CN106055693A - Information processing method and terminal - Google Patents
Information processing method and terminal Download PDFInfo
- Publication number
- CN106055693A CN106055693A CN201610408154.3A CN201610408154A CN106055693A CN 106055693 A CN106055693 A CN 106055693A CN 201610408154 A CN201610408154 A CN 201610408154A CN 106055693 A CN106055693 A CN 106055693A
- Authority
- CN
- China
- Prior art keywords
- code
- image
- characteristic information
- safety detection
- source image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
- G06F16/5846—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using extracted text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/40—Extraction of image or video features
- G06V10/44—Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Library & Information Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Electromagnetism (AREA)
- Multimedia (AREA)
- Alarm Systems (AREA)
- Image Analysis (AREA)
Abstract
The embodiment of the invention discloses an information processing method and a terminal, wherein the method comprises: obtaining a source two-dimensional code image, and generating a fuzzy two-dimensional code image according to the source two-dimensional code image so as to control a target application to display the fuzzy two-dimensional code image; performing security detection on feature information of the source two-dimensional code image and obtaining a security detection result; and if the security detection result shows a legal two-dimensional code image, transferring the source two-dimensional code image to the target application for display so as to update the fuzzy two-dimensional code image, and controlling recognition of the two-dimensional code image. By adoption of the information processing method and the terminal disclosed by the invention, the recognition of the target application can be controlled by virtue of a fuzzy two-dimensional code, and security detection is performed on a source two-dimensional code to determine whether to perform two-dimensional code image recognition or not, which is beneficial for improving the security of the use of two-dimensional codes.
Description
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of information processing method and terminal.
Background technology
Quick Response Code is a kind of chequered with black and white graphic recording data symbol by certain rule in plane or two-dimensional directional
Certain specific geometric figure of information, it can be by having image input device or photoelectric scanning device automatically identifying and reading two dimension
Code characteristic information.Quick Response Code can store various information such as network address, business card, text message, particular code etc..
Along with the universalness of terminal applies, Quick Response Code becomes the bridge between terminal and each platform, and user can be led to
Overscanning Quick Response Code, carries out good friend's interpolation, software download, acquisition of information etc..But, it is same that Quick Response Code let us facility is lived
Time, also imply various danger, such as some lawless persons and utilize planar bar code technology to propagate the most non-net of justice of malicious link information
Stand or mobile phone viruses etc., the storage information in mobile phone such as bank card information, note, address list etc. can be stolen and profit
With, cause the user greater loss.Therefore, the safety how improving Quick Response Code use becomes the problem currently needing solution badly.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and terminal, can improve the safety that Quick Response Code uses.
Embodiments provide a kind of information processing method, including:
Acquisition source image in 2 D code, generates fuzzy two-dimensional code image to control intended application according to described source image in 2 D code
Show described fuzzy two-dimensional code image;
The characteristic information of described source image in 2 D code is carried out safety detection and obtains safety detection result;
If described safety detection result is legal image in 2 D code, source image in 2 D code is passed to described intended application and enters
Row display is to update described fuzzy two-dimensional code image, and controls to be identified described image in 2 D code.
Embodiments providing a kind of terminal, it comprises the steps that
Acquiring unit, is used for obtaining source image in 2 D code;
Processing unit, shows to control intended application for generating fuzzy two-dimensional code image according to described source image in 2 D code
Described fuzzy two-dimensional code image;
Detector unit, for carrying out safety detection and obtaining safety detection knot to the characteristic information of described source image in 2 D code
Really;
Described processing unit, if being legal image in 2 D code for described safety detection result, passes source image in 2 D code
Pass described intended application to carry out showing to update described fuzzy two-dimensional code image;
Control unit, for controlling the identification of described image in 2 D code.
The embodiment of the present invention, can generate fuzzy two by obtaining source image in 2 D code according to described source image in 2 D code
Dimension code image also controls intended application and shows described fuzzy two-dimensional code image, the then characteristic information to described source image in 2 D code
Carry out safety detection and obtain safety detection result, if described safety detection result is legal image in 2 D code, by source Quick Response Code
Image passes to described intended application to carry out showing to update described fuzzy two-dimensional code image, and controls described image in 2 D code
It is identified, it is ensured that legal image in 2 D code can be identified by intended application, improves what image in 2 D code used
Safety.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below
Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area
From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the first embodiment schematic flow sheet of the information processing method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the second embodiment of the information processing method that the embodiment of the present invention provides;
Fig. 3 is the first embodiment structural representation of the terminal that the embodiment of the present invention provides;
Fig. 4 is the second example structure schematic diagram of the terminal that the embodiment of the present invention provides;
Fig. 5 is the 3rd example structure schematic diagram of the terminal that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of protection of the invention.
In implementing, the terminal described in the embodiment of the present invention comprises the steps that mobile phone, panel computer, notebook computer, the palm
Computer and mobile internet device (Mobile Internet Device, MID) etc., above-mentioned terminal is only citing, and
Non exhaustive, including but not limited to above-mentioned terminal.
Refer to Fig. 1, be the first embodiment schematic flow sheet of the information processing method that the embodiment of the present invention provides.This reality
Execute a kind of information processing method described in example, including step S101~S103.
S101, obtains source image in 2 D code, generates fuzzy two-dimensional code image to control mesh according to described source image in 2 D code
Mark application shows described fuzzy two-dimensional code image.
In implementing, terminal obtains source image in 2 D code, and generates fuzzy two-dimensional code according to described source image in 2 D code
Image shows described fuzzy two-dimensional code image to control intended application.In the embodiment of the present invention, terminal can comprise photographic head and use
Image in 2 D code is obtained in scanning.Intended application refers to need to carry out the described terminal that is installed on of Quick Response Code scanning and identification
Application program.When terminal receives that user inputs or Quick Response Code application transmission Quick Response Code scan request, terminal can open
Quick Response Code is scanned, to obtain source image in 2 D code by dynamic photographic head.Wherein, described source image in 2 D code can be through right
The source image in 2 D code that after burnt process, scanning is obtained.The safety used in order to ensure image in 2 D code, in intended application pair
Before Quick Response Code is identified, the characteristic information to image in 2 D code is needed to carry out safety detection, the safety in the embodiment of the present invention
Detection refers to detect in the characteristic information of described source image in 2 D code whether include malicious link information.In safety detection process
In, need limited target application that image in 2 D code is identified.Therefore, the source image in 2 D code that the embodiment of the present invention will obtain
Point two-way carries out processing, and source image in 2 D code is carried out Fuzzy processing by a road, generates fuzzy image in 2 D code, such mesh
Mark application will be unable to identify the characteristic information of image in 2 D code.Optionally, in order to promote Consumer's Experience, it is to avoid this process is by user
It is mistakenly considered image in 2 D code and fails to identify or scan unsuccessful etc., fuzzy image in 2 D code can be shown, or defeated
Go out the information that image in 2 D code carries out detecting.
S102, carries out safety detection to the characteristic information of described source image in 2 D code and obtains safety detection result.
In implementing, described terminal carries out safety detection to the characteristic information of described source image in 2 D code and obtains safety
Testing result.In the embodiment of the present invention, while source image in 2 D code is carried out Fuzzy processing by described terminal, can use another
One tunnel handling process: source image in 2 D code is carried out safety detection, obtains with the characteristic information to source image in 2 D code.False
If the characteristic information collection that terminal is stored is combined into legal characteristic information set, then matching process may is that as got Quick Response Code
The characteristic information of image is uniform resource locator (Uniform Resource Locator, URL) address, then by described
The characteristic information set that location is stored with terminal is mated, if mating inconsistent, illustrates that described address is illegal address, described
Image in 2 D code is also illegal image in 2 D code, needs to limit described image in 2 D code and is delivered to described intended application or prompting
Image in 2 D code described in user is illegal image in 2 D code;If coupling is consistent, then illustrate that described address is legal address, described two
Dimension code image is also legal image in 2 D code, can perform step S103.In the embodiment of the present invention, the feature letter that terminal is stored
Breath set can also be illegal characteristic information set, then the consistent characteristic information that described source image in 2 D code is described of coupling is illegal
Image in 2 D code, otherwise, for legal image in 2 D code.
S103, if described safety detection result is legal image in 2 D code, passes to described target by source image in 2 D code
Application carries out showing to update described fuzzy two-dimensional code image, and controls to be identified described image in 2 D code.
In implementing, if described safety detection result is legal image in 2 D code, described terminal is by source image in 2 D code
Pass to described intended application carry out showing to update described fuzzy two-dimensional code image, and control described image in 2 D code is carried out
Identify.In the embodiment of the present invention, if described safety detection result is legal image in 2 D code, illustrate that described source image in 2 D code can
To allow intended application to be identified the acquisition with characteristic information, source image in 2 D code can be passed to described intended application,
Described intended application will no longer be shown fuzzy image in 2 D code and shows described source image in 2 D code, then by intended application pair
Image in 2 D code is identified, to obtain the characteristic information of described image in 2 D code.
The embodiment of the present invention, can generate fuzzy two by obtaining source image in 2 D code according to described source image in 2 D code
Dimension code image also controls intended application and shows described fuzzy two-dimensional code image, the then characteristic information to described source image in 2 D code
Carry out safety detection and obtain safety detection result, if described safety detection result is legal image in 2 D code, by source Quick Response Code
Image passes to described intended application to carry out showing to update described fuzzy two-dimensional code image, and controls described image in 2 D code
It is identified, it is ensured that legal image in 2 D code can be identified by intended application, improves what image in 2 D code used
Safety.
Refer to Fig. 3, be the second embodiment schematic flow sheet of the information processing method that the embodiment of the present invention provides.This reality
Execute a kind of information processing method described in example, including step S201~S209.
S201, obtains source image in 2 D code, generates fuzzy two-dimensional code image to control mesh according to described source image in 2 D code
Mark application shows described fuzzy two-dimensional code image.
This step explain in detail step S101 that refer in Fig. 2, do not repeat them here.
S202, it may be judged whether extract the characteristic information of source image in 2 D code from image.
In implementing, whether described terminal judges extracts the characteristic information of source image in 2 D code from image.This
In bright embodiment, after described terminal gets source image in 2 D code, can be by described source image in 2 D code be carried out two dimension
Code identifies, extracting the characteristic information of source image in 2 D code, extracting method can be according to the most linear stack of Quick Response Code type
Quick Response Code, matrix two-dimensional code or postal code etc. determine the decoding rule of correspondence, then according to described decoding Rule source two
The characteristic information of dimension code image, such as, get certain website information, text message etc..
S203, if not extracting the characteristic information of source image in 2 D code in preset time range, then exports information retrieval
Failed information.
S204, if extracting the characteristic information of source image in 2 D code, from described source Quick Response Code figure in preset time range
Quick Response Code characteristic information is extracted in Xiang.
In implementing, if not extracting the characteristic information of source image in 2 D code in preset time range, the most described end
The information that end output information retrieval is failed.In the embodiment of the present invention, terminal can be provided with the intervalometer for timing.?
Carry out during the characteristic information of extraction source image in 2 D code, opening described intervalometer and carry out timing, if in default time threshold scope
The most do not extract the characteristic information of source image in 2 D code, it is determined that described characteristic information may extract unsuccessfully, and output information carries
Take the information of failure, be constantly in the task of information retrieval with terminal in the case of preventing characteristic information from cannot extract,
By exporting the failed prompting message of information retrieval to inform that user profile is extracted unsuccessfully;If extracting in preset time range
To the characteristic information of source image in 2 D code, described terminal extracts Quick Response Code characteristic information from the image in 2 D code of described source, described
Characteristic information can be network address, business card, text message, particular code etc..
S205, mates described Quick Response Code characteristic information with default characteristic information set.
S206, if coupling, determines that safety detection result is legal image in 2 D code.
S207, if not mating, determines that safety detection result is illegal image in 2 D code.
In implementing, described Quick Response Code characteristic information is mated by described terminal with default characteristic information set.This
In inventive embodiments, described default characteristic information set can be stored in terminal local, database server or cloud service
In device, described Quick Response Code characteristic information can be preset characteristic information set with this locality and mates by terminal, or by described
Quick Response Code characteristic information mates with the default characteristic information set in remote database server, or by described two dimension
Code characteristic information is uploaded to cloud server, and mates with the default characteristic information set in cloud server, to carry out
Safety detection.Whether the safety detection in the embodiment of the present invention refers to detect in the characteristic information of described source image in 2 D code and comprises
There is malicious link information.Assume that the characteristic information collection that terminal is stored is combined into legal characteristic information set, then matching process is permissible
It is: be URL address as got the characteristic information of image in 2 D code, the characteristic information that described URL address and terminal are stored
The carrying out presetting URL address in set mates, if mating inconsistent, illustrates that described address is illegal address, described Quick Response Code figure
As being also illegal image in 2 D code, need to limit described image in 2 D code and be delivered to described in described intended application or prompting user
Image in 2 D code is illegal image in 2 D code;If coupling is consistent, then illustrate that described address is legal address, described image in 2 D code
Also it is legal image in 2 D code.Optionally, the characteristic information set that terminal is stored can also be for illegal characteristic information set, then
The consistent characteristic information that described source image in 2 D code is described of coupling is illegal image in 2 D code, otherwise, for legal image in 2 D code.
S208, if described safety detection result is legal image in 2 D code, passes to described target by source image in 2 D code
Application carries out showing to update described fuzzy two-dimensional code image, and controls to be identified described image in 2 D code.
This step explain in detail step S103 that refer in Fig. 2, do not repeat them here.
S209, if described safety detection result is illegal image in 2 D code, exports the information of illegal image in 2 D code.
In implementing, if described safety detection result is illegal image in 2 D code, described terminal exports illegal Quick Response Code
The information of image.In the embodiment of the present invention, if described safety detection result is illegal image in 2 D code, then can not be by described
Illegal image in 2 D code is sent to described intended application, can export the information of illegal image in 2 D code to inform user.
The embodiment of the present invention, by obtaining source image in 2 D code and can generate fuzzy two according to described source image in 2 D code
Dimension code image, it is to avoid the image in 2 D code that current safety is unknown is entered by described intended application before not carrying out safety detection
Row identifies, by extracting the characteristic information of source image in 2 D code from image and mating with default characteristic information set,
To determine safety detection result, just described source image in 2 D code can be exported when source image in 2 D code is legal Quick Response Code to
Described intended application, improves the safety that image in 2 D code uses.
Refer to Fig. 3, for the first embodiment structural representation of the terminal that the embodiment of the present invention provides.The embodiment of the present invention
Terminal include: acquiring unit 11, processing unit 12, detector unit 13 and control unit 14.
Acquiring unit 11, is used for obtaining source image in 2 D code.
Processing unit 12, shows to control intended application for generating fuzzy two-dimensional code image according to described source image in 2 D code
Show described fuzzy two-dimensional code image.
Detector unit 13, for carrying out safety detection to the characteristic information of described source image in 2 D code and obtain safety detection
Result.
Described processing unit 12, if being legal image in 2 D code for described safety detection result, by source image in 2 D code
Pass to described intended application carry out showing to update described fuzzy two-dimensional code image.
Control unit 14, for controlling the identification of described image in 2 D code.
The relevant portion explaining in detail the embodiment of the method that refer to Fig. 1~Fig. 2 of unit in the embodiment of the present invention
Explain, do not repeat them here.
Refer to Fig. 4, for the second example structure schematic diagram of the terminal that the embodiment of the present invention provides.The embodiment of the present invention
Terminal include: acquiring unit 11, processing unit 12, detector unit 13, control unit 14, judging unit 15 and output unit
16。
Acquiring unit 11, is used for obtaining source image in 2 D code.
Processing unit 12, shows to control intended application for generating fuzzy two-dimensional code image according to described source image in 2 D code
Show described fuzzy two-dimensional code image.
Judging unit 15, for judging whether to extract the characteristic information of source image in 2 D code from image.
Output unit 16, if for the characteristic information not extracting source image in 2 D code in preset time range, the most defeated
Go out the information that information retrieval is failed.
Detector unit 13, if for the characteristic information extracting source image in 2 D code in preset time range, to described
The characteristic information of source image in 2 D code carries out safety detection and obtains safety detection result.
Concrete, described detector unit 13 can include extraction unit 131, matching unit 132, first determine unit 133
Unit 134 is determined with second.
