作者: Peng Wang
DOI:
关键词: Function (mathematics) 、 Icon 、 Database 、 State (computer science) 、 Interface (computing) 、 Real-time computing 、 Set (abstract data type) 、 Computer science 、 Data security
摘要: In a computerized icon management method for data security of an electronic device, target the device is defined, and activation message corresponding to set. The hidden by changing visible state on display from invisible. An input interface displayed receiving user. changed invisible visible, when user through interface.