CN104091140B - A kind of information processing method and electronic equipment - Google Patents

A kind of information processing method and electronic equipment Download PDF

Info

Publication number
CN104091140B
CN104091140B CN201410283802.8A CN201410283802A CN104091140B CN 104091140 B CN104091140 B CN 104091140B CN 201410283802 A CN201410283802 A CN 201410283802A CN 104091140 B CN104091140 B CN 104091140B
Authority
CN
China
Prior art keywords
data
verification result
image
code
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410283802.8A
Other languages
Chinese (zh)
Other versions
CN104091140A (en
Inventor
苏莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410283802.8A priority Critical patent/CN104091140B/en
Publication of CN104091140A publication Critical patent/CN104091140A/en
Application granted granted Critical
Publication of CN104091140B publication Critical patent/CN104091140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a kind of information processing method, it is applied in the electronic equipment with image acquisition units, solves Quick Response Code in the prior art and there is technical issues that.The method includes:Image in 2 D code is acquired by described image collecting unit;The first data are obtained based on the image in 2 D code;It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;When the verification result shows that first data are non-secure data, generates and export the first prompt message.Meanwhile the invention also discloses a kind of electronic equipment.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field more particularly to a kind of information processing methods and electronic equipment.
Background technology
Quick Response Code (also known as two-dimensional bar code) is divided in plane (two-dimensional directional) according to certain rules with specific geometric figure The chequered with black and white figure of cloth is a key of all information datas.In modern business activities, it can be achieved that application very Extensively, such as:Product false proof/trace to the source, advertisement pushing, web site url, data download, commodity transaction, positioning/navigation, electronic certificate, Vehicle management, information transmission, business card exchange, wifi are shared etc..
In recent years, planar bar code technology was very popular, many electronic equipments (such as:Smart mobile phone, tablet computer etc.) all Have the function of scanning the two-dimensional code, Quick Response Code is scanned by camera and two-dimensional code scanning application program, to obtain Information/resource indicated by Quick Response Code, this brings many facilities to user.
But the inventors discovered that above-mentioned technology at least has the following technical problems:
Virus (or fraud information or swindle network address or trojan horse) is implanted to Quick Response Code by many criminals now In, cause user when scanning the two-dimensional code, there are great security risks.
Invention content
The present invention solves Quick Response Code in the prior art and there is peace by a kind of information processing method of offer and electronic equipment The technical issues of full hidden danger.
On the one hand, the present invention provides a kind of information processing method, is applied in the electronic equipment with image acquisition units, The method includes:
Image in 2 D code is acquired by described image collecting unit;
The first data are obtained based on the image in 2 D code;
It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
When the verification result shows that first data are non-secure data, generates and export the first prompt message.
Preferably, first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Preferably, described to verify whether first data are secure data based on pre-defined rule, a verification result is obtained, Including:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
Preferably, described to verify whether first data are secure data based on pre-defined rule, a verification result is obtained, Including:
Quick Response Code virus base is obtained from authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that First data are non-secure data.
Preferably, the Quick Response Code virus base, including:
User's report number is more than the data of preset times.
Preferably, first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
Preferably, described when the verification result shows that first data are non-secure data, it generates and exports the After one prompt message, further include:
Forbid accessing the network address indicated by first data;And/or
Forbid downloading the resource indicated by first data.
On the other hand, the present invention provides a kind of electronic equipment, including:
Image acquisition units, for acquiring image in 2 D code;
Obtaining unit, for obtaining the first data based on the image in 2 D code;
Authentication unit verifies whether first data are secure data for being based on pre-defined rule, obtains a verification knot Fruit;
Output unit, for when the verification result shows that first data are non-secure data, generating and exporting First prompt message.
Preferably, first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Preferably, the authentication unit, is specifically used for:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
Preferably, the authentication unit, is specifically used for:
Quick Response Code virus base is obtained from authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that First data are non-secure data.
Preferably, the Quick Response Code virus base, including:
User's report number is more than the data of preset times.
Preferably, first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
Preferably, the electronic equipment further includes:
Forbid unit, it is raw for described when first verification result shows that first data are non-secure data At and after inputting the first prompt message, forbid accessing the network address indicated by first data, and/or forbid downloading described the Resource indicated by one data.
