Screen unlocking method and terminal
A screen unlocking and terminal technology, applied in the direction of digital data authentication, etc., can solve the problem of terminal user data loss and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0110] The following will describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.
[0111] The terminals involved in this application can be: mobile phones, tablet computers (Tablet Personal Computer), laptop computers (Laptop Computer), digital cameras, personal digital assistants (personal digital assistant, PDA for short), navigation devices, mobile Internet access devices ( Mobile Internet Device, MID) or wearable devices (WearableDevice), such as bracelets, watches, etc.
[0112] figure 1 It is a schematic diagram of the scene applied in the embodiment of this application. exist figure 1 As ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


