Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security management method for mobile phone

A management method and security management technology, which is applied in the field of mobile phone security management, can solve the problems of easy misoperation, easy cracking of passwords, poor feasibility, etc., and achieve the effect of convenient use, flexible processing methods, and difficult cracking

Inactive Publication Date: 2009-06-17
高延飞
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The invention solves the technical problems that the background technology limits the user's choice, poor feasibility, and is easily affected by misoperation; the implementation is affected by power on and off, the password is easy to crack, and the reliability is low, which affects other legal users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method for mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Referring to the accompanying drawings, the method includes

[0038] 1. First, save the security management program in the mobile phone, which is a program containing a "security code".

[0039] 2. The initial user information is input to the mobile phone through the control center, the control center stores the information, and the control center can call the information after receiving the service request. User information may include the user's name, mobile phone number, address, ID number or password, and question prompts in case the password is forgotten. After the initial user information input is completed, the user can modify the information content. The sending method of initial user information can be short message, telephone or Internet etc.

[0040] 3. Activate the security management program of the mobile phone

[0041] (1). When the user sends a service request to the control center, the control center will send a message containing the "security code" ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A safe management method for cell phones characterizes in storing a safety management process containing 'a safety code' in a cell phone then sending primary user information to a control center storing the information, activating the cell phone safety management program. When the control center receives the unlock service request of a user, it confirms it to send the information with the 'safety code' to unlock it and close down the safety management program. This invention is used after the cell phone is lost.

Description

technical field [0001] The invention relates to a mobile phone safety management method. Background technique [0002] According to statistics, 710,000 mobile phones are stolen in the UK every year, an average of one mobile phone is stolen every 45 seconds. Cell phone theft is up 190 percent since 1995. At the same time, according to incomplete statistics, in 1999 in Beijing, 40,000 mobile phone users lost their mobile phones in that year. Beijing Mobile Communications Company handled more than 35,000 mobile phone loss reporting services during the same period, and handled more than 4,000 cases at most in a month. Beijing Unicom also handles about 5,000 mobile phone loss reporting services. At present, there are many technical means for preventing mobile phone from being stolen, but all of them have shortcomings or defects in varying degrees. [0003] 1. Lock the phone with a password: the phone itself has a password protection function. It uses the "password lock" comma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W88/02H04M11/04H04M9/00
Inventor 高延飞
Owner 高延飞
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products