File protection method, device and terminal
A technology for protecting devices and files, which is applied in the field of communication, can solve problems such as leakage of private files, loss of security of private or important files, poor file storage security, etc., to achieve the effect of protecting private files, preventing leakage, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention. In addition, it should be noted that, for the convenience of description, only some structures related to the present invention are shown in the drawings but not all structures. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0024] The terms "first", "second" and "third" in the embodiments of the present invention are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variation...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


