A user data protection method and terminal
A user data and terminal technology, applied in the electronic field, can solve problems such as insufficient user data security, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0043] Please refer to figure 1 , figure 1 It is a schematic flowchart of a user data protection method provided in the first embodiment of the present invention. As shown in the figure, the method in the embodiment of the present invention includes:
[0044] S101. When an operation instruction by a user on a terminal is detected, determine a domain environment in which the terminal is currently running.
[0045] In specific implementation, the syst...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


