Unlock instant, AI-driven research and patent intelligence for your innovation.
Self-protection method and device for CA terminal
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A protection device and terminal technology, applied in the direction of internal/peripheral computer component protection, etc., can solve problems such as terminal loss, achieve the effect of reducing value, increasing possibility, and strengthening security
Active Publication Date: 2016-08-03
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF8 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
However, in daily life, the terminal is lost or stolen from time to time, when the mobile terminal is lost or stolen, the picker or the thief can continue to use the mobile terminal
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0030] Embodiment 1 of the present invention provides a self-protection method for a CA (CarrierAggregation, carrier aggregation) terminal, which is aimed at a terminal supporting uplink carrier aggregation, regardless of whether it is a CA of China Unicom Telecom or a CA of China Mobile. The present embodiment will be described in detail below in conjunction with the accompanying drawings. figure 1 It is a flow chart of the method of Embodiment 1 of the present invention, please refer to figure 1 , the method of the embodiment of the present invention includes the following steps:
[0031] Step S101, when receiving an instruction sent by a pre-bound security contact, determine whether the instruction is an instruction to control the CA terminal to block radio frequency;
[0032] Specifically, in the setting of the CA terminal, a security contact may be preset. After the setting is complete, you need to bind with the security contact to complete the relevant security interac...
Embodiment 2
[0047] Embodiment 2 of the present invention provides a self-protection device for a CA terminal, please refer to figure 2 , the device according to the embodiment of the present invention includes a judging module 1, a baseband control module 2 and a blocking unblocking module 3, and the principles of the above modules will be described in detail below.
[0048] The judging module 1 is configured to, when receiving an instruction sent by a pre-bound security contact, judge whether the instruction is an instruction to control the radio frequency blocking of the CA terminal.
[0049] Specifically, in the setting of the CA terminal, a security contact may be preset. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.
[0050] When the CA terminal is stolen or lost, the user can send a short message to the CA terminal through the pre-bound security contact, and at this time, the judging module 1 will judge and...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a self-protection method and device for Carrier Aggregation (CA) terminal. The method comprises the following steps: when an instruction transmitted by a pre-bound safety contact person is received, judging whether the instruction is the one for controlling the CA terminal to carry out radio frequency jamming; if the instruction is the one for controlling the CA terminal to carry out radio frequency jamming, enabling two radio frequency transceivers of a radio frequency module of the CA terminal to be in a non-signaling mode, and forcing the two radio frequency transceivers to respectively and continuously emit LTE high-power signals capable of jamming receiving signals to realize jamming of two radio frequency paths and quick discharging of the terminal, so as to enable the CA terminal to not be communicated and shut off quickly. According to the self-protection method, the safety of the CA terminal is effectively improved, and the property safety of a user is guaranteed; meanwhile, the value of the CA terminal in picker or a stealer can be also reduced; the activity of an owner in the subsequent transaction process is enhanced, and the possibility that the CA terminal is traced back after being lost or stolen is increased.
Description
technical field [0001] The present invention relates to the technical field of mobile terminals, and more specifically, relates to a self-protection method and device for a CA terminal. Background technique [0002] With the continuous development of technology, mobile terminals supporting uplink carrier aggregation (CA), such as mobile phones and tablet PCs, play an increasingly important role in people's lives. However, in daily life, the terminal is lost or stolen from time to time. When the mobile terminal is lost or stolen, the picker or the thief can continue to use the mobile terminal. Therefore, how to strengthen the security of mobile terminals has become an urgent problem for manufacturers to solve. Contents of the invention [0003] The purpose of the present invention is to overcome the above-mentioned defects in the prior art, and provide a self-protection method and device of a CA terminal, which effectively strengthens the security of the CA terminal and gu...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.