CN104915617A - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN104915617A
CN104915617A CN201510284602.9A CN201510284602A CN104915617A CN 104915617 A CN104915617 A CN 104915617A CN 201510284602 A CN201510284602 A CN 201510284602A CN 104915617 A CN104915617 A CN 104915617A
Authority
CN
China
Prior art keywords
solicited message
information
electronic equipment
request information
operational order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510284602.9A
Other languages
Chinese (zh)
Other versions
CN104915617B (en
Inventor
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510284602.9A priority Critical patent/CN104915617B/en
Publication of CN104915617A publication Critical patent/CN104915617A/en
Application granted granted Critical
Publication of CN104915617B publication Critical patent/CN104915617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an information processing method and electronic equipment. The method comprises the steps that request information transmitted by second electronic equipment is acquired; when the request information is first request information, a first operation instruction corresponding to the first request information is confirmed on the basis of the corresponding relation between the request information and the operation instruction, and the first request information is particularly the request information used for requesting for acquiring non-confidential information; and when the request information is second request information which is different from the first request information, a second operation instruction which is corresponding to the second request information and different from the first operation instruction is confirmed on the basis of the corresponding relation, and the second request information is particularly the request information used for requesting for acquiring confidential information.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, particularly a kind of information processing method and electronic equipment.
Background technology
Along with the development of science and technology, electronic equipment have also been obtained development at full speed, makes the life of people more and more intelligent, and user can use access card to carry out authentication, can directly use bank card payment etc. when buying commodity.
In the prior art, card reader outwards can send electromagnetic wave with fixed frequency, when the card of user carries out authentication operation or transactional operation with the card reader carrying out operating, as long as after the card of user enters electromagnetic radiation scope, the information be stored in card is just directly sent to card reader by the card of user.
Present inventor, in the process realizing technical scheme in the embodiment of the present application, finds that prior art exists following technical matters:
Due in prior art when card reader needs to read the information in contactless card, as long as contactless card receives the solicited message of the reading information sent by card reader, the information stored in contactless card will be sent to card reader, like this, because contactless card only exists a kind of level of security, when the packets of information stored in contactless card contains classified information, classified information also can be sent to card reader by contactless card, so there is the single technical matters of level of security in contactless card of the prior art.
Summary of the invention
The embodiment of the present application provides a kind of information processing method and electronic equipment, there is the single technical matters of level of security for solving contactless card of the prior art, realizes the technique effect that can meet many level of securitys demand.
The embodiment of the present application provides a kind of information processing method on the one hand, is applied to the first electronic equipment, comprises:
Obtain the solicited message sent by the second electronic equipment;
When described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
Optionally, after the solicited message that described acquisition is sent by the second electronic equipment, described method also comprises:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
Optionally, described when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, specifically comprise:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, described determine that the user profile corresponding with described first solicited message sends instruction after, described method also comprises:
Perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
Described type I information is sent to described second electronic equipment.
Optionally, it is described when described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, specifically comprise:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, described determine the fingerprint authentication instruction corresponding with described second solicited message after, described method also comprises:
By performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
Optionally, judge whether first user fingerprint is pre-set user fingerprint described, after obtaining the second judged result, described method also comprises:
When described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
Optionally, judge whether first user fingerprint is pre-set user fingerprint described, after obtaining the second judged result, described method also comprises:
When described second judged result is no, generates and send the first miscue information to described second electronic equipment, described first miscue information can be exported to make described second electronic equipment.
The embodiment of the present application provides a kind of electronic equipment on the other hand, comprising:
First acquiring unit, for obtaining the solicited message sent by the second electronic equipment;
First determining unit, for when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
Second determining unit, during for being second solicited message different from described first solicited message in described request information, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
The embodiment of the present application also provides a kind of electronic equipment, comprising:
Housing;
Receiver module, is arranged in described housing, for obtaining the solicited message sent by the second electronic equipment;
Processor, be arranged in described housing, for when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information; When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
Optionally, described processor also for:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
Optionally, described processor specifically for:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, described processor also for:
Perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
Described type I information is sent to described second electronic equipment.
Optionally, described processor specifically for:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, described processor also for:
By performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
Optionally, described processor specifically for:
When described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
Optionally, described processor specifically for:
When described second judged result is no, generates and send the first miscue information to described second electronic equipment, described first miscue information can be exported to make described second electronic equipment.
Above-mentioned one or more technical scheme in the embodiment of the present application, at least has one or more technique effects following:
One, due to the technical scheme in the embodiment of the present application, adopt the solicited message obtaining and sent by the second electronic equipment, when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information, when described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially the technological means for asking to obtain the solicited message comprising classified information, like this, electronic equipment can based on the difference of the solicited message received, determine the level of security corresponding with solicited message, and perform the operation corresponding with level of security, when solicited message needs acquisition to comprise the content of classified information, determine that described request information is high level of security, then electronic equipment just performs the instruction corresponding with high level of security, as identity verification, the content that transmission request information is corresponding again after authentication is passed through, so, efficiently solve the technical matters that the level of security of contactless card of the prior art existence is single, realization can meet the technique effect of many level of securitys demand.
Two, due to the technical scheme in the embodiment of the present application, adopt when described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message, by performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping, judge whether first user fingerprint is pre-set user fingerprint, obtain the second judged result, when described second judged result is for being, obtain the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to the technological means of described second electronic equipment, like this, as long as when electronic equipment needs to send classified information, electronic equipment just can obtain the user fingerprints of active user, only when the fingerprint of active user is identical with pre-set user fingerprint, electronic equipment just can send corresponding content to the second electronic equipment, like this, by the mode of fingerprint authentication, achieve the technique effect of the security further increasing electronic equipment.
Three, due to the technical scheme in the embodiment of the present application, acquisition one is adopted to preset concerning security matters list of types and the first content type corresponding with the first request content of described request information, judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result, when described first judged result is for being, determine that described request information is described second solicited message, when described first judged result is no, determine that described request information is the technological means of described first solicited message, like this, user can need arranging concerning security matters list of types according to the use of oneself, be user-friendly to, achieve the technique effect improving Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described by the accompanying drawing used required in describing embodiment below, apparently, the accompanying drawing in the following describes is only some embodiments of the present invention.
A kind of information processing method process flow diagram of Fig. 1 for providing in the embodiment of the present application one;
Fig. 2 is the process flow diagram of the described information processing method when described request information is specially the first solicited message in the embodiment of the present application one;
Fig. 3 is the process flow diagram of the described information processing method when described request information is specially the second solicited message in the embodiment of the present application one;
A kind of structured flowchart of electronic equipment of Fig. 4 for providing in the embodiment of the present application two;
A kind of structured flowchart of electronic equipment of Fig. 5 for providing in the embodiment of the present application three.
Embodiment
The embodiment of the present application provides a kind of information processing method and electronic equipment, there is the low technical matters of security for solving contactless card of the prior art, realizes the technique effect of the security improving contactless card.
Technical scheme in the embodiment of the present application is for solving the problems of the technologies described above, and general thought is as follows:
Obtain the solicited message sent by the second electronic equipment;
When described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
In technique scheme, adopt the solicited message obtaining and sent by the second electronic equipment, when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information, when described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially the technological means for asking to obtain the solicited message comprising classified information, like this, electronic equipment can based on the difference of the solicited message received, determine the level of security corresponding with solicited message, and perform the operation corresponding with level of security, when solicited message needs acquisition to comprise the content of classified information, determine that described request information is high level of security, then electronic equipment just performs the instruction corresponding with high level of security, as identity verification, the content that transmission request information is corresponding again after authentication is passed through, so, efficiently solve the technical matters that the level of security of contactless card of the prior art existence is single, realization can meet the technique effect of many level of securitys demand.
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme of the present invention is clearly and completely described, obviously, described embodiment is a part of embodiment of technical solution of the present invention, instead of whole embodiments.Based on the embodiment recorded in present specification, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of technical solution of the present invention protection.
