CN106022196B - A kind of method and intelligent terminal of information sharing - Google Patents

A kind of method and intelligent terminal of information sharing Download PDF

Info

Publication number
CN106022196B
CN106022196B CN201610513570.XA CN201610513570A CN106022196B CN 106022196 B CN106022196 B CN 106022196B CN 201610513570 A CN201610513570 A CN 201610513570A CN 106022196 B CN106022196 B CN 106022196B
Authority
CN
China
Prior art keywords
level
data
information
dimensional code
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610513570.XA
Other languages
Chinese (zh)
Other versions
CN106022196A (en
Inventor
陈锟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Software Technology Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610513570.XA priority Critical patent/CN106022196B/en
Publication of CN106022196A publication Critical patent/CN106022196A/en
Application granted granted Critical
Publication of CN106022196B publication Critical patent/CN106022196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The method and intelligent terminal shared the embodiment of the invention provides a kind of information, it is related to field of terminal technology, this method comprises: the information content to sharing is classified, determine the corresponding encryption level of all types of data in the information content, wherein, encryption level includes first level and second level, and first level is lower than second level;Corresponding target user is configured for the second level;Partitioned storage is carried out to all types of data according to the encryption level, generates the corresponding feature two dimensional code of the target user;Shared according to the feature two dimensional code.The embodiment of the present invention is ensured information security by the user that feature user can be used for limiting the data for obtaining the second level in feature two dimensional code to solve the problems, such as information leakage in two dimensional code sharing mode.

Description

Information sharing method and intelligent terminal
Technical Field
The invention relates to the technical field of terminals, in particular to an information sharing method and an intelligent terminal.
Background
With the rapid development of internet technology, intelligent terminals such as smart phones are more and more popular, and the intelligent terminals become a main tool for people to share information.
In daily life, people often share some information of themselves with others, such as personal business cards or links of a certain network disk. At present, the sharing method based on the intelligent terminal mainly includes copying characters, screenshot, sending a file, sending a Uniform Resource Locator (URL), a two-dimensional Code (QR Code), and the like. The two-dimensional code has a fault-tolerant function, and if the two-dimensional code picture is partially shielded, the two-dimensional code picture can still be scanned by the intelligent terminal. Therefore, compared with other sharing methods, the two-dimensional code sharing method is more convenient, but the problem of information leakage also exists. For example, the user a may send a two-dimensional code containing a personal contact phone to the user B, so that the user B may obtain the personal contact phone of the user a by scanning the two-dimensional code. If the user B sends the two-dimensional code to other users, the other users can also obtain the contact call of the user A, and further telephone harassment can be carried out on the user A.
Disclosure of Invention
In view of the above problems, embodiments of the present invention provide an information sharing method and a corresponding intelligent terminal, so as to solve the problem of information leakage in a two-dimensional code sharing manner, thereby ensuring information security.
In order to solve the above problem, an embodiment of the present invention discloses an information sharing method, including:
grading the shared information content, and determining the encryption level corresponding to each type of data in the information content, wherein the encryption level comprises a first level and a second level, and the first level is lower than the second level; configuring corresponding target users for the second level; carrying out partition storage on each type of data according to the encryption level to generate a characteristic two-dimensional code corresponding to the target user; and sharing according to the characteristic two-dimensional code.
The embodiment of the invention also discloses another information sharing method, which comprises the following steps: scanning the characteristic two-dimensional code; extracting data from the partition corresponding to the first level in the scanning process; detecting whether a scanning user is matched with a target user of the characteristic two-dimensional code; if the scanning user is matched with the target user, extracting data from the partition corresponding to the second level; and saving the extracted data.
Correspondingly, the embodiment of the invention also discloses an intelligent terminal, which comprises:
the encryption level determining module is used for grading the shared information content and determining the encryption level corresponding to each type of data in the information content, wherein the encryption level comprises a first level and a second level, and the first level is lower than the second level;
the target user configuration module is used for configuring corresponding target users for the second level;
the two-dimensional code generation module is used for carrying out partition storage on various types of data according to the encryption level and generating a characteristic two-dimensional code corresponding to the target user;
and the sharing module is used for sharing according to the characteristic two-dimensional code.
The embodiment of the invention also discloses another intelligent terminal, which comprises:
the scanning module is used for scanning the characteristic two-dimensional code;
the first extraction module is used for extracting data from the partitions corresponding to the first level in the scanning process;
the user matching module is used for detecting whether a scanning user is matched with a target user of the characteristic two-dimensional code; if the scanning user is matched with the target user, triggering a second extraction module;
the second extraction module is used for extracting data from the partitions corresponding to the second level;
and the storage module is used for storing the data extracted by the first extraction module and the second extraction module.
The embodiment of the invention has the following advantages:
firstly, the information content to be shared is classified, so that data of each encryption level can be stored in a partition mode according to the encryption level, and the characteristic two-dimensional code corresponding to the characteristic user is generated. The characteristic user can be used for limiting users for acquiring data of the second level in the characteristic two-dimensional code, so that the problem of information leakage in a two-dimensional code sharing mode is solved, and information safety is guaranteed.
Secondly, the implementation of the invention determines whether the scanning user belongs to the target user of the characteristic two-dimensional code by detecting whether the scanning user is matched with the target user of the characteristic two-dimensional code, extracts the data in the partition corresponding to the second level when the scanning user belongs to the target user of the characteristic two-dimensional code, and only extracts the data in the partition corresponding to the first level if the scanning user does not belong to the target user of the characteristic two-dimensional code, namely, different people can scan different information contents for the same characteristic two-dimensional code, thereby avoiding the embarrassment situation of making different two-dimensional codes for different people and improving the utilization rate of the characteristic two-dimensional code.
Drawings
FIG. 1 is a flowchart illustrating steps of an embodiment of a method for information sharing according to the present invention;
FIG. 2 is a flowchart illustrating steps in an alternative embodiment of a method for sharing information in accordance with the present invention;
FIG. 3 is a schematic illustration of business cards that need to be shared in an embodiment of the present invention;
FIG. 4 is a schematic diagram of a two-dimensional code business card generated in an embodiment of the present invention;
FIG. 5 is a schematic flow chart of sending a feature two-dimensional code according to a specific example of the present invention;
FIG. 6 is a flowchart illustrating steps of another embodiment of a method for sharing information;
FIG. 7 is a flowchart illustrating steps in an alternative embodiment of a method for sharing information in accordance with the present invention;
FIG. 8A is a block diagram of an embodiment of an intelligent terminal of the present invention;
FIG. 8B is a block diagram of an alternative embodiment of an intelligent terminal of the present invention;
FIG. 9A is a block diagram of another intelligent terminal embodiment of the present invention;
FIG. 9B is a block diagram of an alternate embodiment of an intelligent terminal of the present invention;
fig. 10 is a block diagram of the intelligent terminal according to another embodiment of the present invention;
fig. 11 is a schematic structural diagram of an intelligent terminal according to another embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Example one
The embodiment discusses the information sharing method provided by the invention based on the generation process of the two-dimensional code.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of the information sharing method of the present invention is shown, which may specifically include the following steps:
step 101, grading the shared information content, and determining an encryption level corresponding to each type of data in the information content.
As a specific application of the present invention, an intelligent terminal, such as a mobile phone, a tablet computer, a Personal Computer (PC), etc., can convert information content that a user needs to share into a two-dimensional Code (QR Code), so that the user can share information using the QR Code.
In the embodiment of the invention, the intelligent terminal can determine the corresponding information content according to the operation of the user, and can use the determined information content as the shared information content, so that the information content can be classified according to the preset classification standard, and the encryption level corresponding to each type of data in the information content can be determined. The encryption level may specifically include a first level, a second level, a third level, and the like, where the third level may be higher than the second level, and the second level may be higher than the first level, and the setting of the encryption level is not specifically limited by the present invention.
And 102, configuring corresponding target users for the second level.
In this embodiment, the intelligent terminal may set a target user corresponding to each encryption level based on user information input by an operation user, so that a user or a terminal that acquires data at each encryption level may be respectively limited. The user information may be used to identify a corresponding user or terminal, such as any one or more of an Identity number (ID), a user name, an Internet Protocol (IP) address, an equipment Identity, and the like, which is not limited in this embodiment of the present invention.
As a specific example of the present invention, when detecting that user information is input for a second level or data of the second level, the intelligent terminal may configure a corresponding target user for the second level according to the user information, for example, a user corresponding to a user name is used as a target user, so that a user reading data of the second level may be limited, and other users are prevented from illegally acquiring data of the second level; or the terminal corresponding to the equipment identification code is taken as a target user, so that the intelligent terminal for reading the second-level data can be limited, and other terminals are prevented from illegally acquiring the second-level data. Wherein the target user may have the right to read the second level of data.
And 103, performing partition storage on each type of data according to the encryption level to generate a characteristic two-dimensional code corresponding to the target user.
The intelligent terminal can determine the storage position of each type of data in two dimensions based on the encryption level corresponding to the type of data in the generation process of the two-dimensional code. Specifically, the intelligent terminal may preset the partition corresponding to each encryption level, so that the data of each encryption level may be respectively encapsulated into the corresponding partition based on the encryption level in the process of generating the two-dimensional code, and then the corresponding characteristic two-dimensional code is generated by synthesizing all the partitions. The characteristic two-dimensional code may contain user information, and the contained user information may be used to determine a corresponding characteristic user.
And 104, sharing according to the characteristic two-dimensional code.
After the intelligent terminal generates the characteristic two-dimensional code, the characteristic two-dimensional code can be fed back to the user, so that the user can share information by adopting the characteristic two-dimensional code. For example, the intelligent terminal can display the characteristic two-dimensional code on a display interface, so that other intelligent terminals can scan the characteristic two-dimensional code; the characteristic two-dimensional code can also be sent to the target terminal through an application program such as instant messaging software, so that the target terminal can receive the characteristic two-dimensional code and obtain information content carried by the characteristic two-dimensional code by scanning the characteristic two-dimensional code, and the purpose of information sharing is achieved. Of course, the intelligent terminal may also share the characteristic two-dimensional code with other terminals in other manners, and if the characteristic two-dimensional code is printed out, other users may scan the printed characteristic two-dimensional code.
According to the invention, the information content to be shared is classified, so that the data of each encryption level can be stored in a partition mode according to the encryption level, and the characteristic two-dimensional code corresponding to the characteristic user is generated. The characteristic user can be used for limiting users for acquiring data of the second level in the characteristic two-dimensional code, so that the problem of information leakage in a two-dimensional code sharing mode is solved, and information safety is guaranteed.
Referring to fig. 2, a flowchart illustrating steps of an alternative embodiment of the information sharing method according to the present invention is shown, and specifically may include the following steps:
step 201, the shared information content is graded, and the encryption level corresponding to each type of data in the information content is determined.
The intelligent terminal grades the shared information content, and determines an encryption level corresponding to each type of data in the information content, which may specifically include: for each type of data in the information content, determining a corresponding encryption level based on an input level selection operation; or detecting keywords in each type of data to determine the corresponding encryption level. Wherein the encryption level may include a first level and a second level, and the first level is lower than the second level.
Specifically, the intelligent terminal can divide the shared information content into the following according to the importance degree related to the privacy of the user: the privacy degree is public information without confidentiality, private information with the privacy degree of general confidentiality and absolute information with the privacy degree of absolute confidentiality; and setting the encryption level corresponding to each privacy degree, wherein if the confidentiality is not required to correspond to the first level, the confidentiality and the confidentiality are generally corresponding to the second level. The second level of data may specifically include: confidential information and private information.
Taking sharing a personal business card as an example, as shown in fig. 3, the business card to be shared may specifically include: the "name", "hobby", the account number of the communication software such as "QQ", "microblog", the "address", and the "personal phone" and the like. The intelligent terminal can grade the information content of the business card according to the operation of the user and determine the encryption level corresponding to each type of data, for example, the encryption level of the name and the like is set to be a first level corresponding to 'no secrecy' according to the privacy degree selected by the user aiming at the name and the like and 'no secrecy'; setting the encryption levels of the QQ, the microblog and the address as a second level corresponding to the general secrecy according to the privacy degree selected by the user aiming at the QQ, the microblog and the address as the general secrecy; and setting the encryption level of the personal telephone to a second level corresponding to the absolute secret according to the privacy degree selected by the user for the personal telephone as the absolute secret.
Of course, the intelligent terminal may also determine the encryption level corresponding to each type of data in the information content by detecting the shared information content. Specifically, the intelligent terminal detects keywords in various types of data in the business card to be shared, so that the security level corresponding to the type of data can be determined according to the preset privacy degree corresponding to the detected keywords, and if the keyword of 'telephone' is detected, the encryption level corresponding to the 'personal telephone' can be determined as the second level according to the preset privacy degree 'absolute secret' corresponding to the keyword of 'telephone'.
Optionally, when the shared information content is converted into the two-dimensional code, the intelligent terminal may modify the security level or privacy degree corresponding to each type of data in the information content. For example, the smart terminal may use a default view as shown in fig. 3 when converting a business card into a two-dimensional code for the first time. The user can drag an item in the default view, such as pressing the item "QQ" for a long time, to drag "QQ" from "general privacy" to "absolute privacy", so that the intelligent terminal modifies its corresponding privacy level; the 'micro blog' entry can also be dragged from 'general secrecy' to 'no secrecy', so that the intelligent terminal modifies the corresponding privacy degree and modifies the corresponding encryption level of the intelligent terminal at the same time.
Step 202, configuring corresponding target users for the second level.
In the embodiment of the invention, the intelligent terminal can add the trust list in the two-dimensional code, so that a user in the trust list can read the data of the second level in the two-dimensional code, such as the private information and the absolute information in the two-dimensional code. Optionally, the configuring, by the intelligent terminal, the corresponding target user for the second level may specifically include: generating a trust list based on the input contact information, wherein each user in the trust list is a target user; an association between the trust list and the second level is created. Of course, the intelligent terminal may also preset a trust list, so that when the user inputs user information in the shared information content, the corresponding user object is added to the trust list, that is, the user object is set as a target user, so that the user object can read second-level data in the two-dimensional feature data converted from the shared information content.
And 203, performing partition storage on each type of data according to the encryption level to generate a characteristic two-dimensional code corresponding to the target user.
It should be noted that, according to the standard of the two-dimensional code, the data area is usually used as a place where the two-dimensional code stores real data content, and the error correction area is only used for storing an error correction code, so that the intelligent terminal can still read the data content stored in the data area based on the error correction code when the two-dimensional code is polluted and damaged. The two-dimensional code fault tolerance rate can be represented by letters, and the fault tolerance level can be divided into: l (7%), M (15%), Q (25%), H (30%) four stages. Each version of the two-dimensional code is provided with the corresponding maximum number of input characters in combination with the data size, the character type and the error correction level, that is, if the data size is increased, more code elements are needed to form the two-dimensional code, and the two-dimensional code becomes larger.
In the process of generating the two-dimensional code, the private data can be taken as a polluted block, and a part of storage space of the two-dimensional code is occupied. If the embedded private data does not exceed the fault-tolerant range of the two-dimensional code, the integrity of the two-dimensional code data area cannot be affected. Therefore, under the condition of meeting the two-dimensional code standard, the intelligent terminal in the embodiment of the invention can embed information contents such as privacy data and a trust list into the error correction area, so that users who are not in the trust list can only scan the public information in the data area, and the privacy safety of the users is ensured.
Specifically, the intelligent terminal may divide the two-dimensional code into a data area and an error correction area. Wherein the data area can be used for storing public information without security, such as data of a first level; the error correction area may be used to store error correction codes and privacy information, such as a second level of data. Optionally, the partition storage is performed on each type of data according to the encryption level to generate the feature two-dimensional code corresponding to the target user, and the method specifically includes: encrypting the data of the second level and the target user, and storing the encrypted data in an error correction area, for example, encrypting and storing a trust list, the data of the second level, and an association relationship between the trust list and the second level in the error correction area; storing the first level of data in a data area; and synthesizing the error correction area and the data area to generate the characteristic two-dimensional code.
Optionally, the confidential information may have a corresponding expiration time. The expiration time can be used for determining the valid period of the confidential information, so that after the valid period is up, the intelligent terminal invalidates the stored confidential information, for example, deletes the confidential information, thereby further ensuring the security of the confidential information. In a preferred embodiment of the present invention, the information sharing method may further include: configuring corresponding expiration time for the top-secret information; and packaging the expiration time into an error correction area in the generation process of the two-dimensional code. Specifically, the intelligent terminal can configure corresponding expiration time for the absolute secret information in the shared information content according to preset parameter information; or configuring corresponding expiration time for the secret information according to the time information input by the user for the secret information, which is not limited in particular by the embodiment of the present invention.
Fig. 4 is a schematic diagram of a two-dimensional code business card generated by the specific example of the present invention. In the process of generating the two-dimensional code business card, the intelligent terminal can store public information such as names and working phones in the data area, and store private information such as micro signals and microblogs, and absolute information such as private phones and expiration time corresponding to the absolute information, and the trust list in the error correction area, and encrypt the private information and the absolute information, which are stored in the error correction area, only by a target user in the trust list, and synthesize the data area and the error correction area to generate the two-dimensional code business card containing the target user and the expiration time.
In a preferred embodiment of the present invention, the information sharing method may further include: and uploading the trust list to the cloud end, and determining the uniform resource locator of the trust list. The encrypting and storing the trust list in the error correction area may specifically include: storing uniform resource locators for the trust list to the error correction zone.
In the implementation of the invention, in order to store a large amount of data, the intelligent terminal can store the trust list in the characteristic two-dimensional code in the cloud, and encrypt and store the trust list in a Uniform Resource Locator (URL) of the cloud in an error correction area of the two-dimensional code, so that more target users can be configured for the characteristic two-dimensional code under the condition of meeting the standard of the two-dimensional code, that is, the information storage capacity of the two-dimensional code is increased. Certainly, the intelligent terminal may also encrypt and store the URL of the trust list and part of the target users in the trust list in the error correction area, so that in the process of scanning the feature two-dimensional code, under the condition that the corresponding target users cannot be found in the error correction area, the corresponding trust list stored in the cloud is obtained based on the URL of the trust list in the error correction area, and then the target users stored in the cloud are used for verification.
And step 204, sending the characteristic two-dimensional code to a target terminal.
The intelligent terminal provided by the embodiment of the invention can send the characteristic two-dimensional code to the target terminal so as to send the characteristic two-dimensional code to the sharing object, thereby achieving the purpose of information sharing. The target terminal may be determined according to the sharing object, such as an intelligent terminal operated by the sharing object. Specifically, after the characteristic two-dimensional code is generated or acquired by the intelligent terminal, the characteristic two-dimensional code may be sent to the intelligent terminal operated by the sharing object selected by the user, so that the sharing object may acquire the characteristic two-dimensional code.
The embodiment of the invention can add the user to the trust list in a static mode or a dynamic mode so as to set the user as the target user. Specifically, when the user is added to the trust list in a static manner, the intelligent terminal can preset the trust list, so that an object capable of reading the private information in the two-dimensional code can be added to the trust list, the added object is configured as a target user, and a characteristic two-dimensional code containing the target user is generated. Preferably, a trust list corresponding to the readable second-level data is set in a static manner, and the target user in the trust list can be fixed and unchanged all the time after the characteristic two-dimensional code is generated, so that the target user in the trust list can be prevented from being illegally tampered, and the information security is further improved. When the user is added to the trust list in a dynamic mode, the intelligent terminal can add the sharing object to the trust list of the characteristic two-dimensional code, namely, the sharing object is set as the target user of the characteristic two-dimensional code, and therefore the flexibility of adding the target user can be improved.
In a preferred embodiment of the present invention, before sending the characteristic two-dimensional code to the target terminal, the method further includes: verifying whether the current user is an author of the two-dimensional code; and if the current user is the author, adding a sharing object into the trust list, and updating the characteristic two-dimensional code. Wherein, the sending the characteristic two-dimensional code to a target terminal includes: and sending the updated characteristic two-dimensional code to a target terminal. For example, a user A makes a two-dimensional code business card 1 by operating an intelligent terminal and sends the business card 1 to a user B; after receiving the two-dimensional code business card 1, the B can forward the two-dimensional code business card 1 to the C. At this time, the C is not added into the trust list, so that the private data in the two-dimensional code business card 1 cannot be read; and B is in the trust list, so that the private data in the two-dimensional code business card 1 can be read. When A sends the two-dimension code business card to D again, D can also be added into the trust list, namely when A shares D, the intelligent terminal operated by A can read all data of the two-dimension code business card 1, then D is added into the trust list, and a two-dimension code 2 is automatically regenerated to be shared with D. Therefore, the objects shared by the authors of the feature two-dimensional codes can be automatically added to the trust list.
Referring to fig. 5, a schematic flow chart of sending a characteristic two-dimensional code in a specific example of the present invention is shown. Specifically, when the intelligent terminal sets the contents of the business card, the information contents of the business card can be classified into public information, private information and absolute information, then the public information is stored in the data area, the private information, the absolute information and second-level data such as expiration time are stored in the error correction area in an encrypted manner, the characteristic two-dimensional code 1 corresponding to the business card is generated, and therefore information sharing can be performed according to the characteristic two-dimensional code 1. When the feature two-dimensional code is shared, the intelligent terminal can verify whether the current operating user is the author of the feature two-dimensional code 1 or not by acquiring the user information of the current operating user. If the current user is the author of the feature two-dimensional code 1, the sharing object is added into the trust list, the feature two-dimensional code 1 is updated, namely, an updated feature two-dimensional code 2 is generated on the basis of the feature two-dimensional code 1, and then the updated feature two-dimensional code 2 is sent to the target terminal. And if the current user is not the author of the characteristic two-dimensional code, directly sending the characteristic two-dimensional code 1 to the target terminal.
