Mobile phone anti-theft technique
A technology of mobile phone and technology, which is applied in the direction of telephone communication, electrical components, radio/inductive link selection and arrangement, etc., can solve the problem of not being able to effectively prevent theft, and achieve an easy-to-achieve effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0008] First, according to the requirements of the technical plan, write a program that monitors the replacement of the SIM card through "encryption" and "decryption", and implant it into the mobile phone hardware as an integral part of the mobile phone system software. At the same time, necessary changes are made to the corresponding hardware circuit to realize the connection of the circuit that burns the mobile phone by itself after the self-destruction program is started.
[0009] The process of information stealing technology is:
[0010] 1. When a mobile phone is used for the first time, after adding the SIM card, the mobile phone displays:
[0011] Head of household and contact information: __________
[0012] Password: __________ (letters or numbers, at least 6 bytes)
[0013] After entering and confirming, the mobile phone system and user number are locked, and it becomes an encrypted mobile phone. At this time, the mobile phone only accepts SIM cards with locked nu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com