Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile phone anti-theft technique

A technology of mobile phone and technology, which is applied in the direction of telephone communication, electrical components, radio/inductive link selection and arrangement, etc., can solve the problem of not being able to effectively prevent theft, and achieve an easy-to-achieve effect

Inactive Publication Date: 2007-08-29
崔乃铮
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this technology prevents the original SIM card from being stolen, the mobile phone can continue to be used after the SIM card is replaced. In other words, stealing the mobile phone is still profitable, so it cannot effectively prevent the occurrence of theft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0008] First, according to the requirements of the technical plan, write a program that monitors the replacement of the SIM card through "encryption" and "decryption", and implant it into the mobile phone hardware as an integral part of the mobile phone system software. At the same time, necessary changes are made to the corresponding hardware circuit to realize the connection of the circuit that burns the mobile phone by itself after the self-destruction program is started.

[0009] The process of information stealing technology is:

[0010] 1. When a mobile phone is used for the first time, after adding the SIM card, the mobile phone displays:

[0011] Head of household and contact information: __________

[0012] Password: __________ (letters or numbers, at least 6 bytes)

[0013] After entering and confirming, the mobile phone system and user number are locked, and it becomes an encrypted mobile phone. At this time, the mobile phone only accepts SIM cards with locked nu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Using supplement on original system procedure of handset and modifying corresponding hardware circuit makes handset possesses function for suppressing stealing. Implementing operations are as following: writing program, which using encrypting and decrypting operations monitors replacement of SIM card, of guarding against theft as component part of original system program is together embedded into hardware of handset; moreover, hardware circuit is modified correspondingly. If handset is lost or stolen, and after report is made, illegal user is unable to change SIM card when decrypting operation does not accomplished. If decrypting operation is attempted to carry out forcibly, the handset displays method and prompts to contact to owner. If number trying for input exceeds certain value, the handset starts up automatic destruct program, and hardware of the handset will be burnt so as to reach purpose for suppressing stealing.

Description

Technical field [0001] The invention relates to the supplement of the original system program of the mobile phone and the improvement of the corresponding hardware circuit, so that the mobile phone has the function of stopping the theft. Background technique [0002] At present, after the mobile phone is stolen, it can only be reported through the communication company, and the SIM card will be scrapped after the report is lost. Although this technology prevents the original SIM card from being stolen, the mobile phone can continue to use after changing the SIM card. In other words, stealing the mobile phone is still profitable, so it cannot effectively prevent the occurrence of the stolen phenomenon. Contents of the invention [0003] Mobile phones are valuable items, and the phenomenon of theft is common. The reason is that the stolen mobile phones can still be used after changing the SIM card. In this invention, by supplementing the mobile phone system software and imp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/32H04W88/02H04M1/72454H04M1/72463
Inventor 崔乃铮
Owner 崔乃铮
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products