Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Self-protection method and device for CA terminal

A protection device and terminal technology, applied in the direction of internal/peripheral computer component protection, etc., can solve problems such as terminal loss, achieve the effect of reducing value, increasing possibility, and strengthening security

Active Publication Date: 2016-08-03
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in daily life, the terminal is lost or stolen from time to time, when the mobile terminal is lost or stolen, the picker or the thief can continue to use the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-protection method and device for CA terminal
  • Self-protection method and device for CA terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Embodiment 1 of the present invention provides a self-protection method for a CA (CarrierAggregation, carrier aggregation) terminal, which is aimed at a terminal supporting uplink carrier aggregation, regardless of whether it is a CA of China Unicom Telecom or a CA of China Mobile. The present embodiment will be described in detail below in conjunction with the accompanying drawings. figure 1 It is a flow chart of the method of Embodiment 1 of the present invention, please refer to figure 1 , the method of the embodiment of the present invention includes the following steps:

[0031] Step S101, when receiving an instruction sent by a pre-bound security contact, determine whether the instruction is an instruction to control the CA terminal to block radio frequency;

[0032] Specifically, in the setting of the CA terminal, a security contact may be preset. After the setting is complete, you need to bind with the security contact to complete the relevant security interac...

Embodiment 2

[0047] Embodiment 2 of the present invention provides a self-protection device for a CA terminal, please refer to figure 2 , the device according to the embodiment of the present invention includes a judging module 1, a baseband control module 2 and a blocking unblocking module 3, and the principles of the above modules will be described in detail below.

[0048] The judging module 1 is configured to, when receiving an instruction sent by a pre-bound security contact, judge whether the instruction is an instruction to control the radio frequency blocking of the CA terminal.

[0049] Specifically, in the setting of the CA terminal, a security contact may be preset. After the setting is complete, you need to bind with the security contact to complete the relevant security interaction.

[0050] When the CA terminal is stolen or lost, the user can send a short message to the CA terminal through the pre-bound security contact, and at this time, the judging module 1 will judge and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a self-protection method and device for Carrier Aggregation (CA) terminal. The method comprises the following steps: when an instruction transmitted by a pre-bound safety contact person is received, judging whether the instruction is the one for controlling the CA terminal to carry out radio frequency jamming; if the instruction is the one for controlling the CA terminal to carry out radio frequency jamming, enabling two radio frequency transceivers of a radio frequency module of the CA terminal to be in a non-signaling mode, and forcing the two radio frequency transceivers to respectively and continuously emit LTE high-power signals capable of jamming receiving signals to realize jamming of two radio frequency paths and quick discharging of the terminal, so as to enable the CA terminal to not be communicated and shut off quickly. According to the self-protection method, the safety of the CA terminal is effectively improved, and the property safety of a user is guaranteed; meanwhile, the value of the CA terminal in picker or a stealer can be also reduced; the activity of an owner in the subsequent transaction process is enhanced, and the possibility that the CA terminal is traced back after being lost or stolen is increased.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, and more specifically, relates to a self-protection method and device for a CA terminal. Background technique [0002] With the continuous development of technology, mobile terminals supporting uplink carrier aggregation (CA), such as mobile phones and tablet PCs, play an increasingly important role in people's lives. However, in daily life, the terminal is lost or stolen from time to time. When the mobile terminal is lost or stolen, the picker or the thief can continue to use the mobile terminal. Therefore, how to strengthen the security of mobile terminals has become an urgent problem for manufacturers to solve. Contents of the invention [0003] The purpose of the present invention is to overcome the above-mentioned defects in the prior art, and provide a self-protection method and device of a CA terminal, which effectively strengthens the security of the CA terminal and gu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/88G06F21/71
CPCG06F21/71G06F21/88
Inventor 魏伟
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products