Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-theft method and device for mobile terminal

A technology of mobile terminal and anti-theft method, which is applied in branch office equipment, electrical components, telephone communication, etc., and can solve the problems that the life of mobile terminal users is affected, and the impact cannot be ignored.

Active Publication Date: 2019-10-11
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although the mobile terminal provides convenience for people's life, the impact on people's life when the mobile terminal is lost cannot be ignored.
[0003] For example, a lot of information related to the mobile terminal user (online banking, contacts, etc.) is stored in the mobile terminal. Illegal acts, etc., which will have a bad impact on the life of mobile terminal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-theft method and device for mobile terminal
  • Anti-theft method and device for mobile terminal
  • Anti-theft method and device for mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] figure 1 It is a flow chart of a mobile terminal anti-theft method provided in Embodiment 1 of the present application.

[0049] Such as figure 1 As shown, the method includes:

[0050] S101. Receive an operation instruction input by the user, where the operation instruction includes a power-on instruction or a standby wake-up instruction;

[0051] In the embodiment of the present application, preferably, an operation instruction input by a user is received, and the operation instruction includes a power-on instruction or a standby wake-up instruction.

[0052] Preferably, the user inputs the boot command by clicking the boot key, and inputs the standby wake-up command by double-clicking the screen. The above is only the preferred manner of the embodiment of the present application, and the inventor can arbitrarily set the manner of the user inputting the operation instruction according to his own needs, which is not limited here.

[0053] Specifically, the power-on...

Embodiment 2

[0111] Figure 6 It is a schematic structural diagram of an anti-theft device for a mobile terminal provided in Embodiment 2 of the present application.

[0112] Such as Figure 6 As shown, the device includes:

[0113] An instruction receiving unit 1, configured to receive an operation instruction input by a user, the operation instruction includes a power-on instruction or a standby wake-up instruction;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a mobile terminal anti-theft method and device. By receiving an operation instruction input by the user (the operation instruction includes a power-on instruction or a standby wake-up instruction); When the identity information and the card information of the legal SIM card bound with the identity information, and the SIM card is set in the mobile terminal, read the card information of the SIM card and obtain the user's identity information; when the acquired user's identity information and mobile When the pre-stored identity information in the terminal does not match, or the read card information does not match the pre-stored card information in the mobile terminal, the method of prohibiting the execution of actions corresponding to the operation instructions effectively avoids when the current user of the mobile terminal is illegal. Or when the current SIM card in the mobile terminal is invalid, the mobile terminal executes the action corresponding to the above operation instruction, thereby effectively ensuring the security of the data in the mobile terminal.

Description

technical field [0001] The present application relates to the field of mobile terminal anti-theft technology, and in particular to a mobile terminal anti-theft method and device. Background technique [0002] As a portable, stylish and compact communication tool, mobile terminals are becoming more and more important to people's lives and greatly facilitate people's lives. However, although the mobile terminal provides convenience for people's life, the impact on people's life when the mobile terminal is lost cannot be ignored. [0003] For example, a lot of information related to the mobile terminal user (online banking, contacts, etc.) is stored in the mobile terminal. Illegal acts, etc., will have a bad impact on the lives of mobile terminal users. [0004] Therefore, there is an urgent need for a mobile terminal anti-theft method and device to ensure the security of data in the mobile terminal. Contents of the invention [0005] In view of this, the present applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04M1/72454H04M1/72463
Inventor 卞永军
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD