A data storage method, terminal and computer storage medium
A data storage and data technology, which is applied in the field of preventing leakage of confidential information, can solve problems such as unfavorable protection of confidential information, insufficient protection of confidential information, user leakage, etc., to achieve perfect protection, improve protection, and prevent leakage The effect of venting
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] An embodiment of the present application provides a data storage method, which is applied to a terminal, figure 1 For a schematic flowchart of an optional data storage method provided by the embodiment of this application, refer to figure 1 As shown, the data storage methods may include:
[0081] S101: Receive a data acquisition instruction for the first application software on the terminal;
[0082] Usually, in order to facilitate the development and implementation of projects in some enterprises, many companies will use the instant messaging application software specially developed within the company to communicate and exchange projects. Since the content of the communication involves some confidential information, if outside Leakage will bring huge losses to the company, so the confidentiality of this information becomes particularly important.
[0083] In order to prevent leakage of information in secret-related application software and play a role in protecting i...
Embodiment 2
[0153] Figure 5 Schematic diagram of the structure of a terminal provided in the embodiment of this application Figure 1 ,like Figure 5 As shown, the embodiment of the present application provides a terminal, and the terminal may also include:
[0154] a receiving unit 51, configured to receive a data acquisition instruction for the first application software on the terminal;
[0155] An acquisition unit 52, configured to acquire the data of the first application software according to the data acquisition instruction;
[0156] A judging unit 53, configured to judge whether the first application software is a preset secret-related application software;
[0157] The storage unit 54 is configured to store the data of the first application software in the confidentiality-related folder of the first application software when the first application software is a preset confidentiality-related application software;
[0158] Wherein, the confidential folder of the first applicat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


