Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal protection method and terminal

A terminal and consistent technology, applied in the field of communication, can solve the problem of easy damage to personal property during operation, and achieve the effect of protecting security

Inactive Publication Date: 2017-02-22
GREE ELECTRIC APPLIANCES INC
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides a terminal protection method and a terminal to solve the problem that personal property is easily damaged in existing terminal operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal protection method and terminal
  • Terminal protection method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The terminal protection method provided by the embodiments of the present invention and the specific implementation manner of the terminal will be described in detail below with reference to the accompanying drawings.

[0043] A terminal protection method provided by an embodiment of the present invention, such as figure 1 As shown, it specifically includes the following steps:

[0044] S101. Receive password information input by a user on a preset interface;

[0045] S102. According to the received password information, determine whether the user holding the terminal is currently safe; when it is determined that the user's current security is threatened, execute step S103; when it is determined that the user is currently safe, exit the program; perform follow-up operations in the existing manner ;

[0046] S103. Execute a corresponding protection operation.

[0047] Specifically, using the above-mentioned terminal protection method provided by the embodiment of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal protection method and a terminal. The method comprises the steps that when password information input by a user is received by a preset interface, whether the user who holds the terminal is safe at present is determined according to the received password information; and a corresponding protection operation is executed when the user's safety is deemed to be threatened at present. In this way, under situations such as that the user who holds the terminal is seized or threatened to make payment by the terminal under compulsion, whether the user who holds the terminal is safe at present can be determined in a secret manner according to the password information input by the user and received by the preset interface; and when the current safety is deemed to be threatened, the corresponding protection operation can be executed to protect safety of the user's properties. In this way, transfer of the user's properties can be avoided on the premise that relative personal safety of the user is guaranteed.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a terminal protection method and a terminal. Background technique [0002] At present, the payment and transfer functions of terminals such as mobile phones are becoming more and more powerful. Users with mobile phones can directly use mobile phones to realize all payment functions without going to the bank. This makes our life much more convenient, but at the same time brings hidden dangers to property safety. For example, when a user holding a mobile phone is threatened by criminals, he is forced to use the mobile phone to remit or transfer money, or if the mobile phone is lost or the unlock password is known to others, the personal security information will be obtained by others, which may cause personal property damage. Loss. [0003] Therefore, how to adopt corresponding methods and strategies to protect the safety of personal property under the above ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/12G06F21/88G06Q20/38
CPCG06F21/121G06F21/316G06F21/88G06Q20/382G06F21/1015
Inventor 于洪涛吕继方王会苏起钦钱成
Owner GREE ELECTRIC APPLIANCES INC