Mobile terminal stealing protection device, mobile terminal, and stealing protection method
A mobile terminal and protection device technology, applied in the direction of telephone communication, electrical components, branch office equipment, etc., can solve the problems that mobile terminals cannot be prevented from being reused, and mobile terminal theft incidents cannot be effectively avoided, so as to reduce theft incidents, The effect of reducing the value and reducing the incidence rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] figure 1 This is a structural diagram of a mobile terminal theft protection device provided by the first embodiment of the present invention. This embodiment can be applied to the situation where the mobile terminal is stolen, such as figure 1 As shown, the mobile terminal theft protection device may specifically include: a clock module 110, a clock switch 120, and a control module 130;
[0020] The control module 130 is electrically connected with the clock switch 120, and the clock switch 120 is connected in series with the clock module 110; the control module 130 is configured to control the clock switch 120 to disconnect from the clock module when it is detected that the mobile terminal is in a stolen state 110 connection.
[0021] The control module 130 is connected to the control terminal of the clock switch 110 to control the opening or closing of the clock switch 120. The control module 130 may be the CPU of the mobile terminal or other working modules, which a...
Embodiment 2
[0028] figure 2 is a structural diagram of a mobile terminal provided in Embodiment 2 of the present invention, such as figure 2 As shown, the mobile terminal 210 includes the mobile terminal theft protection device 211 according to any embodiment of the present invention.
[0029] Specifically, when the mobile terminal theft protection device 211 detects that the mobile terminal 210 is in a stolen state, it controls the clock switch connected in series with the clock module to be disconnected, and the functional modules that require the clock module to provide a clock reference will not work. The touch screen is used to operate, make calls, answer calls, send text messages or surf the Internet, etc., which reduces the value of the stolen terminal to the thief, thereby reducing the incidence of mobile terminal theft incidents.
Embodiment 3
[0031] image 3 This is a flow chart of a method for protecting a mobile terminal from being stolen according to Embodiment 3 of the present invention. The method is applicable to the case where a mobile terminal is stolen. The method can be executed by a mobile terminal theft protection device, which is usually configured in In the mobile terminal used by the user, such as image 3 As shown, the method may specifically include the following steps:
[0032] Step 310: Determine whether the mobile terminal is in a stolen state.
[0033] The stolen state may be set according to the user's needs and usage habits, and is not specifically limited. The stolen state includes at least one of the number of times that the mobile terminal fails to unlock continuously exceeds a set threshold, a remote anti-theft instruction is acquired, a SIM card is switched, and the mobile terminal is powered off or powered off. Specifically, the number of times the mobile terminal has failed to perfo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 