Terminal equipment security control method, device and terminal equipment
A technology of terminal equipment and control method, applied in the field of terminal equipment security control and terminal equipment, can solve problems such as privacy leakage, and achieve the effect of enhancing security and avoiding interference
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.
[0039] The terminal equipment security control method, device and terminal equipment according to the embodiments of the present invention are described below with reference to the accompanying drawings.
[0040] figure 1 It is a flow chart of a terminal device security control method provided according to an embodiment of the present invention, as shown in figure 1 As shown, the method includes:
[0041] Step 101, when the terminal device is successfully unlocked, control the terminal device from a locked state to an unlocked ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


