Method, system and electronic device for data protection
A technology for electronic equipment and data protection, applied in electronic digital data processing, protection of internal/peripheral computer components, instruments, etc., can solve problems such as inability to protect sensitive information, leakage of sensitive information, and threats to user privacy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] figure 1 The implementation flow of the data protection method provided by Embodiment 1 of the present invention is shown, and the details are as follows:
[0044] In step S101, the real-time distance between the first electronic device and the second electronic device is monitored.
[0045] In the embodiment of the present invention, after the first electronic device establishes a Bluetooth connection with the second electronic device, the first electronic device monitors the real-time distance between the first electronic device and the second electronic device through Bluetooth Low Energy (BLE) technology.
[0046] In step S102, the first electronic device judges whether the first electronic device is lost according to the change of the real-time distance, and when it is determined that the first electronic device is lost, sends a delete command to delete sensitive information stored on the first electronic device.
[0047] In the embodiment of the present invention...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


