Method for localizing and safely storing mobile application data
A secure storage and mobile application technology, applied in the field of mobile application data localization security storage, can solve problems such as poor signal, affecting use, data security nature, etc., to achieve the effect of solving the loss of personnel
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0022] 1. Not every column in the data table needs to be kept secret, but the key data needs to be encrypted, such as the price of the product, the phone number of the customer, and the address. Therefore, the following encryption is strictly for sensitive items, and it is not necessary to encrypt non-sensitive items. Improve computing efficiency.
[0023] 2. Obtain the mobile phone card number, mobile phone identification number and the unique number of the data through the APP, and triple-encrypt the data, and each line is encrypted with a different key value, which effectively increases the difficulty of decryption and prevents the involvement of database files from being stolen Exposed data, see figure 1 , 2 .
[0024] 3. The encrypted data must be decrypted by APP. If it is inconsistent with the original encrypted key value during decryption, only garbled codes will be seen. Therefore, after the user updates the mobile phone or mobile phone card, the data cannot be decrypted ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 