Echo method and device, computer equipment and storage medium
A computer program and character position technology, applied in the computer field, can solve the problems of increasing the possibility of data theft, low security, uncontrollable user hand size, etc., to reduce the possibility of data theft and high security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0054] The echo method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 receives the input information of the user 104, and the input information may be a sequence of characters. When the terminal 102 receives the echo request from the user 104, the terminal 102 processes the input information, generates and displays an echo picture for the user to view , the whole process runs completely in the environment of the terminal 102, and does not need to be displayed or transmitted through the networ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


