CN207198852U - Managing device and terminal - Google Patents
Managing device and terminal Download PDFInfo
- Publication number
- CN207198852U CN207198852U CN201720770257.4U CN201720770257U CN207198852U CN 207198852 U CN207198852 U CN 207198852U CN 201720770257 U CN201720770257 U CN 201720770257U CN 207198852 U CN207198852 U CN 207198852U
- Authority
- CN
- China
- Prior art keywords
- circuit
- terminal
- control
- managing device
- terminal user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The utility model provides managing device and terminal, including terminal monitoring module, authentication module and control module;The terminal monitoring module is used to judge whether the application selected by terminal user opens privacy mode;Whether the authentication module is used to judge the terminal user by the verification mode;The control module is used to control the terminal to show access into privacy mode corresponding to the application or guard pattern.The utility model for single application by being configured privacy mode, when making terminal user's opening application, it need to be verified accordingly, the privacy mode of corresponding application only can be just carried out by verifying, it is if not verified, then system can intercept the startup of the application and carry out preservation of taking pictures to the currently used person of terminal, so that Terminal owner checks.
Description
Technical field
Communication technique field is the utility model is related to, more particularly to a kind of managing device and terminal.
Background technology
With the development of science and technology, the arrival of cybertimes, the development of smart mobile phone, at this stage in some indivedual applications
As QQ have start before carry out authentication function, but this be all third party progress safety measure.And for example, Samsung has photograph album
Privacy mode, i.e. hiding picture can be needed to be arranged to privacy mode oneself, so other people just cannot easily access
Arrive, but, this privacy mode still can be viewed by file manager.
For the monitoring of concrete application, also it is not carried out from the system platform stage, either computer or mobile device be all
Simply there is the lock function of an entirety, as long as after main interface unblock, all applications of whole mobile device can all expose, and
Checked by other people.This is that many users are reluctant to run into, and many terminal users pain spot in use.It is so how real
The privacy management of existing single application, is current problem.
Utility model content
The purpose of this utility model is, there is provided a kind of managing device and terminal, it can be locked for single application
Fixed checking, only it can just enter corresponding privacy mode by verifying.
The utility model provides a kind of managing device, including terminal monitoring module, authentication module and control module;The end
End monitoring modular is used to judge whether the application selected by terminal user opens privacy mode;The authentication module is used for according to institute
Terminal user is stated whether by the verification mode;The control module is used to control the terminal to show access into the application pair
The privacy mode or guard pattern answered.
In another preference of utility model, the authentication module includes:Screen unit, for obtaining terminal user
Input code characters information;First matching unit, for the code characters information for inputting the terminal user and preset
Character information matched;Fingerprint Identification Unit, for obtaining the finger print information of terminal user;Second matching unit, for inciting somebody to action
The finger print information of terminal user's input is matched with default finger print information.
In another preference of utility model, the control module includes:Front camera, for obtaining the end
The image information of end subscriber;Memory, for storing the image information of terminal user.
In another preference of utility model, the control module includes control circuit, and the control circuit includes
First control sub-circuit, the second control sub-circuit, protection circuit;The first control sub-circuit is used for the first electricity for receiving input
Signal is pressed, and the second voltage signal after processing is inputted to the described second control sub-circuit, the second control sub-circuit and used
Handled in the second voltage signal, and the tertiary voltage signal after processing is inputted to the protection circuit;Institute
State protection circuit to be used for when the magnitude of voltage for detecting the tertiary voltage signal is more than or equal to predetermined threshold value, control battery breaks
Open.
In another preference of utility model, partial pressure sub-circuit, the partial pressure sub-circuit and the described first control are sub
One end connection of circuit, for receiving the predeterminated voltage signal of input, and the first voltage signal after voltage division processing is defeated
Enter to the described first control sub-circuit.
In another preference of utility model, the first control sub-circuit includes the first FET and the first electricity
Resistance;The grid of first FET is connected with the partial pressure sub-circuit, the drain electrode of first FET respectively with institute
The first end for stating first resistor connects with the described second control sub-circuit, and the second end of the first resistor and the battery are just
Pole connects.
In another preference of utility model, the second control sub-circuit includes the second FET and the second electricity
Resistance;The grid of second FET is connected with first FET, the drain electrode of second FET with it is described
Protection circuit is connected, and the source electrode of second FET is connected with the first end of the second resistance, the second resistance
Second end is connected with the positive pole of the battery.
In another preference of utility model, the partial pressure sub-circuit includes 3rd resistor and the 4th resistance, described
The first end of 3rd resistor is connected with the 4th resistance and the first control sub-circuit.
In another preference of utility model, the protection circuit includes protection IC and switch;The protection IC's
One end is connected with the drain electrode of the described second control sub-circuit, and the other end of the protection IC is connected with one end of the switch;Institute
The other end for stating switch is connected with the negative pole of the battery, and the protection IC is used for when the electricity for detecting the tertiary voltage signal
When pressure value is more than or equal to predetermined threshold value, by controlling the switch to control the battery to disconnect.
The utility model provides a kind of terminal again, and the terminal includes the as above managing device described in any one.
Managing device and terminal of the present utility model by way of being configured privacy mode for single concrete application,
So that terminal user when opening the application, it is necessary to verified accordingly, only by verify can just carry out it is corresponding should
Privacy mode, if not verified, system can intercept the startup of the application and the currently used person of terminal is taken pictures
Preserve, so that Terminal owner checks.
Described above is only the general introduction of technical solutions of the utility model, in order to better understand skill of the present utility model
Art means, and being practiced according to the content of specification, and in order to allow above and other purpose of the present utility model, feature
It can be become apparent with advantage, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, described in detail as follows.
Brief description of the drawings
Fig. 1 is the utility model control module circuit diagram.
Fig. 2 is the schematic flow sheet for the management method that the utility model first embodiment provides.
Fig. 3 is the schematic flow sheet for the management method that the utility model second embodiment provides.
Fig. 4 is the schematic flow sheet for the management method that the utility model 3rd embodiment provides.
Fig. 5 is the schematic flow sheet for the management method that the utility model fourth embodiment provides.
Fig. 6 is the structural representation for the management method that the embodiment of the utility model the 5th provides.
Fig. 7 is the structural representation for the managing device that the utility model sixth embodiment provides.
Fig. 8 is the structural representation for the managing device that the embodiment of the utility model the 7th provides.
Fig. 9 is the structural representation for the managing device that the embodiment of the utility model the 8th provides.
Figure 10 is the structural representation for the terminal that the embodiment of the utility model the 9th provides.
Embodiment
Further to illustrate that the utility model is to reach the technological means and effect that predetermined purpose of utility model taken,
Below in conjunction with accompanying drawing and preferred embodiment, to according to the utility model proposes managing device and terminal its embodiment,
Method, step, structure, feature and its effect, describe in detail as follows.
Relevant of the present utility model foregoing and other technology contents, feature and effect, it is following coordinate with reference to schema compared with
It can be clearly appeared from the detailed description of good embodiment.By the explanation of embodiment, when can be to the utility model up to
The technological means and effect taken into predetermined purpose are able to more go deep into and specific understanding, but institute's accompanying drawings are only to provide
With reference to purposes of discussion, not be used for the utility model is any limitation as.
Managing device of the present utility model can be, but not limited to be applied to terminal, can also be applied to wearable device etc.
Deng.Terminal includes memory, storage control, one or more processors, Peripheral Interface, radio-frequency module, locating module, shooting
Module, audio-frequency module, screen and key-press module.These components are mutually communicated by one or more communication bus/signal wire.
Memory can be used for storage software program and module, as corresponding to the managing device in the utility model embodiment
Programmed instruction/module, processor is stored in software program and module in storage control by operation, various so as to perform
Application of function and data processing, that is, realize above-mentioned management method and device.
Memory may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Storage device, flash memory or other non-volatile solid state memories.In some instances, memory can further comprise relatively
In the remotely located memory of processor, these remote memories can pass through network connection to terminal.The example of above-mentioned network
Including but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.Processor and other are possible
Access of the component to memory can be carried out under the control of storage control.
Various input/output devices are coupled to CPU and memory by Peripheral Interface.It is each in processor run memory
Kind software, instruct to perform the various functions of terminal and carry out data processing.
