CN104091140A - Information processing method and electronic device - Google Patents
Information processing method and electronic device Download PDFInfo
- Publication number
- CN104091140A CN104091140A CN201410283802.8A CN201410283802A CN104091140A CN 104091140 A CN104091140 A CN 104091140A CN 201410283802 A CN201410283802 A CN 201410283802A CN 104091140 A CN104091140 A CN 104091140A
- Authority
- CN
- China
- Prior art keywords
- data
- information
- quick response
- response code
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information processing method which is applied to an electronic device with an image acquisition unit. The information processing method solves the problem that in the prior art, potential safety hazards exist in two-dimension codes. The information processing method comprises the steps that a two-dimension code image is acquired through an image acquisition unit; first data are acquired based on the two-dimension code image; whether the first data are security data or not is verified based on a preset rule, and a first verification result is obtained; when the first verification result indicates that the first data are non-security data, a first prompt message is generated and output.
Description
Technical field
The present invention relates to electronic technology field, relate in particular to a kind of information processing method and electronic equipment.
Background technology
Quick Response Code (claiming again two-dimensional bar code), is the chequered with black and white figure above distributing in plane (two-dimensional directional) according to certain rules with specific geometric figure, is a key of all information datas.In modern commerce activity, attainable application is very extensive, as: product false proof/tracing to the source, advertisement pushing, web site url, data download, commodity transaction, location/navigation, electronic certificate, vehicle management, information transmission, business card exchange, wifi shares etc.
In recent years, planar bar code technology is very popular, a lot of electronic equipments (for example: smart mobile phone, panel computer etc.) all have the function of scanning Quick Response Code, by camera and Quick Response Code scanning application program, Quick Response Code is scanned, thereby obtain the indicated information/resource of Quick Response Code, this has brought many facilities to user.
But the inventor finds above-mentioned technology and at least has following technical matters:
Now a lot of lawless persons are implanted to virus (or swindle information or swindle network address or trojan horse) in Quick Response Code, cause user when scanning Quick Response Code, have great potential safety hazard.
Summary of the invention
The present invention is by providing a kind of information processing method and electronic equipment, solved the technical matters that Quick Response Code in prior art exists potential safety hazard.
On the one hand, the invention provides a kind of information processing method, be applied to have in the electronic equipment of image acquisition units, described method comprises:
By described image acquisition units, gather image in 2 D code;
Based on described image in 2 D code, obtain the first data;
Based on pre-defined rule, verify whether described the first data are secure data, obtain a result;
When described the result shows that described the first data are non-security data, generate and export the first information.
Preferably, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Preferably, describedly based on pre-defined rule, verify whether described the first data are secure data, obtain a result, comprising:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
Preferably, describedly based on pre-defined rule, verify whether described the first data are secure data, obtain a result, comprising:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
Preferably, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
Preferably, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
Preferably, described when described the result shows that described the first data are non-security data, after generating and export the first information, also comprise:
The indicated network address of the first data described in disable access; And/or
Forbid downloading the indicated resource of described the first data.
On the other hand, the invention provides a kind of electronic equipment, comprising:
Image acquisition units, for gathering image in 2 D code;
Obtain unit, for obtaining the first data based on described image in 2 D code;
Authentication unit, for verifying based on pre-defined rule whether described the first data are secure data, obtains a result;
Output unit, when showing that when described the result described the first data are non-security data, generates and exports the first information.
Preferably, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Preferably, described authentication unit, specifically for:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
Preferably, described authentication unit, specifically for:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
Preferably, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
Preferably, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
Preferably, described electronic equipment, also comprises:
Forbid unit, for described when described the first the result shows that described the first data are non-security data, after generating and input the first information, the indicated network address of the first data described in disable access, and/or forbid downloading the indicated resource of described the first data.
The present invention at least has following technique effect or advantage:
The invention discloses a kind of information processing method, be applied to have in the electronic equipment of image acquisition units, described method comprises: by described image acquisition units, gather image in 2 D code; Based on described image in 2 D code, obtain the first data; Based on pre-defined rule, verify whether described the first data are secure data, obtain the first the result; When described the first the result shows that the first data are non-security data, generate and export the first information.So the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the process flow diagram of information processing method in the embodiment of the present invention one;
Fig. 2 is the structural representation of electronic equipment in the embodiment of the present invention two.
Embodiment
The embodiment of the present invention is by providing a kind of information processing method and electronic equipment, solved the technical matters that Quick Response Code in prior art exists potential safety hazard.
The technical scheme of the embodiment of the present invention is for solving the problems of the technologies described above, and general thought is as follows:
An information processing method, is applied to have in the electronic equipment of image acquisition units, and described method comprises: by described image acquisition units, gather image in 2 D code; Based on described image in 2 D code, obtain the first data; Based on pre-defined rule, verify whether described the first data are secure data, obtain the first the result; When described the first the result shows that the first data are non-security data, generate and export the first information.So the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
First explanation, the term "and/or" occurring herein, is only a kind of incidence relation of describing affiliated partner, and can there are three kinds of relations in expression, and for example, A and/or B, can represent: individualism A exists A and B, these three kinds of situations of individualism B simultaneously.In addition, character "/", generally represents that forward-backward correlation is to liking a kind of relation of "or" herein.
Embodiment mono-
The present embodiment provides a kind of information processing method, is applied to have in the electronic equipment of image acquisition units.As shown in Figure 1, described method comprises:
Step S101: gather image in 2 D code by described image acquisition units;
Step S102: obtain the first data based on described image in 2 D code;
Step S103: verify based on pre-defined rule whether described the first data are secure data, obtain a result;
Step S104: when described the result shows that the first data are non-security data, generate and export the first information.
By way of example, described electronic equipment can be smart mobile phone, panel computer, digital camera etc. electronic equipment, and for described electronic equipment which kind of electronic equipment specifically, the present embodiment is not done concrete restriction.
By way of example, described electronic equipment has an image acquisition units, and conventionally, described image acquisition units can be a camera, for gathering image in 2 D code.
By way of example, described the first data, can comprise;
The view data of described image in 2 D code, or
The symbolic information data that obtain after described image in 2 D code is resolved, for example: the download link of a certain network address or a certain resource.
By way of example, the present embodiment can specifically be applied in two bit code scanning processes, user, open Quick Response Code scan function, when a Quick Response Code is scanned, electronic equipment obtains the image in 2 D code that described image acquisition units collects, and obtains the first data based on described image in 2 D code, verify whether described the first data are secure data, if non-security data, generate and export the first information, make to point out in time the Quick Response Code of the current scanning of user dangerous.
In specific implementation process, described the first information, comprising: auditory tone cues information; And/or text prompt information; And/or picture cues information; And/or visual prompts information; For described the first information which kind of information specifically, the present embodiment is not done concrete restriction.
In the present embodiment, effectively solve the technical matters that in prior art, Quick Response Code exists potential safety hazard, realized the security that guarantees Quick Response Code scanning, guaranteed the technique effect of user information safety and property safety.
Optionally, in the present embodiment, step S103, comprising:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
In specific implementation process, described authentication server is for verifying the security of described the first data, when receiving the first data that described electronic equipment sends, can feed back in time the first the result, whether described the first the result can characterize described the first data is secure data.
Optionally, in the present embodiment, step S103, comprising:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
By way of example, electronic equipment can obtain described Quick Response Code virus base from authentication server, and verifies in described Quick Response Code virus base, whether to comprise described the first data, if comprise, determine that described the first data are non-security data, if do not comprise, determine that described the first data are secure data.Herein, described authentication server is responsible for safeguarding the data in described Quick Response Code virus base, and described electronic equipment can be regularly or Quick Response Code virus base described in real-time update.
Optionally, in the present embodiment, described Quick Response Code virus base, comprising:
User report number of times surpass the data of preset times (these data can be: image in 2 D code or image in 2 D code is resolved after the symbolic information data that obtain).
By way of example, described electronic equipment can provide an interactive interface, obtain the report information that user reports the Quick Response Code scanning, user can report unsafe Quick Response Code, and electronic equipment is sent to authentication server by the Quick Response Code of being reported.Authentication server is responsible for the report number of times of same Quick Response Code to add up, for example, if report number of times (: 20 times, 50 times, 100 times etc. surpasses preset times, herein, for report number of times, do not do concrete restriction), determine that this Quick Response Code of being reported is dangerous, and the Quick Response Code that this is reported adds in described Quick Response Code virus base to.
Optionally, in the present embodiment, after step S104, also comprise:
Forbid that described electronic equipment accesses the indicated network address of described the first data; And/or
Forbid that described electronic equipment downloads the indicated resource of described the first data.
By way of example, described the first data may indicate electronic equipment to access a unsafe network address (for example: swindle network address), now, answer the indicated network address of the first data described in disable access.
By way of example, described the first data may indicate electronic equipment (for example: trojan horse), now, should forbid downloading the indicated resource of described the first data to download a unsafe resource.
Technical scheme in the invention described above embodiment, at least has following technique effect or advantage:
In the present embodiment, in two bit code scanning processes, user, open Quick Response Code scan function, when a Quick Response Code is scanned, obtain the image in 2 D code that described image acquisition units collects, and obtain the first data based on described image in 2 D code, verify whether described the first data are secure data, if non-security data, generate and export the first information, to point out in time user.So the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
Embodiment bis-
Based on same inventive concept, it is a kind of for implementing the electronic equipment of the method for information processing described in the embodiment of the present invention one that the embodiment of the present invention provides.
As shown in Figure 2, a kind of electronic equipment, comprising:
Image acquisition units 201, for gathering image in 2 D code;
Obtain unit 202, for obtaining the first data based on described image in 2 D code;
Authentication unit 203, for verifying based on pre-defined rule whether described the first data are secure data, obtains the first the result;
Output unit 204, for when described the first the result shows that the first data are non-security data, generates and exports the first information.
By way of example, described electronic equipment can be smart mobile phone, panel computer, digital camera etc. electronic equipment, and for described electronic equipment which kind of electronic equipment specifically, the present embodiment is not done concrete restriction.
By way of example, described electronic equipment has an image acquisition units, and conventionally, described image acquisition units can be a camera, for gathering image in 2 D code.
In specific implementation process, described the first information, comprising: auditory tone cues information; And/or text prompt information; And/or picture cues information; And/or visual prompts information; For described the first information which kind of information specifically, the present embodiment is not done concrete restriction.
In the present embodiment, effectively solve the technical matters that in prior art, Quick Response Code exists potential safety hazard, realized the security that guarantees Quick Response Code scanning, guaranteed the technique effect of user information safety and property safety.
Optionally, in the present embodiment, described the first data, are specially;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Optionally, in the present embodiment, described authentication unit 203, specifically for:
Described the first data are sent to authentication server;
Receive the result of described authentication server feedback.
In specific implementation process, described authentication server is for verifying the security of described the first data, when receiving the first data that described electronic equipment sends, can feed back in time the first the result, whether described the first the result can characterize described the first data is secure data.
Optionally, in the present embodiment, described authentication unit 203, specifically for:
From an authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain described the result;
Wherein, if the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
By way of example, electronic equipment can obtain described Quick Response Code virus base from authentication server, and verifies in described Quick Response Code virus base, whether to comprise described the first data, if comprise, determine that described the first data are non-security data, if do not comprise, determine that described the first data are secure data.Herein, described authentication server is responsible for safeguarding the data in described Quick Response Code virus base, and described electronic equipment can be regularly or Quick Response Code virus base described in real-time update.
Optionally, in the present embodiment, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the Quick Response Code of preset times.
By way of example, described electronic equipment can provide an interactive interface, obtain the report information that user reports the Quick Response Code scanning, user can report unsafe Quick Response Code, and electronic equipment is sent to authentication server by the Quick Response Code of being reported.Authentication server is responsible for the report number of times of same Quick Response Code to add up, for example, if report number of times (: 20 times, 50 times, 100 times etc. surpasses preset times, herein, for report number of times, do not do concrete restriction), determine that this Quick Response Code of being reported is dangerous, and the Quick Response Code that this is reported adds in described Quick Response Code virus base to.
Optionally, in the present embodiment, described the first information, comprising: auditory tone cues information; And/or text prompt information; And/or picture cues information; And/or visual prompts information; For described the first information which kind of information specifically, the present embodiment is not done concrete restriction.
Optionally, in the present embodiment, described when described the first the result shows that the first data are non-security data, after generating and input the first information, also comprise:
Forbid that described electronic equipment accesses the indicated network address of described the first data; And/or
Forbid that described electronic equipment downloads the indicated resource of described the first data.
The electronic equipment that the electronic equipment of introducing due to the present embodiment adopts for implementing the method for information processing in the embodiment of the present invention one, so method of the information processing based on introducing in the embodiment of the present invention one, those skilled in the art can understand the present embodiment electronic equipment embodiment with and various version, so the method how realizing in the embodiment of the present invention one for this electronic equipment at this is introduced no longer in detail.As long as those skilled in the art implement the electronic equipment that the method for information processing in the embodiment of the present invention one adopts, all belong to the scope of institute of the present invention wish protection.
Technical scheme in the invention described above embodiment, at least has following technique effect or advantage:
In the present embodiment, a kind of electronic equipment of openly knowing clearly, comprising: image acquisition units, for gathering image in 2 D code; Obtain unit, for obtaining the first data based on described image in 2 D code; Authentication unit 203, for verifying based on pre-defined rule whether described the first data are secure data, obtains the first the result; Output unit, for when described the first the result shows that the first data are non-security data, generates and exports the first information.So the embodiment of the present invention has solved the technical matters that in prior art, Quick Response Code exists potential safety hazard effectively, has realized the security that guarantees Quick Response Code scanning, guarantees the technique effect of user information safety and property safety.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt complete hardware implementation example, implement software example or in conjunction with the form of the embodiment of software and hardware aspect completely.And the present invention can adopt the form that wherein includes the upper computer program of implementing of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code one or more.
The present invention is with reference to describing according to process flow diagram and/or the block scheme of the method for the embodiment of the present invention, equipment (system) and computer program.Should understand can be in computer program instructions realization flow figure and/or block scheme each flow process and/or the flow process in square frame and process flow diagram and/or block scheme and/or the combination of square frame.Can provide these computer program instructions to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, the instruction of carrying out by the processor of computing machine or other programmable data processing device is produced for realizing the device in the function of flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame appointments.
These computer program instructions also can be stored in energy vectoring computer or the computer-readable memory of other programmable data processing device with ad hoc fashion work, the instruction that makes to be stored in this computer-readable memory produces the manufacture that comprises command device, and this command device is realized the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make to carry out sequence of operations step to produce computer implemented processing on computing machine or other programmable devices, thereby the instruction of carrying out is provided for realizing the step of the function of appointment in flow process of process flow diagram or a plurality of flow process and/or square frame of block scheme or a plurality of square frame on computing machine or other programmable devices.
Specifically, computer program instructions corresponding to information processing method in the embodiment of the present application can be stored in CD, hard disk, on the storage mediums such as USB flash disk, when the computer program instructions corresponding with information processing method in storage medium read or be performed by an electronic equipment, comprise the steps:
By described image acquisition units, gather image in 2 D code;
Based on described image in 2 D code, obtain the first data;
Based on pre-defined rule, verify whether described the first data are secure data, obtain a result;
When described the result shows that described the first data are non-security data, generate and export the first information.
Optionally, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
Optionally, that in described storage medium, stores verifies based on pre-defined rule whether described the first data are secure data with step, obtains the step of a result, and corresponding computer instruction, being specifically performed in process, specifically comprises the steps:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
Optionally, that in described storage medium, stores verifies based on pre-defined rule whether described the first data are secure data with step, obtains the step of a result, and corresponding computer instruction, being specifically performed in process, specifically comprises the steps:
From an authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
Optionally, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
Optionally, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
Optionally, in described storage medium, also store other computer instruction, these computer instructions with step: when described the first the result shows that the first data are non-security data, after generating and input the first information, be performed, when being performed, comprise the steps:
Forbid that described electronic equipment accesses the indicated network address of described the first data; And/or
Forbid that described electronic equipment downloads the indicated resource of described the first data.
Although described the preferred embodiments of the present invention, once those skilled in the art obtain the basic creative concept of cicada, can make other change and modification to these embodiment.So claims are intended to all changes and the modification that are interpreted as comprising preferred embodiment and fall into the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.
Claims (14)
1. an information processing method, is applied to have in the electronic equipment of image acquisition units, and described method comprises:
By described image acquisition units, gather image in 2 D code;
Based on described image in 2 D code, obtain the first data;
Based on pre-defined rule, verify whether described the first data are secure data, obtain a result;
When described the result shows that described the first data are non-security data, generate and export the first information.
2. the method for claim 1, is characterized in that, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
3. the method for claim 1, is characterized in that, describedly based on pre-defined rule, verifies whether described the first data are secure data, obtains a result, comprising:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
4. the method for claim 1, is characterized in that, describedly based on pre-defined rule, verifies whether described the first data are secure data, obtains a result, comprising:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
5. method as claimed in claim 4, is characterized in that, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
6. method as claimed in claim 5, is characterized in that, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
7. the method as described in as arbitrary in claim 1~6, is characterized in that, described when described the result shows that described the first data are non-security data, after generating and export the first information, also comprises:
The indicated network address of the first data described in disable access; And/or
Forbid downloading the indicated resource of described the first data.
8. an electronic equipment, comprising:
Image acquisition units, for gathering image in 2 D code;
Obtain unit, for obtaining the first data based on described image in 2 D code;
Authentication unit, for verifying based on pre-defined rule whether described the first data are secure data, obtains a result;
Output unit, when showing that when described the result described the first data are non-security data, generates and exports the first information.
9. electronic equipment as claimed in claim 8, is characterized in that, described the first data, comprise;
The view data of described image in 2 D code; Or
The symbolic information data that obtain after described image in 2 D code is resolved.
10. electronic equipment as claimed in claim 8, is characterized in that, described authentication unit, specifically for:
Described the first data are sent to authentication server;
Receive the first the result of described authentication server feedback.
11. electronic equipments as claimed in claim 8, is characterized in that, described authentication unit, specifically for:
From authentication server, obtain Quick Response Code virus base;
Verify in described Quick Response Code virus base whether comprise described the first data, obtain the second the result;
Wherein, if described the second the result shows to comprise described the first data in described Quick Response Code virus base, determine that described the first data are non-security data.
12. electronic equipments as claimed in claim 11, is characterized in that, described Quick Response Code virus base, comprising:
User reports that number of times surpasses the data of preset times.
13. electronic equipments as claimed in claim 8, is characterized in that, described the first information, comprising:
Auditory tone cues information; And/or
Text prompt information; And/or
Picture cues information; And/or
Visual prompts information.
14. electronic equipments as described in as arbitrary in claim 8~13, is characterized in that, described electronic equipment also comprises:
Forbid unit, for described when described the first the result shows that described the first data are non-security data, after generating and input the first information, the indicated network address of the first data described in disable access, and/or forbid downloading the indicated resource of described the first data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410283802.8A CN104091140B (en) | 2014-06-23 | 2014-06-23 | A kind of information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410283802.8A CN104091140B (en) | 2014-06-23 | 2014-06-23 | A kind of information processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104091140A true CN104091140A (en) | 2014-10-08 |
CN104091140B CN104091140B (en) | 2018-08-31 |
Family
ID=51638855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410283802.8A Active CN104091140B (en) | 2014-06-23 | 2014-06-23 | A kind of information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104091140B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105117256A (en) * | 2015-08-31 | 2015-12-02 | 联想(北京)有限公司 | Information processing method and electronic device |
CN106055693A (en) * | 2016-06-12 | 2016-10-26 | 深圳市金立通信设备有限公司 | Information processing method and terminal |
CN106599759A (en) * | 2016-12-22 | 2017-04-26 | 广东小天才科技有限公司 | Terminal information processing method and apparatus |
CN106845587A (en) * | 2016-12-09 | 2017-06-13 | 北京三快在线科技有限公司 | Method and device, server, the electronic equipment of prints labels, checking label |
CN107239534A (en) * | 2017-05-31 | 2017-10-10 | 广东欧珀移动通信有限公司 | Bar code scanning method, device, mobile terminal and computer-readable recording medium |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN108830581A (en) * | 2018-04-17 | 2018-11-16 | 今电能源科技股份有限公司 | Anti-fake method of payment, user terminal, service unit and sale terminal |
CN110533133A (en) * | 2019-09-05 | 2019-12-03 | 中国联合网络通信集团有限公司 | Handle the method, apparatus and terminal of two dimensional code |
CN111091019A (en) * | 2019-12-23 | 2020-05-01 | 支付宝(杭州)信息技术有限公司 | Information prompting method, device and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090293134A1 (en) * | 2008-05-20 | 2009-11-26 | Canon Kabushiki Kaisha | Image processing apparatus, image processing method, and program |
CN101770554A (en) * | 2009-01-04 | 2010-07-07 | 英业达股份有限公司 | Antivirus system and method thereof |
CN102692881A (en) * | 2012-05-16 | 2012-09-26 | 中国海洋大学 | Household appliance control method and control system based on two-dimension code |
CN102761580A (en) * | 2011-04-29 | 2012-10-31 | 阿里巴巴集团控股有限公司 | Information safety processing method, processing server and processing client side |
CN103136682A (en) * | 2013-03-19 | 2013-06-05 | 王兆卿 | System using cover type label to achieve counterfeiting and method |
CN103324816A (en) * | 2012-03-19 | 2013-09-25 | 联想(北京)有限公司 | Information processing method and electric device |
