Protection method for terminal, terminal and computer readable storage medium

A terminal and equipment technology, applied in the protection method of terminal, terminal and computer readable storage medium field, can solve the problem of reducing the possibility of legal user's recovery, etc.

Inactive Publication Date: 2018-10-19
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to avoid sending the information when using the device to another device bound to the device, the illegal user often unbinds the illegally obtained device from the device in the hands of the legitimate user, thus making the device lost by the legitimate user Easily controlled by illegitimate users, making it less likely for legitimate users to recover the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for terminal, terminal and computer readable storage medium
  • Protection method for terminal, terminal and computer readable storage medium
  • Protection method for terminal, terminal and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0071] At present, many manufacturers have launched their own smart wearable devices such as smart watches and smart bracelets. These smart devices can be bound to the user's mobile phone as an extension of the user's mobile phone functions. To provide convenience for users' normal communication under certain circumstances. Some users even use a mobile phone to bind multiple smart wearable devices. In some cases, if the mobile phone or smart wearable device is obtained by an illegal user, the illegal user will prevent the information generated by the terminal from being sent to the terminal bound to the terminal. On other terminals, generally choose to unbind the terminal and other terminals, so that the legitimate user loses control over the terminal, in order to avoid such unbinding as much as possible and provide help for the legitimate user to track and retrieve the lost terminal , this embodiment proposes a terminal protection method, such as image 3 As shown, the termi...

no. 2 example

[0122] Such as Figure 5 As shown, this embodiment proposes a terminal, which includes a processor 51, a memory 52, and a communication bus 53;

[0123] The communication bus 53 is used to realize connection and communication between the processor 51 and the memory 52;

[0124] The processor 51 is configured to execute one or more programs stored in the memory 52, so as to implement the steps of the terminal protection method proposed in Embodiment 1.

[0125] This embodiment also proposes a computer-readable storage medium, where one or more programs are stored in the computer-readable storage medium, and one or more programs can be executed by one or more processors, so as to realize the The steps of the terminal protection method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a protection method for a terminal, a terminal, and a computer readable storage medium. According to the protection method for the terminal, the terminal, and the computer readable storage medium of the invention, under a condition that a first device and at least one second device are bound to each other, if the first device of a valid user detects that a user initiates the unbinding of the first device from a certain second device, the first device of the valid user initiates an unbinding request to the second device; the first device receives the feedback information of the second device, and determines whether the current unbinding is valid according to the feedback information; if the current unbinding is valid, the first device unbinds the first deviceitself from the second device; if the current unbinding is invalid, it is confirmed that the current user is an invalid user, unbinding is rejected, and the first device obtains information related to the current invalid user through a preset acquisition mode and sends the information to a preset target tracking device, so that the target tracking device tracks a terminal lost by the valid user according to the information of the invalid user; and therefore, the possibility that the first device is retrieved can be improved, and the property loss of the valid user can be decreased as much aspossible.

Description

technical field [0001] The present invention relates to the technical field of terminals, and more specifically, to a terminal protection method, a terminal and a computer-readable storage medium. Background technique [0002] At present, with the development of science and technology, more and more terminals such as mobile phones have penetrated into the lives of users. Users hope that terminals can provide more and more convenient services, so more and more users choose to use multiple terminals together or purchase smart phones. Wearables are used with mobile phones. [0003] For the convenience of users, many smart wearable devices (such as smart watches) can be bound with the user's own mobile phone. After binding, the calls and messages received on the mobile phone can be synchronized to the smart wearable device, which greatly frees the user's hands and is especially suitable for some scenes where it is not convenient to use a large-screen mobile phone, such as sport...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/029H04W8/18H04W12/06H04W12/12H04W12/126H04W12/48
CPCH04W4/029H04W8/183H04W12/06H04W12/12
Inventor 魏桂雄
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products