Stolen terminal processing method and equipment
A processing method and terminal technology, applied in the field of Internet applications, can solve the problem of not being able to identify whether the terminal is stolen or not.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] figure 2 A processing flow chart of a processing method for a stolen terminal according to a preferred embodiment of the present invention is shown, which is used to support any one of the above processing methods for a stolen terminal, and makes the above processing method for a stolen terminal clearer and easier to understand. see figure 2 , this preferred embodiment includes at least step S202 to step S228.
[0060] It should be noted that, in order to explain this preferred embodiment more simply and clearly, in this preferred embodiment, the sender of the state modification command is set to the mobile phone of relatives and friends, and the terminal is set to be a stolen terminal. Among them, the mobile phone of relatives and friends is the mobile phone where the number of relatives and friends bound to the stolen mobile phone is located.
[0061] Step S202, sending a status modification message to mark the mobile phone as stolen.
[0062] When the mobile pho...
Embodiment 2
[0084] image 3 It shows a processing flow chart of a processing method for a stolen terminal according to another preferred embodiment of the present invention, which is used to support any one of the above processing methods for a stolen terminal, and makes the above processing method for a stolen terminal clearer and easier to understand . see image 3 , this preferred embodiment includes at least step S302 to step S324.
[0085] It should be noted that, in order to explain this preferred embodiment more simply and clearly, in this preferred embodiment, the sender of the state modification command is set to the mobile phone of relatives and friends, and the terminal is set to be a stolen terminal. Among them, the mobile phone of relatives and friends is the mobile phone where the number of relatives and friends bound to the stolen mobile phone is located.
[0086] Step S302, sending a status modification message to mark the mobile phone as stolen.
[0087] After the mob...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com