Data protection method and terminal
A data protection and terminal technology, applied in the field of mobile communication, can solve the problems of easy leakage of USIM, leakage of information, security risks, etc., and achieve the effect of avoiding frequent reading and use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0024] In the following description, many specific details are set forth in order to fully understand the present invention, but the present invention can also be implemented in other ways different from those described here, therefore, the present invention is not limited to the specific embodiments disclosed below limit.
[0025] figure 1 is a flowchart of a data protection method according to an embodiment of the present invention.
[0026] like figure 1 As shown, the present invention provides a data protection method, including: step 102, when receiving an instruction from an application program to store data in a shared data area, confirm whether the instruction is automatically issued by the application program; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 