In certain embodiments, Peripheral Interface, processor and storage control can be realized in one single chip.At it
In his some examples, they can be realized by independent chip respectively.
Radio-frequency module is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so as to leading to
News network or other equipment are communicated.Radio-frequency module may include the various existing circuit elements for being used to perform these functions
Part, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, storage
Device etc..Radio-frequency module can be communicated or be passed through wireless network with various networks such as internet, intranet, wireless network
Network is communicated with other equipment.Above-mentioned wireless network may include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).On
The wireless network stated can use various communication standards, agreement and technology, including but not limited to global system for mobile communications
(Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data
GSM Environment, EDGE), Wideband CDMA Technology (wideband code division multiple
Access, W-CDMA), CDMA (Code division access, CDMA), TDMA (time
Division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity, WiFi) is (such as U.S.
State Institute of Electrical and Electric Engineers standard IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE
802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses
(Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, IMU
The agreement of news and short message, and any other suitable communications protocol, or even may include that those are not developed currently yet
Agreement.
Locating module is used for the current location for obtaining terminal.The example of locating module includes but is not limited to global positioning satellite
System (GPS), the location technology based on WLAN or mobile radio communication.
Photographing module is used to shoot photo or video.The photo or video of shooting can be stored to memory, and
It can be sent by radio-frequency module.
Audio-frequency module provides a user COBBAIF, and it may include one or more microphones, one or more raises one's voice
Device and voicefrequency circuit.Voicefrequency circuit receives voice data at Peripheral Interface, and voice data is converted into power information, by telecommunications
Breath is transmitted to loudspeaker.Loudspeaker is converted to power information the sound wave that human ear can hear.Voicefrequency circuit receives also at microphone
Power information, converts electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface to be further processed.
Voice data can obtain at memory or by radio-frequency module.In addition, voice data can also be stored into memory
Or it is transmitted by radio-frequency module.In some instances, audio-frequency module may also include an earphone and broadcast hole, for earphone
Or other equipment provides COBBAIF.
Screen provides an output interface between terminal and user.Specifically, screen shows video frequency output to user, this
The content of a little video frequency outputs may include word, figure, video and its any combination.Some output results correspond to some use
Family interface object.It should be understood that screen can also include Touch Screen.Touch Screen provides simultaneously between terminal and user
One output and inputting interface.Except showing video frequency output to user, Touch Screen also receives the input of user, such as user
The gesture operations such as click, slip, so that input of the user interface object to these users responds.Detect the skill of user's input
Art can be based on resistance-type, condenser type or other any possible touch control detection technologies.The tool of Touch Screen display unit
Body example includes but is not limited to liquid crystal display or light emitting polymer displays.
Key-press module equally provides the interface that user is inputted to terminal, user can by press different buttons with
Terminal is set to perform different functions.
Fig. 2 is the schematic flow sheet for the management method that the utility model first embodiment provides.As shown in Fig. 2 manager
Method comprises the following steps:
Step S11:Judge whether the application selected by terminal user opens privacy mode;
If the application has been switched on privacy mode, into step S12:Judge the terminal user whether by described
Verification mode;
If the terminal user is by checking, into step S13:The terminal is controlled to show access into the application corresponding
Privacy mode;
If the terminal user is not verified, into step S14:The terminal is controlled to show access into the application pair
The guard pattern answered.
Wherein it is possible to but other verification modes for being not limited to be pre-set according to terminal user verified, for example, can be with
For a variety of verification methods such as voice print verification, iris verification, recognition of face checking or wearable device checking, certain this area skill
Art personnel understand or verified by the combined authentication mode of above various ways.
Wherein, the pin mode can be the mode of numerical ciphers or graphical passwords, and user is set in advance by input
Fixed numerical ciphers, or graphical passwords set in advance are drawn to carry out verifying unblock and enter privacy mode.
It is by Fingerprint Identification Unit know the fingerprint of user if the verification mode is the fingerprint authentication mode
It and Yan Zheng not enter privacy mode.
It is that the acoustic information of user is verified simultaneously by microphone if the verification mode is the voice print verification
Into privacy mode.
