Method and device for information security
An information security and information type technology, applied in the information field, can solve problems such as inability to securely protect files, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] According to the solution of the embodiment of the present invention, the protected information is stored on the server, and when the user wants to view the protected information, the screen image (also called computer desktop image) used to present the protected information is not protected The information itself is sent from the server to the user device. Since the user equipment does not have the protected information itself, the protected information cannot be obtained from the user equipment, and the protected information will not be leaked, thereby improving the security of the information.
[0025] In the following, various embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[0026] now refer to figure 1 , which shows a schematic architecture diagram of an information security system according to an embodiment of the present invention. Such as figure 1 As shown, the information security system 10 may i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 