Data transfer method and device
A data and application data technology, applied in the direction of digital data protection, electrical digital data processing, computer security devices, etc., can solve the problems of destroying system security, destroying sandbox security, and danger
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0041] According to an embodiment of the present invention, the step S112 includes: when the application data transfer system performs data transfer, it first checks whether the check codes provided by the applications A and B are consistent with the valid check codes stored by themselves. If they are consistent, perform data processing operations. Otherwise, no data transfer is performed, and the processing ends.
[0042] figure 2 Shows a flow chart of another embodiment of the data transfer method according to the present invention, the method of this embodiment includes figure 1 In addition to the steps of the shown method, after step S112, it also includes:
[0043] In step S202, the application data transfer system sets the unique check code as invalid after completing the data transfer operation. Alternatively, after the data transfer operation is completed by the application data transfer system, the unique check code may also be deleted.
[0044] In step S204, the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


