Processing method of communication terminal after being stolen and communication terminal

A communication terminal and processing method technology, applied in the field of communication terminals, can solve the problems of inability to obtain the physical characteristics of thieves, unfavorable for police to solve cases, inconvenience in actual use, etc., and achieve the effects of protecting security, improving security, and avoiding deletion or destruction.

Inactive Publication Date: 2012-06-20
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology cannot obtain physical information such as the physical characteristics of the thief, which does not allow the police to solve the case; at the same time, if all the data in the communication terminal is deleted, if the original user is lost and recovered, the data has all disappeared
[0003] To sum up, it can be seen that there are obviously inconveniences and defects in the actual use of the existing processing technology after the communication terminal is stolen, so it is necessary to improve it.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method of communication terminal after being stolen and communication terminal
  • Processing method of communication terminal after being stolen and communication terminal
  • Processing method of communication terminal after being stolen and communication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] figure 1 The structure of the communication terminal of the present invention is shown, and the communication terminal 100 can be a mobile phone, a PDA (Personal Digital Assistant, a personal digital assistant), a palmtop computer, etc., and at least includes an instruction receiving module 10 and an information processing module 20, wherein:

[0045] The instruction receiving module 10 is configured to receive the anti-theft processing instruction sent by the server 200 . When the user's communication terminal 100 is stolen, the user may operate through a client such as a web (page) client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of communication and provides a processing method of a communication terminal after being stolen and the communication terminal. The processing method comprises the following steps of: sending an anti-theft processing command to the communication terminal through a server; and carrying out messy code processing on data in the communication terminal by the communication terminal according to the anti-theft processing command. Therefore, after the communication terminal disclosed by the invention is stolen, when other people read the data of the communication terminal, the data is displayed in a messy code state, then the other people can be further prevented from illegally viewing or using private information of a user and safety of the information of the user can be effectively protected. In a better way, the communication terminal can automatically acquire physiological information of a suspected object according to the anti-theft processing command and uploads the physiological information of the suspected object to the server, so that possibility of getting the stolen communication terminal back by the user is increased.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for processing a stolen communication terminal and the communication terminal. Background technique [0002] At present, after a communication terminal such as a user's mobile phone is lost, the server can generally send an information deletion command to the lost communication terminal to delete the user information in the communication terminal, so as to prevent others from illegally obtaining the user's private information and causing greater harm to the user. damage or hazard. However, the existing technology cannot obtain physiological information such as the physical characteristics of the thief, which does not use the police to solve the case; at the same time, if all the data in the communication terminal is deleted, if the original user is lost and recovered, the data has all disappeared. [0003] To sum up, it can be seen that the existing processing te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04W4/00G06F21/78
Inventor 李治国郭晓涛
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products