Keyboard generation method, security information input method and device, mobile terminal
A technology of security information and generating device, applied in the field of network security, can solve problems such as inability to completely solve risks, and achieve the effect of increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0091] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0092] Before discussing the example embodiments in greater detail, it should be mentioned that the specific structural and functional details of some example embodiments disclosed herein are merely representative and are for purposes of describing example embodiments of the invention. Purpose. This invention may, however, be embodied in many alternative forms and should not be construed as limited to only the embodiments set forth herein.
[0093] It will be understood that although the terms "first", "second", etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, withou...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


