Data security access method, device, terminal equipment and readable storage medium
A technology for secure access and data, applied in the field of network communication, which can solve problems such as data leakage and illegal use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0053] refer to figure 1 , figure 1 It is a schematic structural diagram of a terminal device in a hardware operating environment involved in the solution of the embodiment of the present invention.
[0054] Such as figure 1As shown, the terminal device may include: a processor 1001 , such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), and an input unit such as a keyboard (Keyboard) or a mouse (Mouse). Optionally, the user interface 1003 may also include a standard wired interface or a wireless interface. Optionally, the network inte...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


