Terminal encryption and decryption method and terminal
An encryption, decryption and terminal technology, applied in the direction of digital data protection, etc., can solve the problem of easy forgetting, and achieve the effect of concealment of encryption function and protection from leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to be able to understand the above objectives, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0026] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the present invention is not limited to the specific embodiments disclosed below. limit.
[0027] figure 1 A flowchart of a terminal encryption method according to an embodiment of the present invention is shown.
[0028] Such as figure 1 As shown, the terminal encryption and decryption method according to the embodiment of the present invention is applied to a terminal with a displacement sensing device, and includes: step 102, using the displacement sensing device to obtain the first m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 