Terminal processing method and device

A terminal processing and terminal technology, applied in the field of communications, can solve the problems of restricting calling and called services, restricting the number and freedom of users to lock their phones, and users cannot directly lock their mobile phones. efficiency, cost reduction

Inactive Publication Date: 2010-10-13
中国网通集团宽带业务应用国家工程实验室有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disadvantage of the above-mentioned processing method is: the user cannot directly lock his mobile phone, but needs to realize it through the control center, which limits the concurrent number and freedom of the user's locking; calling and called business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal processing method and device
  • Terminal processing method and device
  • Terminal processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0023] figure 1 It is a flow chart of Embodiment 1 of the terminal processing method of the present invention, as figure 1 As shown, this embodiment specifically includes the following steps:

[0024] Step 101, the receiving module of the first terminal receives the request information including the password and the mode information code sent by the second terminal;

[0025] Step 102, the verification module of the first terminal verifies the password;

[0026] Step 103, when the verification is passed, the verification module of the first terminal sends a processing instruction to the relevant module of the first terminal according to the mode information code;

[0027] Step 104, the relevant modules of the first terminal perform processing according to the processing instruction.

[0028] In this embodiment, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a terminal processing method and a terminal processing device. The method comprises the following steps that: a receiving module of a first terminal receives request information which is transmitted by a second terminal and comprises a password and a mode information code; a verification module of the first terminal verifies the password; when the verification passes, the verification module of the first terminal transmits a processing instruction to the relevant module of the first terminal according to the mode information code; and the relevant module of the first terminal processes according to the processing instruction. The terminal processing method and the terminal processing device have the advantages that: a user can process the relevant module of the first terminal according to the request information transmitted by the second terminal, without adding software and hardware modules in the first terminal, so the cost is reduced; and the user can process the relevant module without through a control center, so the concurrent amount and the degree of freedom of the user are improved.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a terminal processing method and device. Background technique [0002] At present, when the mobile phone is lost or stolen, if the user wishes to lock the mobile phone to prevent personal information from being stolen, the following processing methods can be adopted: [0003] First, the security management program containing the "safety code" is stored in the mobile phone; and at the beginning, the user sends the user information to the control center through the mobile phone, and the control center stores the user information. Then, when the user wants to lock the mobile phone, he can contact the control center by SMS, telephone, Internet, etc. When the control center receives the lock service request message containing the user information, it will confirm the user information by comparing it with the pre-stored user information. Afterwards, send informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04M1/725H04W12/06H04W12/126
Inventor 贾雪琴张余包建军
Owner 中国网通集团宽带业务应用国家工程实验室有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products