Terminal protection method and terminal
A terminal and consistent technology, applied in the field of communication, can solve the problem of easy damage to personal property during operation, and achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The terminal protection method provided by the embodiments of the present invention and the specific implementation manner of the terminal will be described in detail below with reference to the accompanying drawings.
[0043] A terminal protection method provided by an embodiment of the present invention, such as figure 1 As shown, it specifically includes the following steps:
[0044] S101. Receive password information input by a user on a preset interface;
[0045] S102. According to the received password information, determine whether the user holding the terminal is currently safe; when it is determined that the user's current security is threatened, execute step S103; when it is determined that the user is currently safe, exit the program; perform follow-up operations in the existing manner ;
[0046] S103. Execute a corresponding protection operation.
[0047] Specifically, using the above-mentioned terminal protection method provided by the embodiment of the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

