CN104091140A - Information processing method and electronic device - Google Patents

Information processing method and electronic device Download PDF

Info

Publication number
CN104091140A
CN104091140A CN201410283802.8A CN201410283802A CN104091140A CN 104091140 A CN104091140 A CN 104091140A CN 201410283802 A CN201410283802 A CN 201410283802A CN 104091140 A CN104091140 A CN 104091140A
Authority
CN
China
Prior art keywords
data
information
quick response
response code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410283802.8A
Other languages
Chinese (zh)
Other versions
CN104091140B (en
Inventor
苏莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410283802.8A priority Critical patent/CN104091140B/en
Publication of CN104091140A publication Critical patent/CN104091140A/en
Application granted granted Critical
Publication of CN104091140B publication Critical patent/CN104091140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information processing method which is applied to an electronic device with an image acquisition unit. The information processing method solves the problem that in the prior art, potential safety hazards exist in two-dimension codes. The information processing method comprises the steps that a two-dimension code image is acquired through an image acquisition unit; first data are acquired based on the two-dimension code image; whether the first data are security data or not is verified based on a preset rule, and a first verification result is obtained; when the first verification result indicates that the first data are non-security data, a first prompt message is generated and output.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, relate in particular to a kind of information processing method and electronic equipment.
Background technology
Quick Response Code (claiming again two-dimensional bar code), is the chequered with black and white figure above distributing in plane (two-dimensional directional) according to certain rules with specific geometric figure, is a key of all information datas.In modern commerce activity, attainable application is very extensive, as: product false proof/tracing to the source, advertisement pushing, web site url, data download, commodity transaction, location/navigation, electronic certificate, vehicle management, information transmission, business card exchange, wifi shares etc.
In recent years, planar bar code technology is very popular, a lot of electronic equipments (for example: smart mobile phone, panel computer etc.) all have the function of scanning Quick Response Code, by camera and Quick Response Code scanning application program, Quick Response Code is scanned, thereby obtain the indicated information/resource of Quick Response Code, this has brought many facilities to user.
But the inventor finds above-mentioned technology and at least has following technical matters:
Now a lot of lawless persons are implanted to virus (or swindle information or swindle network address or trojan horse) in Quick Response Code, cause user when scanning Quick Response Code, have great potential safety hazard.
Summary of the invention
The present invention is by providing a kind of information processing method and electronic equipment, solved the technical matters that Quick Response Code in prior art exists potential safety hazard.
On the one hand, the invention provides a kind of information processing method, be applied to have in the electronic equipment of image acquisition units, described method comprises:
By described image acquisition units, gather image in 2 D code;
Based on described image in 2 D code, obtain the first data;
Based on pre-defined rule, verify whether described the first data are secure data, obtain a result;
When described the result shows that described the first data are non-security data, generate and export the first information.
Preferably, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Preferably, describedly based on pre-defined rule, verify whether described the first data are secure data, obtain a result, comprising:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
Preferably, describedly based on pre-defined rule, verify whether described the first data are secure data, obtain a result, comprising:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
Preferably, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
Preferably, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
Preferably, described when described the result shows that described the first data are non-security data, after generating and export the first information, also comprise:
The indicated network address of the first data described in disable access; And/or
Forbid downloading the indicated resource of described the first data.
On the other hand, the invention provides a kind of electronic equipment, comprising:
Image acquisition units, for gathering image in 2 D code;
Obtain unit, for obtaining the first data based on described image in 2 D code;
Authentication unit, for verifying based on pre-defined rule whether described the first data are secure data, obtains a result;
Output unit, when showing that when described the result described the first data are non-security data, generates and exports the first information.
Preferably, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Preferably, described authentication unit, specifically for:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
Preferably, described authentication unit, specifically for:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
Preferably, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
Preferably, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
Preferably, described electronic equipment, also comprises:
Forbid unit, for described when described the first the result shows that described the first data are non-security data, after generating and input the first information, the indicated network address of the first data described in disable access, and/or forbid downloading the indicated resource of described the first data.
The present invention at least has following technique effect or advantage:
The invention discloses a kind of information processing method, be applied to have in the electronic equipment of image acquisition units, described method comprises: by described image acquisition units, gather image in 2 D code; Based on described image in 2 D code, obtain the first data; Based on pre-defined rule, verify whether described the first data are secure data, obtain the first the result; When described the first the result shows that the first data are non-security data, generate and export the first information.So the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the process flow diagram of information processing method in the embodiment of the present invention one;
Fig. 2 is the structural representation of electronic equipment in the embodiment of the present invention two.
Embodiment
The embodiment of the present invention is by providing a kind of information processing method and electronic equipment, solved the technical matters that Quick Response Code in prior art exists potential safety hazard.
The technical scheme of the embodiment of the present invention is for solving the problems of the technologies described above, and general thought is as follows:
An information processing method, is applied to have in the electronic equipment of image acquisition units, and described method comprises: by described image acquisition units, gather image in 2 D code; Based on described image in 2 D code, obtain the first data; Based on pre-defined rule, verify whether described the first data are secure data, obtain the first the result; When described the first the result shows that the first data are non-security data, generate and export the first information.So the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
First explanation, the term "and/or" occurring herein, is only a kind of incidence relation of describing affiliated partner, and can there are three kinds of relations in expression, and for example, A and/or B, can represent: individualism A exists A and B, these three kinds of situations of individualism B simultaneously.In addition, character "/", generally represents that forward-backward correlation is to liking a kind of relation of "or" herein.
Embodiment mono-
The present embodiment provides a kind of information processing method, is applied to have in the electronic equipment of image acquisition units.As shown in Figure 1, described method comprises:
Step S101: gather image in 2 D code by described image acquisition units;
Step S102: obtain the first data based on described image in 2 D code;
Step S103: verify based on pre-defined rule whether described the first data are secure data, obtain a result;
Step S104: when described the result shows that the first data are non-security data, generate and export the first information.
By way of example, described electronic equipment can be smart mobile phone, panel computer, digital camera etc. electronic equipment, and for described electronic equipment which kind of electronic equipment specifically, the present embodiment is not done concrete restriction.
By way of example, described electronic equipment has an image acquisition units, and conventionally, described image acquisition units can be a camera, for gathering image in 2 D code.
By way of example, described the first data, can comprise;
The view data of described image in 2 D code, or
The symbolic information data that obtain after described image in 2 D code is resolved, for example: the download link of a certain network address or a certain resource.
By way of example, the present embodiment can specifically be applied in two bit code scanning processes, user, open Quick Response Code scan function, when a Quick Response Code is scanned, electronic equipment obtains the image in 2 D code that described image acquisition units collects, and obtains the first data based on described image in 2 D code, verify whether described the first data are secure data, if non-security data, generate and export the first information, make to point out in time the Quick Response Code of the current scanning of user dangerous.
In specific implementation process, described the first information, comprising: auditory tone cues information; And/or text prompt information; And/or picture cues information; And/or visual prompts information; For described the first information which kind of information specifically, the present embodiment is not done concrete restriction.
In the present embodiment, effectively solve the technical matters that in prior art, Quick Response Code exists potential safety hazard, realized the security that guarantees Quick Response Code scanning, guaranteed the technique effect of user information safety and property safety.
Optionally, in the present embodiment, step S103, comprising:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
In specific implementation process, described authentication server is for verifying the security of described the first data, when receiving the first data that described electronic equipment sends, can feed back in time the first the result, whether described the first the result can characterize described the first data is secure data.
Optionally, in the present embodiment, step S103, comprising:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
By way of example, electronic equipment can obtain described Quick Response Code virus base from authentication server, and verifies in described Quick Response Code virus base, whether to comprise described the first data, if comprise, determine that described the first data are non-security data, if do not comprise, determine that described the first data are secure data.Herein, described authentication server is responsible for safeguarding the data in described Quick Response Code virus base, and described electronic equipment can be regularly or Quick Response Code virus base described in real-time update.
Optionally, in the present embodiment, described Quick Response Code virus base, comprising:
User report number of times surpass the data of preset times (these data can be: image in 2 D code or image in 2 D code is resolved after the symbolic information data that obtain).
By way of example, described electronic equipment can provide an interactive interface, obtain the report information that user reports the Quick Response Code scanning, user can report unsafe Quick Response Code, and electronic equipment is sent to authentication server by the Quick Response Code of being reported.Authentication server is responsible for the report number of times of same Quick Response Code to add up, for example, if report number of times (: 20 times, 50 times, 100 times etc. surpasses preset times, herein, for report number of times, do not do concrete restriction), determine that this Quick Response Code of being reported is dangerous, and the Quick Response Code that this is reported adds in described Quick Response Code virus base to.
Optionally, in the present embodiment, after step S104, also comprise:
Forbid that described electronic equipment accesses the indicated network address of described the first data; And/or
Forbid that described electronic equipment downloads the indicated resource of described the first data.
By way of example, described the first data may indicate electronic equipment to access a unsafe network address (for example: swindle network address), now, answer the indicated network address of the first data described in disable access.
By way of example, described the first data may indicate electronic equipment (for example: trojan horse), now, should forbid downloading the indicated resource of described the first data to download a unsafe resource.
Technical scheme in the invention described above embodiment, at least has following technique effect or advantage:
In the present embodiment, in two bit code scanning processes, user, open Quick Response Code scan function, when a Quick Response Code is scanned, obtain the image in 2 D code that described image acquisition units collects, and obtain the first data based on described image in 2 D code, verify whether described the first data are secure data, if non-security data, generate and export the first information, to point out in time user.So the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
Embodiment bis-
Based on same inventive concept, it is a kind of for implementing the electronic equipment of the method for information processing described in the embodiment of the present invention one that the embodiment of the present invention provides.
As shown in Figure 2, a kind of electronic equipment, comprising:
Image acquisition units 201, for gathering image in 2 D code;
Obtain unit 202, for obtaining the first data based on described image in 2 D code;
Authentication unit 203, for verifying based on pre-defined rule whether described the first data are secure data, obtains the first the result;
Output unit 204, for when described the first the result shows that the first data are non-security data, generates and exports the first information.
By way of example, described electronic equipment can be smart mobile phone, panel computer, digital camera etc. electronic equipment, and for described electronic equipment which kind of electronic equipment specifically, the present embodiment is not done concrete restriction.
By way of example, described electronic equipment has an image acquisition units, and conventionally, described image acquisition units can be a camera, for gathering image in 2 D code.
In specific implementation process, described the first information, comprising: auditory tone cues information; And/or text prompt information; And/or picture cues information; And/or visual prompts information; For described the first information which kind of information specifically, the present embodiment is not done concrete restriction.
In the present embodiment, effectively solve the technical matters that in prior art, Quick Response Code exists potential safety hazard, realized the security that guarantees Quick Response Code scanning, guaranteed the technique effect of user information safety and property safety.
Optionally, in the present embodiment, described the first data, are specially;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Optionally, in the present embodiment, described authentication unit 203, specifically for:
Described the first data are sent to authentication server;
