CN104091140B - A kind of information processing method and electronic equipment - Google Patents
A kind of information processing method and electronic equipment Download PDFInfo
- Publication number
- CN104091140B CN104091140B CN201410283802.8A CN201410283802A CN104091140B CN 104091140 B CN104091140 B CN 104091140B CN 201410283802 A CN201410283802 A CN 201410283802A CN 104091140 B CN104091140 B CN 104091140B
- Authority
- CN
- China
- Prior art keywords
- data
- verification result
- image
- code
- electronic equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses a kind of information processing method, it is applied in the electronic equipment with image acquisition units, solves Quick Response Code in the prior art and there is technical issues that.The method includes:Image in 2 D code is acquired by described image collecting unit;The first data are obtained based on the image in 2 D code;It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;When the verification result shows that first data are non-secure data, generates and export the first prompt message.Meanwhile the invention also discloses a kind of electronic equipment.
Description
Technical field
The present invention relates to electronic technology field more particularly to a kind of information processing methods and electronic equipment.
Background technology
Quick Response Code (also known as two-dimensional bar code) is divided in plane (two-dimensional directional) according to certain rules with specific geometric figure
The chequered with black and white figure of cloth is a key of all information datas.In modern business activities, it can be achieved that application very
Extensively, such as:Product false proof/trace to the source, advertisement pushing, web site url, data download, commodity transaction, positioning/navigation, electronic certificate,
Vehicle management, information transmission, business card exchange, wifi are shared etc..
In recent years, planar bar code technology was very popular, many electronic equipments (such as:Smart mobile phone, tablet computer etc.) all
Have the function of scanning the two-dimensional code, Quick Response Code is scanned by camera and two-dimensional code scanning application program, to obtain
Information/resource indicated by Quick Response Code, this brings many facilities to user.
But the inventors discovered that above-mentioned technology at least has the following technical problems:
Virus (or fraud information or swindle network address or trojan horse) is implanted to Quick Response Code by many criminals now
In, cause user when scanning the two-dimensional code, there are great security risks.
Invention content
The present invention solves Quick Response Code in the prior art and there is peace by a kind of information processing method of offer and electronic equipment
The technical issues of full hidden danger.
On the one hand, the present invention provides a kind of information processing method, is applied in the electronic equipment with image acquisition units,
The method includes:
Image in 2 D code is acquired by described image collecting unit;
The first data are obtained based on the image in 2 D code;
It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
When the verification result shows that first data are non-secure data, generates and export the first prompt message.
Preferably, first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Preferably, described to verify whether first data are secure data based on pre-defined rule, a verification result is obtained,
Including:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
Preferably, described to verify whether first data are secure data based on pre-defined rule, a verification result is obtained,
Including:
Quick Response Code virus base is obtained from authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that
First data are non-secure data.
Preferably, the Quick Response Code virus base, including:
User's report number is more than the data of preset times.
Preferably, first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
Preferably, described when the verification result shows that first data are non-secure data, it generates and exports the
After one prompt message, further include:
Forbid accessing the network address indicated by first data;And/or
Forbid downloading the resource indicated by first data.
On the other hand, the present invention provides a kind of electronic equipment, including:
Image acquisition units, for acquiring image in 2 D code;
Obtaining unit, for obtaining the first data based on the image in 2 D code;
Authentication unit verifies whether first data are secure data for being based on pre-defined rule, obtains a verification knot
Fruit;
Output unit, for when the verification result shows that first data are non-secure data, generating and exporting
First prompt message.
Preferably, first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Preferably, the authentication unit, is specifically used for:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
Preferably, the authentication unit, is specifically used for:
Quick Response Code virus base is obtained from authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that
First data are non-secure data.
Preferably, the Quick Response Code virus base, including:
User's report number is more than the data of preset times.
Preferably, first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
Preferably, the electronic equipment further includes:
Forbid unit, it is raw for described when first verification result shows that first data are non-secure data
At and after inputting the first prompt message, forbid accessing the network address indicated by first data, and/or forbid downloading described the
Resource indicated by one data.
The present invention has at least the following technical effects or advantages:
The invention discloses a kind of information processing method, it is applied in the electronic equipment with image acquisition units, it is described
Method includes:Image in 2 D code is acquired by described image collecting unit;The first data are obtained based on the image in 2 D code;Base
It verifies whether first data are secure data in pre-defined rule, obtains the first verification result;When first verification result
When showing that the first data are non-secure data, generates and export the first prompt message.So present invention efficiently solves existing
Quick Response Code there is technical issues that in technology, realize the safety for ensureing two-dimensional code scanning, ensure user information
The technique effect of safety and property safety.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart of information processing method in the embodiment of the present invention one;
Fig. 2 is the structural schematic diagram of electronic equipment in the embodiment of the present invention two.
Specific implementation mode
The embodiment of the present invention solves Quick Response Code in the prior art by a kind of information processing method of offer and electronic equipment
There is technical issues that.
The technical solution of the embodiment of the present invention is in order to solve the above technical problems, general thought is as follows:
A kind of information processing method is applied in the electronic equipment with image acquisition units, the method includes:Pass through
Described image collecting unit acquires image in 2 D code;The first data are obtained based on the image in 2 D code;It is tested based on pre-defined rule
Demonstrate,prove whether first data are secure data, obtains the first verification result;When first verification result shows the first data
For non-secure data when, generate and export the first prompt message.So present invention efficiently solves Quick Response Codes in the prior art
There is technical issues that, realize the safety for ensureing two-dimensional code scanning, ensures user information safety and property peace
Full technique effect.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Illustrate first, herein presented term "and/or", only a kind of incidence relation of description affiliated partner, table
Show may exist three kinds of relationships, for example, A and/or B, can indicate:Individualism A, exists simultaneously A and B, individualism B this three
Kind situation.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Embodiment one
The present embodiment provides a kind of information processing method, it is applied in the electronic equipment with image acquisition units.Such as Fig. 1
It is shown, the method includes:
Step S101:Image in 2 D code is acquired by described image collecting unit;
Step S102:The first data are obtained based on the image in 2 D code;
Step S103:It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
Step S104:When the verification result shows that the first data are non-secure data, generates and export the first prompt
Information.
For example, the electronic equipment can be smart mobile phone, tablet computer, digital camera etc. electronic equipment, right
It is specifically which kind of electronic equipment in the electronic equipment, the present embodiment is not particularly limited.
For example, the electronic equipment has an image acquisition units, in general, described image collecting unit can be one
Camera, for acquiring image in 2 D code.
For example, first data may include;
The image data of the image in 2 D code, or
The symbolic information data obtained after being parsed to the image in 2 D code, such as:A certain network address or a certain resource
Download link.
For example, the present embodiment can be particularly applicable in two code scanning processes, and two-dimensional code scanning is opened in user
Function, when being scanned to a Quick Response Code, electronic equipment obtains the collected image in 2 D code of described image collecting unit institute,
And the first data are obtained based on the image in 2 D code, verify whether first data are secure data, if non-security number
According to, then generate and export the first prompt message, make in time prompt user's Current Scan Quick Response Code it is dangerous.
In specific implementation process, first prompt message, including:Auditory tone cues information;And/or text prompt letter
Breath;And/or picture cues information;And/or visual prompts information;It is specifically which kind of information for first prompt message, this
Embodiment is not particularly limited.
In the present embodiment, it efficiently solves Quick Response Code in the prior art there is technical issues that, realize
Ensure the safety of two-dimensional code scanning, ensures user information safety and the technique effect of property safety.
Optionally, in the present embodiment, step S103, including:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
In specific implementation process, the authentication server is used to verify the safety of first data, is receiving
When the first data that the electronic equipment is sent, the first verification result can be timely feedbacked, first verification result being capable of table
Levy whether first data are secure data.
Optionally, in the present embodiment, step S103, including:
Quick Response Code virus base is obtained from authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that
First data are non-secure data.
