Method for querying and verifying private data of computer
A private data and computer technology, applied in the computer field, can solve problems such as low security, access to the computer, loss, etc., and achieve the effects of improving security, making life more convenient, and avoiding major losses
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0020] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative work, any modifications, equivalent replacements, improvements, etc., shall be included in the protection scope of the present invention Inside.
[0021] This embodiment discloses a method for querying and verifying computer privacy data, including the following steps:
[0022] S1. Set the preliminary verification operation at the entry port of the privacy data storage area in the computer; the entry port of the privacy data storage area can be a USB interface or other signal interface;
[0023] S2. Set up a privacy check reminder module in the com...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More