Mobile terminal, key, privacy protection system and method

A privacy protection system and mobile terminal technology applied in the field of electronic products to achieve high security, large information capacity, and improved security

Inactive Publication Date: 2014-07-16
PHICOMM (SHANGHAI) CO LTD
7 Cites 3 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0011] In view of the above, it is necessary to propose a mobile terminal, key, privacy pro...
View more

Abstract

The invention provides a mobile terminal, a key, a privacy protection system and a method. The mobile terminal comprises a socket module, a scanning module, an identification module and a control module, wherein a key is inserted in the socket module, and the plug portion of the key is provided with a three-dimensional code; when the key is inserted in the socket module, the scanning module scans the three-dimensional code for acquiring scanning information; the identification module is coupled with the scanning module and is used for comparing the scanning information and prestored user information; the control module is coupled with the identification module; and when the scanning information is matched with the prestored user information, the control module sends an instruction to execute corresponding operation. According to the mobile terminal, the key, the privacy protection system and the method, as the information bore by the three-dimensional code on the key is compared with the prestored user information to control the mobile terminal to be started, a screen to be unlocked, an application program to be unlocked and other operation, security of user privacy protection can be improved.

Application Domain

Unauthorised/fraudulent call prevention

Technology Topic

User privacyPrivacy protection +3

Image

  • Mobile terminal, key, privacy protection system and method
  • Mobile terminal, key, privacy protection system and method
  • Mobile terminal, key, privacy protection system and method

Examples

  • Experimental program(1)

Example Embodiment

[0055] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings of the embodiments of the present invention. Obviously, the described embodiments It is only a part of the embodiments of the present invention, but not all the embodiments.
[0056] Regarding the “coupling” used in this article, it can refer to the direct connection of two modules (or units, elements), or the indirect connection of two modules (or units, elements), that is, the connection between the two modules (or units, elements) There are other modules (or units, components).
[0057] Reference figure 1 , figure 2 , figure 1 Shows a schematic diagram of a mobile terminal according to an embodiment of the present invention, figure 2 It shows a schematic diagram of a key module according to an embodiment of the present invention.
[0058] Combine below figure 1 , figure 2 The mobile terminal and key are described in detail.
[0059] Such as figure 1 As shown, the mobile terminal 100 includes a socket module 110, a scanning module 120, an identification module 130, and a control module 140.
[0060] Such as figure 2 As shown, the key 200 includes a plug portion 210, which has a three-dimensional code. The three-dimensional code carries user information. The user information can be, for example, the user’s name or the user ID number, such as an ID card number, a passport number, The military ID number, etc., can also be a user photo or password. Of course, it can also be a combination of user name, user ID number, user photo, and password, and is not limited to this.
[0061] In an embodiment, the structure of the key 200 may be such as image 3 As shown, image 3 A schematic diagram of the structure of an embodiment of the key 200 is shown, but it should be noted that the key 200 is not limited to this key structure, and can also be a card structure, as long as it is easy to carry and its plug 210 has a three-dimensional code, such as a A card-like structure. One end of the plug part has a three-dimensional code, and the other end is used to buckle into the keychain for easy carrying. In short, the “key” in this article does not specifically refer to keys, but generally refers to It is sufficient if it is convenient to carry and the plug part has a three-dimensional code.
[0062] The socket module 110 is used to insert the key 200. The socket module 110 matches the plug portion 210 of the key 200. That is, when the key 200 is inserted into the socket module 110, the plug portion 210 is just in the socket module 110.
[0063] The scanning module 120 may be arranged on the inner surface of the socket module 110, such as on the upper inner surface of the socket module 110. When the key 200 is inserted into the socket module 110, the scanning module 120 can scan the three-dimensional code on the key 200 to obtain Scan information.
[0064] The identification module 130 is coupled to the scanning module 120 to compare the scanned information with pre-stored user information. The pre-stored user information can be the information carried by the three-dimensional code on the key 200 when the user inserts the key 200 for the first time To record, save as pre-stored user information.
[0065] The control module 140 is coupled to the identification module 130. When the scanned information matches the pre-stored user information, the control module 140 issues instructions to perform corresponding operations, such as booting, screen unlocking, or application unlocking, but is not limited to this.
[0066] Such as figure 1 As shown, the identification module 130 includes a user information viewing unit 132, a mode setting unit 134, and a replacement unit 136.
[0067] The user information viewing unit 132 is used for viewing pre-stored user information.
[0068] The mode setting unit 134 is used to set the lock mode. The lock mode includes at least one of a boot mode, a lock screen mode, and an application lock mode. Accordingly, if the lock mode is set, it can be set to the boot mode, the lock screen mode or the application Lock mode.
[0069] The replacement unit 136 is used to replace the user or user information, such as the user name, user photo, etc.
[0070] Reference Figure 4 to Figure 7 , Figure 4 It shows a schematic diagram of the main interface after starting the recognition module 130; Figure 5 Draws a schematic diagram of the interface for viewing user information; Image 6 Draws a schematic diagram of the interface for setting the lock mode; Figure 7 It shows a schematic diagram of the interface for changing users.
[0071] Pass below Figure 4 to Figure 7 The identification module 130 will be described.
[0072] The identification module 130, which can be a software module, pops up when it is started Figure 4 The interface shown, such as Figure 4 As shown, there may be a button for viewing user information, a button for setting a lock mode, and a button for changing, but not limited to this.
[0073] Click the View User Information button, and it will pop up Figure 5 The interface shown, such as Figure 5 As shown, you can view related user information, such as ID number, password, and user photo.
[0074] Click the lock mode setting button to pop up Image 6 The interface shown, such as Image 6 As shown, it can be set to boot mode, lock screen mode or application lock mode. When set to boot mode, you need to insert the key 200 when booting to achieve boot; when set to lock screen mode, you need to unlock the screen Insert the key 200 to unlock the screen; when it is set to the application lock mode, such as setting to lock the Alipay application and Weibo application, you need to insert the key 200 to use the locked application; of course, you can also choose no lock Mode, at this time, there is no need to insert the key 200 to turn on, unlock the screen, unlock applications, etc., so that the mobile terminal 100 can be operated normally.
[0075] Click the replace button to pop up Figure 7 The interface shown, such as Figure 7 As shown, the user information can be replaced. For example, user A transfers the mobile terminal 100 to user B. At this time, the key 200 may need to be replaced, or user A himself has replaced the key 200. Accordingly, the user information needs to be replaced through the identification module. It corresponds to the information carried by the three-dimensional code of the new key 200. It should be added that the key 200 in this embodiment can be produced by the supplier of the mobile terminal 100, or produced by the supplier of the key 200. Of course, it can also be operated by a third-party merchant, such as China Mobile and China Telecom. For example, when the user needs to change the key 200, the user can go to the corresponding service point and provide relevant personal information to make it. For example, the user’s personal information can be made into a corresponding three-dimensional code through three-dimensional code technology. The process is already in the prior art, and for the sake of brevity, it will not be repeated here.
[0076] It should be noted that Figure 4 to Figure 7 The schematic diagrams of the interfaces are only schematic, and the schematic diagrams of the interfaces are not limited thereto.
[0077] It should also be noted that in the above-mentioned embodiment, the identification module 130 may be disabled. In this case, the key 200 does not need to be inserted and the mobile terminal 100 is operated normally.
[0078] In the above-mentioned embodiment, since the information carried by the three-dimensional code on the key 200 is compared with the pre-stored user information to control the operation of turning on the mobile terminal 100, unlocking the screen, and unlocking the application, the security of protecting the user's personal privacy can be improved , Especially when the mobile terminal 100 is lost or stolen, because others do not have the key 200, they may not be able to turn on, unlock the screen, or view some applications (such as Alipay, address book, SMS, online banking software, etc.).
[0079] Reference Picture 8 , Picture 8 It shows a schematic diagram of modules of a privacy protection system according to another embodiment of the present invention.
[0080] Such as Picture 8 As shown, the privacy protection system 800 includes a mobile terminal 810 and a key 820.
[0081] For the mobile terminal 810 and the key 820, they are the same as the mobile terminal 100 and the key 200 in the above-mentioned embodiment, respectively. For the sake of brevity, the details are not repeated here.
[0082] Refer again Picture 9 , Picture 9 It shows a flowchart of a privacy protection method according to another embodiment of the present invention.
[0083] In this embodiment, a privacy protection method for a mobile terminal is characterized in that it includes:
[0084] First, in step S910, it is detected whether the key is inserted, that is, whether the key is inserted into the mobile terminal, wherein the key has a plug part, the plug part has a three-dimensional code, and the three-dimensional code carries user information.
[0085] Then, in step S920, when the key is inserted, scan the three-dimensional code to obtain scan information.
[0086] After that, in step S930, the scanned information is compared with the preset user information.
[0087] Then, in step S940, when the scan information matches the preset information, the corresponding operation here is performed, for example, it may be power on, screen unlock, or application unlock.
[0088] In this embodiment, it is necessary to configure pre-stored user information in the mobile terminal before performing step S910. Specifically, when the key is inserted for the first time, the mobile terminal scans the three-dimensional code of the plug of the key to obtain the first scan information. After that, save the first scan information as the pre-stored user information to complete the configuration of the pre-stored user information. Of course, the configuration method is not limited to this, for example, the user can directly go to the corresponding service point for related configuration.
[0089] In the foregoing embodiments, the mobile terminal may be various portable terminals such as mobile phones, tablet computers, and PDAs.
[0090] In summary, the mobile terminal, key, privacy protection system and method proposed by the present invention, because the plug of the key has a three-dimensional code, it not only has the inherent portability of the key, but also has the advantages of three-dimensional code, such as large information capacity. , High security, and because the key with a three-dimensional code is used, the scanned information can be obtained by scanning the three-dimensional code on the key, that is, the information carried by the three-dimensional code, and the scanned information is compared with the pre-stored user information. When the user information matches, operations such as turning on the mobile terminal, unlocking the screen, and unlocking the application are performed, which can improve the security of protecting the user’s personal privacy. Especially when the mobile terminal is lost or stolen, others may not have the key. Unable to turn on, unlock the screen, or view some applications (such as Alipay, address book, SMS, online banking software, etc.).
[0091] The above only expresses several embodiments of the present invention, and the description is relatively specific and detailed, but it should not be understood as a limitation to the patent scope of the present invention. It should be pointed out that for those of ordinary skill in the art, without departing from the concept of the present invention, several modifications and improvements can be made, and these all fall within the protection scope of the present invention. Therefore, the protection scope of the patent of the present invention should be subject to the appended claims.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

A medical history device

InactiveCN105997406ALarge information capacity
Owner:THE THIRD AFFILIATED HOSPITAL OF THIRD MILITARY MEDICAL UNIV OF PLA

Electronic group-buying coupon and usage and system of electronic group-buying coupon

InactiveCN102509141ALarge information capacityreduce operating costs
Owner:GUANGDONG UNIVERSITY OF BUSINESS STUDIES +1

Malicious website prompt method and router

ActiveCN104125209Aimprove security
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Credible virtual machine platform

InactiveCN101957900AImprove stability and attack resistanceimprove security
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Intelligent door lock identity authentication method and system, readable storage medium and mobile terminal

ActiveCN109712278APrevent Identity Leakageimprove security
Owner:深圳市小石安防科技有限公司

Method for identifying and verifying truth of goods using digital array

InactiveCN1684099Aimprove securityLarge information capacity
Owner:东方惠科防伪技术有限公司

Classification and recommendation of technical efficacy words

  • improve security
  • Large information capacity

Electronic group-buying coupon and usage and system of electronic group-buying coupon

InactiveCN102509141ALarge information capacityreduce operating costs
Owner:GUANGDONG UNIVERSITY OF BUSINESS STUDIES +1

Method for identifying and verifying truth of goods using digital array

InactiveCN1684099Aimprove securityLarge information capacity
Owner:东方惠科防伪技术有限公司

A medical history device

InactiveCN105997406ALarge information capacity
Owner:THE THIRD AFFILIATED HOSPITAL OF THIRD MILITARY MEDICAL UNIV OF PLA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products