A method and device for protecting data
A technology for protecting data and user data, applied in electrical components, transmission systems, etc., to solve problems such as user inconvenience and the inability of the owner to unlock it.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not used to limit the present invention.
[0028] In this embodiment, the user data is locked when the identification card bound to the device is not detected, thereby ensuring the safety and non-disclosure of the user data. And through the authentication method to provide users with an unlocking way, so that users can continue to use the data.
[0029] See figure 1 The main method flow of data protection in this embodiment is as follows:
[0030] Step 101: After the operating system is running, check whether there is an identification card bound to the device.
[0031] Step 102: If the identification card bound to the device is not checked, the operating system locks the user data. If the identification card bound to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 