Receive the result of described authentication server feedback.
In specific implementation process, described authentication server is for verifying the security of described the first data, when receiving the first data that described electronic equipment sends, can feed back in time the first the result, whether described the first the result can characterize described the first data is secure data.
Optionally, in the present embodiment, described authentication unit 203, specifically for:
From an authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain described the result;
Wherein, if the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
By way of example, electronic equipment can obtain described Quick Response Code virus base from authentication server, and verifies in described Quick Response Code virus base, whether to comprise described the first data, if comprise, determine that described the first data are non-security data, if do not comprise, determine that described the first data are secure data.Herein, described authentication server is responsible for safeguarding the data in described Quick Response Code virus base, and described electronic equipment can be regularly or Quick Response Code virus base described in real-time update.
Optionally, in the present embodiment, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the Quick Response Code of preset times.
By way of example, described electronic equipment can provide an interactive interface, obtain the report information that user reports the Quick Response Code scanning, user can report unsafe Quick Response Code, and electronic equipment is sent to authentication server by the Quick Response Code of being reported.Authentication server is responsible for the report number of times of same Quick Response Code to add up, for example, if report number of times (: 20 times, 50 times, 100 times etc. surpasses preset times, herein, for report number of times, do not do concrete restriction), determine that this Quick Response Code of being reported is dangerous, and the Quick Response Code that this is reported adds in described Quick Response Code virus base to.
Optionally, in the present embodiment, described the first information, comprising: auditory tone cues information; And/or text prompt information; And/or picture cues information; And/or visual prompts information; For described the first information which kind of information specifically, the present embodiment is not done concrete restriction.
Optionally, in the present embodiment, described when described the first the result shows that the first data are non-security data, after generating and input the first information, also comprise:
Forbid that described electronic equipment accesses the indicated network address of described the first data; And/or
Forbid that described electronic equipment downloads the indicated resource of described the first data.
The electronic equipment that the electronic equipment of introducing due to the present embodiment adopts for implementing the method for information processing in the embodiment of the present invention one, so method of the information processing based on introducing in the embodiment of the present invention one, those skilled in the art can understand the present embodiment electronic equipment embodiment with and various version, so the method how realizing in the embodiment of the present invention one for this electronic equipment at this is introduced no longer in detail.As long as those skilled in the art implement the electronic equipment that the method for information processing in the embodiment of the present invention one adopts, all belong to the scope of institute of the present invention wish protection.
Technical scheme in the invention described above embodiment, at least has following technique effect or advantage:
In the present embodiment, a kind of electronic equipment of openly knowing clearly, comprising: image acquisition units, for gathering image in 2 D code; Obtain unit, for obtaining the first data based on described image in 2 D code; Authentication unit 203, for verifying based on pre-defined rule whether described the first data are secure data, obtains the first the result; Output unit, for when described the first the result shows that the first data are non-security data, generates and exports the first information.So the embodiment of the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, implement software example or in conjunction with the form of the embodiment of software and hardware aspect completely.And the present invention can adopt the form that wherein includes the upper computer program of implementing of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code one or more.
The present invention is with reference to describing according to process flow diagram and/or the block scheme of the method for the embodiment of the present invention, equipment (system) and computer program.Should understand can be in computer program instructions realization flow figure and/or block scheme each flow process and/or the flow process in square frame and process flow diagram and/or block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, the instruction of carrying out by the processor of computing machine or other programmable data processing device is produced for realizing the device in the function of flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, the instruction that makes to be stored in this computer-readable memory produces the manufacture that comprises command device, and this command device is realized the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make to carry out sequence of operations step to produce computer implemented processing on computing machine or other programmable devices, thereby the instruction of carrying out is provided for realizing the step of the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame on computing machine or other programmable devices.
Specifically, computer program instructions corresponding to information processing method in the embodiment of the present application can be stored in CD, hard disk, on the storage mediums such as USB flash disk, when the computer program instructions corresponding with information processing method in storage medium read or be performed by an electronic equipment, comprise the steps:
By described image acquisition units, gather image in 2 D code;
Based on described image in 2 D code, obtain the first data;
Based on pre-defined rule, verify whether described the first data are secure data, obtain a result;
When described the result shows that described the first data are non-security data, generate and export the first information.
Optionally, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Optionally, that in described storage medium, stores verifies based on pre-defined rule whether described the first data are secure data with step, obtains the step of a result, and corresponding computer instruction, being specifically performed in process, specifically comprises the steps:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
Optionally, that in described storage medium, stores verifies based on pre-defined rule whether described the first data are secure data with step, obtains the step of a result, and corresponding computer instruction, being specifically performed in process, specifically comprises the steps:
From an authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
Optionally, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
Optionally, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
Optionally, in described storage medium, also store other computer instruction, these computer instructions with step: when described the first the result shows that the first data are non-security data, after generating and input the first information, be performed, when being performed, comprise the steps:
Forbid that described electronic equipment accesses the indicated network address of described the first data; And/or
Forbid that described electronic equipment downloads the indicated resource of described the first data.
Although described the preferred embodiments of the present invention, once those skilled in the art obtain the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (14)

1. an information processing method, is applied to have in the electronic equipment of image acquisition units, and described method comprises:
By described image acquisition units, gather image in 2 D code;
Based on described image in 2 D code, obtain the first data;
Based on pre-defined rule, verify whether described the first data are secure data, obtain a result;
When described the result shows that described the first data are non-security data, generate and export the first information.
2. the method for claim 1, is characterized in that, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
3. the method for claim 1, is characterized in that, describedly based on pre-defined rule, verifies whether described the first data are secure data, obtains a result, comprising:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
4. the method for claim 1, is characterized in that, describedly based on pre-defined rule, verifies whether described the first data are secure data, obtains a result, comprising:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
5. method as claimed in claim 4, is characterized in that, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
6. method as claimed in claim 5, is characterized in that, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
7. the method as described in as arbitrary in claim 1~6, is characterized in that, described when described the result shows that described the first data are non-security data, after generating and export the first information, also comprises:
The indicated network address of the first data described in disable access; And/or
Forbid downloading the indicated resource of described the first data.
8. an electronic equipment, comprising:
Image acquisition units, for gathering image in 2 D code;
Obtain unit, for obtaining the first data based on described image in 2 D code;
Authentication unit, for verifying based on pre-defined rule whether described the first data are secure data, obtains a result;
Output unit, when showing that when described the result described the first data are non-security data, generates and exports the first information.
9. electronic equipment as claimed in claim 8, is characterized in that, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
10. electronic equipment as claimed in claim 8, is characterized in that, described authentication unit, specifically for:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
11. electronic equipments as claimed in claim 8, is characterized in that, described authentication unit, specifically for:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
12. electronic equipments as claimed in claim 11, is characterized in that, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
13. electronic equipments as claimed in claim 8, is characterized in that, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
14. electronic equipments as described in as arbitrary in claim 8~13, is characterized in that, described electronic equipment also comprises:
Forbid unit, for described when described the first the result shows that described the first data are non-security data, after generating and input the first information, the indicated network address of the first data described in disable access, and/or forbid downloading the indicated resource of described the first data.
CN201410283802.8A 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment Active CN104091140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410283802.8A CN104091140B (en) 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410283802.8A CN104091140B (en) 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104091140A true CN104091140A (en) 2014-10-08
CN104091140B CN104091140B (en) 2018-08-31

Family

ID=51638855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410283802.8A Active CN104091140B (en) 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104091140B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117256A (en) * 2015-08-31 2015-12-02 联想(北京)有限公司 Information processing method and electronic device
CN106055693A (en) * 2016-06-12 2016-10-26 深圳市金立通信设备有限公司 Information processing method and terminal
CN106599759A (en) * 2016-12-22 2017-04-26 广东小天才科技有限公司 Terminal information processing method and apparatus
CN106845587A (en) * 2016-12-09 2017-06-13 北京三快在线科技有限公司 Method and device, server, the electronic equipment of prints labels, checking label
CN107239534A (en) * 2017-05-31 2017-10-10 广东欧珀移动通信有限公司 Bar code scanning method, device, mobile terminal and computer-readable recording medium
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN108830581A (en) * 2018-04-17 2018-11-16 今电能源科技股份有限公司 Anti-fake method of payment, user terminal, service unit and sale terminal
CN110533133A (en) * 2019-09-05 2019-12-03 中国联合网络通信集团有限公司 Handle the method, apparatus and terminal of two dimensional code
CN111091019A (en) * 2019-12-23 2020-05-01 支付宝(杭州)信息技术有限公司 Information prompting method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090293134A1 (en) * 2008-05-20 2009-11-26 Canon Kabushiki Kaisha Image processing apparatus, image processing method, and program
CN101770554A (en) * 2009-01-04 2010-07-07 英业达股份有限公司 Antivirus system and method thereof
CN102692881A (en) * 2012-05-16 2012-09-26 中国海洋大学 Household appliance control method and control system based on two-dimension code
CN102761580A (en) * 2011-04-29 2012-10-31 阿里巴巴集团控股有限公司 Information safety processing method, processing server and processing client side
CN103136682A (en) * 2013-03-19 2013-06-05 王兆卿 System using cover type label to achieve counterfeiting and method
CN103324816A (en) * 2012-03-19 2013-09-25 联想(北京)有限公司 Information processing method and electric device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090293134A1 (en) * 2008-05-20 2009-11-26 Canon Kabushiki Kaisha Image processing apparatus, image processing method, and program
CN101770554A (en) * 2009-01-04 2010-07-07 英业达股份有限公司 Antivirus system and method thereof
CN102761580A (en) * 2011-04-29 2012-10-31 阿里巴巴集团控股有限公司 Information safety processing method, processing server and processing client side
CN103324816A (en) * 2012-03-19 2013-09-25 联想(北京)有限公司 Information processing method and electric device
CN102692881A (en) * 2012-05-16 2012-09-26 中国海洋大学 Household appliance control method and control system based on two-dimension code
CN103136682A (en) * 2013-03-19 2013-06-05 王兆卿 System using cover type label to achieve counterfeiting and method

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117256A (en) * 2015-08-31 2015-12-02 联想(北京)有限公司 Information processing method and electronic device
CN111368578A (en) * 2015-08-31 2020-07-03 联想(北京)有限公司 Information processing method and electronic equipment
CN106055693A (en) * 2016-06-12 2016-10-26 深圳市金立通信设备有限公司 Information processing method and terminal
CN106055693B (en) * 2016-06-12 2020-01-10 深圳市金立通信设备有限公司 Information processing method and terminal
CN106845587A (en) * 2016-12-09 2017-06-13 北京三快在线科技有限公司 Method and device, server, the electronic equipment of prints labels, checking label
CN106599759A (en) * 2016-12-22 2017-04-26 广东小天才科技有限公司 Terminal information processing method and apparatus
CN107239534B (en) * 2017-05-31 2020-06-30 Oppo广东移动通信有限公司 Bar code scanning method, bar code scanning device, mobile terminal and computer readable storage medium
CN107239534A (en) * 2017-05-31 2017-10-10 广东欧珀移动通信有限公司 Bar code scanning method, device, mobile terminal and computer-readable recording medium
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN108830581A (en) * 2018-04-17 2018-11-16 今电能源科技股份有限公司 Anti-fake method of payment, user terminal, service unit and sale terminal
CN110533133A (en) * 2019-09-05 2019-12-03 中国联合网络通信集团有限公司 Handle the method, apparatus and terminal of two dimensional code
CN111091019A (en) * 2019-12-23 2020-05-01 支付宝(杭州)信息技术有限公司 Information prompting method, device and equipment
CN111091019B (en) * 2019-12-23 2024-03-01 支付宝(杭州)信息技术有限公司 Information prompting method, device and equipment

Also Published As

Publication number Publication date
CN104091140B (en) 2018-08-31

Similar Documents

Publication Publication Date Title
CN104091140A (en) Information processing method and electronic device
CN107730196B (en) Project progress management method and terminal equipment
CN104219246B (en) A kind of control method and equipment of client display interface
CN108269062B (en) Electronic contract making method, device, equipment and medium based on H5
CN106157344B (en) Verification picture generation method and device
CN103841239A (en) Method and device for verifying authenticity of terminal
CN104169952A (en) Network payment method, device and system
CN105512881A (en) Method and terminal for completing payment on the basis of two-dimensional code
CN103903038A (en) System for dynamically displaying two-dimension codes and implementation method and application thereof
CN109992949A (en) A kind of equipment authentication method, air card-writing method and apparatus authentication device
CN103902729A (en) Method and device for recommending application program
CN104252613A (en) Method, device and terminal for obtaining virtual object
CN105868970A (en) Authentication method and electronic device
CN103929411A (en) Information displaying method, terminal, safety server and system
US9740835B2 (en) Systems and methods for creating and sharing protected content
CN102169534A (en) Method and device for displaying watermark
CN112685055A (en) Cluster construction method and device
CN109818957A (en) Intelligent contract call method, apparatus and system based on visualization interface
CN114443171A (en) Configurable service platform and configurable service implementation method
CN104768204A (en) Network access management method, wearable device and system
US20170169211A1 (en) One kind of website passwords generating method and apparatus
CN115622732A (en) Multi-application-based application authority control method and system, electronic device and medium
JP2014115873A (en) Store side device, information processing method and program
CN113485731A (en) Intelligent contract upgrading method and system for block chain
CN113792285A (en) Nuclear power station service authority control method and device and terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant