Mobile phone payment protection method
A technology for mobile payment and program protection, applied in the field of computer security, can solve the problem of no solution for mobile phone security, and achieve the effect of cache data protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0013] A reverse sandbox-based mobile phone payment protection method provided by the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0014] Reference in this specification to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase "in one embodiment" in various places throughout the specification are not necessarily all referring to the same embodiment.
[0015] What is described below is presented in terms of computational algorithms, or symbolic representations, which are the means used by those skilled in the art to convey the substance of the work in the most effective manner to those skilled in the art. In the following description, the features, structure and logic of these embodiments may be included in other emb...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com