Through the embodiment, even if the characteristic two-dimensional code generated by the intelligent terminal is leaked, the user and/or the intelligent terminal which are not in the trust list of the characteristic two-dimensional code cannot acquire the privacy information in the two-dimensional code under the condition that the encrypted privacy information is not cracked, so that the problem that the privacy information in the characteristic two-dimensional code is leaked can be avoided.
Example two
On the basis of the above embodiment, the two-dimensional code-based scanning process is used to discuss the information sharing method provided by the present invention.
Referring to fig. 6, a flowchart illustrating steps of another embodiment of the information sharing method of the present invention is shown, which may specifically include the following steps:
step 601, scanning the characteristic two-dimensional code.
In the embodiment of the invention, the intelligent terminal can use the camera to scan the characteristic two-dimension; or the characteristic two-dimensional code can be obtained by shooting through a camera, and the obtained characteristic two-dimensional code is scanned to extract the information content stored in the characteristic two-dimensional code from the characteristic two-dimensional code. Of course, the intelligent terminal according to the embodiment of the present invention may also acquire the characteristic two-dimensional code by using the method, for example, the characteristic two-dimensional code is received by using a wireless or wired communication method, which is not limited in this respect.
Wherein, this characteristic two-dimensional code specifically can include: and the two-dimensional code is generated by grading the shared information content and storing each type of data in a partition mode according to the graded encryption level. The encryption levels include a first level and a second level, the first level being lower than the second level, and the second level having a corresponding target user.
Step 602, in the scanning process, data is extracted from the partition corresponding to the first level.
In the feature two-dimensional code of the embodiment of the present invention, the data stored in the partition corresponding to the first level may not be encrypted, and specifically, the method may include: first level data, such as public information that does not need to be kept secret. The intelligent terminal can extract data without encryption, such as data of a first level, from a partition corresponding to the first level of the characteristic two-dimensional code based on a two-dimensional code technology.
Step 603, detecting whether the scanning user is matched with the target user of the characteristic two-dimensional code.
If the scanning user matches the target user, go to step 604; otherwise, the process jumps to step 605.
Specifically, the intelligent terminal can determine the current scanning user by obtaining the user information of the current operation, and further can detect whether the scanning user is matched with the target user of the feature two-dimensional code, so as to check whether the current scanning user has the authority to obtain the data of the second level in the feature two-dimensional code, that is, whether the scanning user belongs to the target user of the feature two-dimensional code. When the scanning user is matched with the target user of the feature two-dimensional code, it can be determined that the scanning user belongs to the target user of the feature two-dimensional code, and then step 604 is executed; when the scanning user does not match with the target user of the feature two-dimensional code, it may be determined that the scanning user does not belong to the target user of the feature two-dimensional code, and the step 605 may be directly skipped to execute.
And step 604, extracting data from the partition corresponding to the second level.
In this step, the intelligent terminal may extract the encrypted and stored data, such as the second-level data in the characteristic two-dimensional code, from the partition corresponding to the second level based on the authority possessed by the target user.
Step 605, the extracted data is saved.
The intelligent terminal can automatically store the data extracted from the characteristic two-dimensional code, so that the stored data can be used in subsequent data processing, corresponding services are provided for users, the requirements of the users are met, and the purpose of information sharing is achieved.
The embodiment of the invention determines whether the scanning user belongs to the target user of the characteristic two-dimensional code by detecting whether the scanning user is matched with the target user of the characteristic two-dimensional code, extracts the data in the subarea corresponding to the second level when the scanning user belongs to the target user of the characteristic two-dimensional code, and only extracts the data in the subarea corresponding to the first level if the scanning user does not belong to the target user of the characteristic two-dimensional code, namely different people can scan different information contents for the same characteristic two-dimensional code, thereby avoiding the embarrassment condition of making different two-dimensional codes for different people and improving the utilization rate of the characteristic two-dimensional code.
Referring to fig. 7, a flowchart illustrating steps of another alternative embodiment of the information sharing method according to the present invention is shown, which may specifically include the following steps:
and step 701, scanning the characteristic two-dimensional code.
In the embodiment of the present invention, the characteristic two-dimensional code may be specifically divided into: a data area and an error correction area. The partition corresponding to the first level may be a data area of the characteristic two-dimensional code, and the partition corresponding to the second level may be an error correction area of the characteristic two-dimensional code.
Step 702, in the scanning process, extracting data of a first level from the data area of the characteristic two-dimensional code.
In the process of reading the two-dimensional code, the intelligent terminal can extract first-level data from a data area of the characteristic two-dimensional code, for example, public information such as 'name', 'hobby' and the like with privacy degree being not required to be kept secret.
Step 703, performing category detection on the data of the first level, and determining a corresponding information category.
After the data of the first level is extracted, the intelligent terminal may determine the information category of the data of the first level according to a preset detection mode, for example, the information category of the characteristic two-dimensional code is determined by detecting a keyword in the data of the first level. For example, when it is detected that the first-level data includes the keyword "name", the information category of the feature two-dimensional code may be determined as business card information.
Step 704, determining the corresponding target database by using the information type.
Wherein the target database is used for storing the extracted data. For example, in combination with the above example, the intelligent terminal may use a business card database corresponding to the business card information as a target database to store the extracted data in the business card database.
Step 705, detecting whether the scanning user is matched with the target user of the characteristic two-dimensional code.
If the scanning user matches the target user, go to step 706; otherwise, go to step 707 and execute.
Step 706, extracting the data of the second level from the error correction area of the characteristic two-dimensional code.
In this step, the intelligent terminal may extract, according to the authority of the target user, data of a second level, such as private information with a privacy degree of "general secrecy" and absolute information with a privacy degree of "absolute" from the error correction area of the feature two-dimensional code.
Step 707, store the extracted data into the target data.
The extracted data in this embodiment includes data of a first level, and may also include data of a second level. Therefore, saving the extracted data may specifically include: and storing the data of the first level and the data of the second level to the target database.
In a preferred embodiment of the present invention, the second level data may specifically include: private information and confidential information, where the confidential information may have a corresponding expiration time. When the intelligent terminal stores the extracted data, the private information can be stored in a plaintext mode; the effectiveness of the top-secret information can be determined by judging whether the current time exceeds the expiration time, and when the current time exceeds the expiration time, the intelligent terminal can determine that the top-secret information is expired and delete the top-secret information; and when the current time does not exceed the expiration time, determining that the secret information is not expired, and storing the secret information in a ciphertext mode. When the intelligent terminal stores the top secret information, the validity of the top secret information in the characteristic two-dimensional code can be detected through the expiration time in the characteristic two-dimensional code, so that the expired top secret information can be automatically deleted, the unexpired top secret information can be stored in a ciphertext mode, and the information safety is further improved.
Optionally, after determining that the top secret information is not expired, the intelligent terminal may further determine valid time corresponding to the top secret information by using the expiration time, and may store the valid time in the target database, so that when the top secret information is used, the validity of the top secret information may be detected by using the valid time. Specifically, after storing the extracted data, the intelligent terminal may detect whether the secret information is valid by using the valid time when the application calls the secret information. When the secret-insulated information is effective, the intelligent terminal can decrypt the secret-insulated information to generate corresponding plaintext data and feed the plaintext data back to the application program, so that the application program can use the plaintext data to provide services for the user.
After feeding back plaintext data to the application program, the intelligent terminal of the embodiment of the invention can also display the first-level data corresponding to the secret information. Specifically, when using the two-dimensional code data stored in the target database, the smart terminal may determine whether a producer of the two-dimensional code wishes the data to be disseminated by determining whether the privacy level corresponding to the data is absolute. If the data corresponds to an absolute degree of privacy, it can be determined that the producer of the two-dimensional code does not want the data to be propagated. For example, author a of a two-dimensional code shares a phone number with salesperson B, but a does not want B to share the number to other salespersons, nor does B know his number all the time. At this time, the privacy degree corresponding to the telephone number of the A can be set to be top secret, so that when the telephone number of the A is displayed in the smart phone, the telephone number of the A can be displayed in a ciphertext mode instead of a plaintext mode, for example, the number of the A is not displayed, the telephone number of the A can not be known by the B, and the telephone number of the A can not be disclosed by the B.
As a specific example of the present invention, the smart phone may encrypt and display the confidential information. Since the system of the smart phone knows the encryption method, when the secret information is used for operation in the system, the smart phone can decrypt the secret information into plaintext data and then use the plaintext data. Specifically, in the storage process of the smart phone, the extracted data can be stored in the business card database according to the classification of information privacy in the two-dimensional code business card, and the storage format of the data can be as shown in table 1:
name of field Field value Degree of privacy
Name (I) Mr.k Disclosed is a
QQ 12345 In general
Telephone set 12321 Absolute secret
TABLE 1
The encrypted phone number can be stored in the smart phone in a ciphertext mode, and a phone program of the smart phone can obtain a real number through reverse operation.
Of course, the real number may also be stored in the smartphone in clear text. If the privacy degree corresponding to the real number is the top secret, the phone program of the smart phone can be dialed by using the real number, but the real number is not displayed, namely, the information itself is not displayed, so that the user can be prevented from acquiring the information when using the stored top secret information, and the top secret information can be prevented from being leaked by the user. Therefore, when the user shares the name card with the salesperson, the salesperson does not need to worry about the leakage of personal information of the salesperson, and the situation that the salesperson receives a sales call endlessly can be avoided.
The method and the device are not limited to application scenes for sharing business cards, and can also be applied to application scenes for sharing other information, such as application scenes for sharing web addresses, video and video. The implementation of the invention can meet the requirement of grading information according to the privacy degree of the information when sharing the information, and can realize directional sharing by setting the target user, thereby improving the flexibility of information sharing.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
EXAMPLE III
Referring to fig. 8A, a block diagram of an embodiment of an intelligent terminal according to the present invention is shown, and specifically, the block diagram may include the following modules:
an encryption level determining module 801, configured to grade the shared information content, and determine an encryption level corresponding to each type of data in the information content. Wherein the encryption levels include a first level and a second level, the first level being lower than the second level.
A target user configuration module 802, configured to configure a corresponding target user for the second level.
And a two-dimensional code generation module 803, configured to perform partition storage on each type of data according to the encryption level, and generate a characteristic two-dimensional code corresponding to the target user.
The sharing module 804 is configured to share according to the characteristic two-dimensional code.
On the basis of fig. 8A, optionally, the two-dimensional code generating module 803 may include: an encrypted storage submodule 8031, a storage submodule 8032, and a generation submodule 8033, as shown in fig. 8B.
The encryption storage submodule 8031 is configured to encrypt the second level data and the target user, and store the encrypted second level data and the encrypted target user in the error correction area. The storage submodule 8032 is configured to store the first level data in a data area. And the generating submodule module 8033 is configured to synthesize the error correction area and the data area, and generate the characteristic two-dimensional code.
In a preferred embodiment of the present invention, the encryption level determining module 801 may include the following sub-modules:
a selecting sub-module 8011 for determining, for each type of data in the information content, a corresponding encryption level based on an input level selection operation;
the detecting sub-module 8012 is configured to detect keywords in each type of data, and determine a corresponding encryption level.
In a preferred embodiment of the present invention, the target user configuration module 802 may be specifically configured to generate a trust list based on the input contact information, and create an association relationship between the trust list and the second level. And each user in the trust list is the target user. The encryption storage sub-module 8031 may be specifically configured to encrypt and store the association relationship, the trust list, and the second level data in the error correction area.
Optionally, the intelligent terminal according to the embodiment of the present invention may further include: and an upload module 805. The uploading module 805 may be configured to upload the trust list to the cloud, and determine a uniform resource locator of the trust list. The encrypted storage submodule 8031 may be further configured to store the uniform resource locator of the trust list in the error correction area.
In a preferred embodiment of the present invention, the sharing module 804 may include the following sub-modules:
and the sending submodule is used for sending the characteristic two-dimensional code to a target terminal.
And the display submodule is used for displaying the two-dimensional code.
Optionally, the target terminal in the embodiment of the present invention may be determined according to the sharing object. The sharing module 804 may further include the following sub-modules:
the verification submodule is used for verifying whether the current user is the author of the two-dimensional code;
the updating submodule is used for adding a sharing object into the trust list and updating the characteristic two-dimensional code when the current user is the author; and triggering the sending submodule to send the updated characteristic two-dimensional code to the target terminal.
In an embodiment of the present invention, the second level of data may include: confidential information and private information. Wherein the confidential information has a corresponding expiration time. Optionally, the intelligent terminal according to the embodiment of the present invention may further include the following modules:
a time configuration module 806, configured to configure a corresponding expiration time for the secret information;
a time packing module 807, configured to pack the expiration time into the error correction area during the generation process of the two-dimensional code.
The intelligent terminal provided by the invention can be used for grading the information content to be shared, so that the data of each encryption level can be stored in a partition mode according to the encryption level, and the characteristic two-dimensional code corresponding to the characteristic user is generated. The characteristic user can be used for limiting users for acquiring data of the second level in the characteristic two-dimensional code, so that the problem of information leakage in a two-dimensional code sharing mode is solved, and information safety is guaranteed.
Referring to fig. 9A, a block diagram of another intelligent terminal embodiment of the present invention is shown, which may specifically include the following modules:
the scanning module 901 is configured to scan the characteristic two-dimensional code.
The first extracting module 902 is configured to extract data from a partition corresponding to the first level in the scanning process.
And the user matching module 903 is used for detecting whether the scanning user is matched with the target user of the characteristic two-dimensional code. If the scanning user matches the target user, a second extraction 904 module is triggered.
And a second extracting module 904, configured to extract data from the partition corresponding to the second level.
A saving module 905, configured to save the data extracted by the first extraction module and the second extraction module.
In the embodiment of the present invention, the partition corresponding to the first level may be a data area of the characteristic two-dimensional code, and the partition corresponding to the second level may be an error correction area of the characteristic two-dimensional code.
On the basis of fig. 9A, optionally, the intelligent terminal may further include: an information category detection module 906 and a database determination module 907, as shown in fig. 9B.
The information category detecting module 906 may be configured to perform category detection on the data of the first level, and determine a corresponding information category. A database determining module 907 may be configured to determine a corresponding target database using the information type, where the target database is used to store the extracted data. The saving module 905 may be specifically configured to store the first-level data and the second-level data in the target database.
Optionally, the second level of data may include: private information and confidential information, the confidential information having a corresponding expiration time. The saving module 905 may include the following sub-modules:
and the plaintext storage submodule 9051 is configured to store the private information in a plaintext manner.
And the time judging submodule 9052 is configured to judge whether the current time exceeds the expiration time.
And the expiration determining submodule 9053 is configured to determine that the secret information is expired and delete the secret information when the current time exceeds the expiration time.
And the ciphertext storage submodule 9054 is configured to determine that the secret-critical information is not expired when the current time does not exceed the expiration time, and store the secret-critical information in a ciphertext manner.
In a preferred embodiment of the present invention, the intelligent terminal may further include the following modules:
the valid time determining module 908 may be configured to determine, after the ciphertext storage sub-module determines that the absolute secret information has not expired, valid time corresponding to the absolute secret information by using the expiration time.
And a validity detection module 909, configured to detect whether the secret information is valid by using the valid time when the application calls the secret information.
The decryption module 910 is configured to perform a decryption operation on the confidential information to generate corresponding plaintext data when the validity detection module 909 determines that the confidential information is valid.
A feedback module 911, configured to feed back the plaintext data generated by the decryption module 910 to the application.
Optionally, the intelligent terminal may further include a display module. The display module can be used for displaying the first-level data corresponding to the top-secret information.
The intelligent terminal determines whether the scanning user belongs to the target user of the characteristic two-dimensional code by detecting whether the scanning user is matched with the target user of the characteristic two-dimensional code, extracts the data in the partition corresponding to the second level when the scanning user belongs to the target user of the characteristic two-dimensional code, and only extracts the data in the partition corresponding to the first level if the scanning user does not belong to the target user of the characteristic two-dimensional code, namely different people can scan different information contents for the same characteristic two-dimensional code, so that the embarrassment situation of making different two-dimensional codes for different people can be avoided, and the utilization rate of the characteristic two-dimensional code is improved.
Fig. 10 is a block diagram of an intelligent terminal according to another embodiment of the present invention. The smart terminal 1000 shown in fig. 10 includes: at least one processor 1001, memory 1002, at least one network interface 1004, and other user interfaces 1003. The various components in intelligent terminal 1000 are coupled together by a bus system 1005. It is understood that bus system 1005 is used to enable communications among the components connected. The bus system 1005 includes a power bus, a control bus, and a status signal bus, in addition to a data bus. But for the sake of clarity the various busses are labeled in figure 10 as the bus system 1005.
The user interface 1003 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It is to be understood that the memory 1002 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a programmable Read-only memory (PROM), an erasable programmable Read-only memory (erasabprom, EPROM), an electrically erasable programmable Read-only memory (EEPROM), or a flash memory. The volatile memory may be a Random Access Memory (RAM) which functions as an external cache. By way of example, but not limitation, many forms of RAM are available, such as static random access memory (staticiram, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (syncronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced synchronous SDRAM (ESDRAM), synchronous link SDRAM (SLDRAM), and direct memory bus SDRAM (DRRAM). The memory 1002 of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory. For example, the memory 1002 may store information content that needs to be shared, including user information, expiration time, a trust list, and the like.
In some embodiments, memory 1002 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 10021 and applications 10022.
The operating system 10021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 10022 includes various applications, such as a media player (MediaPlayer), a Browser (Browser), and the like, for implementing various application services. The program implementing the method according to the embodiment of the present invention may be included in the application program 10022.
In this embodiment of the present invention, by calling a program or an instruction stored in the memory 1002, specifically, a program or an instruction stored in the application program 10022, the processor 1001 may be configured to grade the shared information content, and determine an encryption level corresponding to each type of data in the information content, where the encryption level includes a first level and a second level, and the first level is lower than the second level; configuring corresponding target users for the second level; carrying out partition storage on each type of data according to the encryption level to generate a characteristic two-dimensional code corresponding to the target user; and sharing according to the characteristic two-dimensional code. Of course, the processor 1001 may also be configured to scan the characteristic two-dimensional code; extracting data from the partition corresponding to the first level in the scanning process; detecting whether a scanning user is matched with a target user of the characteristic two-dimensional code; if the scanning user is matched with the target user, extracting data from the partition corresponding to the second level; and saving the extracted data.
The method disclosed by the embodiment of the invention can be applied to the processor 1001 or can be implemented by the processor 1001. The processor 1001 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 1001. The processor 1001 may be a general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware component. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 1002, and the processor 1001 reads the information in the memory 1002 and performs the steps of the method in combination with the hardware.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Optionally, the partitioning and storing, by the processor 1001, each type of data according to the encryption level to generate the feature two-dimensional code corresponding to the target user includes: encrypting the data of the second level and the target user and storing the data of the second level and the target user in an error correction area; storing the first level of data in a data area; and synthesizing the error correction area and the data area to generate the characteristic two-dimensional code.
Optionally, the processor 1001 ranks the shared information content, and determines an encryption level corresponding to each type of data in the information content, including: for each type of data in the information content, determining a corresponding encryption level based on an input level selection operation; or detecting keywords in each type of data and determining the corresponding encryption level.
Optionally, the processor 1001 configures a corresponding target user for the second level, including: generating a trust list based on the input contact information, wherein each user in the trust list is the target user; creating an association between the trust list and the second level. Wherein, the encrypting the data of the second level and the target user and storing the encrypted data in the error correction area includes: and encrypting and storing the incidence relation, the trust list and the second-level data in the error correction area.
Optionally, the processor 1001 is further configured to: and uploading the trust list to a cloud end, and determining a uniform resource locator of the trust list. Wherein, encrypting and storing the trust list in the error correction area comprises: storing uniform resource locators for the trust list to the error correction zone.
Optionally, the second level of data comprises: the system comprises confidential information and private information, wherein the confidential information has corresponding expiration time. The processor 1001 is further configured to configure a corresponding expiration time for the absolute information; and packaging the expiration time into the error correction area in the generation process of the two-dimensional code.
Optionally, as another embodiment, before detecting whether the scanning user matches with the target user of the feature two-dimensional code, the processor 1001 is further configured to: performing category detection on the data of the first level, and determining a corresponding information category; and determining a corresponding target database by adopting the information type, wherein the target database is used for storing the extracted data. Wherein the storing the extracted data comprises: and storing the data of the first level and the data of the second level to the target database.
Optionally, the second level of data comprises: private information and confidential information, the confidential information having a corresponding expiration time. The processor 1001 stores the extracted data, and includes: storing the private information in a plaintext mode; judging whether the current time exceeds the expiration time; when the current time exceeds the expiration time, determining that the secret information is expired, and deleting the secret information; and when the current time does not exceed the expiration time, determining that the secret information is not expired, and storing the secret information in a ciphertext mode.
Optionally, the processor 1001 is further configured to, after determining that the secret information has not expired: and determining the effective time corresponding to the absolute secret information by adopting the expiration time.
Optionally, the processor 1001, after saving the extracted data, is further configured to: when the application program calls the secret information, detecting whether the secret information is valid or not by adopting the valid time; when the secret-insulated information is effective, carrying out decryption operation on the secret-insulated information to generate corresponding plaintext data; and feeding the plaintext data back to the application program.
The intelligent terminal 1000 in this embodiment can implement each process implemented by the intelligent terminal in the foregoing embodiments, and is not described here again to avoid repetition. In the generation process of the two-dimensional code, the intelligent terminal 1000 can classify information content needing to be shared, and partition storage is performed on data of each encryption level according to encryption level prizes, so that a characteristic two-dimensional code corresponding to a characteristic user is generated, the characteristic user can be used for limiting users obtaining data of a second level in the characteristic two-dimensional code, the problem of information leakage in a two-dimensional code sharing mode is solved, and information safety is guaranteed. In addition, the intelligent terminal 1000 can scan different information contents for different people for the same characteristic two-dimensional code, so that the embarrassment situation that different two-dimensional codes are made for different people can be avoided, and the utilization rate of the characteristic two-dimensional code is improved.
Fig. 11 is a schematic structural diagram of an intelligent terminal according to another embodiment of the present invention. Specifically, the smart terminal 1100 in fig. 11 may be a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), or a vehicle-mounted computer.
The smart terminal 1100 in fig. 11 includes a Radio Frequency (RF) circuit 1110, a memory 1120, an input unit 1130, a display unit 1140, a processor 1160, an audio circuit 1170, a wifi (wirelessfidelity) module 1080, and a power supply 1190.
The input unit 1130 may be used to receive numeric or character information input by a user and generate signal inputs related to user settings and function control of the smart terminal 1100, among others. Specifically, in the embodiment of the present invention, the input unit 1130 may include a touch panel 1131. The touch panel 1131, also referred to as a touch screen, can collect touch operations of a user (for example, operations of the user on the touch panel 1131 by using a finger, a stylus pen, or any other suitable object or accessory) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 1131 may include two parts, namely, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1160, and can receive and execute commands sent by the processor 1160. In addition, the touch panel 1131 can be implemented by using various types, such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 1131, the input unit 1130 may also include other input devices 1132, and the other input devices 1132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
Among other things, the display unit 1140 may be used to display information input by the user or information provided to the user and various menu interfaces of the smart terminal 1100. The display unit 1140 may include a display panel 1141, and optionally, the display panel 1141 may be configured in the form of an LCD or an organic light-emitting diode (OLED).
It should be noted that touch panel 1131 may cover display panel 1141 to form a touch display screen, and when the touch display screen detects a touch operation thereon or nearby, the touch display screen transmits the touch operation to processor 1160 to determine the type of the touch event, and then processor 1160 provides a corresponding visual output on the touch display screen according to the type of the touch event.
The touch display screen comprises an application program interface display area and a common control display area. The arrangement modes of the application program interface display area and the common control display area are not limited, and can be an arrangement mode which can distinguish two display areas, such as vertical arrangement, left-right arrangement and the like. The application interface display area may be used to display an interface of an application. Each interface may contain at least one interface element such as an icon and/or widget desktop control for an application. The application interface display area may also be an empty interface that does not contain any content. The common control display area is used for displaying controls with high utilization rate, such as application icons like setting buttons, interface numbers, scroll bars, phone book icons and the like.
The processor 1160 is a control center of the intelligent terminal 1100, is connected to various parts of the whole mobile phone through various interfaces and lines, and executes various functions and processes data of the intelligent terminal 1100 by running or executing software programs and/or modules stored in the first memory 1121 and calling data stored in the second memory 1122, thereby integrally monitoring the intelligent terminal 1100. Optionally, processor 1160 may include one or more processing units.
In the embodiment of the present invention, by calling the software program and/or the module stored in the first memory 1121 and/or the data stored in the second memory 1122, the processor 1160 is configured to rank the shared information content, and determine the encryption level corresponding to each type of data in the information content, where the encryption level includes a first level and a second level, and the first level is lower than the second level; configuring corresponding target users for the second level; carrying out partition storage on each type of data according to the encryption level to generate a characteristic two-dimensional code corresponding to the target user; and sharing according to the characteristic two-dimensional code.
Optionally, the processor 1160 performs partition storage on each type of data according to the encryption level to generate the feature two-dimensional code corresponding to the target user, including: encrypting the data of the second level and the target user and storing the data of the second level and the target user in an error correction area; storing the first level of data in a data area; and synthesizing the error correction area and the data area to generate the characteristic two-dimensional code.
Optionally, the step of classifying the shared information content and determining the encryption level corresponding to each type of data in the information content includes: for each type of data in the information content, determining a corresponding encryption level based on an input level selection operation; or detecting keywords in each type of data and determining the corresponding encryption level.
Optionally, the configuring the corresponding target user for the second level includes: generating a trust list based on the input contact information, wherein each user in the trust list is the target user; creating an association between the trust list and the second level. Wherein, the encrypting the data of the second level and the target user and storing the encrypted data in the error correction area includes: and encrypting and storing the incidence relation, the trust list and the second-level data in the error correction area.
Optionally, the processor 1160 is further configured to: and uploading the trust list to a cloud end, and determining a uniform resource locator of the trust list. Wherein, encrypting and storing the trust list in the error correction area comprises: storing uniform resource locators for the trust list to the error correction zone.
Optionally, the second level of data comprises: the system comprises confidential information and private information, wherein the confidential information has corresponding expiration time. Processor 1160 is further configured to configure a corresponding expiration time for the privacy information; and packaging the expiration time into the error correction area in the generation process of the two-dimensional code.
Optionally, as another embodiment, the processor 1160 is further configured to scan the characteristic two-dimensional code; extracting data from the partition corresponding to the first level in the scanning process; detecting whether a scanning user is matched with a target user of the characteristic two-dimensional code; if the scanning user is matched with the target user, extracting data from the partition corresponding to the second level; and saving the extracted data.
Optionally, the processor 1160, before detecting whether the scanned user matches the target user of the feature two-dimensional code, is further configured to: performing category detection on the data of the first level, and determining a corresponding information category; and determining a corresponding target database by adopting the information type, wherein the target database is used for storing the extracted data. Wherein the storing the extracted data comprises: and storing the data of the first level and the data of the second level to the target database.
Optionally, the second level of data comprises: private information and confidential information, the confidential information having a corresponding expiration time. Wherein processor 1160 stores the extracted data, including: storing the private information in a plaintext mode; judging whether the current time exceeds the expiration time; when the current time exceeds the expiration time, determining that the secret information is expired, and deleting the secret information; and when the current time does not exceed the expiration time, determining that the secret information is not expired, and storing the secret information in a ciphertext mode.
Optionally, the processor 1160, after determining that the confidential information has not expired, is further configured to: and determining the effective time corresponding to the absolute secret information by adopting the expiration time.
Optionally, the processor 1160, after saving the extracted data, is further configured to: when the application program calls the secret information, detecting whether the secret information is valid or not by adopting the valid time; when the secret-insulated information is effective, carrying out decryption operation on the secret-insulated information to generate corresponding plaintext data; and feeding the plaintext data back to the application program.
Obviously, in the generation process of the two-dimensional code, the intelligent terminal 1100 in this embodiment may classify the information content to be shared, and perform partition storage on the data of each encryption level according to the encryption level award, so as to generate the feature two-dimensional code corresponding to the feature user, and the feature user may be used to limit the user who obtains the data of the second level in the feature two-dimensional code, thereby solving the problem of information leakage in the two-dimensional code sharing mode, and ensuring information security. In addition, the intelligent terminal 1100 can scan different information contents for the same feature two-dimensional code and different people, so that the embarrassment situation that different two-dimensional codes are made for different people can be avoided, and the utilization rate of the feature two-dimensional code is improved.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (22)

1. A method for information sharing, comprising:
grading the shared information content, and determining an encryption level corresponding to each type of data in the information content, wherein the encryption level comprises a first level and a second level, and the first level is lower than the second level;
configuring corresponding target users for the second level;
performing partition storage on various types of data according to the encryption level to generate a characteristic two-dimensional code corresponding to the target user, wherein the characteristic two-dimensional code comprises an error correction area and a data area, the error correction area is used for storing the second level of data and the target user, and the data area is used for storing the first level of data;
and sharing according to the characteristic two-dimensional code.
2. The method according to claim 1, wherein the partitioning and storing each type of data according to the encryption level to generate the feature two-dimensional code corresponding to the target user comprises:
encrypting the data of the second level and the target user and storing the data of the second level and the target user in an error correction area;
storing the first level of data in a data area;
and synthesizing the error correction area and the data area to generate the characteristic two-dimensional code.
3. The method according to claim 1, wherein the step of ranking the shared information content and determining the encryption level corresponding to each type of data in the information content comprises:
for each type of data in the information content, determining a corresponding encryption level based on an input level selection operation; or,
and detecting keywords in each type of data, and determining a corresponding encryption level.
4. The method of claim 2, wherein configuring the second level with the corresponding target user comprises:
generating a trust list based on the input contact information, wherein each user in the trust list is the target user;
creating an association between the trust list and the second level;
wherein, the encrypting the data of the second level and the target user and storing the encrypted data in the error correction area includes: and encrypting and storing the incidence relation, the trust list and the second-level data in the error correction area.
5. The method of claim 4, further comprising:
uploading the trust list to a cloud end, and determining a uniform resource locator of the trust list;
wherein, encrypting and storing the trust list in the error correction area comprises: storing uniform resource locators for the trust list to the error correction zone.
6. The method of claim 1, wherein the second level of data comprises: confidential information and private information, the confidential information having a corresponding expiration time, the method further comprising:
configuring corresponding expiration time for the absolute information;
and packaging the expiration time into the error correction area in the generation process of the two-dimensional code.
7. A method for information sharing, comprising:
scanning the characteristic two-dimensional code;
in the scanning process, data are extracted from the partitions corresponding to the first level, wherein the partitions corresponding to the first level are the data areas of the characteristic two-dimensional codes;
detecting whether a scanning user is matched with a target user of the characteristic two-dimensional code;
if the scanning user is matched with the target user, extracting data from a partition corresponding to a second level, wherein the partition corresponding to the second level is an error correction area of the characteristic two-dimensional code;
and saving the extracted data.
8. The method of claim 7, before detecting whether the scanned user matches the target user of the feature two-dimensional code, further comprising:
performing category detection on the data of the first level, and determining a corresponding information category;
determining a corresponding target database by adopting the information type, wherein the target database is used for storing the extracted data;
wherein the storing the extracted data comprises: and storing the data of the first level and the data of the second level to the target database.
9. The method of claim 7, wherein the second level of data comprises: private information and confidential information, the confidential information having a corresponding expiration time;
wherein the storing the extracted data comprises:
storing the private information in a plaintext mode;
judging whether the current time exceeds the expiration time;
when the current time exceeds the expiration time, determining that the secret information is expired, and deleting the secret information;
and when the current time does not exceed the expiration time, determining that the secret information is not expired, and storing the secret information in a ciphertext mode.
10. The method of claim 9, further comprising, after determining that the confidential information has not expired:
and determining the effective time corresponding to the absolute secret information by adopting the expiration time.
11. The method of claim 10, further comprising, after saving the extracted data:
when the application program calls the secret information, detecting whether the secret information is valid or not by adopting the valid time;
when the secret-insulated information is effective, carrying out decryption operation on the secret-insulated information to generate corresponding plaintext data;
and feeding the plaintext data back to the application program.
12. An intelligent terminal, comprising:
the encryption level determining module is used for grading the shared information content and determining the encryption level corresponding to each type of data in the information content, wherein the encryption level comprises a first level and a second level, and the first level is lower than the second level;
the target user configuration module is used for configuring corresponding target users for the second level;
the two-dimensional code generation module is used for storing each type of data in a partition mode according to the encryption level and generating a characteristic two-dimensional code corresponding to the target user, wherein the characteristic two-dimensional code comprises an error correction area and a data area, the error correction area is used for storing the second level of data, and the data area is used for storing the first level of data;
and the sharing module is used for sharing according to the characteristic two-dimensional code.
13. The intelligent terminal according to claim 12, wherein the two-dimensional code generation module comprises:
the encryption storage submodule is used for encrypting the data of the second level and the target user and storing the data in an error correction area;
the storage submodule is used for storing the data of the first level in a data area;
and the generating sub-module is used for synthesizing the error correction area and the data area to generate the characteristic two-dimensional code.
14. The intelligent terminal according to claim 12, wherein the encryption level determining module comprises:
a selection submodule for determining, for each type of data in the information content, a corresponding encryption level based on an input level selection operation;
and the detection submodule is used for detecting the keywords in each type of data and determining the corresponding encryption level.
15. The intelligent terminal according to claim 13, wherein the target user configuration module is specifically configured to generate a trust list based on input contact information, and create an association between the trust list and the second level, where each user in the trust list is the target user;
the encryption storage submodule is specifically configured to encrypt and store the association relationship, the trust list, and the second-level data in the error correction area.
16. The intelligent terminal of claim 15, further comprising:
the uploading module is used for uploading the trust list to a cloud end and determining a uniform resource locator of the trust list;
the encryption storage submodule is specifically further configured to store the uniform resource locator of the trust list in the error correction area.
17. The intelligent terminal of claim 13, wherein the second level of data comprises: secret information and private information, secret information has corresponding expiration time, intelligent terminal still includes:
the time configuration module is used for configuring corresponding expiration time for the absolute secret information;
and the time packaging module is used for packaging the expiration time into the error correction area in the generation process of the two-dimensional code.
18. An intelligent terminal, comprising:
the scanning module is used for scanning the characteristic two-dimensional code;
the first extraction module is used for extracting data from a partition corresponding to a first level in a scanning process, wherein the partition corresponding to the first level is a data area of the characteristic two-dimensional code;
the user matching module is used for detecting whether a scanning user is matched with a target user of the characteristic two-dimensional code; if the scanning user is matched with the target user, triggering a second extraction module;
the second extraction module is used for extracting data from partitions corresponding to a second level, wherein the partitions corresponding to the second level are error correction areas of the characteristic two-dimensional code;
and the storage module is used for storing the data extracted by the first extraction module and the second extraction module.
19. The intelligent terminal of claim 18, further comprising:
the information category detection module is used for carrying out category detection on the data of the first level and determining a corresponding information category;
the database determining module is used for determining a corresponding target database by adopting the information type, and the target database is used for storing the extracted data;
the storage module is specifically configured to store the first-level data and the second-level data in the target database.
20. The intelligent terminal of claim 18, wherein the second level of data comprises: private information and confidential information, the confidential information having a corresponding expiration time;
wherein, the save module comprises:
the plaintext storage submodule is used for storing the private information in a plaintext mode;
the time interpretation submodule is used for judging whether the current time exceeds the expiration time;
the expiration determining submodule is used for determining that the secret information is expired and deleting the secret information when the current time exceeds the expiration time;
and the ciphertext storage submodule is used for determining that the secret-stop information is not expired when the current time does not exceed the expiration time, and storing the secret-stop information in a ciphertext mode.
21. The intelligent terminal of claim 20, further comprising:
and the valid time determining module is used for determining the valid time corresponding to the secret information by adopting the expiration time after the ciphertext storage submodule determines that the secret information is not expired.
22. The intelligent terminal of claim 21, further comprising:
the validity detection module is used for detecting whether the secret information is valid or not by adopting the valid time when the application program calls the secret information;
the decryption module is used for carrying out decryption operation on the secret-insulated information to generate corresponding plaintext data when the validity detection module determines that the secret-insulated information is valid;
and the feedback module is used for feeding the plaintext data back to the application program.
CN201610513570.XA 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing Active CN106022196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610513570.XA CN106022196B (en) 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610513570.XA CN106022196B (en) 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing

Publications (2)

Publication Number Publication Date
CN106022196A CN106022196A (en) 2016-10-12
CN106022196B true CN106022196B (en) 2019-01-11

Family

ID=57106171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610513570.XA Active CN106022196B (en) 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing

Country Status (1)

Country Link
CN (1) CN106022196B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503133B (en) * 2016-10-19 2020-06-19 北京小米移动软件有限公司 Cloud disk data processing method and device
CN108810451A (en) * 2017-04-26 2018-11-13 杭州海康威视数字技术股份有限公司 A kind of video recording storage, access method and video recording storage system
CN109215170B (en) * 2017-07-04 2021-03-02 百度在线网络技术(北京)有限公司 Driving data storage method, device and equipment
CN109726786B (en) * 2017-10-31 2023-09-26 北京京东尚科信息技术有限公司 Two-dimensional code information reading and generating method and device
CN108769403B (en) * 2018-05-24 2021-05-18 维沃移动通信有限公司 Information acquisition method, terminal and computer readable storage medium
CN109525482B (en) * 2018-11-09 2021-08-10 北京北信源软件股份有限公司 Instant messaging method based on secret level channel
CN109410083A (en) * 2018-11-20 2019-03-01 咪咕数字传媒有限公司 Information sharing method and device and storage medium
CN109635905B (en) * 2018-12-06 2022-09-02 南京中孚信息技术有限公司 Two-dimensional code generation method, device and system
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN110266683A (en) * 2019-06-18 2019-09-20 北京阿尔山区块链联盟科技有限公司 Digital asset sharing method, device and electronic equipment
CN110414241B (en) * 2019-08-05 2021-08-27 深圳市网安计算机安全检测技术有限公司 Privacy policy detection method and device, computer equipment and storage medium
CN111046350A (en) * 2019-10-31 2020-04-21 贝壳技术有限公司 Authority information processing method and system
CN111177694B (en) * 2019-12-16 2023-03-17 华为技术有限公司 Method and device for processing data
CN113132524A (en) * 2019-12-31 2021-07-16 华为技术有限公司 Method for generating contact name card and method for displaying contact information
CN113868209B (en) * 2021-12-02 2022-03-15 天津联想协同科技有限公司 Network disk-based external link sharing expiration date management method and device and storage medium
CN114549187B (en) * 2022-04-24 2022-07-08 梅州客商银行股份有限公司 Method and system for controlling marketing two-dimensional code use range by electronic bank
CN115033918B (en) * 2022-06-09 2023-05-05 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049869A (en) * 2012-12-28 2013-04-17 浙江理工大学 Two-dimensional code based clothing industry client information management method
CN103489025A (en) * 2012-06-08 2014-01-01 北京千橡网景科技发展有限公司 Method and device for sending contact information
CN104268610A (en) * 2014-09-11 2015-01-07 重庆大学 Method for generating and reading graded QR code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2004090794A1 (en) * 2003-04-07 2006-07-06 ボーダフォン株式会社 Information processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489025A (en) * 2012-06-08 2014-01-01 北京千橡网景科技发展有限公司 Method and device for sending contact information
CN103049869A (en) * 2012-12-28 2013-04-17 浙江理工大学 Two-dimensional code based clothing industry client information management method
CN104268610A (en) * 2014-09-11 2015-01-07 重庆大学 Method for generating and reading graded QR code

Also Published As

Publication number Publication date
CN106022196A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN106022196B (en) A kind of method and intelligent terminal of information sharing
CN106612285B (en) Distributed cloud data management method and system based on peer-to-peer network
CN110210246B (en) Personal data service method and system based on safety calculation
KR101756288B1 (en) Document security system
US10904761B2 (en) Media agnostic content obfuscation
CN106909855B (en) File hiding method and device
CN107527040B (en) Face recognition method and device
CN111897786B (en) Log reading method, device, computer equipment and storage medium
TWI637279B (en) Method, system and web server for uploading form attachments
US11775244B2 (en) Data processing method and electronic terminal
KR20140042905A (en) Identity authentication and management device and method thereof
CN107180203B (en) Image encryption and decryption method, mobile terminal and computer readable storage medium
CN105868617B (en) Application program encryption method and mobile terminal
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
US11720246B2 (en) Information processing method, system, and storage medium for presenting a user login interface
CN103218132A (en) Method for processing pictures and device
CN106030527B (en) By the system and method for application notification user available for download
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN112764857A (en) Information processing method and device and electronic equipment
JP2014075096A (en) Input method, input device and input program
TW201409988A (en) Handheld device and unlocking method thereof
JP6717131B2 (en) Control program, control method, information processing device, decoding program, decoding method, and terminal device
CN111817944A (en) Picture sharing method and device and electronic equipment
CN103414688A (en) Method for loading user security seal in visited page and device thereof
CN112019642B (en) Audio uploading method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201102

Address after: Room 708, 7 / F, 101, floors 1-7, building 205, yard a 10, Jiuxianqiao North Road, Chaoyang District, Beijing 100016

Patentee after: WEIWO SOFTWARE TECHNOLOGY Co.,Ltd.

Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd.