Network locking method and terminal
A network lock and terminal technology, applied in the field of network lock methods and terminals, can solve problems such as complex management, and achieve the effect of convenient testers and simple lock network management
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The network locking method and terminal provided by the embodiments of the present invention solve the problems in the prior art that special software is needed to realize network locking and the management is complicated, and it is easy to implement and easy to use for users or testers. It will be described in detail below in conjunction with the accompanying drawings.
[0019] figure 1 It is a schematic flow diagram of a network locking method according to an embodiment of the present invention, the method comprising:
[0020] 101. Determine whether there is a network lock file in the temporary folder, if not, judge whether there is the network lock file in the special folder;
[0021] 102. If there is the network lock file in the special folder, judge whether the network lock flag in the network lock file is set,
[0022] 103. If the bit is set, execute the network lock according to the network lock information in the network lock file.
[0023] In the above steps...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com