Unlock instant, AI-driven research and patent intelligence for your innovation.

GSM-based self protection method and device for DSDS terminal

A protection device and terminal technology, applied in the direction of communication interference, telephone communication, access restrictions, etc., can solve the problems of lost or stolen mobile terminals, achieve the effects of reducing value, ensuring property safety, and increasing possibilities

Active Publication Date: 2016-06-01
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in daily life, mobile terminals are lost or stolen from time to time. When a mobile terminal is lost or stolen, the picker or thief can continue to use the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GSM-based self protection method and device for DSDS terminal
  • GSM-based self protection method and device for DSDS terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Embodiment 1 of the present invention provides a self-protection method for a DSDS terminal based on GSM (Global System for Mobile Communication, Global System for Mobile Communications). The embodiment will be described in detail below with reference to the accompanying drawings. figure 1 It is a flow chart of the method of Embodiment 1 of the present invention, please refer to figure 1 , the method of the embodiment of the present invention includes the following steps:

[0031] Step S101. When receiving an instruction sent by a pre-bound security contact, determine whether the instruction is an instruction to control the terminal to block radio frequency;

[0032] Specifically, in the setting of the mobile terminal, a security contact may be set in advance. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.

[0033] When the mobile terminal is stolen or lost, the user can send a short message to ...

Embodiment 2

[0047] Embodiment 2 of the present invention provides a self-protection device for a GSM-based DSDS terminal, please refer to figure 2 , the device according to the embodiment of the present invention includes a judging module 1, a baseband control module 2 and a blocking unblocking module 3, and the principles of the above modules will be described in detail below.

[0048]The judging module 1 is configured to, when receiving an instruction sent by a pre-bound security contact, judge whether the instruction is an instruction to control the radio frequency blocking of the terminal.

[0049] Specifically, in the setting of the mobile terminal, a security contact may be set in advance. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.

[0050] When the mobile terminal is stolen or lost, the user can send a short message to the mobile terminal through the pre-bound security contact, and at this time, the jud...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a GSM-based self protection method and device for a DSDS terminal. The method comprises the following steps: when receiving an instruction sent by a pre-bound security contact, judging whether the instruction is an instruction of controlling a terminal to carry out radio frequency obstruction; and if the instruction is the instruction of controlling the terminal to carry out the radio frequency obstruction, locating a radio frequency module of the terminal in a non-signaling mode, forcing the radio frequency module to continuously transmit GSM high power signals that can obstruct a receiving signal, in order to realize the radio frequency obstruction and the quick discharge of the terminal, such that the mobile terminal cannot communicate or quickly shut down. The GSM-based self protection method disclosed by the invention is used for effectively enhancing the security of the mobile terminal, and guaranteeing the property security of a user, and meanwhile, the GSM-based self protection method can be used for reducing the value of the mobile terminal for a picker or a thief, increasing the initiative of the owner in a subsequent negotiation process and increasing the find possibility of the mobile terminal after being lost or stolen.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, and more specifically, relates to a self-protection method and device for a GSM-based DSDS terminal. Background technique [0002] With the continuous development of science and technology, dual-card dual-standby mobile terminals (ie, DSDS terminals) such as mobile phones and tablet computers play an increasingly important role in people's lives. However, in daily life, the mobile terminal is lost or stolen from time to time. When the mobile terminal is lost or stolen, the picker or the thief can continue to use the mobile terminal. Therefore, how to strengthen the security of mobile terminals has become an urgent problem for manufacturers to solve. Contents of the invention [0003] The purpose of the present invention is to overcome the above-mentioned defects in the prior art and provide a self-protection method and device for a GSM-based DSDS terminal, which effectively en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04K3/00H04M1/725H04W48/16H04W48/18H04M1/72448
CPCH04K3/60H04K3/62H04W48/16H04W48/18H04M1/72448
Inventor 魏伟
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD