Self-protection method and device for CA terminal
A protection device and terminal technology, applied in the direction of internal/peripheral computer component protection, etc., can solve problems such as terminal loss, achieve the effect of reducing value, increasing possibility, and strengthening security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0029] Example 1
[0030] Embodiment 1 of the present invention provides a self-protection method for a CA (Carrier Aggregation, carrier aggregation) terminal, which is aimed at a terminal supporting uplink carrier aggregation, whether it is supported for the CA of China Unicom Telecom or the CA of China Mobile. The present embodiment will be described in detail below with reference to the accompanying drawings. figure 1 It is a flow chart of the method of Embodiment 1 of the present invention, please refer to figure 1 , the method of the embodiment of the present invention comprises the following steps:
[0031] Step S101, when receiving an instruction sent by a pre-bound security contact, determine whether the instruction is an instruction to control the CA terminal to perform radio frequency blocking;
[0032] Specifically, in the setting of the CA terminal, a security contact can be preset. After the setting is complete, you need to bind with the security contact to com...
Example Embodiment
[0046] Embodiment 2
[0047] The second embodiment of the present invention provides a self-protection device for a CA terminal. Please refer to figure 2 , the apparatus in this embodiment of the present invention includes a judgment module 1, a baseband control module 2, and a blocking release module 3. The principles of the above modules will be described in detail below.
[0048] The judgment module 1 is configured to judge whether the instruction is an instruction to control the CA terminal to perform radio frequency blocking when receiving an instruction sent by a pre-bound security contact.
[0049] Specifically, in the setting of the CA terminal, a security contact can be preset. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.
[0050] When the CA terminal is stolen or lost, the user can send a short message to the CA terminal through the pre-bound security contact. At this time, the judgment mo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap