Information protection method, terminal device, and computer-readable storage medium
A technology for terminal equipment and information protection, applied to the protection of internal/peripheral computer components, etc., can solve problems such as the loss of mobile phones, and achieve the effect of improving security and reducing the possibility of information leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized.
[0019] The first embodiment of the present invention relates to an information protection method. The core of this embodiment is to detect the motion state of the terminal device in real time; when the detected motion state meets the preset conditions, the terminal device is controlled to lock the screen and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