It is that the iris of user is scanned by front camera if the verification mode is the iris verification
And verify into privacy mode, the recognition of face checking is also that the face of user is shot simultaneously by front camera
Checking matching is carried out, subsequently enters privacy mode.
If the verification mode is verified for the wearable device, specifically include and wearable device and terminal are subjected to indigo plant
Tooth connects, and then by carrying out matching checking automatically close to terminal, matching, which is proved to be successful, then enters privacy mode.
Fig. 3 is the schematic flow sheet for the management method that the utility model second embodiment provides.Manager as shown in Figure 3
Judge whether the terminal user is included by the step of verification mode in method:
Step S21:Obtain the verification mode for the privacy mode that the terminal user pre-sets;
Step S22:The verification mode for judging privacy mode is pin mode or fingerprint mode;
Step S23:If the verification mode pre-set is pin mode, input proper password is prompted to enter privacy mould
Formula;
Step S24:If the verification mode pre-set is fingerprint mode, checking finger print information is prompted.
Specifically, verification mode as described above can have varied, but final terminal can find the terminal user
The verification mode that pre-sets simultaneously is verified by screen prompt user.
Further, 3 kinds of checkings can be pre-set for the ease of end users operation and raising security, terminal user
Mode, the terminal give tacit consent to three kinds of level of securitys, and when level of security is low, the terminal user is only needed in 3 kinds of verification modes
Privacy mode can be entered by completing a kind of checking.If level of security is middle, the terminal user is needed in 3 kinds of verification modes
Optional two kinds of verification modes are verified, privacy mode of being allowed for access.If level of security is high, the terminal user is working as
And if only if 3 kinds of verification modes are all by can just enter privacy mode.
Fig. 4 is the schematic flow sheet for the management method that the utility model 3rd embodiment provides.As shown in figure 4, manager
If the verification mode pre-set in method is pin mode, prompt to input the step of proper password enters privacy mode, bag
Include following steps:
Step S31:Obtain the code characters information of terminal user's input;
Step S32:Judge whether code characters information and the default character information of the input are consistent;
Step S33:If the code characters information of the input is consistent with default character information, the terminal is controlled to enter
Enter privacy mode;
Step S34:If the code characters information of the input and default character information are inconsistent, the terminal is controlled
Into the pattern of guard.
Specifically, the code characters are not limited to text information, can also be graphic character information, and the length of code characters
Degree is preferably more than four characters, and in order to improve security, the code characters can include capital and small letter or numeral, and can not
It is consistent with the identity information or cell-phone number of terminal user.
Further, in a preference of the present utility model, terminal user can pre-set a prompt message,
For oneself can be prompted when forgeing code characters information, it is easy to quickly remember correct code characters information.
Fig. 5 is the schematic flow sheet for the management method that the utility model fourth embodiment provides.As shown in figure 5, manager
If the verification mode pre-set in method is fingerprint mode, the step of prompting to verify finger print information, comprise the following steps:
Step S41:Obtain the finger print information of the terminal user;
Step S42:Judge whether finger print information and the default finger print information of the terminal user are consistent;
Step S43:If the finger print information of the terminal user is consistent with default finger print information, the terminal is controlled to enter
Enter privacy mode;
Step S44:If the finger print information of the terminal user and default finger print information are inconsistent, the terminal is controlled
Into the pattern of guard.
Specifically, the terminal user can pre-set multiple finger print informations, at that time, only need to be verified a fingerprint
Information.Further, the finger print information verification mode can be applied in combination with the code characters Information Authentication mode,
Or the code characters verification mode can be as the verification mode of revealing all the details of other any verification modes, i.e. at other
Any verification mode, include but is not limited to, finger print information verification mode, voice print verification mode, iris verification mode, face
Identify these verification modes such as verification mode and wearable device checking not by or failing effectively to be identified and cause to test
Card can switch to password authentification mode to be verified not in the case of.
Fig. 6 is the structural representation for the management method that the embodiment of the utility model the 5th provides.As shown in fig. 6, manager
The guard pattern in method intercepts the step of application starts for system, comprises the following steps:
Step S51:System intercepts the application and started;
Step S52:Open front camera and active user is shot;
Step S53:By in the photograph album application of the photo deposit privacy mode after shooting.
Specifically, after the system intercepts the application startup, directly open camera and simultaneously switch to front camera to working as
Preceding user (user) is taken pictures, and photo is stored in the photograph album of privacy mode after shooting, is easy to the terminal owner to enter
Row is checked.Further, the shooting can use quick candid photograph or continuous shooting function, to greatest extent, clearly to clap
Photograph currently used person.
Fig. 7 is the structural representation for the managing device that utility model sixth embodiment provides.A kind of as shown in fig. 7, management
Device, including terminal monitoring module 61, authentication module 62 and control module 63;
The terminal monitoring module 61 is used to judge whether the application selected by terminal user opens privacy mode;
The authentication module 62 is used to whether pass through the verification mode according to the terminal user;
The control module 63 is used to control the terminal to show access into privacy mode corresponding to the application or guard mould
Formula.
Wherein, terminal monitoring module 61 is used to judge whether the application selected by terminal user opens privacy mode.If institute
State using having been switched on privacy mode, then start whether authentication module 62 is calibrated by checking to the terminal user, with
Notify control module 63 to enter privacy mode afterwards or guard pattern.On the other hand, if the terminal detection module 61 is not detected by
Privacy mode is opened in the application, then directly initiates the application.
Fig. 8 is the structural representation for the managing device that the embodiment of the utility model the 7th provides.A kind of as shown in figure 8, pipe
The authentication module 63 of device is managed, including:
Screen unit 71, the code characters information of the input for obtaining terminal user;
First matching unit 72, code characters information and default character information for the terminal user to be inputted enter
Row matching;
Fingerprint Identification Unit 73, for obtaining the finger print information of terminal user;
Second matching unit 74, for finger print information and the progress of default finger print information for inputting the terminal user
Match somebody with somebody.
Specifically, the terminal user inputs code characters on screen unit 71, will by first matching unit 72
The code characters information of terminal user's input matches compared with default character information, passes through screen unit if consistent
71 notify the terminal user, are verified, and into privacy mode, or can also be directly entered privacy mode.If described
The matching result of one matching unit 72 is inconsistent, then notifies end-user verification failure, into the pattern of guard, or can also be direct
Into the pattern of guard.
Further, in another embodiment of the present utility model, the verification mode is fingerprint authentication, then the end
After end subscriber sees the information of the prompting of the screen unit 71 checking fingerprint, finger is placed on the Fingerprint Identification Unit 73, institute
State the finger print information that Fingerprint Identification Unit 73 obtains the terminal user, second matching unit 74 is by the finger of the terminal user
Line information is matched with default finger print information, if unanimously, informing the terminal user by screen unit 71, checking is led to
Cross, into privacy mode, or privacy mode can also be directly entered.If the matching result of the second matching unit 74 differs
Cause, then notify end-user verification failure, into the pattern of guard, or guard pattern can also be directly entered.
It is further preferred that the terminal user is used based on fingerprint authentication, the mode supplemented by password authentification is verified
When, when terminal user's fingerprint authentication fails, then system automatically switches to password authentification mode, and specific verification process is as above
Described in text, it will not be repeated here.
Fig. 9 is the structural representation for the managing device that the embodiment of the utility model the 8th provides.A kind of as shown in figure 8, pipe
Device is managed, the control module 64 includes:
Front camera 81, for obtaining the image information of the terminal user;
Memory 82, for storing the image information of terminal user.
The utility model control module circuit diagram as shown in Figure 1, the control module include control circuit, the control electricity
Road includes the first control sub-circuit, the second control sub-circuit, protection circuit;The first control sub-circuit is used to receive input
First voltage signal, and the second voltage signal after processing is inputted to the described second control sub-circuit, the second control
Circuit is used to handle the second voltage signal, and the tertiary voltage signal after processing is inputted to the protection electricity
Road;The protection circuit is used for when the magnitude of voltage for detecting the tertiary voltage signal is more than or equal to predetermined threshold value, control electricity
Pond disconnects.
In another preference of utility model, partial pressure sub-circuit, the partial pressure sub-circuit and the described first control are sub
One end connection of circuit, for receiving the predeterminated voltage signal of input, and the first voltage signal after voltage division processing is defeated
Enter to the described first control sub-circuit.
In another preference of utility model, the first control sub-circuit includes the first FET and the first electricity
Resistance;The grid of first FET is connected with the partial pressure sub-circuit, the drain electrode of first FET respectively with institute
The first end for stating first resistor connects with the described second control sub-circuit, and the second end of the first resistor and the battery are just
Pole connects.
In another preference of utility model, the second control sub-circuit includes the second FET and the second electricity
Resistance;The grid of second FET is connected with first FET, the drain electrode of second FET with it is described
Protection circuit is connected, and the source electrode of second FET is connected with the first end of the second resistance, the second resistance
Second end is connected with the positive pole of the battery.
In another preference of utility model, the partial pressure sub-circuit includes 3rd resistor and the 4th resistance, described
The first end of 3rd resistor is connected with the 4th resistance and the first control sub-circuit.
In another preference of utility model, the protection circuit includes protection IC and switch;The protection IC's
One end is connected with the drain electrode of the described second control sub-circuit, and the other end of the protection IC is connected with one end of the switch;Institute
The other end for stating switch is connected with the negative pole of the battery, and the protection IC is used for when the electricity for detecting the tertiary voltage signal
When pressure value is more than or equal to predetermined threshold value, by controlling the switch to control the battery to disconnect.
Figure 10 is the structural representation for the terminal that the embodiment of the utility model the 9th provides.As shown in Figure 10, terminal includes
Managing device 90, the concrete structure of managing device 90 refer to Fig. 7, will not be repeated here.
Managing device and terminal of the present utility model by way of being configured privacy mode for single concrete application,
So that terminal user when opening the application, it is necessary to verified accordingly, only by verify can just carry out it is corresponding should
Privacy mode, if not verified, system can intercept the startup of the application and the currently used person of terminal is taken pictures
Preserve, so that Terminal owner checks.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
For system class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined
See the part explanation of embodiment of the method.
It is described above, only it is preferred embodiment of the present utility model, not the utility model is made any formal
Limitation, although the utility model is disclosed above with preferred embodiment, but be not limited to the utility model, it is any ripe
Professional and technical personnel is known, is not being departed from the range of technical solutions of the utility model, when in the technology using the disclosure above
Hold the equivalent embodiment made a little change or be modified to equivalent variations, as long as being without departing from technical solutions of the utility model
Hold, any simple modification, equivalent change and modification made according to the technical essence of the utility model to above example, still
Belong in the range of technical solutions of the utility model.
Claims (10)
1. a kind of managing device, it is characterised in that the managing device includes terminal monitoring module, authentication module and control mould
Block;
The terminal monitoring module is used to judge whether the application selected by terminal user opens privacy mode;
Whether the authentication module is used to judge the terminal user by the verification mode of the authentication module;
The control module is used to control the terminal to show access into privacy mode corresponding to the application or guard pattern.
2. managing device as claimed in claim 1, it is characterised in that the authentication module includes:
Screen unit, the code characters information of the input for obtaining terminal user;
First matching unit, for code characters information and the progress of default character information for inputting the terminal user
Match somebody with somebody;
Fingerprint Identification Unit, for obtaining the finger print information of terminal user;
Second matching unit, for the finger print information that the terminal user inputs to be matched with default finger print information.
3. managing device as claimed in claim 1, it is characterised in that the control module includes:
Front camera, for obtaining the image information of the terminal user;
Memory, for storing the image information of terminal user.
4. managing device as claimed in claim 1, it is characterised in that the control module includes control circuit, the control
Circuit includes the first control sub-circuit, the second control sub-circuit, protection circuit;The first control sub-circuit, which is used to receive, to be inputted
First voltage signal, and by the second voltage signal after processing input to described second control sub-circuit, it is described second control
Sub-circuit is used to handle the second voltage signal, and the tertiary voltage signal after processing is inputted to the protection electricity
Road;The protection circuit is used for when the magnitude of voltage for detecting the tertiary voltage signal is more than or equal to predetermined threshold value, control electricity
Pond disconnects.
5. managing device as claimed in claim 4, it is characterised in that the control module also includes:
Partial pressure sub-circuit, the partial pressure sub-circuit is connected with one end of the described first control sub-circuit, for receiving the pre- of input
If voltage signal, and the first voltage signal after voltage division processing is inputted to the described first control sub-circuit.
6. managing device as claimed in claim 5, it is characterised in that the first control sub-circuit includes the first FET
And first resistor;The grid of first FET is connected with the partial pressure sub-circuit, the drain electrode of first FET
Be connected respectively with the first end of the first resistor and the second control sub-circuit, the second end of the first resistor with it is described
The positive pole connection of battery.
7. managing device as claimed in claim 6, it is characterised in that the second control sub-circuit includes the second FET
And second resistance;The grid of second FET is connected with first FET, the leakage of second FET
Pole is connected with the protection circuit, and the source electrode of second FET is connected with the first end of the second resistance, and described
Second end of two resistance is connected with the positive pole of the battery.
8. managing device as claimed in claim 5, it is characterised in that the partial pressure sub-circuit includes 3rd resistor and the 4th electricity
Resistance, the first end of the 3rd resistor are connected with the 4th resistance and the first control sub-circuit.
9. managing device as claimed in claim 7, it is characterised in that the protection circuit includes protection IC and switch;It is described
IC one end is protected to be connected with the drain electrode of the described second control sub-circuit, the other end of the protection IC and one end of the switch
Connection;The other end of the switch is connected with the negative pole of the battery, and the protection IC, which is used to work as, detects the tertiary voltage
When the magnitude of voltage of signal is more than or equal to predetermined threshold value, by controlling the switch to control the battery to disconnect.
10. a kind of terminal, it is characterised in that the terminal includes management as in one of claimed in any of claims 1 to 9 and filled
Put.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720770257.4U CN207198852U (en) | 2017-06-27 | 2017-06-27 | Managing device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201720770257.4U CN207198852U (en) | 2017-06-27 | 2017-06-27 | Managing device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN207198852U true CN207198852U (en) | 2018-04-06 |
Family
ID=61785191
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201720770257.4U Active CN207198852U (en) | 2017-06-27 | 2017-06-27 | Managing device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN207198852U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI667591B (en) * | 2018-08-14 | 2019-08-01 | 秘傳應用資訊有限公司 | Method for safely transferring pictures |
-
2017
- 2017-06-27 CN CN201720770257.4U patent/CN207198852U/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI667591B (en) * | 2018-08-14 | 2019-08-01 | 秘傳應用資訊有限公司 | Method for safely transferring pictures |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105224838B (en) | A kind of user authority control method and system based on recognition of face | |
CN105590043B (en) | Identity verification method, device and system | |
CN107437009B (en) | Authority control method and related product | |
CN104700010A (en) | Personal information protection method and protection device | |
CN109033801B (en) | Method for verifying user identity by application program, mobile terminal and storage medium | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN106657528A (en) | Incoming call management method and device | |
CN109039860B (en) | Method and device for sending and displaying message and method and device for identity authentication | |
CN104159229A (en) | Incoming call processing method and apparatus | |
CN104639533A (en) | Safety control method and device based on terminal | |
CN106454800A (en) | Identity verification method, device and system | |
CN104601783A (en) | Communication processing method based on subjective judgment, mobile terminal and system | |
CN104468988B (en) | A kind of mobile terminal and the telephone receiving method and apparatus under non-security mode thereof | |
CN106303085B (en) | Mobile terminal and method and device for secure call | |
CN107437994A (en) | A kind of method and device of safe memory mobile terminal password | |
CN101552830A (en) | Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof | |
CN207198852U (en) | Managing device and terminal | |
CN107181851A (en) | Call control method and device | |
CN107395363B (en) | Fingerprint sharing method and mobile terminal | |
CN105512542B (en) | Data inputting method and device | |
CN109711198B (en) | Application management method, mobile terminal and storage medium | |
CN107169337A (en) | management method, device and terminal | |
CN108040186A (en) | The sending method and mobile terminal of a kind of dtmf signal | |
JP2009232108A (en) | Communication device and computer program | |
CN108093403A (en) | Access the method, apparatus and storage medium of wireless network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |