[0055] In order to enable those skilled in the art to better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be described clearly and completely in conjunction with the accompanying drawings of the embodiments of the present invention. Obviously, the described embodiments It is only a part of the embodiments of the present invention, but not all the embodiments.
[0056] Regarding the “coupling” used in this article, it can refer to the direct connection of two modules (or units, elements), or the indirect connection of two modules (or units, elements), that is, the connection between the two modules (or units, elements) There are other modules (or units, components).
[0057] Reference figure 1 , figure 2 , figure 1 Shows a schematic diagram of a mobile terminal according to an embodiment of the present invention, figure 2 It shows a schematic diagram of a key module according to an embodiment of the present invention.
[0058] Combine below figure 1 , figure 2 The mobile terminal and key are described in detail.
[0059] Such as figure 1 As shown, the mobile terminal 100 includes a socket module 110, a scanning module 120, an identification module 130, and a control module 140.
[0060] Such as figure 2 As shown, the key 200 includes a plug portion 210, which has a three-dimensional code. The three-dimensional code carries user information. The user information can be, for example, the user’s name or the user ID number, such as an ID card number, a passport number, The military ID number, etc., can also be a user photo or password. Of course, it can also be a combination of user name, user ID number, user photo, and password, and is not limited to this.
[0061] In an embodiment, the structure of the key 200 may be such as image 3 As shown, image 3 A schematic diagram of the structure of an embodiment of the key 200 is shown, but it should be noted that the key 200 is not limited to this key structure, and can also be a card structure, as long as it is easy to carry and its plug 210 has a three-dimensional code, such as a A card-like structure. One end of the plug part has a three-dimensional code, and the other end is used to buckle into the keychain for easy carrying. In short, the “key” in this article does not specifically refer to keys, but generally refers to It is sufficient if it is convenient to carry and the plug part has a three-dimensional code.
[0062] The socket module 110 is used to insert the key 200. The socket module 110 matches the plug portion 210 of the key 200. That is, when the key 200 is inserted into the socket module 110, the plug portion 210 is just in the socket module 110.
[0063] The scanning module 120 may be arranged on the inner surface of the socket module 110, such as on the upper inner surface of the socket module 110. When the key 200 is inserted into the socket module 110, the scanning module 120 can scan the three-dimensional code on the key 200 to obtain Scan information.
[0064] The identification module 130 is coupled to the scanning module 120 to compare the scanned information with pre-stored user information. The pre-stored user information can be the information carried by the three-dimensional code on the key 200 when the user inserts the key 200 for the first time To record, save as pre-stored user information.
[0065] The control module 140 is coupled to the identification module 130. When the scanned information matches the pre-stored user information, the control module 140 issues instructions to perform corresponding operations, such as booting, screen unlocking, or application unlocking, but is not limited to this.
[0066] Such as figure 1 As shown, the identification module 130 includes a user information viewing unit 132, a mode setting unit 134, and a replacement unit 136.
[0067] The user information viewing unit 132 is used for viewing pre-stored user information.
[0068] The mode setting unit 134 is used to set the lock mode. The lock mode includes at least one of a boot mode, a lock screen mode, and an application lock mode. Accordingly, if the lock mode is set, it can be set to the boot mode, the lock screen mode or the application Lock mode.
[0069] The replacement unit 136 is used to replace the user or user information, such as the user name, user photo, etc.
[0070] Reference Figure 4 to Figure 7 , Figure 4 It shows a schematic diagram of the main interface after starting the recognition module 130; Figure 5 Draws a schematic diagram of the interface for viewing user information; Image 6 Draws a schematic diagram of the interface for setting the lock mode; Figure 7 It shows a schematic diagram of the interface for changing users.
[0071] Pass below Figure 4 to Figure 7 The identification module 130 will be described.
[0072] The identification module 130, which can be a software module, pops up when it is started Figure 4 The interface shown, such as Figure 4 As shown, there may be a button for viewing user information, a button for setting a lock mode, and a button for changing, but not limited to this.
[0073] Click the View User Information button, and it will pop up Figure 5 The interface shown, such as Figure 5 As shown, you can view related user information, such as ID number, password, and user photo.
[0074] Click the lock mode setting button to pop up Image 6 The interface shown, such as Image 6 As shown, it can be set to boot mode, lock screen mode or application lock mode. When set to boot mode, you need to insert the key 200 when booting to achieve boot; when set to lock screen mode, you need to unlock the screen Insert the key 200 to unlock the screen; when it is set to the application lock mode, such as setting to lock the Alipay application and Weibo application, you need to insert the key 200 to use the locked application; of course, you can also choose no lock Mode, at this time, there is no need to insert the key 200 to turn on, unlock the screen, unlock applications, etc., so that the mobile terminal 100 can be operated normally.
[0075] Click the replace button to pop up Figure 7 The interface shown, such as Figure 7 As shown, the user information can be replaced. For example, user A transfers the mobile terminal 100 to user B. At this time, the key 200 may need to be replaced, or user A himself has replaced the key 200. Accordingly, the user information needs to be replaced through the identification module. It corresponds to the information carried by the three-dimensional code of the new key 200. It should be added that the key 200 in this embodiment can be produced by the supplier of the mobile terminal 100, or produced by the supplier of the key 200. Of course, it can also be operated by a third-party merchant, such as China Mobile and China Telecom. For example, when the user needs to change the key 200, the user can go to the corresponding service point and provide relevant personal information to make it. For example, the user’s personal information can be made into a corresponding three-dimensional code through three-dimensional code technology. The process is already in the prior art, and for the sake of brevity, it will not be repeated here.
[0076] It should be noted that Figure 4 to Figure 7 The schematic diagrams of the interfaces are only schematic, and the schematic diagrams of the interfaces are not limited thereto.
[0077] It should also be noted that in the above-mentioned embodiment, the identification module 130 may be disabled. In this case, the key 200 does not need to be inserted and the mobile terminal 100 is operated normally.
[0078] In the above-mentioned embodiment, since the information carried by the three-dimensional code on the key 200 is compared with the pre-stored user information to control the operation of turning on the mobile terminal 100, unlocking the screen, and unlocking the application, the security of protecting the user's personal privacy can be improved , Especially when the mobile terminal 100 is lost or stolen, because others do not have the key 200, they may not be able to turn on, unlock the screen, or view some applications (such as Alipay, address book, SMS, online banking software, etc.).
[0079] Reference Picture 8 , Picture 8 It shows a schematic diagram of modules of a privacy protection system according to another embodiment of the present invention.
[0080] Such as Picture 8 As shown, the privacy protection system 800 includes a mobile terminal 810 and a key 820.
[0081] For the mobile terminal 810 and the key 820, they are the same as the mobile terminal 100 and the key 200 in the above-mentioned embodiment, respectively. For the sake of brevity, the details are not repeated here.
[0082] Refer again Picture 9 , Picture 9 It shows a flowchart of a privacy protection method according to another embodiment of the present invention.
[0083] In this embodiment, a privacy protection method for a mobile terminal is characterized in that it includes:
[0084] First, in step S910, it is detected whether the key is inserted, that is, whether the key is inserted into the mobile terminal, wherein the key has a plug part, the plug part has a three-dimensional code, and the three-dimensional code carries user information.
[0085] Then, in step S920, when the key is inserted, scan the three-dimensional code to obtain scan information.
[0086] After that, in step S930, the scanned information is compared with the preset user information.
[0087] Then, in step S940, when the scan information matches the preset information, the corresponding operation here is performed, for example, it may be power on, screen unlock, or application unlock.
[0088] In this embodiment, it is necessary to configure pre-stored user information in the mobile terminal before performing step S910. Specifically, when the key is inserted for the first time, the mobile terminal scans the three-dimensional code of the plug of the key to obtain the first scan information. After that, save the first scan information as the pre-stored user information to complete the configuration of the pre-stored user information. Of course, the configuration method is not limited to this, for example, the user can directly go to the corresponding service point for related configuration.
[0089] In the foregoing embodiments, the mobile terminal may be various portable terminals such as mobile phones, tablet computers, and PDAs.
[0090] In summary, the mobile terminal, key, privacy protection system and method proposed by the present invention, because the plug of the key has a three-dimensional code, it not only has the inherent portability of the key, but also has the advantages of three-dimensional code, such as large information capacity. , High security, and because the key with a three-dimensional code is used, the scanned information can be obtained by scanning the three-dimensional code on the key, that is, the information carried by the three-dimensional code, and the scanned information is compared with the pre-stored user information. When the user information matches, operations such as turning on the mobile terminal, unlocking the screen, and unlocking the application are performed, which can improve the security of protecting the user’s personal privacy. Especially when the mobile terminal is lost or stolen, others may not have the key. Unable to turn on, unlock the screen, or view some applications (such as Alipay, address book, SMS, online banking software, etc.).
[0091] The above only expresses several embodiments of the present invention, and the description is relatively specific and detailed, but it should not be understood as a limitation to the patent scope of the present invention. It should be pointed out that for those of ordinary skill in the art, without departing from the concept of the present invention, several modifications and improvements can be made, and these all fall within the protection scope of the present invention. Therefore, the protection scope of the patent of the present invention should be subject to the appended claims.