Safety verification method and safety verification device
A security verification and preset technology, applied in computer security devices, digital data authentication, instruments, etc., can solve problems such as low user information security, avoid privacy leakage, improve information security, and reduce the possibility of being cracked Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Embodiments of the present invention provide a security verification method and a mobile terminal, which can avoid disclosure of personal privacy of users.
[0024] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.
[0025] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention and the above drawings are intended to cover a n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

