Data protection method and device used for terminal external storage card
An external storage and terminal technology, applied in the field of information security, can solve the problems of random reading and tampering of data sources that cannot be stored
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0033] According to the embodiment of the present invention, as for how, it is not necessary to bind the terminal, nor to set the data storage card, so that the data storage card can be obtained by others without affecting the normal reading and writing of data by the application. Finally, in the case that the sensitive information is not arbitrarily browsed, copied, transmitted and other threat data, a method for protecting the data of the external memory card of the terminal is provided. Such as figure 1 Shown:
[0034] S101. Store at least one key and a corresponding encryption / decryption algorithm in the terminal.
[0035] Further description of step S101 is that at least one key and corresponding encryption / decryption algorithms ar...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com