Non-invasive data protection method, device, terminal and storage medium
A data protection, non-intrusive technology, applied in the Internet field, can solve the problems of data theft, data acquisition by applications, complex network environment, etc., to achieve the effect of protecting security and ensuring smooth operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] In order to make the purpose, technical solution and advantages of the present disclosure clearer, the implementation manners of the present disclosure will be further described in detail below in conjunction with the accompanying drawings.
[0046] It can be understood that the terms "each", "multiple" and "any" used in the embodiments of the present disclosure, etc., a plurality includes two or more, and each refers to each of the corresponding plurality, Any refers to any one of the corresponding plurality. For example, the plurality of words includes 10 words, and each word refers to each of the 10 words, and any word refers to any one of the 10 words.
[0047] Before implementing the embodiments of the present disclosure, terms involved in the embodiments of the present disclosure are explained first.
[0048] Non-intrusive is relative to intrusive. Non-intrusive can apply the functions of the application client to the operating system framework, and can also prov...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


