1. Technical Field
The embodiments of the present disclosure relate to a mobile device and method for protecting private information stored in the mobile device.
2. Description of related art
Mobile devices, such as smart phones or tablet computers, are very popular. The mobile devices bring convenience to daily life. However, because the mobile devices are usually used in public places, private information stored in the mobile device is easy to leak, causing information security problems to users of the mobile devices.
The present disclosure, including the accompanying drawings, is illustrated by way of examples and not by way of limitation. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one.”
In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language. In one embodiment, the program language may be Java, C, or assembly. One or more software instructions in the modules may be embedded in firmware, such as in an EPROM. The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable medium include CDs, DVDs, flash memory, and hard disk drives.
The pair of glasses 2 comprises a projector configured to beam an image into eyes of a user wearing the pair of glasses 2, and generate a visual screen in front of a user of the mobile device 1, and further display selected information transmitted from the mobile device 1 on the visual screen using micro-cast technology.
In one embodiment, the storage device 12 (a non-transitory storage device) may be an internal storage system, such as a random access memory (RAM) for the temporary storage of information, and/or a accessed only memory (ROM) for the permanent storage of information. In some embodiments, the storage device 12 may be an external storage system, such as an external hard disk, a storage card, or a data storage medium.
The at least one processor 14 may include a processor unit, a microprocessor, an application-specific integrated circuit, and a field programmable gate array, for example.
In one embodiment, the private information protection system 10 includes a plurality of function modules which include computerized codes or instructions that can be stored in the storage device 12 and executed by the at least one processor 14 to provide a method for protecting private information stored in a mobile device 1.
In step S10, the activating module 100 receives a first instruction to activate a private protection function of the mobile device 1. In the embodiment, the private protection function can force private information to be accessed through the pair of glasses 2, and not to be displayed on a screen of the mobile device 1 when the private information is accessed. The first instruction can be a first inputted key (e.g., a letter “S” key) from an input device of the mobile device 1.
In step S11, the selection module 102 receives a second instruction to select the private information stored in the mobile device 1. In the embodiment, the selected private information may be pictures, text files, or videos, for example. The second instruction can be a second inputted key (e.g., a letter “F” key) from an input device of the mobile device 1.
In step S12, the communication module 104 connects the mobile device 1 to the pair of glasses 2 through a wireless network(e.g., BLUETOOTH), and transmits the selected private information to the pair of glasses 2.
In step S13, the displaying module 106 controls the pair of glasses 2 to display the selected private information on a visual screen of the pair of glasses, and not to display the selected private information on the screen of the mobile device 1.
In the embodiment, the communication module 104 can encrypt a connection between the mobile device 1 and the pair of glasses 2. For example, the communication module 104 can control the visual screen to display a visual keyboard including numbers of 0-9, and decrypt the connection by receiving a predefined password inputted through the visual keyboard.
In the embodiment, the selected private information of the mobile device 1 can be directly displayed on the screen of the mobile device 1 if the private protection function of the mobile device 1 is not activated.
Although certain disclosed embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
2013104979562 | Oct 2013 | CN | national |