Embodiment one
Please refer to Fig. 1, be a kind of information processing method that the embodiment of the present application one provides, be applied to the first electronic equipment, described method comprises:
S101: obtain the solicited message sent by the second electronic equipment;
S102: when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
S103: when described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
In specific implementation process, described first electronic equipment is specifically as follows to be had processor and can receive the electronic equipment with sending function, as Contact Type Ic Cards such as intelligent SIM card, intelligent finance IC-cards, also may be used for Intelligent bus card, the non-contact IC card such as intelligent work card that intelligent entrance guard card, intra-company use, at this, just differing one schematically illustrates.Described second electronic equipment can be specifically the electronic equipment with reception and sending function, as card reader, POS (point of sale information control system) etc., in the embodiment of the present application, by the intelligent work card used for intra-company for described first electronic equipment, described second electronic equipment for card reader, the specific implementation process of the method in the embodiment of the present application is described in detail.
When adopting the method in the embodiment of the present application to carry out information processing, first perform step S101, that is: obtain the solicited message sent by the second electronic equipment.
In specific implementation process, the intelligent work card used for intra-company for described first electronic equipment, described second electronic equipment are for card reader, when user needs to use intelligent work card to enter company, company's access-control card reader just can send a solicited message, as, the solicited message of " request obtains job number and name "; When user uses intelligent work card to carry out bank transaction, as, swipe the card on bank POS machine when buying commodity, now, bank POS machine also can send a solicited message, e.g., and the solicited message of " request obtains card number and password ", at this moment, intelligent work card just can receive the solicited message being sent the solicited message of " request obtains job number and name " or " request obtains card number and password " of bank POS machine transmission by access-control card reader.In specific implementation process, intelligent work card can obtain different solicited messages according to the service condition of user, and just differing at this one schematically illustrates.
Before execution step S102, the information processing method in the embodiment of the present application one also comprises:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
In specific implementation process, continue to use above-mentioned example, need to realize multiple different operation according to the use of user in order to intelligent work card can be made, user can arrange a concerning security matters list of types to the intelligent work card of oneself, intelligent work card is made automatically to determine current operation according to concerning security matters list of types, as, user arrange concerning security matters list of types for " password; The amount of money "; after intelligent work card receives the solicited message sent by card reader; just can obtain in solicited message the content type wanting the content of acquisition corresponding; as; when intelligent work card obtains the solicited message of " request obtains job number and name " sent by access-control card reader; then determine that the content type that request content is corresponding is: job number, name, then judge the content type whether comprising acquisition in the concerning security matters list of types that user is arranged, due to concerning security matters list of types " password; The amount of money " in do not comprise job number and name, now, intelligent work card determines the content not concerning security matters that access-control card reader request obtains, and the solicited message sent by access-control card reader is the solicited message of not concerning security matters.
When intelligent work card obtains the solicited message of " request obtains card number and password " sent by bank POS machine, then determine that request content corresponding content type is: card number, password, then judge the content type whether comprising acquisition in the concerning security matters list of types that user is arranged, due to concerning security matters list of types " password; The amount of money " in comprise " password " of request content type, now, intelligent work card determines the content concerning security matters that bank POS machine request obtains, and the solicited message sent by bank POS machine is the solicited message of concerning security matters.
After executing above-mentioned steps, the embodiment of the present application once in information processing method perform step S102, that is: when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information.
In the embodiment of the present application one, the embodiment of step S102 is:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction.
In specific implementation process, continue to use above-mentioned example, user can arrange the corresponding relation list of a solicited message and operational order, as " concerning security matters solicited message corresponding user information does not send instruction; The corresponding fingerprint authentication instruction of concerning security matters solicited message "; at this moment; when the solicited message that intelligent work card is determined to be sent by access-control card reader is the solicited message of not concerning security matters; the solicited message arranged according to user and the corresponding relation list of operational order, determine that the operational order corresponding with the solicited message of not concerning security matters is that user profile sends instruction.
Correspondingly, please refer to Fig. 2, after complete step S102, described information processing method also comprises:
S104: perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
S105: described type I information is sent to described second electronic equipment.
