Non-invasive data protection method and device, terminal and storage medium
A data protection, non-intrusive technology, applied in the Internet field, can solve problems such as data theft, application program acquisition data, user privacy information leakage, etc., to ensure smooth operation and protect security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] In order to make the purpose, technical solution and advantages of the present disclosure clearer, the implementation manners of the present disclosure will be further described in detail below in conjunction with the accompanying drawings.
[0046] It can be understood that the terms "each", "multiple" and "any" used in the embodiments of the present disclosure, etc., a plurality includes two or more, and each refers to each of the corresponding plurality, Any refers to any one of the corresponding plurality. For example, the plurality of words includes 10 words, and each word refers to each of the 10 words, and any word refers to any one of the 10 words.
[0047] Before implementing the embodiments of the present disclosure, terms involved in the embodiments of the present disclosure are explained first.
[0048] Non-intrusive is relative to intrusive. Non-intrusive can apply the functions of the application client to the operating system framework, and can also prov...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