The present invention has at least the following technical effects or advantages:
The invention discloses a kind of information processing method, it is applied in the electronic equipment with image acquisition units, it is described Method includes:Image in 2 D code is acquired by described image collecting unit;The first data are obtained based on the image in 2 D code;Base It verifies whether first data are secure data in pre-defined rule, obtains the first verification result;When first verification result When showing that the first data are non-secure data, generates and export the first prompt message.So present invention efficiently solves existing Quick Response Code there is technical issues that in technology, realize the safety for ensureing two-dimensional code scanning, ensure user information The technique effect of safety and property safety.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart of information processing method in the embodiment of the present invention one;
Fig. 2 is the structural schematic diagram of electronic equipment in the embodiment of the present invention two.
Specific implementation mode
The embodiment of the present invention solves Quick Response Code in the prior art by a kind of information processing method of offer and electronic equipment There is technical issues that.
The technical solution of the embodiment of the present invention is in order to solve the above technical problems, general thought is as follows:
A kind of information processing method is applied in the electronic equipment with image acquisition units, the method includes:Pass through Described image collecting unit acquires image in 2 D code;The first data are obtained based on the image in 2 D code;It is tested based on pre-defined rule Demonstrate,prove whether first data are secure data, obtains the first verification result;When first verification result shows the first data For non-secure data when, generate and export the first prompt message.So present invention efficiently solves Quick Response Codes in the prior art There is technical issues that, realize the safety for ensureing two-dimensional code scanning, ensures user information safety and property peace Full technique effect.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Illustrate first, herein presented term "and/or", only a kind of incidence relation of description affiliated partner, table Show may exist three kinds of relationships, for example, A and/or B, can indicate:Individualism A, exists simultaneously A and B, individualism B this three Kind situation.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Embodiment one
The present embodiment provides a kind of information processing method, it is applied in the electronic equipment with image acquisition units.Such as Fig. 1 It is shown, the method includes:
Step S101:Image in 2 D code is acquired by described image collecting unit;
Step S102:The first data are obtained based on the image in 2 D code;
Step S103:It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
Step S104:When the verification result shows that the first data are non-secure data, generates and export the first prompt Information.
For example, the electronic equipment can be smart mobile phone, tablet computer, digital camera etc. electronic equipment, right It is specifically which kind of electronic equipment in the electronic equipment, the present embodiment is not particularly limited.
For example, the electronic equipment has an image acquisition units, in general, described image collecting unit can be one Camera, for acquiring image in 2 D code.
For example, first data may include;
The image data of the image in 2 D code, or
The symbolic information data obtained after being parsed to the image in 2 D code, such as:A certain network address or a certain resource Download link.
For example, the present embodiment can be particularly applicable in two code scanning processes, and two-dimensional code scanning is opened in user Function, when being scanned to a Quick Response Code, electronic equipment obtains the collected image in 2 D code of described image collecting unit institute, And the first data are obtained based on the image in 2 D code, verify whether first data are secure data, if non-security number According to, then generate and export the first prompt message, make in time prompt user's Current Scan Quick Response Code it is dangerous.
In specific implementation process, first prompt message, including:Auditory tone cues information;And/or text prompt letter Breath;And/or picture cues information;And/or visual prompts information;It is specifically which kind of information for first prompt message, this Embodiment is not particularly limited.
In the present embodiment, it efficiently solves Quick Response Code in the prior art there is technical issues that, realize Ensure the safety of two-dimensional code scanning, ensures user information safety and the technique effect of property safety.
Optionally, in the present embodiment, step S103, including:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
In specific implementation process, the authentication server is used to verify the safety of first data, is receiving When the first data that the electronic equipment is sent, the first verification result can be timely feedbacked, first verification result being capable of table Levy whether first data are secure data.
Optionally, in the present embodiment, step S103, including:
Quick Response Code virus base is obtained from authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that First data are non-secure data.
For example, electronic equipment can obtain the Quick Response Code virus base from authentication server, and verify the two dimension Whether include first data in code virus base, if including, it is determined that first data are non-secure data, if not wrapping Contain, it is determined that first data are secure data.Herein, the authentication server is responsible for safeguarding in the Quick Response Code virus base Data, the electronic equipment can timing or real-time update described in Quick Response Code virus base.
Optionally, in the present embodiment, the Quick Response Code virus base, including:
User's report number is more than that (data can be for the data of preset times:Image in 2 D code or to image in 2 D code The symbolic information data obtained after being parsed).
For example, the electronic equipment can provide an interactive interface, obtain user to the Quick Response Code that scans into The report information of row report, user can report unsafe Quick Response Code electronic equipment sends out the Quick Response Code reported It send to authentication server.Authentication server is responsible for counting the report number of the same Quick Response Code, if report number is more than Preset times (such as:20 times, 50 times, 100 times etc., herein, report number is not particularly limited), it is determined that this is lifted The Quick Response Code of report is dangerous, and the Quick Response Code that this is reported is added in the Quick Response Code virus base.
Optionally, in the present embodiment, after step S104, further include:
The electronic equipment is forbidden to access the network address indicated by first data;And/or
The electronic equipment is forbidden to download the resource indicated by first data.
For example, first data may indicate that electronic equipment access a unsafe network address (such as:Swindle net Location), at this point, should forbid accessing the network address indicated by first data.
For example, first data may indicate that electronic equipment download a unsafe resource (such as:Wooden horse disease Poison), at this point, should forbid downloading the resource indicated by first data.
Technical solution in the embodiments of the present invention, at least has the following technical effect that or advantage:
In the present embodiment, in two code scanning processes, two-dimensional code scanning function is opened in user, to a Quick Response Code When being scanned, the collected image in 2 D code of described image collecting unit institute is obtained, and obtain based on the image in 2 D code First data, verify whether first data are secure data, if non-secure data, then generate and export the first prompt letter Breath, to prompt user in time.So present invention efficiently solves Quick Response Code in the prior art, there are the technologies of security risk to ask Topic realizes the safety for ensureing two-dimensional code scanning, ensures user information safety and the technique effect of property safety.
Embodiment two
Based on same inventive concept, the embodiment of the present invention provides a kind of for implementing information described in the embodiment of the present invention one The electronic equipment of the method for processing.
As shown in Fig. 2, a kind of electronic equipment, including:
Image acquisition units 201, for acquiring image in 2 D code;
Obtaining unit 202, for obtaining the first data based on the image in 2 D code;
Authentication unit 203 verifies whether first data are secure data for being based on pre-defined rule, obtains first and tests Demonstrate,prove result;
Output unit 204, for when first verification result shows that the first data are non-secure data, generating and defeated Go out the first prompt message.
For example, the electronic equipment can be smart mobile phone, tablet computer, digital camera etc. electronic equipment, right It is specifically which kind of electronic equipment in the electronic equipment, the present embodiment is not particularly limited.
For example, the electronic equipment has an image acquisition units, in general, described image collecting unit can be one Camera, for acquiring image in 2 D code.
In specific implementation process, first prompt message, including:Auditory tone cues information;And/or text prompt letter Breath;And/or picture cues information;And/or visual prompts information;It is specifically which kind of information for first prompt message, this Embodiment is not particularly limited.
In the present embodiment, it efficiently solves Quick Response Code in the prior art there is technical issues that, realize Ensure the safety of two-dimensional code scanning, ensures user information safety and the technique effect of property safety.
Optionally, in the present embodiment, first data, specially;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Optionally, in the present embodiment, the authentication unit 203, is specifically used for:
First data are sent to authentication server;
Receive the verification result of the authentication server feedback.
In specific implementation process, the authentication server is used to verify the safety of first data, is receiving When the first data that the electronic equipment is sent, the first verification result can be timely feedbacked, first verification result being capable of table Levy whether first data are secure data.
Optionally, in the present embodiment, the authentication unit 203, is specifically used for:
Quick Response Code virus base is obtained from an authentication server;
Whether include first data, obtain the verification result if verifying in the Quick Response Code virus base;
Wherein, if verification result shows to include first data in the Quick Response Code virus base, it is determined that described first Data are non-secure data.
For example, electronic equipment can obtain the Quick Response Code virus base from authentication server, and verify the two dimension Whether include first data in code virus base, if including, it is determined that first data are non-secure data, if not wrapping Contain, it is determined that first data are secure data.Herein, the authentication server is responsible for safeguarding in the Quick Response Code virus base Data, the electronic equipment can timing or real-time update described in Quick Response Code virus base.
Optionally, in the present embodiment, the Quick Response Code virus base, including:
User's report number is more than the Quick Response Code of preset times.
For example, the electronic equipment can provide an interactive interface, obtain user to the Quick Response Code that scans into The report information of row report, user can report unsafe Quick Response Code electronic equipment sends out the Quick Response Code reported It send to authentication server.Authentication server is responsible for counting the report number of the same Quick Response Code, if report number is more than Preset times (such as:20 times, 50 times, 100 times etc., herein, report number is not particularly limited), it is determined that this is lifted The Quick Response Code of report is dangerous, and the Quick Response Code that this is reported is added in the Quick Response Code virus base.
Optionally, in the present embodiment, first prompt message, including:Auditory tone cues information;And/or text prompt Information;And/or picture cues information;And/or visual prompts information;It is specifically which kind of information for first prompt message, The present embodiment is not particularly limited.
It is optionally, in the present embodiment, described when first verification result shows that the first data are non-secure data, It generates and inputs after the first prompt message, further include:
The electronic equipment is forbidden to access the network address indicated by first data;And/or
The electronic equipment is forbidden to download the resource indicated by first data.
Since the electronic equipment that the present embodiment is introduced is adopted to implement the method for information processing in the embodiment of the present invention one Electronic equipment, so the method based on the information processing described in the embodiment of the present invention one, the affiliated technology people in this field Member can understand the specific implementation mode and its various change form of the electronic equipment of the present embodiment, so herein for the electricity How sub- equipment realizes that the method in the embodiment of the present invention one is no longer discussed in detail.As long as those skilled in the art implement this Electronic equipment used by the method for information processing in inventive embodiments one belongs to the range of the invention to be protected.
Technical solution in the embodiments of the present invention, at least has the following technical effect that or advantage:
In the present embodiment, a kind of electronic equipment has been disclosed, including:Image acquisition units, for acquiring Quick Response Code figure Picture;Obtaining unit, for obtaining the first data based on the image in 2 D code;Authentication unit 203 is tested for being based on pre-defined rule Demonstrate,prove whether first data are secure data, obtains the first verification result;Output unit, for working as first verification result When showing that the first data are non-secure data, generates and export the first prompt message.So the embodiment of the present invention efficiently solves Quick Response Code there is technical issues that in the prior art, realize the safety for ensureing two-dimensional code scanning, ensure to use The technique effect of family information security and property safety.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Specifically, the corresponding computer program instructions of information processing method in the embodiment of the present application can be stored in CD, hard disk, on the storage mediums such as USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium One electronic equipment reads or is performed, and includes the following steps:
Image in 2 D code is acquired by described image collecting unit;
The first data are obtained based on the image in 2 D code;
It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
When the verification result shows that first data are non-secure data, generates and export the first prompt message.
Optionally, first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Optionally, what is stored in the storage medium is based on whether pre-defined rule verification first data are peace with step The step of total evidence, one verification result of acquisition, corresponding computer instruction specifically include following step during specific be performed Suddenly:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
Optionally, what is stored in the storage medium is based on whether pre-defined rule verification first data are peace with step The step of total evidence, one verification result of acquisition, corresponding computer instruction specifically include following step during specific be performed Suddenly:
Quick Response Code virus base is obtained from an authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that First data are non-secure data.
Optionally, the Quick Response Code virus base, including:
User's report number is more than the data of preset times.
Optionally, first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
Optionally, be also stored with other computer instruction in the storage medium, these computer instructions with step Suddenly:When first verification result shows that the first data are non-secure data, generates and input after the first prompt message, quilt It executes, includes the following steps when executed:
The electronic equipment is forbidden to access the network address indicated by first data;And/or
The electronic equipment is forbidden to download the resource indicated by first data.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of information processing method is applied in the electronic equipment with image acquisition units, the method includes:
Image in 2 D code is acquired by described image collecting unit;
The first data are obtained based on the image in 2 D code;
It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
When the verification result shows that first data are non-secure data, generates and export the first prompt message;Wherein,
It is described to verify whether first data are secure data based on pre-defined rule, a verification result is obtained, including:
Quick Response Code virus base is obtained from authentication server;The Quick Response Code virus base includes that user's report number is more than preset times Data;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that described First data are non-secure data.
2. the method as described in claim 1, which is characterized in that first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
3. the method as described in claim 1, which is characterized in that it is described based on pre-defined rule verify first data whether be Secure data obtains a verification result, including:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
4. the method as described in claim 1, which is characterized in that first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
5. the method as described in Claims 1 to 4 is any, which is characterized in that described when the verification result shows described first When data are non-secure data, after generating and exporting the first prompt message, further include:
Forbid accessing the network address indicated by first data;And/or
Forbid downloading the resource indicated by first data.
6. a kind of electronic equipment, including:
Image acquisition units, for acquiring image in 2 D code;
Obtaining unit, for obtaining the first data based on the image in 2 D code;
Authentication unit verifies whether first data are secure data for being based on pre-defined rule, obtains a verification result;
Output unit, for when the verification result shows that first data are non-secure data, generating and exporting first Prompt message;
Wherein, the authentication unit, is specifically used for:
Quick Response Code virus base is obtained from authentication server;The Quick Response Code virus base includes that user's report number is more than preset times Data;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that described First data are non-secure data.
7. electronic equipment as claimed in claim 6, which is characterized in that first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
8. electronic equipment as claimed in claim 6, which is characterized in that the authentication unit is specifically used for:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
9. electronic equipment as claimed in claim 6, which is characterized in that first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
10. the electronic equipment as described in claim 6~9 is any, which is characterized in that the electronic equipment further includes:
Forbid unit, for described when first verification result shows that first data are non-secure data, generates simultaneously It inputs after the first prompt message, forbids accessing the network address indicated by first data, and/or forbid downloading first number According to indicated resource.
CN201410283802.8A 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment Active CN104091140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410283802.8A CN104091140B (en) 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410283802.8A CN104091140B (en) 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104091140A CN104091140A (en) 2014-10-08
CN104091140B true CN104091140B (en) 2018-08-31

Family

ID=51638855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410283802.8A Active CN104091140B (en) 2014-06-23 2014-06-23 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104091140B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105117256A (en) * 2015-08-31 2015-12-02 联想(北京)有限公司 Information processing method and electronic device
CN106055693B (en) * 2016-06-12 2020-01-10 深圳市金立通信设备有限公司 Information processing method and terminal
CN106845587B (en) * 2016-12-09 2020-07-03 北京三快在线科技有限公司 Method and device for printing label and verifying label, server and electronic equipment
CN106599759A (en) * 2016-12-22 2017-04-26 广东小天才科技有限公司 Terminal information processing method and apparatus
CN107239534B (en) * 2017-05-31 2020-06-30 Oppo广东移动通信有限公司 Bar code scanning method, bar code scanning device, mobile terminal and computer readable storage medium
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN108830581A (en) * 2018-04-17 2018-11-16 今电能源科技股份有限公司 Anti-fake method of payment, user terminal, service unit and sale terminal
CN110533133A (en) * 2019-09-05 2019-12-03 中国联合网络通信集团有限公司 Handle the method, apparatus and terminal of two dimensional code
CN111091019B (en) * 2019-12-23 2024-03-01 支付宝(杭州)信息技术有限公司 Information prompting method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101770554A (en) * 2009-01-04 2010-07-07 英业达股份有限公司 Antivirus system and method thereof
CN102761580A (en) * 2011-04-29 2012-10-31 阿里巴巴集团控股有限公司 Information safety processing method, processing server and processing client side
CN103324816A (en) * 2012-03-19 2013-09-25 联想(北京)有限公司 Information processing method and electric device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5274183B2 (en) * 2008-05-20 2013-08-28 キヤノン株式会社 Image processing apparatus, image processing method, program thereof, and storage medium
CN102692881A (en) * 2012-05-16 2012-09-26 中国海洋大学 Household appliance control method and control system based on two-dimension code
CN103136682A (en) * 2013-03-19 2013-06-05 王兆卿 System using cover type label to achieve counterfeiting and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101770554A (en) * 2009-01-04 2010-07-07 英业达股份有限公司 Antivirus system and method thereof
CN102761580A (en) * 2011-04-29 2012-10-31 阿里巴巴集团控股有限公司 Information safety processing method, processing server and processing client side
CN103324816A (en) * 2012-03-19 2013-09-25 联想(北京)有限公司 Information processing method and electric device

Also Published As

Publication number Publication date
CN104091140A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN104091140B (en) A kind of information processing method and electronic equipment
CN103841239B (en) Terminal authenticity verification method and device
EP3926920A1 (en) Method and device for allocating augmented reality-based virtual objects
CN107392618B (en) Method and equipment for implanting intelligent contract
CN103368957B (en) Method and system that web page access behavior is processed, client, server
CN104200150B (en) Method and device for processing verification codes
US10395022B2 (en) Access control for a resource
CN104200140B (en) The offer method and device of identifying code
CN103873455B (en) A kind of method and device of information checking
CN105245489B (en) Verification method and device
KR20160126986A (en) Voice print verification method and apparatus, storage medium and device
CN103927469B (en) Based on the dynamic password formation method of iris information
CN105354481B (en) Network verification method and network authentication server
US20150143481A1 (en) Application security verification method, application server, application client and system
CN109523611A (en) Identifying code Picture Generation Method and device
CN109145590A (en) A kind of function hook detection method, detection device and computer-readable medium
CN107873125A (en) Active/standby devices scramble is shown
CN107888553A (en) A kind of verification method, server and system
CN101309260A (en) Network authentication method on the basis of cryptoguard
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN107453871A (en) Password generated method, password authentication method, method of payment and device
US10554400B2 (en) Method and a system for generating a multi-factor authentication code
CN104079527A (en) Information processing method and electronic equipment
CN107920044A (en) A kind of safe verification method and device
CN106161338A (en) For verifying the method and device of user identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant