A method and device for preventing personal information leakage
A technology for information leakage and incidents, applied in digital data protection, internal/peripheral computer component protection, digital data authentication, etc. Avoid the effect of misuse
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the embodiments described here are only used to explain the present invention, not to limit the present invention. Various changes and modifications made by those skilled in the art without departing from the spirit of the present invention are within the scope of the independent claims and dependent claims of the present invention.
[0049] In this article, a program represents an application that includes sensitive personal information. The application includes multiple functions. The execution of these functions is called an event. The core event represents the execution of a function in the application to obtain personal sensitive information. In the prior art, the user generally needs to unlock the device when the device is started or when the screen saver is released, and the unlocking operation generally inclu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


