Data access method and terminal
A data access and terminal technology, used in digital data authentication, electrical digital data processing, instruments, etc., can solve the problems of cumbersome access to private content, inability to view and modify information, etc., to protect privacy, easy to remember, and ensure security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0053] refer to figure 1 , the first embodiment of the data access method of the present invention includes:
[0054] Step 100: setting a privacy password according to the privacy level;
[0055] First, the user sets one or more privacy passwords on the terminal device, where each privacy password corresponds to a privacy level. When the privacy level increases for the first time, the higher the level, the higher the authority of the corresponding privacy password.
[0056] The terminal equipment can be mobile terminals such as mobile phones, tablet computers, notebook computers, etc., and can also be desktop computers or other fixed terminal equipment, as long as these terminal equipment include screens and password settings can be carried out in them, no longer here repeat.
[0057] Step 110: Setting a private information list; wherein the private information list includes access data corresponding to the privacy level;
[0058] Wherein, the access data specifically incl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


