A method and device for protecting user information
A user information and legal technology, applied in the Internet field, can solve the problems of reducing effectiveness, and the pace of security software upgrades cannot keep up with the upgrade and changes of hacking programs, so as to achieve the effect of improving effectiveness and strengthening security mechanisms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.
[0023] figure 1 It is an overall flowchart of a method for protecting user information provided by an embodiment of the present invention.
[0024] In this embodiment, the user can log in to the webpage through the web browser in the mobile terminal, and browse various information in the webpage, such as information, various online applications, etc. The interactive interface logs in to the corresponding interface to operate the corresponding business. In the above operation process, there will be an interface that requires the user to enter the user's account number and password. At this time, if the user's mobile terminal is in a safe environment (for example, the mobile terminal is protected by corresponding security software or a firewall) , the user's input account number and password operation will be protected safely; when the security softwar...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com