Information security protecting system and method of mobile terminal
A mobile terminal and information security technology, applied in computer security devices, digital data protection, instruments, etc., can solve problems such as high system resources and poor user experience, and achieve strong scalability, good user experience, and comprehensive protection Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0023] An Anroid smart phone is taken as an example to illustrate the application of the present invention.
[0024] The Android system is divided into four levels: Applications (application layer), Application Frameworks (application framework layer), Libraries and Android Runtime (class library and real-time runtime layer), Linux Kernel (Linux kernel layer).
[0025] 1. Applications (application layer)
[0026] Android will be pre-installed with a set of core applications, including email client, short message service, calendar schedule, map service, browser, contacts and other applications. All applications are written in the Java programming language.
[0027] At the application layer, all applications that store information based on files can implement dynamic encryption and decryption protection for files operated by the application by calling the API provided by the interface module of the present invention.
[0028] 2. Application Frameworks (application framework layer)
[0029...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap