SD card data secrecy method, system and device and computer medium
A data security, computer technology, applied in the field of data security, can solve problems such as poor data security of SD card
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0046] see figure 1 , figure 1 It is the first flow chart of an SD card data security method provided by the embodiment of this application.
[0047] A kind of SD card data security method that the embodiment of the present application provides, can comprise the following steps:
[0048] Step S101: Determine the file system partition table of the target SD card.
[0049] In practical applications, the file system partition table of the target SD card may be determined first. Spe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