-
2014
- 2014-06-23 CN CN201410283802.8A patent/CN104091140B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090293134A1 (en) * | 2008-05-20 | 2009-11-26 | Canon Kabushiki Kaisha | Image processing apparatus, image processing method, and program |
CN101770554A (en) * | 2009-01-04 | 2010-07-07 | 英业达股份有限公司 | Antivirus system and method thereof |
CN102761580A (en) * | 2011-04-29 | 2012-10-31 | 阿里巴巴集团控股有限公司 | Information safety processing method, processing server and processing client side |
CN103324816A (en) * | 2012-03-19 | 2013-09-25 | 联想(北京)有限公司 | Information processing method and electric device |
CN102692881A (en) * | 2012-05-16 | 2012-09-26 | 中国海洋大学 | Household appliance control method and control system based on two-dimension code |
CN103136682A (en) * | 2013-03-19 | 2013-06-05 | 王兆卿 | System using cover type label to achieve counterfeiting and method |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105117256A (en) * | 2015-08-31 | 2015-12-02 | 联想(北京)有限公司 | Information processing method and electronic device |
CN111368578A (en) * | 2015-08-31 | 2020-07-03 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN106055693A (en) * | 2016-06-12 | 2016-10-26 | 深圳市金立通信设备有限公司 | Information processing method and terminal |
CN106055693B (en) * | 2016-06-12 | 2020-01-10 | 深圳市金立通信设备有限公司 | Information processing method and terminal |
CN106845587A (en) * | 2016-12-09 | 2017-06-13 | 北京三快在线科技有限公司 | Method and device, server, the electronic equipment of prints labels, checking label |
CN106599759A (en) * | 2016-12-22 | 2017-04-26 | 广东小天才科技有限公司 | Terminal information processing method and apparatus |
CN107239534B (en) * | 2017-05-31 | 2020-06-30 | Oppo广东移动通信有限公司 | Bar code scanning method, bar code scanning device, mobile terminal and computer readable storage medium |
CN107239534A (en) * | 2017-05-31 | 2017-10-10 | 广东欧珀移动通信有限公司 | Bar code scanning method, device, mobile terminal and computer-readable recording medium |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN108830581A (en) * | 2018-04-17 | 2018-11-16 | 今电能源科技股份有限公司 | Anti-fake method of payment, user terminal, service unit and sale terminal |
CN110533133A (en) * | 2019-09-05 | 2019-12-03 | 中国联合网络通信集团有限公司 | Handle the method, apparatus and terminal of two dimensional code |
CN111091019A (en) * | 2019-12-23 | 2020-05-01 | 支付宝(杭州)信息技术有限公司 | Information prompting method, device and equipment |
CN111091019B (en) * | 2019-12-23 | 2024-03-01 | 支付宝(杭州)信息技术有限公司 | Information prompting method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN104091140B (en) | 2018-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104091140A (en) | Information processing method and electronic device | |
CN107730196B (en) | Project progress management method and terminal equipment | |
CN104219246B (en) | A kind of control method and equipment of client display interface | |
CN108269062B (en) | Electronic contract making method, device, equipment and medium based on H5 | |
CN106157344B (en) | Verification picture generation method and device | |
CN103841239A (en) | Method and device for verifying authenticity of terminal | |
CN104169952A (en) | Network payment method, device and system | |
CN105512881A (en) | Method and terminal for completing payment on the basis of two-dimensional code | |
CN103903038A (en) | System for dynamically displaying two-dimension codes and implementation method and application thereof | |
CN109992949A (en) | A kind of equipment authentication method, air card-writing method and apparatus authentication device | |
CN103902729A (en) | Method and device for recommending application program | |
CN104252613A (en) | Method, device and terminal for obtaining virtual object | |
CN105868970A (en) | Authentication method and electronic device | |
CN103929411A (en) | Information displaying method, terminal, safety server and system | |
US9740835B2 (en) | Systems and methods for creating and sharing protected content | |
CN102169534A (en) | Method and device for displaying watermark | |
CN112685055A (en) | Cluster construction method and device | |
CN109818957A (en) | Intelligent contract call method, apparatus and system based on visualization interface | |
CN114443171A (en) | Configurable service platform and configurable service implementation method | |
CN104768204A (en) | Network access management method, wearable device and system | |
US20170169211A1 (en) | One kind of website passwords generating method and apparatus | |
CN115622732A (en) | Multi-application-based application authority control method and system, electronic device and medium | |
JP2014115873A (en) | Store side device, information processing method and program | |
CN113485731A (en) | Intelligent contract upgrading method and system for block chain | |
CN113792285A (en) | Nuclear power station service authority control method and device and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |