Mobile terminal theft-protection device, mobile terminal and theft-protection method
A mobile terminal and protection device technology, applied in the direction of telephone communication, electrical components, branch equipment, etc., can solve the problems of not being able to effectively avoid the theft of mobile terminals and preventing the reuse of mobile terminals, so as to reduce the number of stolen incidents, The effect of reducing the incidence
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] figure 1 It is a structural diagram of a mobile terminal theft protection device provided in Embodiment 1 of the present invention. This embodiment is applicable to the case where a mobile terminal is stolen, such as figure 1 As shown, the mobile terminal theft protection device may specifically include: an antenna 110, an antenna switch 120, and a control module 130;
[0020] Wherein, control module 130 is electrically connected with antenna switch 120, and antenna switch 120 is connected in series with antenna 110; connect.
[0021] Specifically, the antenna 110 may be at least one antenna in the mobile terminal that implements functions such as communication, Internet access, or Bluetooth, and the control module 130 may be the CPU of the mobile terminal. One end of the antenna switch 120 is connected to the input end of the antenna 110 , the other end is connected to the antenna feed point, and the control end of the antenna switch 120 is connected to the control m...
Embodiment 2
[0027] figure 2 It is a structural diagram of a mobile terminal provided in Embodiment 2 of the present invention, as shown in figure 2 As shown, the mobile terminal 210 includes the mobile terminal theft protection device 211 described in any embodiment of the present invention.
[0028] Specifically, when the mobile terminal theft protection device 211 detects that the mobile terminal 210 is stolen, it controls the antenna switch to disconnect the antenna, so that the mobile terminal cannot use the working modules that require antenna functions, such as making calls and answering calls. , Sending text messages, surfing the Internet, etc., greatly reduces the value of the stolen terminal to the thief, thereby reducing the incidence of mobile terminal theft events.
Embodiment 3
[0030] image 3 It is a flow chart of a method for protecting a mobile terminal from being stolen according to Embodiment 3 of the present invention. The method is applicable to the case where a mobile terminal is stolen. The method can be executed by a device for protecting a mobile terminal from being stolen. The device is usually configured in In the mobile terminal used by the user, such as image 3 As shown, the method may specifically include the following steps:
[0031] Step 310, judging whether the mobile terminal is stolen.
[0032] Wherein, the stolen state can be set according to the needs and usage habits of the user, and is not specifically limited. The theft state includes at least one of the number of consecutive failures to unlock the mobile terminal exceeding a set threshold, obtaining a remote anti-theft command, switching SIM cards, and shutting down or powering off the mobile terminal. Specifically, it is possible to obtain the number of consecutive fai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 