Data protection method and apparatus
A protection device and data technology, applied in the field of Internet information security, can solve problems such as data leakage, loss of important data in U disk, computer network virus infection, etc., to achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] The specific embodiments of the invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.
[0067] figure 1 A schematic flowchart of a data protection method provided by an embodiment of the present invention, such as figure 1 As shown, the data protection method includes the following steps:
[0068] 101. When it is detected that a mobile storage device is accessed, acquire a scene change mapping relationship of the mobile storage device, the scene change mapping relationship includes a correspondence between a connection identifier and a scene change type, and the connection identifier indicates the The historical connection relationship between the mobile storage device and the terminal device.
[0069] It should be noted that the mobile storage device in this...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