For example, electronic equipment can obtain the Quick Response Code virus base from authentication server, and verify the two dimension
Whether include first data in code virus base, if including, it is determined that first data are non-secure data, if not wrapping
Contain, it is determined that first data are secure data.Herein, the authentication server is responsible for safeguarding in the Quick Response Code virus base
Data, the electronic equipment can timing or real-time update described in Quick Response Code virus base.
Optionally, in the present embodiment, the Quick Response Code virus base, including:
User's report number is more than that (data can be for the data of preset times:Image in 2 D code or to image in 2 D code
The symbolic information data obtained after being parsed).
For example, the electronic equipment can provide an interactive interface, obtain user to the Quick Response Code that scans into
The report information of row report, user can report unsafe Quick Response Code electronic equipment sends out the Quick Response Code reported
It send to authentication server.Authentication server is responsible for counting the report number of the same Quick Response Code, if report number is more than
Preset times (such as:20 times, 50 times, 100 times etc., herein, report number is not particularly limited), it is determined that this is lifted
The Quick Response Code of report is dangerous, and the Quick Response Code that this is reported is added in the Quick Response Code virus base.
Optionally, in the present embodiment, after step S104, further include:
The electronic equipment is forbidden to access the network address indicated by first data;And/or
The electronic equipment is forbidden to download the resource indicated by first data.
For example, first data may indicate that electronic equipment access a unsafe network address (such as:Swindle net
Location), at this point, should forbid accessing the network address indicated by first data.
For example, first data may indicate that electronic equipment download a unsafe resource (such as:Wooden horse disease
Poison), at this point, should forbid downloading the resource indicated by first data.
Technical solution in the embodiments of the present invention, at least has the following technical effect that or advantage:
In the present embodiment, in two code scanning processes, two-dimensional code scanning function is opened in user, to a Quick Response Code
When being scanned, the collected image in 2 D code of described image collecting unit institute is obtained, and obtain based on the image in 2 D code
First data, verify whether first data are secure data, if non-secure data, then generate and export the first prompt letter
Breath, to prompt user in time.So present invention efficiently solves Quick Response Code in the prior art, there are the technologies of security risk to ask
Topic realizes the safety for ensureing two-dimensional code scanning, ensures user information safety and the technique effect of property safety.
Embodiment two
Based on same inventive concept, the embodiment of the present invention provides a kind of for implementing information described in the embodiment of the present invention one
The electronic equipment of the method for processing.
As shown in Fig. 2, a kind of electronic equipment, including:
Image acquisition units 201, for acquiring image in 2 D code;
Obtaining unit 202, for obtaining the first data based on the image in 2 D code;
Authentication unit 203 verifies whether first data are secure data for being based on pre-defined rule, obtains first and tests
Demonstrate,prove result;
Output unit 204, for when first verification result shows that the first data are non-secure data, generating and defeated
Go out the first prompt message.
For example, the electronic equipment can be smart mobile phone, tablet computer, digital camera etc. electronic equipment, right
It is specifically which kind of electronic equipment in the electronic equipment, the present embodiment is not particularly limited.
For example, the electronic equipment has an image acquisition units, in general, described image collecting unit can be one
Camera, for acquiring image in 2 D code.
In specific implementation process, first prompt message, including:Auditory tone cues information;And/or text prompt letter
Breath;And/or picture cues information;And/or visual prompts information;It is specifically which kind of information for first prompt message, this
Embodiment is not particularly limited.
In the present embodiment, it efficiently solves Quick Response Code in the prior art there is technical issues that, realize
Ensure the safety of two-dimensional code scanning, ensures user information safety and the technique effect of property safety.
Optionally, in the present embodiment, first data, specially;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Optionally, in the present embodiment, the authentication unit 203, is specifically used for:
First data are sent to authentication server;
Receive the verification result of the authentication server feedback.
In specific implementation process, the authentication server is used to verify the safety of first data, is receiving
When the first data that the electronic equipment is sent, the first verification result can be timely feedbacked, first verification result being capable of table
Levy whether first data are secure data.
Optionally, in the present embodiment, the authentication unit 203, is specifically used for:
Quick Response Code virus base is obtained from an authentication server;
Whether include first data, obtain the verification result if verifying in the Quick Response Code virus base;
Wherein, if verification result shows to include first data in the Quick Response Code virus base, it is determined that described first
Data are non-secure data.
For example, electronic equipment can obtain the Quick Response Code virus base from authentication server, and verify the two dimension
Whether include first data in code virus base, if including, it is determined that first data are non-secure data, if not wrapping
Contain, it is determined that first data are secure data.Herein, the authentication server is responsible for safeguarding in the Quick Response Code virus base
Data, the electronic equipment can timing or real-time update described in Quick Response Code virus base.
Optionally, in the present embodiment, the Quick Response Code virus base, including:
User's report number is more than the Quick Response Code of preset times.
For example, the electronic equipment can provide an interactive interface, obtain user to the Quick Response Code that scans into
The report information of row report, user can report unsafe Quick Response Code electronic equipment sends out the Quick Response Code reported
It send to authentication server.Authentication server is responsible for counting the report number of the same Quick Response Code, if report number is more than
Preset times (such as:20 times, 50 times, 100 times etc., herein, report number is not particularly limited), it is determined that this is lifted
The Quick Response Code of report is dangerous, and the Quick Response Code that this is reported is added in the Quick Response Code virus base.
Optionally, in the present embodiment, first prompt message, including:Auditory tone cues information;And/or text prompt
Information;And/or picture cues information;And/or visual prompts information;It is specifically which kind of information for first prompt message,
The present embodiment is not particularly limited.
It is optionally, in the present embodiment, described when first verification result shows that the first data are non-secure data,
It generates and inputs after the first prompt message, further include:
The electronic equipment is forbidden to access the network address indicated by first data;And/or
The electronic equipment is forbidden to download the resource indicated by first data.
Since the electronic equipment that the present embodiment is introduced is adopted to implement the method for information processing in the embodiment of the present invention one
Electronic equipment, so the method based on the information processing described in the embodiment of the present invention one, the affiliated technology people in this field
Member can understand the specific implementation mode and its various change form of the electronic equipment of the present embodiment, so herein for the electricity
How sub- equipment realizes that the method in the embodiment of the present invention one is no longer discussed in detail.As long as those skilled in the art implement this
Electronic equipment used by the method for information processing in inventive embodiments one belongs to the range of the invention to be protected.
Technical solution in the embodiments of the present invention, at least has the following technical effect that or advantage:
In the present embodiment, a kind of electronic equipment has been disclosed, including:Image acquisition units, for acquiring Quick Response Code figure
Picture;Obtaining unit, for obtaining the first data based on the image in 2 D code;Authentication unit 203 is tested for being based on pre-defined rule
Demonstrate,prove whether first data are secure data, obtains the first verification result;Output unit, for working as first verification result
When showing that the first data are non-secure data, generates and export the first prompt message.So the embodiment of the present invention efficiently solves
Quick Response Code there is technical issues that in the prior art, realize the safety for ensureing two-dimensional code scanning, ensure to use
The technique effect of family information security and property safety.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer
The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Specifically, the corresponding computer program instructions of information processing method in the embodiment of the present application can be stored in
CD, hard disk, on the storage mediums such as USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium
One electronic equipment reads or is performed, and includes the following steps:
Image in 2 D code is acquired by described image collecting unit;
The first data are obtained based on the image in 2 D code;
It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
When the verification result shows that first data are non-secure data, generates and export the first prompt message.
Optionally, first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
Optionally, what is stored in the storage medium is based on whether pre-defined rule verification first data are peace with step
The step of total evidence, one verification result of acquisition, corresponding computer instruction specifically include following step during specific be performed
Suddenly:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
Optionally, what is stored in the storage medium is based on whether pre-defined rule verification first data are peace with step
The step of total evidence, one verification result of acquisition, corresponding computer instruction specifically include following step during specific be performed
Suddenly:
Quick Response Code virus base is obtained from an authentication server;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that
First data are non-secure data.
Optionally, the Quick Response Code virus base, including:
User's report number is more than the data of preset times.
Optionally, first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
Optionally, be also stored with other computer instruction in the storage medium, these computer instructions with step
Suddenly:When first verification result shows that the first data are non-secure data, generates and input after the first prompt message, quilt
It executes, includes the following steps when executed:
The electronic equipment is forbidden to access the network address indicated by first data;And/or
The electronic equipment is forbidden to download the resource indicated by first data.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of information processing method is applied in the electronic equipment with image acquisition units, the method includes:
Image in 2 D code is acquired by described image collecting unit;
The first data are obtained based on the image in 2 D code;
It verifies whether first data are secure data based on pre-defined rule, obtains a verification result;
When the verification result shows that first data are non-secure data, generates and export the first prompt message;Wherein,
It is described to verify whether first data are secure data based on pre-defined rule, a verification result is obtained, including:
Quick Response Code virus base is obtained from authentication server;The Quick Response Code virus base includes that user's report number is more than preset times
Data;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that described
First data are non-secure data.
2. the method as described in claim 1, which is characterized in that first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
3. the method as described in claim 1, which is characterized in that it is described based on pre-defined rule verify first data whether be
Secure data obtains a verification result, including:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
4. the method as described in claim 1, which is characterized in that first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
5. the method as described in Claims 1 to 4 is any, which is characterized in that described when the verification result shows described first
When data are non-secure data, after generating and exporting the first prompt message, further include:
Forbid accessing the network address indicated by first data;And/or
Forbid downloading the resource indicated by first data.
6. a kind of electronic equipment, including:
Image acquisition units, for acquiring image in 2 D code;
Obtaining unit, for obtaining the first data based on the image in 2 D code;
Authentication unit verifies whether first data are secure data for being based on pre-defined rule, obtains a verification result;
Output unit, for when the verification result shows that first data are non-secure data, generating and exporting first
Prompt message;
Wherein, the authentication unit, is specifically used for:
Quick Response Code virus base is obtained from authentication server;The Quick Response Code virus base includes that user's report number is more than preset times
Data;
Whether include first data, obtain the second verification result if verifying in the Quick Response Code virus base;
Wherein, if second verification result shows to include first data in the Quick Response Code virus base, it is determined that described
First data are non-secure data.
7. electronic equipment as claimed in claim 6, which is characterized in that first data, including;
The image data of the image in 2 D code;Or
The symbolic information data obtained after being parsed to the image in 2 D code.
8. electronic equipment as claimed in claim 6, which is characterized in that the authentication unit is specifically used for:
First data are sent to authentication server;
Receive the first verification result of the authentication server feedback.
9. electronic equipment as claimed in claim 6, which is characterized in that first prompt message, including:
Auditory tone cues information;And/or
Text prompt information;And/or
Picture cues information;And/or
Visual prompts information.
10. the electronic equipment as described in claim 6~9 is any, which is characterized in that the electronic equipment further includes:
Forbid unit, for described when first verification result shows that first data are non-secure data, generates simultaneously
It inputs after the first prompt message, forbids accessing the network address indicated by first data, and/or forbid downloading first number
According to indicated resource.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410283802.8A CN104091140B (en) | 2014-06-23 | 2014-06-23 | A kind of information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410283802.8A CN104091140B (en) | 2014-06-23 | 2014-06-23 | A kind of information processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104091140A CN104091140A (en) | 2014-10-08 |
CN104091140B true CN104091140B (en) | 2018-08-31 |
Family
ID=51638855
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410283802.8A Active CN104091140B (en) | 2014-06-23 | 2014-06-23 | A kind of information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104091140B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105117256A (en) * | 2015-08-31 | 2015-12-02 | 联想(北京)有限公司 | Information processing method and electronic device |
CN106055693B (en) * | 2016-06-12 | 2020-01-10 | 深圳市金立通信设备有限公司 | Information processing method and terminal |
CN106845587B (en) * | 2016-12-09 | 2020-07-03 | 北京三快在线科技有限公司 | Method and device for printing label and verifying label, server and electronic equipment |
CN106599759A (en) * | 2016-12-22 | 2017-04-26 | 广东小天才科技有限公司 | Terminal information processing method and apparatus |
CN107239534B (en) * | 2017-05-31 | 2020-06-30 | Oppo广东移动通信有限公司 | Bar code scanning method, bar code scanning device, mobile terminal and computer readable storage medium |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN108830581A (en) * | 2018-04-17 | 2018-11-16 | 今电能源科技股份有限公司 | Anti-fake method of payment, user terminal, service unit and sale terminal |
CN110533133A (en) * | 2019-09-05 | 2019-12-03 | 中国联合网络通信集团有限公司 | Handle the method, apparatus and terminal of two dimensional code |
CN111091019B (en) * | 2019-12-23 | 2024-03-01 | 支付宝(杭州)信息技术有限公司 | Information prompting method, device and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770554A (en) * | 2009-01-04 | 2010-07-07 | 英业达股份有限公司 | Antivirus system and method thereof |
CN102761580A (en) * | 2011-04-29 | 2012-10-31 | 阿里巴巴集团控股有限公司 | Information safety processing method, processing server and processing client side |
CN103324816A (en) * | 2012-03-19 | 2013-09-25 | 联想(北京)有限公司 | Information processing method and electric device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5274183B2 (en) * | 2008-05-20 | 2013-08-28 | キヤノン株式会社 | Image processing apparatus, image processing method, program thereof, and storage medium |
CN102692881A (en) * | 2012-05-16 | 2012-09-26 | 中国海洋大学 | Household appliance control method and control system based on two-dimension code |
CN103136682A (en) * | 2013-03-19 | 2013-06-05 | 王兆卿 | System using cover type label to achieve counterfeiting and method |
-
2014
- 2014-06-23 CN CN201410283802.8A patent/CN104091140B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101770554A (en) * | 2009-01-04 | 2010-07-07 | 英业达股份有限公司 | Antivirus system and method thereof |
CN102761580A (en) * | 2011-04-29 | 2012-10-31 | 阿里巴巴集团控股有限公司 | Information safety processing method, processing server and processing client side |
CN103324816A (en) * | 2012-03-19 | 2013-09-25 | 联想(北京)有限公司 | Information processing method and electric device |
Also Published As
Publication number | Publication date |
---|---|
CN104091140A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104091140B (en) | A kind of information processing method and electronic equipment | |
CN103841239B (en) | Terminal authenticity verification method and device | |
EP3926920A1 (en) | Method and device for allocating augmented reality-based virtual objects | |
CN107392618B (en) | Method and equipment for implanting intelligent contract | |
CN103368957B (en) | Method and system that web page access behavior is processed, client, server | |
CN104200150B (en) | Method and device for processing verification codes | |
US10395022B2 (en) | Access control for a resource | |
CN104200140B (en) | The offer method and device of identifying code | |
CN103873455B (en) | A kind of method and device of information checking | |
CN105245489B (en) | Verification method and device | |
KR20160126986A (en) | Voice print verification method and apparatus, storage medium and device | |
CN103927469B (en) | Based on the dynamic password formation method of iris information | |
CN105354481B (en) | Network verification method and network authentication server | |
US20150143481A1 (en) | Application security verification method, application server, application client and system | |
CN109523611A (en) | Identifying code Picture Generation Method and device | |
CN109145590A (en) | A kind of function hook detection method, detection device and computer-readable medium | |
CN107873125A (en) | Active/standby devices scramble is shown | |
CN107888553A (en) | A kind of verification method, server and system | |
CN101309260A (en) | Network authentication method on the basis of cryptoguard | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN107453871A (en) | Password generated method, password authentication method, method of payment and device | |
US10554400B2 (en) | Method and a system for generating a multi-factor authentication code | |
CN104079527A (en) | Information processing method and electronic equipment | |
CN107920044A (en) | A kind of safe verification method and device | |
CN106161338A (en) | For verifying the method and device of user identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |