Data sharing method
A data sharing and data encryption technology, applied in the field of data processing, can solve the problems of data insecurity, privacy, easy leakage, etc., and achieve the effect of realizing security, preventing leakage, and ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0065] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0066] The data sharing method provided by this application can be applied to such as Figure 1a shown in the application environment. in, Figure 1a Both the first security domain and the second security domain in include at least one device, or at least one type of device; and Figure 1a The first security domain and the first security domain can be deployed on computer devices or terminal devices in any field, including but not limited to various personal computers, notebook computers, tablet computers, wearable devices, etc. etc., the embodiment of the present applicat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


