An alarm method and device for a mobile terminal
A mobile terminal and terminal information technology, applied in the field of communication, can solve problems such as illegal use of user information and file materials, user loss, etc., and achieve the effect of reducing the loss of illegal use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0049] After stealing a mobile terminal, in order to prevent the mobile terminal from reporting data or tracking the user, the thief usually uninstalls the SIM card immediately, and then illegally uses the user information and files stored in the mobile terminal. And under the situation that SIM card is unloaded, the connection port of mobile terminal and mobile phone network, so some existing alarm actions (as the alarm action of informing the user of the information of new card in the background technology) can't be carried out.
[0050] In the embodiment of the present application, when the behavior of unloading the SIM card is monitored, the SIM card is used to build a mobile phone network, and the bu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


