Method for providing device and data security service for wireless mobile terminal users
A mobile terminal and data security technology, applied in radio/inductive link selection arrangement, data exchange network, user identity/authority verification, etc., can solve problems such as mobile phone theft, high price, casualties, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0009] The method for providing equipment and data security services for wireless mobile terminals in the present invention includes the following steps:
[0010] Establish a network server, the database in the server records the unique identification code of the mobile terminal and the user identification code bound to the terminal, as well as other communication methods and ID number of the user, login website information and operation password of the control terminal, etc., a terminal A device can only be bound to one user ID, but a user can be bound to multiple mobile devices.
[0011] A control program will be embedded in the terminal operating system. Its function is to read the device identification code and personal identification code of the current terminal after the terminal is turned on and send it to the preset network server for identity verification. After the server returns the verification success message , the control program allows the terminal device to con...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com