Current location - Loan Platform Complete Network - Big data management - Lenovo cloud services and what is Lenovo's Le Security
Lenovo cloud services and what is Lenovo's Le Security
"Lenovo cloud services":

With the development of cloud computing is getting better and better, Lenovo's cloud services are also gradually into the common people's homes. With the debut of Lenovo's new tablet and smartphone, Lenovo's cloud service system is clearly visible.

With the development of cloud computing is getting better and better, Lenovo's cloud service is also gradually into the common people's home. With the debut of Lenovo's new tablet and smartphone, Lenovo's cloud service system is clearly visible. LePad, LePad A1, LePad S2, LePhone, LePhone2 and so on, together with Lenovo LeTV, plus the PC side, Lenovo's layout has realized a systematic integration of the big picture. From the tightly organized service system, we can see that Lenovo is still in the past, as in the past, to maintain a solid and steady service style.

We also see that Lenovo has built a bridge through a new service model. That is the "LeCloud" cloud service, through the "LeCloud" to realize personal information management, connectivity, social and other three types of services. In terms of personal information management, Lenovo provides 200G of storage space, supports access to a variety of file formats, and provides contact data backup services; automatic synchronization function, which can realize synchronous data updates of various types of terminals. In terms of interconnectivity, it realizes mutual access between different terminals, discovering terminals and reading data at any time; the "task migration" function enables seamless switching between terminals for applications such as games, videos and e-books. In terms of social networking, Lenovo provides a "one-click publishing" function, which allows users to publish graphics and videos to multiple mainstream social networking platforms at the same time on the Le terminal with just one keystroke. Obviously, this is a unification or adhesion of self-products. Because there are many kinds of products, a complete coordination is needed, so as to better reflect the coordination between each other, and then bring more convenience. The convenience brought by cloud computing will increase user loyalty.

"Lenovo Security":

"Lenovo Security Intercept Engine" utilizes the industry-leading security protection technology "LSIE (Lenovo Security Intercept Engine)". Intercept Engine", with 21 domestic and international invention patents.

The advantages are: on the one hand, Lenovo, as a terminal manufacturer, can monitor the behavior of the application software from the bottom of the cell phone, proactive defense, and fundamentally resist undesirable applications; on the other hand, Lenovo cooperates with the third-party security software vendors and builds up a powerful virus database. These ensure that all the applications on the shelves of Le Store have gone through the strict testing of Le Security to ensure that the application software users download from Le Store is safe and reliable, and the tested security rate reaches 99.8%.

Three major defenses to protect users

According to a survey, more than one-third of smartphone users are most worried about privacy leaks, followed by cost-sucking, viruses and other security issues. It is clear that privacy security, chargebacks, and mobile viruses have become the three major factors affecting every smartphone user's mobile Internet experience. The "Le Security Engine" used for testing applications in Le Store realizes the "three major defenses", i.e., "anti-billing", "anti-snooping", "anti-virus", and "anti-smuggling".

Setting up "charge-sucking" software in smartphones has been an open secret in the cell phone industry. When users upgrade their systems in unregulated markets such as the parallel market, unscrupulous individuals will take the opportunity to implant fee-sucking and traffic-sucking software in the ROM packages that have not been tested for security. The "Anti-Charge" function in the "Three Great Defenses" can strictly examine the malicious programs hidden in the cell phone to deduct the phone bill, and timely block the increase of Internet traffic and SMS costs, so as to eliminate the charge and traffic sucking behavior.

Numerous applications can access users' private data, such as automatically accessing the phone's address book, text messages, call logs, location, calendar, browser history, and more. The "Anti-Snooping" feature will record and block all the applications accessing the phone's data in real-time, and firmly block background recording, background camera eavesdropping, etc. It's like adding an unbreakable security shield to your smartphone!

In addition, the Le Store's "Le Security Engine" has the industry's largest and most up-to-date "virus database", which is jointly established by Lenovo and Tencent, Kaspersky and other top companies in the security industry, with the highest efficiency in the industry. Security rate of 99.8%. The "anti-virus" allows cell phone viruses to have no escape, maximizing the security of cell phones.

"Four-layer filtering", multiple protection against potential security risks

Lenovo's "Lenovo Security Engine" is another heavy security weapon, "four-layer filtering". It uses a "honeypot" security mechanism to ensure the safety of applications on the shelf through multiple protections.

Many App Stores don't check for sensitive apps during the app upload process. In order to eliminate such problems, Le Store uses the first layer of "content filtering" to remove apps that violate relevant laws and regulations. Secondly, Le Store realizes the second layer of "Virus Filtering" through the largest and most up-to-date virus database in the industry to comprehensively check and kill viruses. The third layer of "cost-sucking filtering" will effectively prevent applications from increasing users' communication costs by subscribing to related paid services and stealing cell phone traffic. Ultimately, Le Store uses a fourth layer of "privacy filtering" to protect users' security and privacy against the illegal behavior of calling up address books, scanning user information and stealing it.