Joke Collection Website - Public benefit messages - What are Lenovo Cloud Services and Lenovo’s LeSafe?

What are Lenovo Cloud Services and Lenovo’s LeSafe?

"Lenovo Cloud Service":

As cloud computing develops better and better, Lenovo's cloud services have gradually entered the homes of ordinary people. With the debut of Lenovo's new tablets and smartphones, Lenovo's cloud service system is clearly visible.

As cloud computing develops better and better, Lenovo's cloud services are gradually entering the homes of ordinary people. With the debut of Lenovo's new tablets and smartphones, Lenovo's cloud service system is clearly visible. LePad, LePad A1, LePad S2, LePhone, LePhone2, etc., plus Lenovo LeTV, plus the PC side, Lenovo's layout has achieved systematic overall integration. It can be seen from the strict service system that Lenovo still maintains a down-to-earth and steady service style as in the past.

We have also seen that Lenovo has built a bridge through a new service model. That is the cloud service of "Leyun". Through "Leyun", three types of services such as personal information management, interconnection and social networking are realized. In terms of personal information management, Lenovo Group provides 200G storage space, supports access to multiple file formats, and provides real-time backup services for contact data; the automatic synchronization function can realize synchronous data updates on various terminals. In terms of interconnection, it enables mutual access between different terminals, discovers terminals and reads data at any time; the "task migration" function enables applications such as games, videos, and e-books to be seamlessly switched between terminals. In terms of social networks, Lenovo provides the "one-click publishing" function. With just one button, users can publish images, texts, and videos to multiple mainstream social network platforms simultaneously on the Lenovo terminal. Obviously this is a unified unification or bonding of self-products. Because there are many types of products, a complete coordination is needed, so as to better reflect the coordination between them and bring more convenience. The convenience and speed brought by cloud computing will increase user loyalty.

"Lenovo Security Intercept Engine":

"Lenovo Security Engine" adopts the industry-leading security protection technology "LSIE (Lenovo Security Intercept Engine)" and has 21 domestic and foreign invention patents.

The advantage is: on the one hand, as a terminal manufacturer, Lenovo can monitor the behavior of application software from the bottom of the mobile phone, proactively defend against bad applications fundamentally; on the other hand, Lenovo and third-party security Cooperate with software vendors to build a powerful virus database. These ensure that all applications on the Le Store have been rigorously tested by Le Security, ensuring that the application software downloaded by users from the Le Store is safe and trustworthy, with a security assurance rate of 99.8% after testing.

"Three Major Defenses" "Comprehensive protection of user security

According to surveys, more than one-third of smartphone users are most worried about privacy leaks, followed by security issues such as fee collection and viruses. It can be seen that privacy security, fee collection, and mobile phone viruses have become the three major factors affecting the mobile Internet experience of every smartphone user. The "Le Security Engine" used for application testing in the Le Store implements the "three major defenses", namely "anti-sucking", "anti-peeping" and "anti-virus", allowing users to have no security worries and fully protecting user privacy and security. Safety.

It is an open secret in the mobile phone industry to install "charge-absorbing" software in smartphones. When users upgrade their systems in unregulated markets such as parallel markets, criminals will take the opportunity to implant fee- and traffic-absorbing software into the flash ROM package that has not been tested for safety. The "anti-bill-sucking" function in the "Three Major Defenses" can strictly examine the malicious programs hidden in mobile phones to charge phone bills, promptly block the increase in Internet traffic and text message charges, and eliminate bill-sucking and traffic-sucking behaviors.

Many application software will obtain users’ private data, such as automatically accessing mobile phone address books, text messages, call records, location, schedule, browser history, etc. The "anti-peeping" function will record and intercept all applications' access to mobile phone data in real time, and resolutely intercept background recording, background camera eavesdropping, etc. It is like adding an unbreakable security shield to your smartphone!

In addition, Le Store's "Le Security Engine" has the industry's largest and most timely "virus database", which was jointly established by Lenovo and top companies in the security industry such as Tencent and Kaspersky. The killing efficiency is the highest in the industry, and the tested security rate reaches 99.8%. "Anti-virus" makes mobile phone viruses have nowhere to escape, ensuring mobile phone security to the greatest extent.

"Four-layer filtration", multiple protections to block security risks

Another major security weapon of Lenovo's "Le Security Engine" is the "four-layer filtration", which uses a "honeypot" The security mechanism ensures that the application software on the shelves is safe and worry-free through multiple protections.

Many App Stores do not check any sensitive applications during the application listing process. In order to prevent such problems, Le Store adopts the first layer of "content filtering" to remove applications that violate relevant laws and regulations. Secondly, Ledian uses the largest and most timely virus database in the industry to comprehensively check and kill viruses, achieving the second layer of "virus filtering". The third layer of "fee-absorbing filtering" will effectively prevent applications from stealing mobile phones by subscribing to related fee-based services. Traffic increases user communication costs. Finally, in response to the illegal behavior of calling address books, scanning user information and stealing it, Le Store adopts the fourth layer of "privacy filtering" to greatly protect users' security and privacy.