In specific implementation process, continue to use above-mentioned example, when intelligent work card determines that the operational order corresponding with the solicited message that access-control card reader sends is after user profile sends instruction, intelligence work card is just according to the solicited message that access-control card reader sends, obtain corresponding content, send to access-control card reader, as, the solicited message of access-control card reader is " request obtains job number and name ", the job number that intelligence work card obtains user from self storage unit is: 25, name is: Zhang San, then incite somebody to action " job number: 25; Name: Zhang San " send to access-control card reader.
In the embodiment of the present application one, the embodiment of step S103 is:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message.
In specific implementation process, the solicited message of " request obtains card number and password " that sent by bank POS machine is obtained for intelligent work card, user can arrange the corresponding relation list of a solicited message and operational order, as " concerning security matters solicited message corresponding user information does not send instruction; The corresponding fingerprint authentication instruction of concerning security matters solicited message "; at this moment; when the solicited message that intelligent work card is determined to be sent by bank POS machine is the solicited message of concerning security matters; the solicited message arranged according to user and the corresponding relation list of operational order, determine that the operational order corresponding with the solicited message of concerning security matters is fingerprint authentication instruction.
Correspondingly, please refer to Fig. 3, after complete step S103, described information processing method also comprises:
S106: by performing described fingerprint authentication instruction, obtains the first user fingerprint of the first user of described first electronic equipment of current gripping; And
S107: judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result;
S108: when described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment;
S109: when described second judged result is no, generates and sends the first miscue information to described second electronic equipment, can export described first miscue information to make described second electronic equipment.
In specific implementation process, continue to use above-mentioned example, after intelligent work card determines that the operational order corresponding with the solicited message that bank POS machine sends is fingerprint authentication instruction, first intelligence work card obtains the user fingerprints of the user of the intelligent work card of current use, the whole surface of intelligent work card can be made to obtain fingerprint, when determining that current operation is when obtaining user fingerprints, the CPU of intelligence work card just activates the fingerprint acquisition function on intelligent work card surface, now, intelligence work card just obtains the user fingerprints of active user, intelligence work card is before being sent to employee, just the fingerprint of the employee corresponding with intelligent work card is input in the storage unit of intelligent work card, then compared with the user fingerprints that the fingerprint of acquisition and self memory cell are stored up by intelligent work card, judge that whether fingerprint is consistent, when judged result is for being, then show that active user is card main, now, intelligence work card just obtains the content " card number: 201501020304 corresponding with the solicited message that POS sends from self storage unit, password: 888888 " be sent to bank POS machine.
When judged result is no, then show that active user is not that card is main, now, intelligence work card can generate an error message, as " error ", and being sent to bank POS machine, the information that after bank POS machine receives transmission " error " information, just can send " drip drip " is not the card master of intelligent work card to point out active user.
In the embodiment of the present application, described second solicited message also can corresponding speech verification instruction.
In specific implementation process, the solicited message of " request obtains card number and password " that sent by bank POS machine is obtained for intelligent work card, user can arrange the corresponding relation list of a solicited message and operational order, as " concerning security matters solicited message corresponding user information does not send instruction; The corresponding speech verification instruction of concerning security matters solicited message "; at this moment; when the solicited message that intelligent work card is determined to be sent by bank POS machine is the solicited message of concerning security matters; the solicited message arranged according to user and the corresponding relation list of operational order, determine that the operational order corresponding with the solicited message of concerning security matters is speech verification instruction.
Correspondingly, after intelligent work card determines that the operational order corresponding with the solicited message that bank POS machine sends is speech verification instruction, first intelligence work card sends voice and obtains instruction, as " please name be say ", after user answers, just the user speech of the user of the intelligent work card of current use is obtained by voice collecting unit, intelligence work card is before being sent to employee, just by the phonetic entry of the employee corresponding with intelligent work card in the storage unit of intelligent work card, then compared with the pre-set user voice that the voice of acquisition and self memory cell are stored up by intelligent work card, extract the eigenvector of user speech, judge that whether the speech characteristic vector extracted is consistent with the default speech characteristic vector in storage unit, when judged result is for being, then show that active user is card main, now, intelligence work card just obtains the content " card number: 201501020304 corresponding with the solicited message that POS sends from self storage unit, password: 888888 " be sent to bank POS machine.
When judged result is no, then show that active user is not that card is main, now, intelligence work card can generate an error message, as " error ", and being sent to bank POS machine, the information that after bank POS machine receives transmission " error " information, just can send " drip drip " is not the card master of intelligent work card to point out active user.
In the embodiment of the present application, described second solicited message also can corresponding recognition of face instruction.
In specific implementation process, the solicited message of " request obtains card number and password " that sent by bank POS machine is obtained for intelligent work card, user can arrange the corresponding relation list of a solicited message and operational order, as " concerning security matters solicited message corresponding user information does not send instruction; The corresponding recognition of face instruction of concerning security matters solicited message "; at this moment; when the solicited message that intelligent work card is determined to be sent by bank POS machine is the solicited message of concerning security matters; the solicited message arranged according to user and the corresponding relation list of operational order, determine that the operational order corresponding with the solicited message of concerning security matters is face instruction.
Correspondingly, after intelligent work card determines that the operational order corresponding with the solicited message that bank POS machine sends is face recognition instruction, first intelligence work card obtains user's head portrait of the user of the intelligent work card of current use by image acquisition units, intelligence work card can send the phonetic order of an image acquisition, as " please camera be aim at ", thus obtain user's head portrait of the intelligent work card of current use, intelligence work card is before being sent to employee, just the head portrait of the employee corresponding with intelligent work card is input in the storage unit of intelligent work card, then compared with the pre-set user head portrait that active user's head portrait of acquisition and self memory cell are stored up by intelligent work card, extract the unique point of head portrait, judge that whether the unique point of the user's head portrait obtained is consistent with the unique point of the pre-set user head portrait in storage unit, when judged result is for being, then show that active user is card main, now, intelligence work card just obtains the content " card number: 201501020304 corresponding with the solicited message that POS sends from self storage unit, password: 888888 " be sent to bank POS machine.
When judged result is no, then show that active user is not that card is main, now, intelligence work card can generate an error message, as " error ", and being sent to bank POS machine, the information that after bank POS machine receives transmission " error " information, just can send " drip drip " is not the card master of intelligent work card to point out active user.
In specific implementation process, those of ordinary skill in the art according to actual needs, can be arranged the corresponding relation of multiple solicited message and operational order, are not restricted in the embodiment of the present application.
Embodiment two
Based on the inventive concept identical with the embodiment of the present application one, the embodiment of the present application two provides a kind of electronic equipment, please refer to Fig. 4, comprising:
Housing 10;
Receiver module 20, is arranged in housing 10, for obtaining the solicited message sent by the second electronic equipment;
Processor 30, be arranged in 10 housings, for when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information; When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
In the embodiment of the present application two, processor 30 also for:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
In the embodiment of the present application two, processor 30 specifically for:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, processor 30 also for:
Perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
Described type I information is sent to described second electronic equipment.
In the embodiment of the present application two, processor 30 specifically for:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, processor 30 also for:
By performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
In the embodiment of the present application two, processor 30 specifically for:
When described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
In the embodiment of the present application two, processor 30 specifically for:
When described second judged result is no, generates and send the first miscue information to described second electronic equipment, described first miscue information can be exported to make described second electronic equipment.
Embodiment three
Based on the inventive concept identical with the embodiment of the present application one, the embodiment of the present application three provides a kind of electronic equipment, please refer to Fig. 5, comprising:
First acquiring unit 101, for obtaining the solicited message sent by the second electronic equipment;
First determining unit 102, for when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
Second determining unit 103, during for being second solicited message different from described first solicited message in described request information, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
Optionally, in the embodiment of the present application three, described electronic equipment also comprises:
Second acquisition unit 104, presets concerning security matters list of types and the first content type corresponding with the first request content of described request information for obtaining one;
First judging unit 105, for judging whether comprise described first content type in described default concerning security matters list of types, obtains the first judged result;
3rd determining unit 106, for when described first judged result is for being, determines that described request information is described second solicited message;
4th determining unit 107, for when described first judged result is no, determines that described request information is described first solicited message.
Optionally, in the embodiment of the present application three, the first determining unit 102 specifically comprises:
First determination module, for when described request information is the first solicited message, based on described corresponding relation, determines that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, please refer to figure, in the embodiment of the present application three, described electronic equipment also comprises:
First performance element 108, sending instruction for performing described user profile, obtaining the type I information corresponding with described first solicited message; And
First transmitting element 109, for being sent to described second electronic equipment by described type I information.
Optionally, in the embodiment of the present application three, the second determining unit 103 specifically comprises:
Second determination module, for when described request information is the second solicited message, based on described corresponding relation, determines the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, please refer to figure, in the embodiment of the present application three, described electronic equipment also comprises:
Second performance element 110, for by performing described fingerprint authentication instruction, obtains the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Second judging unit 111, for judging whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
Optionally, implement in three in the application, described electronic equipment also comprises:
Second transmitting element 112, for when described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
Optionally, implement in three in the application, described electronic equipment also comprises:
First generation unit 113, for when described second judged result is no, generates and sends the first miscue information to described second electronic equipment, can export described first miscue information to make described second electronic equipment.
By the one or more technical schemes in the embodiment of the present application, following one or more technique effect can be realized:
One, due to the technical scheme in the embodiment of the present application, adopt the solicited message obtaining and sent by the second electronic equipment, when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information, when described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially the technological means for asking to obtain the solicited message comprising classified information, like this, electronic equipment can based on the difference of the solicited message received, determine the level of security corresponding with solicited message, and perform the operation corresponding with level of security, when solicited message needs acquisition to comprise the content of classified information, determine that described request information is high level of security, then electronic equipment just performs the instruction corresponding with high level of security, as identity verification, the content that transmission request information is corresponding again after authentication is passed through, so, efficiently solve the technical matters that the level of security of contactless card of the prior art existence is single, realization can meet the technique effect of many level of securitys demand.
Two, due to the technical scheme in the embodiment of the present application, adopt when described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message, by performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping, judge whether first user fingerprint is pre-set user fingerprint, obtain the second judged result, when described second judged result is for being, obtain the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to the technological means of described second electronic equipment, like this, as long as when electronic equipment needs to send classified information, electronic equipment just can obtain the user fingerprints of active user, only when the fingerprint of active user is identical with pre-set user fingerprint, electronic equipment just can send corresponding content to the second electronic equipment, like this, by the mode of fingerprint authentication, achieve the technique effect of the security further increasing electronic equipment.
Three, due to the technical scheme in the embodiment of the present application, acquisition one is adopted to preset concerning security matters list of types and the first content type corresponding with the first request content of described request information, judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result, when described first judged result is for being, determine that described request information is described second solicited message, when described first judged result is no, determine that described request information is the technological means of described first solicited message, like this, user can need arranging concerning security matters list of types according to the use of oneself, be user-friendly to, achieve the technique effect improving Consumer's Experience.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disk memory, CD-ROM, optical memory etc.) of computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Specifically, the computer program instructions that information processing method in the embodiment of the present application is corresponding can be stored in CD, hard disk, on the storage mediums such as USB flash disk, read by an electronic equipment when the computer program instructions corresponding with information processing method in storage medium or when being performed, comprise the steps:
Obtain the solicited message sent by the second electronic equipment;
When described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
Optionally, that store in described storage medium and step: after the solicited message that described acquisition is sent by the second electronic equipment, corresponding computer program instructions, when being performed, also comprises:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
Optionally, that store in described storage medium and step: when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, corresponding computer program instructions, when being performed, specifically comprises:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, store in described storage medium with step: described determine that the user profile corresponding with described first solicited message sends instruction after, corresponding computer program instructions is when being performed, and described method also comprises:
Perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
Described type I information is sent to described second electronic equipment.
Optionally, store in described storage medium from step: when described request information is second solicited message different with described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, corresponding computer program instructions, when being performed, specifically comprises:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, store in described storage medium with step: described determine the fingerprint authentication instruction corresponding with described second solicited message after, corresponding computer program instructions is when being performed, and described method also comprises:
By performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
Optionally, that store in described storage medium and step: judge whether first user fingerprint is pre-set user fingerprint described, after obtaining the second judged result, corresponding computer program instructions is when being performed, and described method also comprises:
When described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
Optionally, that store in described storage medium and step: judge whether first user fingerprint is pre-set user fingerprint described, after obtaining the second judged result, corresponding computer program instructions is when being performed, and described method also comprises:
When described second judged result is no, generates and send the first miscue information to described second electronic equipment, described first miscue information can be exported to make described second electronic equipment.
Although describe the preferred embodiments of the present invention, those skilled in the art once obtain the basic creative concept of cicada, then can make other change and amendment to these embodiments.So claims are intended to be interpreted as comprising preferred embodiment and falling into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (13)

1. an information processing method, is applied to the first electronic equipment, comprises:
Obtain the solicited message sent by the second electronic equipment;
When described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
2. the method for claim 1, is characterized in that, after the solicited message that described acquisition is sent by the second electronic equipment, described method also comprises:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
3. method as claimed in claim 1 or 2, is characterized in that, described when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determines first operational order corresponding with described first solicited message, specifically comprises:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, described determine that the user profile corresponding with described first solicited message sends instruction after, described method also comprises:
Perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
Described type I information is sent to described second electronic equipment.
4. method as claimed in claim 1 or 2, it is characterized in that, it is described when described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, specifically comprise:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, described determine the fingerprint authentication instruction corresponding with described second solicited message after, described method also comprises:
By performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
5. method as claimed in claim 4, it is characterized in that, judge whether first user fingerprint is pre-set user fingerprint described, after obtaining the second judged result, described method also comprises:
When described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
6. method as claimed in claim 4, it is characterized in that, judge whether first user fingerprint is pre-set user fingerprint described, after obtaining the second judged result, described method also comprises:
When described second judged result is no, generates and send the first miscue information to described second electronic equipment, described first miscue information can be exported to make described second electronic equipment.
7. an electronic equipment, comprising:
First acquiring unit, for obtaining the solicited message sent by the second electronic equipment;
First determining unit, for when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information;
Second determining unit, during for being second solicited message different from described first solicited message in described request information, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
8. an electronic equipment, comprising:
Housing;
Receiver module, is arranged in described housing, for obtaining the solicited message sent by the second electronic equipment;
Processor, be arranged in described housing, for when described request information is the first solicited message, based on the corresponding relation of solicited message and operational order, determine first operational order corresponding with described first solicited message, wherein, described first solicited message is specially for asking to obtain the solicited message comprising non-classified information; When described request information is second solicited message different from described first solicited message, based on described corresponding relation, determine with described first operational order different second operational order corresponding from described second solicited message, wherein, described second solicited message is specially for asking to obtain the solicited message comprising classified information.
9. electronic equipment as claimed in claim 8, is characterized in that, described processor also for:
Obtain one and preset concerning security matters list of types and the first content type corresponding with the first request content of described request information;
Judge whether comprise described first content type in described default concerning security matters list of types, obtain the first judged result;
When described first judged result is for being, determine that described request information is described second solicited message;
When described first judged result is no, determine that described request information is described first solicited message.
10. as claimed in claim 8 or 9 electronic equipment, is characterized in that, described processor specifically for:
When described request information is the first solicited message, based on described corresponding relation, determine that the user profile corresponding with described first solicited message sends instruction;
Correspondingly, described processor also for:
Perform described user profile and send instruction, obtain the type I information corresponding with described first solicited message; And
Described type I information is sent to described second electronic equipment.
11. electronic equipments as claimed in claim 8 or 9, is characterized in that, described processor specifically for:
When described request information is the second solicited message, based on described corresponding relation, determine the fingerprint authentication instruction corresponding with described second solicited message;
Correspondingly, described processor also for:
By performing described fingerprint authentication instruction, obtain the first user fingerprint of the first user of described first electronic equipment of current gripping; And
Judge whether first user fingerprint is pre-set user fingerprint, obtains the second judged result.
12. electronic equipments as claimed in claim 11, is characterized in that, described processor specifically for:
When described second judged result is for being, obtains the Equations of The Second Kind information corresponding with described second solicited message, and described Equations of The Second Kind information is sent to described second electronic equipment.
13. electronic equipments as claimed in claim 11, is characterized in that, described processor specifically for:
When described second judged result is no, generates and send the first miscue information to described second electronic equipment, described first miscue information can be exported to make described second electronic equipment.
CN201510284602.9A 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment Active CN104915617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510284602.9A CN104915617B (en) 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510284602.9A CN104915617B (en) 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104915617A true CN104915617A (en) 2015-09-16
CN104915617B CN104915617B (en) 2018-02-27

Family

ID=54084675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510284602.9A Active CN104915617B (en) 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104915617B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002117458A (en) * 2000-10-04 2002-04-19 I Convenience:Kk Information processing system using bar-code screen
CN101165701A (en) * 2006-10-17 2008-04-23 国际商业机器公司 Methods and systems for providing radio frequency identification (RFID) security mutual authentication
CN101493899A (en) * 2009-03-06 2009-07-29 广东纺织职业技术学院 Campus card identification method based on RFID technology
US20110321121A1 (en) * 2009-02-17 2011-12-29 Nec Corporation Information processing system and operation method of information processing system
CN104346550A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN104462922A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 Method for verifying authorization on basis of biological recognition

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002117458A (en) * 2000-10-04 2002-04-19 I Convenience:Kk Information processing system using bar-code screen
CN101165701A (en) * 2006-10-17 2008-04-23 国际商业机器公司 Methods and systems for providing radio frequency identification (RFID) security mutual authentication
US20110321121A1 (en) * 2009-02-17 2011-12-29 Nec Corporation Information processing system and operation method of information processing system
CN101493899A (en) * 2009-03-06 2009-07-29 广东纺织职业技术学院 Campus card identification method based on RFID technology
CN104346550A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN104462922A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 Method for verifying authorization on basis of biological recognition

Also Published As

Publication number Publication date
CN104915617B (en) 2018-02-27

Similar Documents

Publication Publication Date Title
US11334862B2 (en) Terminal transaction method, and terminal
CN102542453B (en) Mobile payment identity verification method
KR101330867B1 (en) Authentication method for payment device
EP3571824B1 (en) Binding cryptogram with protocol characteristics
WO2017128976A1 (en) Credit payment method and device based on card emulation of mobile terminal
RU2014138935A (en) METHOD, DEVICE AND PROTECTED ELEMENT FOR PERFORMING A SAFE FINANCIAL TRANSACTION IN A DEVICE
CN102768787B (en) Action transaction method and handheld electronic device for action transaction
CN107851251A (en) A kind of payment verification method and device
CN104038924A (en) Method and system for achieving resource exchange information processing
CN102938081A (en) Intelligent card individualized data processing, controller and system
US10810591B2 (en) Virtual reality headset device and payment method
CN104363589A (en) Identity authentication method, device and terminal
CN102034307A (en) Electronic wallet-based dynamic password authentication system and method
US10410095B2 (en) Method and system for identifying a payment card design
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
US20230185898A1 (en) Systems and methods for authentication code entry using mobile electronic devices
CN1845183B (en) Intelligent key apparatus with debit/credit function
CN113544673A (en) Point of sale (POS) system and method with dynamic kernel selection
CN104915617A (en) Information processing method and electronic equipment
CN105654376B (en) Cardless withdrawal method, related device and system
US11651361B2 (en) Secure authentication based on passport data stored in a contactless card
CN105592032B (en) Safety information interaction method Internet-based
CN109872148B (en) Trusted data processing method and device based on TUI and mobile terminal
Abdulwahab et al. NFC Payments Security in Light of COVID-19 Pandemic: Review of Recent Security Threats and Protection Methods
CN107086919B (en) Transaction signature method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant