Mobile terminal using method and mobile terminal and mobile terminal system

A mobile terminal and terminal identification technology, applied in the field of communication, can solve problems such as inconvenient operation and uncontrollable security, and achieve the effects of protecting security, increasing trust, and preventing exposure

Inactive Publication Date: 2006-10-25
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention provides a method for using a mobile terminal, a mobile terminal and a mobile terminal system, which are used to solve the problems of uncontrollable security and inconvenient operation caused by users sharing mobile terminals in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal using method and mobile terminal and mobile terminal system
  • Mobile terminal using method and mobile terminal and mobile terminal system
  • Mobile terminal using method and mobile terminal and mobile terminal system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The specific implementation manners of the present invention will be described below in conjunction with the accompanying drawings.

[0091] First explain the concept of user mode. The user mode mainly means that the user can use the program normally after entering the mobile terminal, but the sensitive data such as the accessible phone book, short message, email, and document are bound to the user name. In order to facilitate the identification of each user, the mobile terminal needs to manage and process a user with multiple cards to ensure that each card can effectively activate the user account.

[0092] Option One:

[0093] Normally, whether it is a GSM system or a CDMA system, a mobile terminal user will get a user card (such as a SIM card in the GSM system or a UIM card in the CDMA system) when "connecting to the network", which can be inserted into any GSM-compliant specification or within the mobile terminal of the CDMA specification. The International Mobil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: setting up user list in user list; setting up coincidence relation between user and user's id in the said user list; when mobile user uses the mobile terminal, the method assigns use mode for the mobile terminal based on the said user list. Through validating user's id, the method controls user's access authority on mobile terminal for multiple users. The invention protects security of information in mobile terminal, protects users' privacy and secret from exposure, and increases trust in security of mobile terminal by users.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method for using a mobile terminal, a mobile terminal and a mobile terminal system. Background technique [0002] With the development of science and technology, the emergence of mobile terminals such as mobile phones has changed the communication lifestyle of modern people, and mobile terminals have increasingly become an indispensable part of people's (especially mobile business people) daily work and life. However, in real life, due to limited resources or some special circumstances (such as borrowing someone else's mobile phone if the mobile phone is out of battery), the same mobile terminal may be used by multiple users. [0003] Machine-card separation technology enables users to simply insert their own SIM / USIM card or UIM card into a shared mobile terminal. However, the single-machine multi-user has brought a threat to the privacy of mobile terminal users. For busine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M1/72448H04W12/06H04W12/30H04W88/02
Inventor 王正伟赵琴王晨曦
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products