Data isolation method, data isolation device and terminal
A data isolation and terminal technology, applied in the field of data security, can solve the problem of insufficient data convenience, and achieve the effect of convenient operation and guaranteed safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0028] see figure 1 , which shows the flow of Embodiment 1 of the data isolation method provided by this application. This embodiment is applied to a terminal provided with multiple communication modules. The terminal may be a mobile phone, etc. Correspondingly, the communication module is a phone card module. In the terminal, different communication modules correspond to different data domains, and different databases and different communication processes are set in different data...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 