Extraction unit 131, if for the characteristic information extracting source image in 2 D code in preset time range, from described
Source image in 2 D code extracts Quick Response Code characteristic information.
Matching unit 132, for mating described Quick Response Code characteristic information with default characteristic information set.
First determines unit 133, if for described Quick Response Code characteristic information and default characteristic information sets match, determining peace
Full testing result is legal image in 2 D code.
Second determines unit 134, if not mating with default characteristic information set for described Quick Response Code characteristic information, determines
Safety detection result is illegal image in 2 D code.
Described processing unit 12, if being legal image in 2 D code for described safety detection result, by source image in 2 D code
Pass to described intended application carry out showing to update described fuzzy two-dimensional code image, and control described image in 2 D code is carried out
Identify.
Described output unit 16, if being illegal image in 2 D code for described safety detection result, exports illegal Quick Response Code
The information of image.
The relevant portion explaining in detail the embodiment of the method that refer to Fig. 1~Fig. 2 of unit in the embodiment of the present invention
Explain, do not repeat them here.
Refer to Fig. 5, be the 3rd example structure schematic diagram of the terminal that the embodiment of the present invention provides.Institute in the present embodiment
The terminal described includes: at least one outut device 1000 such as display screen;At least one processor 2000, such as CPU;Storage
Device 3000;At least one input equipment 4000 such as photographic head;Above-mentioned outut device 1000, processor 2000, memorizer 3000
Connected by bus 5000 with input equipment 4000.
Wherein, above-mentioned outut device 1000, can be used for information and the output of fuzzy image in 2 D code, above-mentioned input
Equipment 4000, can be used for acquisition source image in 2 D code.
Above-mentioned memorizer 3000 can be high-speed RAM memorizer, it is possible to for non-labile memorizer (non-volatile
Memory), such as disk memory.Above-mentioned memorizer 3000 can be used for storing the goal-selling identification code of terminal and for storing
Batch processing code, above-mentioned outut device 1000, processor 2000 and input equipment 4000 are used for calling in memorizer 3000 to be deposited
The program code of storage, performs to operate as follows:
Above-mentioned processor 2000, for obtaining source image in 2 D code by described input equipment 4000, and according to described source
Image in 2 D code generates fuzzy two-dimensional code image and shows described fuzzy two to control intended application by described outut device 1000
Dimension code image;
Above-mentioned processor 2000, is additionally operable to carry out the characteristic information of described source image in 2 D code safety detection and obtain peace
Full testing result;
Above-mentioned processor 2000, if being additionally operable to described safety detection result is legal image in 2 D code, by source Quick Response Code figure
Image relaying to described intended application to carry out showing to update described fuzzy two-dimensional code image, and controls to enter described image in 2 D code
Row identifies.
In one embodiment, above-mentioned processor 2000, if being illegal image in 2 D code for described safety detection result,
The information of illegal image in 2 D code is exported by described outut device 1000.
In one embodiment, above-mentioned processor 2000, it is used for judging whether from image, extract source image in 2 D code
Characteristic information;If extracting the characteristic information of source image in 2 D code in preset time range, then to described source Quick Response Code figure
The characteristic information of picture carries out safety detection and obtains safety detection result;If not extracting source Quick Response Code in preset time range
The characteristic information of image, then the information that output information retrieval is failed.
In one embodiment, above-mentioned processor 2000, for extracting Quick Response Code feature from the image in 2 D code of described source
Information;Described Quick Response Code characteristic information is mated with default characteristic information set;If coupling, determine that safety detection result is
Legal image in 2 D code;If not mating, determine that safety detection result is illegal image in 2 D code.
In one embodiment, above-mentioned processor 2000, for presetting feature by described Quick Response Code characteristic information and this locality
Information aggregate mates;Or described Quick Response Code characteristic information is carried out with the default characteristic information set in database server
Coupling;Or described Quick Response Code characteristic information is uploaded to cloud server, and with the default characteristic information collection in cloud server
Conjunction is mated.
Outut device 1000, processor 2000 and memorizer 3000 in implementing, described in the embodiment of the present invention
Realization side described in the first embodiment of information processing method of embodiment of the present invention offer, the second embodiment can be provided
Formula, it is possible to perform the implementation described in the terminal that the embodiment of the present invention provides, do not repeat them here.
