首页>
外国专利>
A method for protecting mobile telecommunication devices and mobile computing devices from unauthorized removal With BLUETOOTH technology
A method for protecting mobile telecommunication devices and mobile computing devices from unauthorized removal With BLUETOOTH technology
展开▼
机译:一种利用蓝牙技术保护移动电信设备和移动计算设备免于未经授权移除的方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
method of protecting mobile telecommunications devices and mobile computer devices from unauthorized u043fu0435u0440u0435u043cu0435u0449u0435u043du0438u00a0 using technology Blueto based on the fact of unauthorized u043fu0435u0440u0435u043cu0435u0449u0435u043du0438u00a0 oth alarm system using u043eu0431u043du0430u0440u0443u0436u0435u043du0438u00a0 active u0438u0437u043bu0443u0447u0435u043du0438u00a0, u043eu0442u043bu0438u0447u0430u044eu0449u0438u0439u0441u00a0 what use the standard module, bluetooth, u043du0430u0445u043eu0434u00a0u0449u0438u0439u0441u00a0 zone u0434u043eu0441u00a0u0433u0430u0435u043cu043eu0441u0442u0438 u043cu043eu0434u0443u043bu00a0 bluetoothembedded in the mobile telecommunications device (mobile computing device) and the software of the device u0432u043du043eu0441u00a0u0442 u043fu0440u043eu0433u0440u0430u043cu043cu043d pod u043eu0431u0435u0441u043fu0435u0447u0435u043du0438u00a0 protection from unauthorized u043fu0435u0440u0435u043cu0435u0449u0435u043du0438u00a0.
展开▼