Unlock instant, AI-driven research and patent intelligence for your innovation.

Mobile terminal stealing protection device, mobile terminal, and stealing protection method

A mobile terminal and protection device technology, applied in the direction of telephone communication, electrical components, branch office equipment, etc., can solve the problems that mobile terminals cannot be prevented from being reused, and mobile terminal theft incidents cannot be effectively avoided, so as to reduce theft incidents, The effect of reducing the value and reducing the incidence rate

Active Publication Date: 2016-05-18
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The mobile terminal anti-theft method in the prior art cannot prevent the reuse of the mobile terminal, making the thief profitable, and cannot effectively avoid the theft of the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal stealing protection device, mobile terminal, and stealing protection method
  • Mobile terminal stealing protection device, mobile terminal, and stealing protection method
  • Mobile terminal stealing protection device, mobile terminal, and stealing protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] figure 1 This is a structural diagram of a mobile terminal theft protection device provided by the first embodiment of the present invention. This embodiment can be applied to the situation where the mobile terminal is stolen, such as figure 1 As shown, the mobile terminal theft protection device may specifically include: a clock module 110, a clock switch 120, and a control module 130;

[0020] The control module 130 is electrically connected with the clock switch 120, and the clock switch 120 is connected in series with the clock module 110; the control module 130 is configured to control the clock switch 120 to disconnect from the clock module when it is detected that the mobile terminal is in a stolen state 110 connection.

[0021] The control module 130 is connected to the control terminal of the clock switch 110 to control the opening or closing of the clock switch 120. The control module 130 may be the CPU of the mobile terminal or other working modules, which a...

Embodiment 2

[0028] figure 2 is a structural diagram of a mobile terminal provided in Embodiment 2 of the present invention, such as figure 2 As shown, the mobile terminal 210 includes the mobile terminal theft protection device 211 according to any embodiment of the present invention.

[0029] Specifically, when the mobile terminal theft protection device 211 detects that the mobile terminal 210 is in a stolen state, it controls the clock switch connected in series with the clock module to be disconnected, and the functional modules that require the clock module to provide a clock reference will not work. The touch screen is used to operate, make calls, answer calls, send text messages or surf the Internet, etc., which reduces the value of the stolen terminal to the thief, thereby reducing the incidence of mobile terminal theft incidents.

Embodiment 3

[0031] image 3 This is a flow chart of a method for protecting a mobile terminal from being stolen according to Embodiment 3 of the present invention. The method is applicable to the case where a mobile terminal is stolen. The method can be executed by a mobile terminal theft protection device, which is usually configured in In the mobile terminal used by the user, such as image 3 As shown, the method may specifically include the following steps:

[0032] Step 310: Determine whether the mobile terminal is in a stolen state.

[0033] The stolen state may be set according to the user's needs and usage habits, and is not specifically limited. The stolen state includes at least one of the number of times that the mobile terminal fails to unlock continuously exceeds a set threshold, a remote anti-theft instruction is acquired, a SIM card is switched, and the mobile terminal is powered off or powered off. Specifically, the number of times the mobile terminal has failed to perfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal stealing protection device, a mobile terminal, and a stealing protection method. The mobile terminal stealing protection device comprises a clock module, a clock switch, and a control module. The control module is electrically connected with the clock switch, and the clock switch is serially connected with the clock module. Under the control of the control module, the clock switch can be disconnected from the clock module, when the mobile terminal is detected to be in the stolen state. By adopting the technical scheme provided by the invention, the value of the stolen mobile terminal can be reduced for the thief, and therefore the incidence rate of the stealing of the mobile terminal can be reduced.

Description

technical field [0001] Embodiments of the present invention relate to mobile terminal technologies, and in particular, to a mobile terminal theft protection device, a mobile terminal, and a theft protection method. Background technique [0002] With the continuous development of science and technology, the role of mobile terminals in people's lives is becoming more and more important. However, in daily life, the theft of mobile terminals often occurs. [0003] When the mobile terminal is stolen, the thief can prevent the owner from retrieving the stolen mobile terminal by flashing the mobile terminal and other operations, and take the mobile terminal as used or sold. [0004] The mobile terminal anti-theft method in the prior art cannot prevent the reuse of the mobile terminal, making the thief profitable, and cannot effectively avoid the incident of the mobile terminal being stolen. SUMMARY OF THE INVENTION [0005] The present invention provides a mobile terminal theft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/667H04M1/72463
CPCH04M1/667H04M1/72463
Inventor 李银鹏魏伟
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD