Data security protection method and system for mobile terminal
A mobile terminal and data security technology, applied in digital data protection, digital data authentication, electronic digital data processing, etc., can solve problems such as easy data leakage, and achieve the effects of protection, cost reduction, and leakage avoidance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0070] The data security protection method and system of the mobile terminal provided by the embodiments of the present invention solve the problem that the data of the mobile terminal is easy to leak and seriously damage the security of the data of the mobile terminal introduced in the background art.
[0071] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention are described below in conjunction with the accompanying drawings The program is described in further detail.
[0072] Please refer to the attached figure 1 , figure 1 It is a schematic flowchart of a data security protection method for a mobile terminal shown in an embodiment of the present invention. The data security protectio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


