GSM-based self protection method and device for DSDS terminal
A protection device and terminal technology, applied in the direction of communication interference, telephone communication, access restrictions, etc., can solve the problems of lost or stolen mobile terminals, achieve the effects of reducing value, ensuring property safety, and increasing possibilities
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] Embodiment 1 of the present invention provides a self-protection method for a DSDS terminal based on GSM (Global System for Mobile Communication, Global System for Mobile Communications). The embodiment will be described in detail below with reference to the accompanying drawings. figure 1 It is a flow chart of the method of Embodiment 1 of the present invention, please refer to figure 1 , the method of the embodiment of the present invention includes the following steps:
[0031] Step S101. When receiving an instruction sent by a pre-bound security contact, determine whether the instruction is an instruction to control the terminal to block radio frequency;
[0032] Specifically, in the setting of the mobile terminal, a security contact may be set in advance. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.
[0033] When the mobile terminal is stolen or lost, the user can send a short message to ...
Embodiment 2
[0047] Embodiment 2 of the present invention provides a self-protection device for a GSM-based DSDS terminal, please refer to figure 2 , the device according to the embodiment of the present invention includes a judging module 1, a baseband control module 2 and a blocking unblocking module 3, and the principles of the above modules will be described in detail below.
[0048]The judging module 1 is configured to, when receiving an instruction sent by a pre-bound security contact, judge whether the instruction is an instruction to control the radio frequency blocking of the terminal.
[0049] Specifically, in the setting of the mobile terminal, a security contact may be set in advance. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.
[0050] When the mobile terminal is stolen or lost, the user can send a short message to the mobile terminal through the pre-bound security contact, and at this time, the jud...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 