Information security encryption and number hiding system
An information security and number technology, applied in the field of information security, can solve problems such as company loss, loss, and customer information leakage, and achieve the effect of protecting resources, facilitating control, and ensuring customer resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0020] An information security encryption hidden number system proposed by the present invention includes: a master database, a shared client and a computer client.
[0021] The master database is used to store customer information, including customer identity information and customer phone numbers. Customer identification information includes customer name and customer company name. In this way, identification by the customer's company name can avoid information confusion of customers with duplicate names. In this embodiment, the master database is stored on the server.
[0022] The shared client is installed on the mobile phone and connected to the master database to obtain customer information in the master database and encrypt and hide the customer phone number. In this embodiment, the sharing client logs in through an account, and after each account is logged in, the corresponding customer information is obtained according to the authority and displayed on the sharing c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com