Client and method for maintaining BYOD (Bring Your Own Device) safety

A client-side and secure technology, applied in the field of communication, can solve the problems of inability to effectively balance enterprise information security and employee information security, no solution has been proposed, and no alternate authentication method has been adopted.

Active Publication Date: 2015-07-01
NANJING ZHONGXING SOFTWARE
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problem of how to balance enterprise information security and employee information security, existing BYOD security solutions usually use smart mobile access client software, but the software only authenticates the user's username and password, and does not adopt a backup authentication method
When the user forgets the authentication user name or password, he cannot enter the enterprise system to handle urgent affairs, and needs to wait for re-approval and authentication before re-entering the system. During this period, precious time may be delayed, and even business opportunities may be lost
[0007] Aiming at the problem that BYOD security solutions in related technologies cannot effectively balance enterprise information security and employee information security, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client and method for maintaining BYOD (Bring Your Own Device) safety
  • Client and method for maintaining BYOD (Bring Your Own Device) safety
  • Client and method for maintaining BYOD (Bring Your Own Device) safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0032] In the BYOD application scenario, the existing technology does not provide an effective solution to the problem of how to effectively balance enterprise information security and employee information security. Embodiments of the present invention will provide a new type of security solution to solve the above technical problems. question. The main idea of ​​the embodiment of the present invention is to integrate a user identity authentication method based on facial images. When an employee forgets the user name or password, this user identity authentication method based on facial images can be used for identity authentication. To ensure that authorized personnel can smoothly enter the enterpri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosing are a client and method for maintaining BYOD security. The client comprises: a device and user identity authentication module configured to perform identity authentication on a user according to the authentication method selected, from pre-set authentication methods, by the user using a mobile device when said mobile device attempting to access is determined to be a legitimate device; a mobile device management system configured to provide management operations during the complete life cycle of the mobile device, the management operations comprising: a permanent online push message service.

Description

technical field [0001] The present invention relates to the communication field, in particular to a client and method for maintaining BYOD security. Background technique [0002] BYOD (Bring Your Own Device) refers to bringing your own equipment to work. BYOD realizes 5A smart office (any employee (Anyone) authorized by the enterprise can access any office resource (Anything) of the company at any time (Anytime) and any place (Anywhere) through any smart device (Any device) , and innovatively enhanced the security of office solutions. [0003] The popularization of smart terminals and the development of 3G / 4G mobile communication technology have prompted the birth of the 5A smart office solution and opened a new era of smart office. Mobile office enables office work to happen at any time and improves efficiency. The problems existing in the traditional office solution are also easily solved: in the past, when employees were away from the company, they could not obtain the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08
CPCH04W12/06H04L63/0853H04W12/068
Inventor 李春霞冯燕青丁岩
Owner NANJING ZHONGXING SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products