Terminal data protecting method, system as well as mobile communication terminal

A mobile communication terminal and terminal technology, which is applied to electrical components, telemetry/remote control selection devices, radio/induction link selection arrangements, etc. The effect of not being leaked

Active Publication Date: 2008-08-27
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF0 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the course of work, the inventor finds that the prior art has at least the following problems: the existing anti-theft technology cannot carry out anti-theft restrictions when the stolen mobile phone is operated with the original SIM card, which may cause further losses to the stolen user. The data stored on the mobile phone will also be arbitrarily stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal data protecting method, system as well as mobile communication terminal
  • Terminal data protecting method, system as well as mobile communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0022] The embodiment of the present invention provides the protection method of terminal data, and the terminal is a mobile phone as an example to illustrate below. The protection method of mobile phone data is: the network side entity receives the special anti-theft message sent by the lost mobile phone; the network side entity receives the special anti-theft message sent by the lost mobile phone For special anti-theft messages, query the device identification code of the corresponding anti-theft mobile phone; the network-side entity takes anti-theft measures according to the device identification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to protection method and system and a mobile communication terminal for terminal data, and belongs to the wireless communication field. The method comprises the steps that the restarting code is verified if restarting occurs when the terminal is stolen, the terminal is recognized to be stolen and locked if the code is wrong; the user data stored at the stolen terminal is backed up; if restarting does not occur, operation instruction is remotely sent to the stolen terminal to back up the user data stored at the stolen terminal to a server. An identification authentication ID number issued simultaneously with the mobile communication terminal can be used for identifying the control right of the users to the mobile communication terminal and protect the control right; the users can perform anti-theft operation through logging in the server without setting the anti-theft function on the mobile communication terminal in advance; moreover, the adoption of the protection method and system and the mobile communication terminal can ensure the private data of the users to be protected and backed up immediately, thus protecting private data at the mobile communication terminal against leakage.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a terminal data protection method, system and mobile communication terminal. Background technique [0002] Mobile phone anti-theft technology is a very popular technology today. Because the mobile phone stores a large amount of private information, contact numbers, communication records, memos, and text messages, or binds with the account numbers and passwords of game providers and value-added service providers, or customizes call and receive calls that do not limit time or region. Access services, or have the "access control" opening function of community entrance, building door, house door, office door, insurance rejection, car, computer, mobile hard disk, once the mobile phone is stolen or lost, illegal users may bring various losses to legitimate users and trouble. Therefore, mobile phone anti-theft technology has broad market prospects and is expected to become the st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/22H04Q7/32H04Q9/00H04W12/06H04W12/126H04W12/30
Inventor 李刚
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products