Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mobile terminal of a stolen anti-swiping machine and a stolen anti-swiping machine method

A mobile terminal and anti-swipe technology, applied in data processing applications, instruments, computing, etc., can solve problems such as loss or theft of mobile terminals, reduce value, increase initiative, and avoid resale of users' mobile terminals.

Inactive Publication Date: 2019-04-02
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in daily life, incidents of mobile terminals being lost or stolen happen from time to time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal of a stolen anti-swiping machine and a stolen anti-swiping machine method
  • A mobile terminal of a stolen anti-swiping machine and a stolen anti-swiping machine method
  • A mobile terminal of a stolen anti-swiping machine and a stolen anti-swiping machine method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] The first embodiment of the present invention provides a mobile terminal of a stolen anti-brush machine, please refer to figure 1 The mobile terminal of the embodiment of the present invention includes a control switch 1, a USB interface circuit 2 and a terminal processor 3. This embodiment will be described in detail below with reference to the accompanying drawings.

[0034] The control switch 1, which is connected in series to the data transmission port or power port of the USB interface circuit 2 of the mobile terminal, and is located between the USB interface circuit 2 and the terminal processor 3, and is used to turn on / off the signal of the USB interface circuit 2 Circulate, or turn on / off the power of the USB interface circuit 2. The control switch 1 is in an off state when the mobile terminal locks the screen.

[0035] In specific implementation, the data transmission port of the USB interface circuit 2 includes the D+ port and the D- port of the USB interface circu...

Embodiment 2

[0043] The second embodiment of the present invention provides a mobile terminal of a stolen anti-brush machine, please refer to figure 2 The difference between the mobile terminal in the second embodiment of the present invention and the mobile terminal in the first embodiment is that the terminal processor 3 of the mobile terminal in the second embodiment of the present invention further includes a counting module 33 and a positioning information feedback module 34. The modules are described, the same modules are not repeated here.

[0044] The counting module 33 is configured to calculate the number of times that the unlock verification information input by the user fails to be verified.

[0045] The positioning information feedback module 34 is configured to send the current location information of the mobile terminal to the preset mobile phone number of the anti-theft notification contact when the number of verification failures reaches a preset threshold.

[0046] The mobile t...

Embodiment 3

[0048] The third embodiment of the present invention provides a stolen anti-brushing method implemented by using the mobile terminal described in the above technical solution. image 3 It is the method flowchart of the third embodiment of the present invention, please refer to image 3 , The method of the embodiment of the present invention includes the following steps:

[0049] Step S101: A control switch 1 is connected in series with the data transmission port or the power port of the USB interface circuit 2 of the mobile terminal in advance;

[0050] In specific implementation, the data transmission port of the USB interface circuit 2 includes the D+ port or the D- port of the USB interface circuit 2; the power port of the USB interface circuit 2 includes the VBUS port of the USB interface circuit 2. Wherein, the control switch 1 is in an off state when the mobile terminal locks the screen.

[0051] Step S102: When the mobile terminal is in the locked screen state, obtain the un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an anti-reinstallation-after-stolen mobile terminal and an anti-reinstallation-after-stolen method therefor. According to the anti-reinstallation-after-stolen mobile terminal and the anti-reinstallation-after-stolen method therefor, which are disclosed by the present invention, a control switch is connected in series to a data transmission port or a power supply port of a USB interface circuit of the mobile terminal, the control switch is in a disconnection state when a screen of the mobile terminal is locked, and only when the mobile terminal confirms an owner identity, the control switch can be closed and conducted to enable the USB interface circuit to operate normally, or the control switch is always kept in a disconnection state to disable the USB interface circuit to transmit a signal, so that a law breaker can be prevented from unlocking the mobile terminal of a user by means of a getroot operation, events of reselling the mobile terminal of the user, stealing private information of the user and utilizing the mobile terminal of the user to perform illegal fraud activities can be avoided, property security of the user is ensured, meanwhile, value of the mobile terminal in hands of a picker or a thief also can be reduced, and the initiative of an owner in the subsequent negotiation process can be increased, and the possibility of tracking back the lost or stolen mobile terminal can be increased.

Description

Technical field [0001] The present invention relates to the technical field of mobile terminals, and more specifically, to a mobile terminal of a stolen anti-brush machine and a stolen anti-brush machine method. Background technique [0002] With the continuous development of technology, mobile terminals (including mobile phones, tablets and other devices) play an increasingly important role in people's lives. However, in daily life, mobile terminals are lost or stolen from time to time. When the mobile terminal is lost or stolen, the picker or thief can unlock the mobile terminal by flashing the mobile terminal, preventing the owner from retrieving the lost or stolen mobile terminal. What's more, the thief will steal the owner The private information and the use of stolen mobile terminals to defraud the owner’s friends of money or publish false information, etc. Summary of the invention [0003] The purpose of the present invention is to overcome the above-mentioned defects in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/40
CPCG06Q20/3227G06Q20/40145G06Q20/42
Inventor 李银鹏魏伟
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products