CN207198852U - Managing device and terminal - Google Patents

Managing device and terminal Download PDF

Info

Publication number
CN207198852U
CN207198852U CN201720770257.4U CN201720770257U CN207198852U CN 207198852 U CN207198852 U CN 207198852U CN 201720770257 U CN201720770257 U CN 201720770257U CN 207198852 U CN207198852 U CN 207198852U
Authority
CN
China
Prior art keywords
circuit
terminal
control
managing device
terminal user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201720770257.4U
Other languages
Chinese (zh)
Inventor
付开涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN201720770257.4U priority Critical patent/CN207198852U/en
Application granted granted Critical
Publication of CN207198852U publication Critical patent/CN207198852U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model provides managing device and terminal, including terminal monitoring module, authentication module and control module;The terminal monitoring module is used to judge whether the application selected by terminal user opens privacy mode;Whether the authentication module is used to judge the terminal user by the verification mode;The control module is used to control the terminal to show access into privacy mode corresponding to the application or guard pattern.The utility model for single application by being configured privacy mode, when making terminal user's opening application, it need to be verified accordingly, the privacy mode of corresponding application only can be just carried out by verifying, it is if not verified, then system can intercept the startup of the application and carry out preservation of taking pictures to the currently used person of terminal, so that Terminal owner checks.

Description

Managing device and terminal
Technical field
Communication technique field is the utility model is related to, more particularly to a kind of managing device and terminal.
Background technology
With the development of science and technology, the arrival of cybertimes, the development of smart mobile phone, at this stage in some indivedual applications As QQ have start before carry out authentication function, but this be all third party progress safety measure.And for example, Samsung has photograph album Privacy mode, i.e. hiding picture can be needed to be arranged to privacy mode oneself, so other people just cannot easily access Arrive, but, this privacy mode still can be viewed by file manager.
For the monitoring of concrete application, also it is not carried out from the system platform stage, either computer or mobile device be all Simply there is the lock function of an entirety, as long as after main interface unblock, all applications of whole mobile device can all expose, and Checked by other people.This is that many users are reluctant to run into, and many terminal users pain spot in use.It is so how real The privacy management of existing single application, is current problem.
Utility model content
The purpose of this utility model is, there is provided a kind of managing device and terminal, it can be locked for single application Fixed checking, only it can just enter corresponding privacy mode by verifying.
The utility model provides a kind of managing device, including terminal monitoring module, authentication module and control module;The end End monitoring modular is used to judge whether the application selected by terminal user opens privacy mode;The authentication module is used for according to institute Terminal user is stated whether by the verification mode;The control module is used to control the terminal to show access into the application pair The privacy mode or guard pattern answered.
In another preference of utility model, the authentication module includes:Screen unit, for obtaining terminal user Input code characters information;First matching unit, for the code characters information for inputting the terminal user and preset Character information matched;Fingerprint Identification Unit, for obtaining the finger print information of terminal user;Second matching unit, for inciting somebody to action The finger print information of terminal user's input is matched with default finger print information.
In another preference of utility model, the control module includes:Front camera, for obtaining the end The image information of end subscriber;Memory, for storing the image information of terminal user.
In another preference of utility model, the control module includes control circuit, and the control circuit includes First control sub-circuit, the second control sub-circuit, protection circuit;The first control sub-circuit is used for the first electricity for receiving input Signal is pressed, and the second voltage signal after processing is inputted to the described second control sub-circuit, the second control sub-circuit and used Handled in the second voltage signal, and the tertiary voltage signal after processing is inputted to the protection circuit;Institute State protection circuit to be used for when the magnitude of voltage for detecting the tertiary voltage signal is more than or equal to predetermined threshold value, control battery breaks Open.
In another preference of utility model, partial pressure sub-circuit, the partial pressure sub-circuit and the described first control are sub One end connection of circuit, for receiving the predeterminated voltage signal of input, and the first voltage signal after voltage division processing is defeated Enter to the described first control sub-circuit.
In another preference of utility model, the first control sub-circuit includes the first FET and the first electricity Resistance;The grid of first FET is connected with the partial pressure sub-circuit, the drain electrode of first FET respectively with institute The first end for stating first resistor connects with the described second control sub-circuit, and the second end of the first resistor and the battery are just Pole connects.
In another preference of utility model, the second control sub-circuit includes the second FET and the second electricity Resistance;The grid of second FET is connected with first FET, the drain electrode of second FET with it is described Protection circuit is connected, and the source electrode of second FET is connected with the first end of the second resistance, the second resistance Second end is connected with the positive pole of the battery.
In another preference of utility model, the partial pressure sub-circuit includes 3rd resistor and the 4th resistance, described The first end of 3rd resistor is connected with the 4th resistance and the first control sub-circuit.
In another preference of utility model, the protection circuit includes protection IC and switch;The protection IC's One end is connected with the drain electrode of the described second control sub-circuit, and the other end of the protection IC is connected with one end of the switch;Institute The other end for stating switch is connected with the negative pole of the battery, and the protection IC is used for when the electricity for detecting the tertiary voltage signal When pressure value is more than or equal to predetermined threshold value, by controlling the switch to control the battery to disconnect.
The utility model provides a kind of terminal again, and the terminal includes the as above managing device described in any one.
Managing device and terminal of the present utility model by way of being configured privacy mode for single concrete application, So that terminal user when opening the application, it is necessary to verified accordingly, only by verify can just carry out it is corresponding should Privacy mode, if not verified, system can intercept the startup of the application and the currently used person of terminal is taken pictures Preserve, so that Terminal owner checks.
Described above is only the general introduction of technical solutions of the utility model, in order to better understand skill of the present utility model Art means, and being practiced according to the content of specification, and in order to allow above and other purpose of the present utility model, feature It can be become apparent with advantage, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, described in detail as follows.
Brief description of the drawings
Fig. 1 is the utility model control module circuit diagram.
Fig. 2 is the schematic flow sheet for the management method that the utility model first embodiment provides.
Fig. 3 is the schematic flow sheet for the management method that the utility model second embodiment provides.
Fig. 4 is the schematic flow sheet for the management method that the utility model 3rd embodiment provides.
Fig. 5 is the schematic flow sheet for the management method that the utility model fourth embodiment provides.
Fig. 6 is the structural representation for the management method that the embodiment of the utility model the 5th provides.
Fig. 7 is the structural representation for the managing device that the utility model sixth embodiment provides.
Fig. 8 is the structural representation for the managing device that the embodiment of the utility model the 7th provides.
Fig. 9 is the structural representation for the managing device that the embodiment of the utility model the 8th provides.
Figure 10 is the structural representation for the terminal that the embodiment of the utility model the 9th provides.
Embodiment
Further to illustrate that the utility model is to reach the technological means and effect that predetermined purpose of utility model taken, Below in conjunction with accompanying drawing and preferred embodiment, to according to the utility model proposes managing device and terminal its embodiment, Method, step, structure, feature and its effect, describe in detail as follows.
Relevant of the present utility model foregoing and other technology contents, feature and effect, it is following coordinate with reference to schema compared with It can be clearly appeared from the detailed description of good embodiment.By the explanation of embodiment, when can be to the utility model up to The technological means and effect taken into predetermined purpose are able to more go deep into and specific understanding, but institute's accompanying drawings are only to provide With reference to purposes of discussion, not be used for the utility model is any limitation as.
Managing device of the present utility model can be, but not limited to be applied to terminal, can also be applied to wearable device etc. Deng.Terminal includes memory, storage control, one or more processors, Peripheral Interface, radio-frequency module, locating module, shooting Module, audio-frequency module, screen and key-press module.These components are mutually communicated by one or more communication bus/signal wire.
Memory can be used for storage software program and module, as corresponding to the managing device in the utility model embodiment Programmed instruction/module, processor is stored in software program and module in storage control by operation, various so as to perform Application of function and data processing, that is, realize above-mentioned management method and device.
Memory may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Storage device, flash memory or other non-volatile solid state memories.In some instances, memory can further comprise relatively In the remotely located memory of processor, these remote memories can pass through network connection to terminal.The example of above-mentioned network Including but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor and other are possible Access of the component to memory can be carried out under the control of storage control.
Various input/output devices are coupled to CPU and memory by Peripheral Interface.It is each in processor run memory Kind software, instruct to perform the various functions of terminal and carry out data processing.
In certain embodiments, Peripheral Interface, processor and storage control can be realized in one single chip.At it In his some examples, they can be realized by independent chip respectively.
Radio-frequency module is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so as to leading to News network or other equipment are communicated.Radio-frequency module may include the various existing circuit elements for being used to perform these functions Part, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, storage Device etc..Radio-frequency module can be communicated or be passed through wireless network with various networks such as internet, intranet, wireless network Network is communicated with other equipment.Above-mentioned wireless network may include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).On The wireless network stated can use various communication standards, agreement and technology, including but not limited to global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code division multiple Access, W-CDMA), CDMA (Code division access, CDMA), TDMA (time Division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity, WiFi) is (such as U.S. State Institute of Electrical and Electric Engineers standard IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, IMU The agreement of news and short message, and any other suitable communications protocol, or even may include that those are not developed currently yet Agreement.
Locating module is used for the current location for obtaining terminal.The example of locating module includes but is not limited to global positioning satellite System (GPS), the location technology based on WLAN or mobile radio communication.
Photographing module is used to shoot photo or video.The photo or video of shooting can be stored to memory, and It can be sent by radio-frequency module.
Audio-frequency module provides a user COBBAIF, and it may include one or more microphones, one or more raises one's voice Device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface, and voice data is converted into power information, by telecommunications Breath is transmitted to loudspeaker.Loudspeaker is converted to power information the sound wave that human ear can hear.Voicefrequency circuit receives also at microphone Power information, converts electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface to be further processed. Voice data can obtain at memory or by radio-frequency module.In addition, voice data can also be stored into memory Or it is transmitted by radio-frequency module.In some instances, audio-frequency module may also include an earphone and broadcast hole, for earphone Or other equipment provides COBBAIF.
Screen provides an output interface between terminal and user.Specifically, screen shows video frequency output to user, this The content of a little video frequency outputs may include word, figure, video and its any combination.Some output results correspond to some use Family interface object.It should be understood that screen can also include Touch Screen.Touch Screen provides simultaneously between terminal and user One output and inputting interface.Except showing video frequency output to user, Touch Screen also receives the input of user, such as user The gesture operations such as click, slip, so that input of the user interface object to these users responds.Detect the skill of user's input Art can be based on resistance-type, condenser type or other any possible touch control detection technologies.The tool of Touch Screen display unit Body example includes but is not limited to liquid crystal display or light emitting polymer displays.
Key-press module equally provides the interface that user is inputted to terminal, user can by press different buttons with Terminal is set to perform different functions.
Fig. 2 is the schematic flow sheet for the management method that the utility model first embodiment provides.As shown in Fig. 2 manager Method comprises the following steps:
Step S11:Judge whether the application selected by terminal user opens privacy mode;
If the application has been switched on privacy mode, into step S12:Judge the terminal user whether by described Verification mode;
If the terminal user is by checking, into step S13:The terminal is controlled to show access into the application corresponding Privacy mode;
If the terminal user is not verified, into step S14:The terminal is controlled to show access into the application pair The guard pattern answered.
Wherein it is possible to but other verification modes for being not limited to be pre-set according to terminal user verified, for example, can be with For a variety of verification methods such as voice print verification, iris verification, recognition of face checking or wearable device checking, certain this area skill Art personnel understand or verified by the combined authentication mode of above various ways.
Wherein, the pin mode can be the mode of numerical ciphers or graphical passwords, and user is set in advance by input Fixed numerical ciphers, or graphical passwords set in advance are drawn to carry out verifying unblock and enter privacy mode.
It is by Fingerprint Identification Unit know the fingerprint of user if the verification mode is the fingerprint authentication mode It and Yan Zheng not enter privacy mode.
It is that the acoustic information of user is verified simultaneously by microphone if the verification mode is the voice print verification Into privacy mode.
It is that the iris of user is scanned by front camera if the verification mode is the iris verification And verify into privacy mode, the recognition of face checking is also that the face of user is shot simultaneously by front camera Checking matching is carried out, subsequently enters privacy mode.
If the verification mode is verified for the wearable device, specifically include and wearable device and terminal are subjected to indigo plant Tooth connects, and then by carrying out matching checking automatically close to terminal, matching, which is proved to be successful, then enters privacy mode.
Fig. 3 is the schematic flow sheet for the management method that the utility model second embodiment provides.Manager as shown in Figure 3 Judge whether the terminal user is included by the step of verification mode in method:
Step S21:Obtain the verification mode for the privacy mode that the terminal user pre-sets;
Step S22:The verification mode for judging privacy mode is pin mode or fingerprint mode;
Step S23:If the verification mode pre-set is pin mode, input proper password is prompted to enter privacy mould Formula;
Step S24:If the verification mode pre-set is fingerprint mode, checking finger print information is prompted.
Specifically, verification mode as described above can have varied, but final terminal can find the terminal user The verification mode that pre-sets simultaneously is verified by screen prompt user.
Further, 3 kinds of checkings can be pre-set for the ease of end users operation and raising security, terminal user Mode, the terminal give tacit consent to three kinds of level of securitys, and when level of security is low, the terminal user is only needed in 3 kinds of verification modes Privacy mode can be entered by completing a kind of checking.If level of security is middle, the terminal user is needed in 3 kinds of verification modes Optional two kinds of verification modes are verified, privacy mode of being allowed for access.If level of security is high, the terminal user is working as And if only if 3 kinds of verification modes are all by can just enter privacy mode.
Fig. 4 is the schematic flow sheet for the management method that the utility model 3rd embodiment provides.As shown in figure 4, manager If the verification mode pre-set in method is pin mode, prompt to input the step of proper password enters privacy mode, bag Include following steps:
Step S31:Obtain the code characters information of terminal user's input;
Step S32:Judge whether code characters information and the default character information of the input are consistent;
Step S33:If the code characters information of the input is consistent with default character information, the terminal is controlled to enter Enter privacy mode;
Step S34:If the code characters information of the input and default character information are inconsistent, the terminal is controlled Into the pattern of guard.
Specifically, the code characters are not limited to text information, can also be graphic character information, and the length of code characters Degree is preferably more than four characters, and in order to improve security, the code characters can include capital and small letter or numeral, and can not It is consistent with the identity information or cell-phone number of terminal user.
Further, in a preference of the present utility model, terminal user can pre-set a prompt message, For oneself can be prompted when forgeing code characters information, it is easy to quickly remember correct code characters information.
Fig. 5 is the schematic flow sheet for the management method that the utility model fourth embodiment provides.As shown in figure 5, manager If the verification mode pre-set in method is fingerprint mode, the step of prompting to verify finger print information, comprise the following steps:
Step S41:Obtain the finger print information of the terminal user;
Step S42:Judge whether finger print information and the default finger print information of the terminal user are consistent;
Step S43:If the finger print information of the terminal user is consistent with default finger print information, the terminal is controlled to enter Enter privacy mode;
Step S44:If the finger print information of the terminal user and default finger print information are inconsistent, the terminal is controlled Into the pattern of guard.
Specifically, the terminal user can pre-set multiple finger print informations, at that time, only need to be verified a fingerprint Information.Further, the finger print information verification mode can be applied in combination with the code characters Information Authentication mode, Or the code characters verification mode can be as the verification mode of revealing all the details of other any verification modes, i.e. at other Any verification mode, include but is not limited to, finger print information verification mode, voice print verification mode, iris verification mode, face Identify these verification modes such as verification mode and wearable device checking not by or failing effectively to be identified and cause to test Card can switch to password authentification mode to be verified not in the case of.
Fig. 6 is the structural representation for the management method that the embodiment of the utility model the 5th provides.As shown in fig. 6, manager The guard pattern in method intercepts the step of application starts for system, comprises the following steps:
Step S51:System intercepts the application and started;
Step S52:Open front camera and active user is shot;
Step S53:By in the photograph album application of the photo deposit privacy mode after shooting.
Specifically, after the system intercepts the application startup, directly open camera and simultaneously switch to front camera to working as Preceding user (user) is taken pictures, and photo is stored in the photograph album of privacy mode after shooting, is easy to the terminal owner to enter Row is checked.Further, the shooting can use quick candid photograph or continuous shooting function, to greatest extent, clearly to clap Photograph currently used person.
Fig. 7 is the structural representation for the managing device that utility model sixth embodiment provides.A kind of as shown in fig. 7, management Device, including terminal monitoring module 61, authentication module 62 and control module 63;
The terminal monitoring module 61 is used to judge whether the application selected by terminal user opens privacy mode;
The authentication module 62 is used to whether pass through the verification mode according to the terminal user;
The control module 63 is used to control the terminal to show access into privacy mode corresponding to the application or guard mould Formula.
Wherein, terminal monitoring module 61 is used to judge whether the application selected by terminal user opens privacy mode.If institute State using having been switched on privacy mode, then start whether authentication module 62 is calibrated by checking to the terminal user, with Notify control module 63 to enter privacy mode afterwards or guard pattern.On the other hand, if the terminal detection module 61 is not detected by Privacy mode is opened in the application, then directly initiates the application.
