Unlock instant, AI-driven research and patent intelligence for your innovation.

Information protection method of mobile terminal and mobile terminal

A mobile terminal and information protection technology, applied in telephone communication, wireless communication, message/email/notification, etc., can solve problems such as inability to trigger emergency processing procedures, and achieve the effect of preventing information leakage

Active Publication Date: 2020-09-22
SHENZHEN TRANSSION COMM LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an information protection method of a mobile terminal and the mobile terminal, so as to solve the problem that the emergency processing procedure cannot be triggered when other terminals are not matched or other matched terminals fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method of mobile terminal and mobile terminal
  • Information protection method of mobile terminal and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information protection method for a mobile terminal and the mobile terminal. The method comprises the steps of confirming a first number according to a call record in a preset period; sending a first short message to a first terminal corresponding to the first number; receiving protection control information which is obtained by the first terminal according to the first short message and is sent by the first terminal; and performing a preset protection program and / or instruction according to the protection control information. Under the condition that the other terminal is not matched, or the matched other terminal is invalid, a remote control initiator can be automatically determined, the remote control protection initiated at the first terminal can be finished, and the condition that information is leaked can be effectively prevented.

Description

technical field [0001] The invention relates to the field of mobile terminals, in particular to an information protection method of a mobile terminal and the mobile terminal. Background technique [0002] A mobile terminal refers to an electronic terminal device with a mobile communication module. After being equipped with an identification card, it can be connected to the network. Leakage and other issues, which will bring huge losses to users. [0003] In order to prevent the stolen mobile terminal from causing greater losses, the mobile terminal will trigger the corresponding emergency process after it is automatically judged stolen. In this way, it is difficult to define the triggering conditions of the emergency process. Therefore, the existing In related technologies, remote control can also be used to trigger the emergency treatment process. [0004] The existing remote control method requires the user to match other terminals in advance. Once no other terminal is m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04M1/2746H04W4/14H04W8/22
CPCH04W4/14H04W8/22H04M1/2746H04M1/72421H04M1/72463
Inventor 朱峰结杨岚
Owner SHENZHEN TRANSSION COMM LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More