Information safety protecting method and device for mobile terminal
A mobile terminal and information security technology, applied in the direction of internal/peripheral computer component protection, etc., can solve the problem that mobile terminal information cannot be effectively protected, and achieve the effect of avoiding leakage and protecting privacy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0021] The invention provides a mobile terminal information security protection method. Such as figure 1 as shown, figure 1 It is a flow chart of the first embodiment of the method for protecting mobile terminal information security in the present invention. The method for mobile terminal information security protection mentioned in this embodiment includes steps:
[0022] Step S10, real-time detection of touch point features on the touch screen of the mobile terminal;
[0023] In this embodiment, since different people have different usage habits when performing touch operations on the touch screen, this embodiment can judge whether the user is the owner of the mobile terminal according to the characteristics of the touch points received when the user operates the touch screen of the mobile terminal. myself. Amo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 