Fig. 8 is the structural representation for the managing device that the embodiment of the utility model the 7th provides.A kind of as shown in figure 8, pipe The authentication module 63 of device is managed, including:
Screen unit 71, the code characters information of the input for obtaining terminal user;
First matching unit 72, code characters information and default character information for the terminal user to be inputted enter Row matching;
Fingerprint Identification Unit 73, for obtaining the finger print information of terminal user;
Second matching unit 74, for finger print information and the progress of default finger print information for inputting the terminal user Match somebody with somebody.
Specifically, the terminal user inputs code characters on screen unit 71, will by first matching unit 72 The code characters information of terminal user's input matches compared with default character information, passes through screen unit if consistent 71 notify the terminal user, are verified, and into privacy mode, or can also be directly entered privacy mode.If described The matching result of one matching unit 72 is inconsistent, then notifies end-user verification failure, into the pattern of guard, or can also be direct Into the pattern of guard.
Further, in another embodiment of the present utility model, the verification mode is fingerprint authentication, then the end After end subscriber sees the information of the prompting of the screen unit 71 checking fingerprint, finger is placed on the Fingerprint Identification Unit 73, institute State the finger print information that Fingerprint Identification Unit 73 obtains the terminal user, second matching unit 74 is by the finger of the terminal user Line information is matched with default finger print information, if unanimously, informing the terminal user by screen unit 71, checking is led to Cross, into privacy mode, or privacy mode can also be directly entered.If the matching result of the second matching unit 74 differs Cause, then notify end-user verification failure, into the pattern of guard, or guard pattern can also be directly entered.
It is further preferred that the terminal user is used based on fingerprint authentication, the mode supplemented by password authentification is verified When, when terminal user's fingerprint authentication fails, then system automatically switches to password authentification mode, and specific verification process is as above Described in text, it will not be repeated here.
Fig. 9 is the structural representation for the managing device that the embodiment of the utility model the 8th provides.A kind of as shown in figure 8, pipe Device is managed, the control module 64 includes:
Front camera 81, for obtaining the image information of the terminal user;
Memory 82, for storing the image information of terminal user.
The utility model control module circuit diagram as shown in Figure 1, the control module include control circuit, the control electricity Road includes the first control sub-circuit, the second control sub-circuit, protection circuit;The first control sub-circuit is used to receive input First voltage signal, and the second voltage signal after processing is inputted to the described second control sub-circuit, the second control Circuit is used to handle the second voltage signal, and the tertiary voltage signal after processing is inputted to the protection electricity Road;The protection circuit is used for when the magnitude of voltage for detecting the tertiary voltage signal is more than or equal to predetermined threshold value, control electricity Pond disconnects.
In another preference of utility model, partial pressure sub-circuit, the partial pressure sub-circuit and the described first control are sub One end connection of circuit, for receiving the predeterminated voltage signal of input, and the first voltage signal after voltage division processing is defeated Enter to the described first control sub-circuit.
In another preference of utility model, the first control sub-circuit includes the first FET and the first electricity Resistance;The grid of first FET is connected with the partial pressure sub-circuit, the drain electrode of first FET respectively with institute The first end for stating first resistor connects with the described second control sub-circuit, and the second end of the first resistor and the battery are just Pole connects.
In another preference of utility model, the second control sub-circuit includes the second FET and the second electricity Resistance;The grid of second FET is connected with first FET, the drain electrode of second FET with it is described Protection circuit is connected, and the source electrode of second FET is connected with the first end of the second resistance, the second resistance Second end is connected with the positive pole of the battery.
In another preference of utility model, the partial pressure sub-circuit includes 3rd resistor and the 4th resistance, described The first end of 3rd resistor is connected with the 4th resistance and the first control sub-circuit.
In another preference of utility model, the protection circuit includes protection IC and switch;The protection IC's One end is connected with the drain electrode of the described second control sub-circuit, and the other end of the protection IC is connected with one end of the switch;Institute The other end for stating switch is connected with the negative pole of the battery, and the protection IC is used for when the electricity for detecting the tertiary voltage signal When pressure value is more than or equal to predetermined threshold value, by controlling the switch to control the battery to disconnect.
Figure 10 is the structural representation for the terminal that the embodiment of the utility model the 9th provides.As shown in Figure 10, terminal includes Managing device 90, the concrete structure of managing device 90 refer to Fig. 7, will not be repeated here.
Managing device and terminal of the present utility model by way of being configured privacy mode for single concrete application, So that terminal user when opening the application, it is necessary to verified accordingly, only by verify can just carry out it is corresponding should Privacy mode, if not verified, system can intercept the startup of the application and the currently used person of terminal is taken pictures Preserve, so that Terminal owner checks.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to. For system class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
It is described above, only it is preferred embodiment of the present utility model, not the utility model is made any formal Limitation, although the utility model is disclosed above with preferred embodiment, but be not limited to the utility model, it is any ripe Professional and technical personnel is known, is not being departed from the range of technical solutions of the utility model, when in the technology using the disclosure above Hold the equivalent embodiment made a little change or be modified to equivalent variations, as long as being without departing from technical solutions of the utility model Hold, any simple modification, equivalent change and modification made according to the technical essence of the utility model to above example, still Belong in the range of technical solutions of the utility model.

Claims (10)

1. a kind of managing device, it is characterised in that the managing device includes terminal monitoring module, authentication module and control mould Block;
The terminal monitoring module is used to judge whether the application selected by terminal user opens privacy mode;
Whether the authentication module is used to judge the terminal user by the verification mode of the authentication module;
The control module is used to control the terminal to show access into privacy mode corresponding to the application or guard pattern.
2. managing device as claimed in claim 1, it is characterised in that the authentication module includes:
Screen unit, the code characters information of the input for obtaining terminal user;
First matching unit, for code characters information and the progress of default character information for inputting the terminal user Match somebody with somebody;
Fingerprint Identification Unit, for obtaining the finger print information of terminal user;
Second matching unit, for the finger print information that the terminal user inputs to be matched with default finger print information.
3. managing device as claimed in claim 1, it is characterised in that the control module includes:
Front camera, for obtaining the image information of the terminal user;
Memory, for storing the image information of terminal user.
4. managing device as claimed in claim 1, it is characterised in that the control module includes control circuit, the control Circuit includes the first control sub-circuit, the second control sub-circuit, protection circuit;The first control sub-circuit, which is used to receive, to be inputted First voltage signal, and by the second voltage signal after processing input to described second control sub-circuit, it is described second control Sub-circuit is used to handle the second voltage signal, and the tertiary voltage signal after processing is inputted to the protection electricity Road;The protection circuit is used for when the magnitude of voltage for detecting the tertiary voltage signal is more than or equal to predetermined threshold value, control electricity Pond disconnects.
5. managing device as claimed in claim 4, it is characterised in that the control module also includes:
Partial pressure sub-circuit, the partial pressure sub-circuit is connected with one end of the described first control sub-circuit, for receiving the pre- of input If voltage signal, and the first voltage signal after voltage division processing is inputted to the described first control sub-circuit.
6. managing device as claimed in claim 5, it is characterised in that the first control sub-circuit includes the first FET And first resistor;The grid of first FET is connected with the partial pressure sub-circuit, the drain electrode of first FET Be connected respectively with the first end of the first resistor and the second control sub-circuit, the second end of the first resistor with it is described The positive pole connection of battery.
7. managing device as claimed in claim 6, it is characterised in that the second control sub-circuit includes the second FET And second resistance;The grid of second FET is connected with first FET, the leakage of second FET Pole is connected with the protection circuit, and the source electrode of second FET is connected with the first end of the second resistance, and described Second end of two resistance is connected with the positive pole of the battery.
8. managing device as claimed in claim 5, it is characterised in that the partial pressure sub-circuit includes 3rd resistor and the 4th electricity Resistance, the first end of the 3rd resistor are connected with the 4th resistance and the first control sub-circuit.
9. managing device as claimed in claim 7, it is characterised in that the protection circuit includes protection IC and switch;It is described IC one end is protected to be connected with the drain electrode of the described second control sub-circuit, the other end of the protection IC and one end of the switch Connection;The other end of the switch is connected with the negative pole of the battery, and the protection IC, which is used to work as, detects the tertiary voltage When the magnitude of voltage of signal is more than or equal to predetermined threshold value, by controlling the switch to control the battery to disconnect.
10. a kind of terminal, it is characterised in that the terminal includes management as in one of claimed in any of claims 1 to 9 and filled Put.
CN201720770257.4U 2017-06-27 2017-06-27 Managing device and terminal Active CN207198852U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201720770257.4U CN207198852U (en) 2017-06-27 2017-06-27 Managing device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201720770257.4U CN207198852U (en) 2017-06-27 2017-06-27 Managing device and terminal

Publications (1)

Publication Number Publication Date
CN207198852U true CN207198852U (en) 2018-04-06

Family

ID=61785191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201720770257.4U Active CN207198852U (en) 2017-06-27 2017-06-27 Managing device and terminal

Country Status (1)

Country Link
CN (1) CN207198852U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI667591B (en) * 2018-08-14 2019-08-01 秘傳應用資訊有限公司 Method for safely transferring pictures

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI667591B (en) * 2018-08-14 2019-08-01 秘傳應用資訊有限公司 Method for safely transferring pictures

Similar Documents

Publication Publication Date Title
CN105224838B (en) A kind of user authority control method and system based on recognition of face
CN105590043B (en) Identity verification method, device and system
CN107437009B (en) Authority control method and related product
CN104700010A (en) Personal information protection method and protection device
CN109033801B (en) Method for verifying user identity by application program, mobile terminal and storage medium
CN104933351A (en) Information security processing method and information security processing device
CN106657528A (en) Incoming call management method and device
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
CN104159229A (en) Incoming call processing method and apparatus
CN104639533A (en) Safety control method and device based on terminal
CN106454800A (en) Identity verification method, device and system
CN104601783A (en) Communication processing method based on subjective judgment, mobile terminal and system
CN104468988B (en) A kind of mobile terminal and the telephone receiving method and apparatus under non-security mode thereof
CN106303085B (en) Mobile terminal and method and device for secure call
CN107437994A (en) A kind of method and device of safe memory mobile terminal password
CN101552830A (en) Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof
CN207198852U (en) Managing device and terminal
CN107181851A (en) Call control method and device
CN107395363B (en) Fingerprint sharing method and mobile terminal
CN105512542B (en) Data inputting method and device
CN109711198B (en) Application management method, mobile terminal and storage medium
CN107169337A (en) management method, device and terminal
CN108040186A (en) The sending method and mobile terminal of a kind of dtmf signal
JP2009232108A (en) Communication device and computer program
CN108093403A (en) Access the method, apparatus and storage medium of wireless network

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant