Mobile terminal card locking method and device and mobile terminal

A mobile terminal and card lock technology, which is applied in telephone communication, electrical components, branch office equipment, etc., can solve the problem that the probability of mobile terminal theft cannot be reduced, and achieve the effect of reducing the probability of theft

Active Publication Date: 2017-05-31
BEIJING ANYUNSHIJI TECH CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above method cannot prevent the thief from using the mobile terminal normally after the mobile terminal is stolen, thereby failing to reduce the probability of the mobile terminal being stolen.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal card locking method and device and mobile terminal
  • Mobile terminal card locking method and device and mobile terminal
  • Mobile terminal card locking method and device and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0044] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a method for locking a mobile terminal according to the present invention, which may specifically include the following steps:

[0045] Step 101, judging whether a card lock instruction is received.

[0046] Wherein, the lock card instruction locks the current SIM (Subscriber Identification Module, Subscriber Identification Module) card of the mob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of invention provides a mobile terminal card locking method and device and a mobile terminal. The method comprises the steps of determining whether a card locking directive is received or not, if the answer is affirmative, calling a security interface of the security switch service to lock a user identification module SIM card of the current mobile terminal; if the security service monitors that the SIM card is replaced with a new SIM card, prohibiting the current mobile terminal system to use the new SIM card. The method solves the problem that after the mobile terminal is stolen, it is unable to prevent the mobile terminal from being used normally by a thief through replacing the SIM card. The advantage that the use of other SIM cards is prohibited to reduce the incidence rate of the mobile terminal stealing cases can be achieved.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a card locking method and device for a mobile terminal and a mobile terminal. Background technique [0002] With the widespread use of mobile terminals, the theft of mobile terminals occurs more frequently. After the mobile terminal is stolen, information such as user data on the mobile terminal may be used by lawbreakers, thereby causing personal and property losses of the user. Therefore, the anti-theft of mobile terminals is more and more important. [0003] In the prior art, the main steps of an anti-theft method for a mobile terminal include: first, the user of the stolen mobile terminal sends a short message in a specified format to the stolen mobile terminal through a mobile terminal; then, when the stolen mobile terminal receives the When sending a short message, parse the short message; finally, when the number corresponding to the mobile terminal that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/725
CPCH04M1/72448H04M1/72463H04M1/72484
Inventor 邢春雪李磊
Owner BEIJING ANYUNSHIJI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products