Pursuant method of misappropriated signalling number for mobile communication terminal
A technology for mobile communication terminals and users, applied in wireless communication, communication supplementary services, messages/mailboxes/notifications, etc., which can solve the problem that no method is provided to track the user who has stolen the number, and the user whose number has been stolen cannot know the fact of the theft And other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] An embodiment of the tracking method when the signaling code of the user of the mobile communication terminal is stolen according to the present invention will be described in detail below with reference to the accompanying drawings.
[0026] figure 2 It is a structural block diagram of a mobile communication terminal and a message management server applicable to the present invention.
[0027] Here, reference number 50 is a mobile communication terminal that enables the user to perform a call function through a wireless section when moving, and can use message services such as SMS, LMS, MMS, etc., and 60 is connected to the above-mentioned mobile communication terminal 50 to manage such as SMS, Message management server for LMS, MMS and other messages.
[0028] image 3 It is a flow chart of the tracking method when the signaling code of the user of the mobile communication terminal is stolen in the present invention.
[0029] As shown in the figure, the present in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 