Information security control method and terminal
A technology of information security and control method, applied in the field of information security control method and terminal, can solve problems such as security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
[0029] figure 1 It is a schematic flowchart of an embodiment of the information security control method of the present invention. Such as figure 1 As shown, the information security control method of the present invention may include:
[0030] Step S110, when the user needs to view specific content of a certain application, the terminal performs face recognition on the user.
[0031] Step S111 , when it is determined through face recognition that th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 