Safety protection method and system and terminal
A security protection and identification code technology, applied in the field of intelligent control management, to achieve the effect of data security and personal and property security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to facilitate the understanding of the present invention, specific examples will be given below for further description.
[0024] The first embodiment of the present invention provides a method for security protection, such as figure 1 As shown, the steps are as follows:
[0025] Step S101, preset the common identification code and security protection identification code corresponding to the user.
[0026] Step S102, preset the common application mode and application corresponding to the common identification code and the security protection mode and application corresponding to the security protection identification code.
[0027] Step S103, determine the type of the identification code input by the user, if it is an ordinary identification code, call the ordinary application mode and application corresponding to the ordinary identification code; if it is a security protection identification code, call the security protection corresponding to the security pro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 