A mobile terminal theft protection device, mobile terminal and theft protection method
A mobile terminal and protection device technology, applied in branch office equipment, electrical components, telephone communications, etc., can solve the problems of not being able to effectively avoid theft of mobile terminals and prevent the re-use of mobile terminals, so as to reduce theft incidents, The effect of reducing the value and reducing the incidence rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] figure 1 It is a structural diagram of a mobile terminal theft protection device provided in Embodiment 1 of the present invention. This embodiment is applicable to the case where a mobile terminal is stolen, such as figure 1 As shown, the mobile terminal theft protection device may specifically include: a clock module 110, a clock switch 120 and a control module 130;
[0020] Wherein, the control module 130 is electrically connected with the clock switch 120, and the clock switch 120 is connected in series with the clock module 110; the control module 130 is used to control the clock switch 120 to disconnect from the clock module when detecting that the mobile terminal is in a stolen 110 connections.
[0021] Wherein, the control module 130 is connected with the control terminal of the clock switch 120, and is used to control the opening or closing of the clock switch 120. The control module 130 can be the CPU of the mobile terminal, or other working modules, without ...
Embodiment 2
[0028] figure 2 It is a structural diagram of a mobile terminal provided in Embodiment 2 of the present invention, as shown in figure 2 As shown, the mobile terminal 210 includes the mobile terminal theft protection device 211 described in any embodiment of the present invention.
[0029] Specifically, when the mobile terminal theft protection device 211 detects that the mobile terminal 210 is in a stolen state, the clock switch connected in series to the control clock module is disconnected, and the functional modules that require the clock module to provide a clock reference will not be able to work. Operating, making calls, answering calls, sending text messages or surfing the Internet, etc., reduces the value of stolen terminals to thieves, thereby reducing the incidence of mobile terminal theft incidents.
Embodiment 3
[0031] image 3 It is a flow chart of a method for protecting a mobile terminal from being stolen according to Embodiment 3 of the present invention. The method is applicable to the case where a mobile terminal is stolen. The method can be executed by a device for protecting a mobile terminal from being stolen. The device is usually configured in In the mobile terminal used by the user, such as image 3 As shown, the method may specifically include the following steps:
[0032] Step 310, judging whether the mobile terminal is stolen.
[0033] Wherein, the stolen state can be set according to the needs and usage habits of the user, and is not specifically limited. The theft state includes at least one of the number of consecutive failures to unlock the mobile terminal exceeding a set threshold, obtaining a remote anti-theft command, switching SIM cards, and shutting down or powering off the mobile terminal. Specifically, it is possible to obtain the number of consecutive fai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


