Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting user terminal and user terminal

A user terminal, user technology, applied in the direction of telephone communication, electrical components, branch equipment, etc., can solve the problem of mobile phone anti-theft function failure and other problems

Inactive Publication Date: 2013-02-27
XIAOMI INC
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the above-mentioned mobile phone anti-theft scheme, after the mobile phone is stolen, if the anti-theft software is deleted from the mobile phone before the anti-theft processing operation is triggered, or the mobile phone is restored to factory settings, or the mobile phone is re-flashed, the mobile phone can be locked. The anti-theft feature of the phone is removed, causing the phone's anti-theft feature to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting user terminal and user terminal
  • Method for detecting user terminal and user terminal
  • Method for detecting user terminal and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] In the method for determining whether a user terminal has been stolen provided in an embodiment of the present invention, anti-theft information may be preset, and the anti-theft information may include information for determining whether the user terminal has been stolen, and after determining that the user terminal has been stolen, perform anti-theft processing operations information on which it is based.

[0034] figure 2 Shown is the flow chart of setting anti-theft information for the first time provided by Embodiment 1 of the present invention, which specifically includes the following processing steps:

[0035] Step 201, after the user terminal is turned on, detect whether a subscriber identification card is inserted, if no subscriber identification card is inserted, go to step 202, if a subscriber identification card is inserted, go to step 203.

[0036] Step 202, prompting the user to insert a user identification card.

[0037] Step 203 , detecting whether t...

Embodiment 2

[0065] After the anti-theft information is preset, the anti-theft function can be activated to determine whether the user terminal is stolen, and after determining that the user terminal is stolen, trigger corresponding anti-theft processing operations.

[0066] Figure 4 Shown is the method for determining whether the user terminal is stolen provided by Embodiment 2 of the present invention, which specifically includes the following processing steps:

[0067] Step 401. When the preset trigger condition is satisfied, check whether the information of the subscriber identification card currently inserted in the user terminal is consistent with the preset information of the first designated subscriber identification card stored in the non-volatile partition of the user terminal, and if they are consistent , go to step 402, if not, go to step 403.

[0068] Wherein, the execution trigger condition can be flexibly set according to actual needs, for example, it can be triggered ever...

Embodiment 3

[0084] Based on the same inventive concept, according to the method for determining whether the user terminal is stolen according to the above-mentioned embodiments of the present invention, correspondingly, Embodiment 3 of the present invention also provides a user terminal, the structural diagram of which is as follows Figure 5 shown, including:

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for detecting a user terminal and the user terminal. The method comprises the following steps of: detecting whether information on a subscriber identity module card currently inserted in the user terminal is consistent with information on a previously arranged first specified subscriber identity module card stored in a non-volatile partition of the user terminal; when detecting that the information on the currently inserted subscriber identity module card is inconsistent with the information on the first specified subscriber identity module card, determining that the user terminal is stolen; and when detecting that the information on the currently inserted subscriber identity module card is consistent with the information on the first specified subscriber identity module card, determining that the user terminal is not stolen. By using the scheme provided by the embodiment of the invention, after the user terminal is stolen, invalidation of an anti-theft function of the user terminal cannot be realized by deleting the information.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a method for detecting a user terminal and the user terminal. Background technique [0002] With the continuous increase of mobile phone functions, in addition to communication functions, mobile phones also have the functions of other electronic devices such as PDAs (Personal Digital Assistant, PDA), digital cameras, etc. Mobile phones have been widely used as user terminals in real life. . [0003] As a mobile terminal at the same time, the mobile phone is easily lost or stolen due to its portability. Therefore, a technology to prevent mobile phone theft has emerged. A remedial technology that is triggered later, for example, can be the technology of recovering the mobile phone, or the technology of recovering the data on the mobile phone. It may also be a technology to lock the function of the mobile phone, etc. [0004] The current mobile phone anti-theft technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04M1/72454H04M1/72463
Inventor 张国全王娜陶钧
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products