Method for realizing mobile terminal data protection
A mobile terminal and data protection technology, which is applied in the direction of security devices, electrical components, radio/inductive link selection arrangements, etc., to achieve the effects of convenient and flexible unlocking, avoiding leakage, and avoiding embezzlement
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0106] Example 1:
[0107] This embodiment provides a method for realizing data protection of a mobile terminal when the SIM card is replaced. Specifically, when mobile terminal A with the original SIM card number 1234567890 is lost, user B finds it and exchanges his SIM card into mobile terminal A to continue using it. The SIM card number that is replaced is 0123456789. The flowchart of the method for realizing data protection of the mobile terminal in this embodiment is as follows: Figure 6 As shown, it includes the following steps:
[0108] Step 101: When the mobile terminal A starts for the first time, the network-side server receives and automatically reports the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 1234567890, which are automatically reported by the mobile terminal, as the IMEI information and the corresponding SIM card information;
[0109] Step 102: The network-side server receives the IMEI information XXXXXXYYZZZZZZB and the corresp...
Example Embodiment
[0124] Example 2:
[0125] Such as Figure 7 As shown, this embodiment provides a flowchart of a method for realizing data protection of a mobile terminal when the information provided in the loss report is the original SIM card information under the same conditions as in Embodiment 1, including the following steps:
[0126] Step 201: When the mobile terminal A starts for the first time, the network-side server receives and automatically reports the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 1234567890, which are automatically reported by the mobile terminal, as the IMEI information and the corresponding SIM card information, and saves the received information Time information
[0127] Step 202: The network-side server receives the IMEI information XXXXXXYYZZZZZZB and the corresponding SIM card information 0123456789 automatically reported when the mobile terminal A detects that the SIM card changes, as the current IMEI information of the mobile te...
Example Embodiment
[0141] Example 3:
[0142] Such as Figure 8 As shown, this embodiment provides on the basis of Embodiment 1 or 2, preventing the SIM card that is lost or stolen along with the terminal from being replaced in the mobile terminal B for continued use, including the following steps:
[0143] Step 301 to step 305 are the same as step 101 to step 105;
[0144] Step 306: The network-side server verifies that the current SIM card 0123456789 is different from the original SIM card information 1234567890 before the lost time;
[0145] Step 307: The network-side server verifies whether the SIM card with the number 0123456789 and / or the SIM card with the number 1234567890 is in use, if yes, go to step 310, otherwise go to step 308;
[0146] Step 308: The network side server identification number is 0123456789 and / or the SIM card information with the number 1234567890;
[0147] Step 309: The network-side server detects whether the SIM card with the number 0123456789 and / or the number 12345678...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap