RCS-based (u) SIM card protection method and mobile terminal
A mobile terminal and terminal technology, applied in the communication field, can solve problems such as poor user experience and single SIM card protection mode, and achieve the effect of improving user experience and simplifying user operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0051] like figure 1 As shown, it is a flow chart of a preferred embodiment of the security process part of the protection method based on RCS (U)SIM card of the present invention; this embodiment includes the following steps:
[0052] Step S101: receiving the user setting face recognition protection for the (U)SIM card;
[0053] Step S102: Obtain the avatar in the personal information of the phone number bound to the (U)SIM card from the RCS platform server side;
[0054] Step S103: Determine whether the avatar meets the face recognition unlocking requirements, if so, execute step S104; otherwise, execute step S105;
[0055] Step S104: Set the avatar as the unlocked avatar of the (U)SIM card; this security setting is over;
[0056] Step S105: Prompt the user that the current avatar does not meet the unlocking requir...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


