Boe technology group co., ltd. (20250007703). Security Management System and Security Management Method: Difference between revisions
Creating a new page |
Creating a new page |
||
Line 11: | Line 11: | ||
==Inventor(s)== | ==Inventor(s)== | ||
[[:Category:Yang Zhang of Beijing | [[:Category:Yang Zhang of Beijing CN|Yang Zhang of Beijing CN]][[Category:Yang Zhang of Beijing CN]] | ||
[[:Category:Han Li of Beijing | [[:Category:Han Li of Beijing CN|Han Li of Beijing CN]][[Category:Han Li of Beijing CN]] | ||
[[:Category:Jiuxia Yang of Beijing | [[:Category:Jiuxia Yang of Beijing CN|Jiuxia Yang of Beijing CN]][[Category:Jiuxia Yang of Beijing CN]] | ||
[[:Category:Mingyuan Ma of Beijing | [[:Category:Mingyuan Ma of Beijing CN|Mingyuan Ma of Beijing CN]][[Category:Mingyuan Ma of Beijing CN]] | ||
[[:Category:Jiashuang Zong of Beijing | [[:Category:Jiashuang Zong of Beijing CN|Jiashuang Zong of Beijing CN]][[Category:Jiashuang Zong of Beijing CN]] | ||
[[:Category:Yuhai Sun of Beijing | [[:Category:Yuhai Sun of Beijing CN|Yuhai Sun of Beijing CN]][[Category:Yuhai Sun of Beijing CN]] | ||
==Security Management System and Security Management Method== | ==Security Management System and Security Management Method== | ||
Line 27: | Line 27: | ||
This abstract first appeared for US patent application 20250007703 titled 'Security Management System and Security Management Method | This abstract first appeared for US patent application 20250007703 titled 'Security Management System and Security Management Method | ||
==Original Abstract Submitted== | ==Original Abstract Submitted== |
Latest revision as of 03:36, 25 March 2025
Security Management System and Security Management Method
Organization Name
boe technology group co., ltd.
Inventor(s)
Security Management System and Security Management Method
This abstract first appeared for US patent application 20250007703 titled 'Security Management System and Security Management Method
Original Abstract Submitted
a security management system includes a first server. the first server is configured to: obtain access information of a terminal device; generate, if the access information of the terminal device meets an access condition, a first key based on a registration time of the terminal device, identification information of the terminal device, and fingerprint information of the terminal device; encrypt the first key using a second key, the first key being different from the second key; and send the encrypted first key to the terminal device, so that the terminal device decrypts the encrypted first key using the second key.
(Ad) Transform your business with AI in minutes, not months
Trusted by 1,000+ companies worldwide