Mobile terminal antitheft method and client
A technology of mobile terminals and anti-theft methods, applied in the field of Internet applications, can solve the problems of inability to effectively curb theft crimes, loss, and inability to protect mobile terminals, and achieve the effect of reducing the probability of theft crimes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0072] Example one
[0073] Figure 7 to Figure 9 It shows a processing flowchart of a mobile terminal anti-theft method according to a preferred embodiment of the present invention, which is used to support any one of the above-mentioned mobile terminal anti-theft methods, and the above-mentioned mobile terminal anti-theft method is explained more clearly and easily. It should be noted that, in order to explain this preferred embodiment more clearly and simply, in this preferred embodiment, the sender is set on the mobile phone of relatives and friends, and the mobile terminal is set on the stolen mobile phone.
[0074] Figure 7 The processing flowchart of the anti-theft method for a mobile terminal according to a preferred embodiment of the present invention is shown. Such as Figure 7 As shown, after the mobile phone is stolen, this preferred embodiment executes step S702 to send an anti-theft short message to the stolen mobile phone through the mobile phone of relatives and f...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap