Security and protection method for achieving security and protection function of mobile phone

A mobile phone and functional technology, applied in location-based services, telephone communications, electrical components, etc., can solve the problem of multi-time re-collection

Inactive Publication Date: 2015-01-07
NINGXIA TIANZONG HONGGUANG COGENERATION TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the mobile phone is lost, a large amount of contact information stored in the mobile phone cannot be retrieved. These problems bring great troubles to users: for example, it tak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection method for achieving security and protection function of mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Please see also figure 1 , the present invention also provides a kind of security method that realizes mobile phone security function, comprises the following steps:

[0015] Step S400, receiving call information provided by the base station. For example, when a legitimate mobile phone user loses his mobile phone with security function and uses other mobile phones to dial the mobile phone with security function, the base station will provide the call information to the mobile phone with security function.

[0016] Step S401, obtaining the calling mobile phone number in the call information.

[0017] Step S402, judging whether the acquired mobile phone number of the calling party is the same as the preset mobile phone number for initiating callback. The preset callback activation mobile phone number is the mobile phone number preset by the legal user of the mobile phone in the lost mobile phone. The mobile phone number of the third party's mobile phone.

[0018] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security and protection method for achieving a security and protection function of a mobile phone comprises the following steps of receiving calling information supplied by a base station, obtaining a calling mobile phone number in the calling information, judging whether the obtained calling mobile phone number and a preset postback start mobile phone number are consistent, sending a mobile phone address list back to a legitimate user of the mobile phone when it is judged that the obtained calling mobile phone number and the preset postback start mobile phone number are consistent, and deleting corresponding data information in the mobile phone according to preset deletion rules.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a security method for realizing the security function of a mobile phone. Background technique [0002] With the advancement of communication technology, mobile phones have gradually replaced traditional telephones and become the preferred tool for people to communicate. When the user needs to contact other people, he only needs to find the contact's phone number from the phone book of the mobile phone to make a call, which is very convenient to use. [0003] However, when the mobile phone is lost, a large amount of contact information stored in the mobile phone cannot be retrieved. These problems bring great troubles to users: for example, it takes a lot of time to collect the mobile phone numbers of relatives, friends, leaders and customers , some private information in the mobile phone is known by the holder who holds the lost mobile phone, etc. Contents of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/02H04W4/12H04M1/725
CPCH04M1/2757H04W4/02H04W4/16
Inventor 穆祥王西来董伟胜
Owner NINGXIA TIANZONG HONGGUANG COGENERATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products