Terminal startup processing method and device
A processing method and terminal technology, applied in the field of network security, can solve the problems of low data security and data theft of key modules, and achieve the effect of reducing the risk of being stolen and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure, as recited in the appended claims.
[0057] In the embodiments of the present application, "at least one" refers to one or more, and "a plurality" refers to two or more. "And / or", which describes the association relationship of the associated objects, means that there can be three kinds of relationships, for example, A and / or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone, where A and B can...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


