current enterprise version security products need to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and system of terminal security
  • Information processing method and system of terminal security
  • Information processing method and system of terminal security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0011] figure 1 Shown is a flow chart of a terminal security information processing method provided according to a preferred embodiment of the present invention. Such as figure 1 As shown, the terminal security information processing method provided by the preferred embodiment of the present invention includes steps 101-105.

[0012] In step 101, the mapping relationship server receives the detection data information reported by each terminal, and establishes a security problem statistics table according to the detection data information.

[0013] In this embodiment, the detection data information reported by each terminal includes the type of safety problem, the dangerous item, and the correspond...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information processing method and a system of terminal security. The method comprises the following steps that a mapping relation server synchronizes a secure question statistical table to an information processing server which obtains a first current system time slice amount, the information processing server confirms a first distribution time slice and systematic surplus time slices of each terminal according to the secure question statistical table, the first current system time slice amount and a first strategy, and if the systematic surplus time pieces are larger than preset value, the information processing server takes the systematic surplus time slices as a second current system time slice amount. According to the first strategy, a second distribution time slice of each terminal is recounted, and if now the systematic surplus time pieces are smaller than or equal to the preset value, target distribution time pieces of each terminal are obtained according to the first distribution time slice and the second distribution time slice. According to the target distribution time slices of each terminal, the information processing server deals with security problem of each terminal.

Description

technical field [0001] The invention belongs to the technical field of computer security, in particular to an information processing method and system for terminal security. Background technique [0002] In the traditional enterprise network environment, various security desktop products, such as anti-virus software, are piled up on enterprise terminal computers. These software products usually come from different manufacturers, cannot be managed in a unified manner, and occupy a large amount of system resources, thereby affecting the enterprise's security. work efficiency. In order to solve the above problems, enterprise version security products came into being. However, the system resource utilization problem caused by the current enterprise version security products needs to be solved urgently. Contents of the invention [0003] The present invention provides a terminal security information processing method and system to solve the above problems. [0004] The inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 谢静宇
Owner STATE GRID JIBEI ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products