Unit in all embodiments of the invention, can pass through universal integrated circuit, such as CPU (Central
Processing Unit, central processing unit), or by ASIC (Application Specific Integrated
Circuit, special IC) realize.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible
Instructing relevant hardware by computer program to complete, described program can be stored in a computer read/write memory medium
In, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access
Memory, RAM) etc..
The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly
Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.
Claims (10)
1. an information processing method, it is characterised in that described method includes:
Acquisition source image in 2 D code, generates fuzzy two-dimensional code image according to described source image in 2 D code and controls intended application and show
Described fuzzy two-dimensional code image;
The characteristic information of described source image in 2 D code is carried out safety detection and obtains safety detection result;
If described safety detection result is legal image in 2 D code, source image in 2 D code is passed to described intended application and shows
Show to update described fuzzy two-dimensional code image, and control described image in 2 D code is identified.
Method the most according to claim 1, it is characterised in that after described acquisition safety detection result, also include:
If described safety detection result is illegal image in 2 D code, export the information of illegal image in 2 D code.
Method the most according to claim 1, it is characterised in that the described characteristic information to described source image in 2 D code is carried out
Before safety detection, also include:
Judge whether to extract the characteristic information of source image in 2 D code from image
If extracting the characteristic information of source image in 2 D code in preset time range, then perform described source image in 2 D code
Characteristic information carries out safety detection and obtains the step of safety detection result;
If not extracting the characteristic information of source image in 2 D code in preset time range, then the prompting that output information retrieval is failed
Information.
4. according to the method described in claim 1-3 any one, it is characterised in that the described spy to described source image in 2 D code
Reference breath carries out safety detection and obtains safety detection result, including:
Quick Response Code characteristic information is extracted from the image in 2 D code of described source;
Described Quick Response Code characteristic information is mated with default characteristic information set;
If coupling, determine that safety detection result is legal image in 2 D code;
If not mating, determine that safety detection result is illegal image in 2 D code.
Method the most according to claim 4, it is characterised in that described described Quick Response Code characteristic information and default feature are believed
Breath set is mated, including:
With this locality, described Quick Response Code characteristic information is preset characteristic information set mate;Or,
Described Quick Response Code characteristic information is mated with the default characteristic information set in database server;Or,
Described Quick Response Code characteristic information is uploaded to cloud server, and enters with the default characteristic information set in cloud server
Row coupling.
6. a terminal, it is characterised in that described method includes:
Acquiring unit, is used for obtaining source image in 2 D code;
Processing unit, shows described for generating fuzzy two-dimensional code image according to described source image in 2 D code to control intended application
Fuzzy two-dimensional code image;
Detector unit, for carrying out safety detection to the characteristic information of described source image in 2 D code and obtain safety detection result;
Described processing unit, if being legal image in 2 D code for described safety detection result, passes to source image in 2 D code
Described intended application carries out showing to update described fuzzy two-dimensional code image;
Control unit, for controlling the identification of described image in 2 D code.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Output unit, if being illegal image in 2 D code for described safety detection result, exports the prompting of illegal image in 2 D code
Information.
Terminal the most according to claim 6, it is characterised in that described terminal also includes judging unit;
Described judging unit, for judging whether to extract the characteristic information of source image in 2 D code from image
Described detector unit, if being additionally operable to extract the characteristic information of source image in 2 D code in preset time range, to described
The characteristic information of source image in 2 D code carries out safety detection and obtains safety detection result;
Described output unit, if being additionally operable to not extract the characteristic information of source image in 2 D code in preset time range, the most defeated
Go out the information that information retrieval is failed.
9. according to the terminal described in claim 6-8 any one, it is characterised in that described detector unit includes:
Extraction unit, for extracting Quick Response Code characteristic information from the image in 2 D code of described source;
Matching unit, for mating described Quick Response Code characteristic information with default characteristic information set;
First determines unit, if for described Quick Response Code characteristic information and default characteristic information sets match, determining safety detection
Result is legal image in 2 D code;
Second determines unit, if not mating with default characteristic information set for described Quick Response Code characteristic information, determines safe inspection
Surveying result is illegal image in 2 D code.
Terminal the most according to claim 9, it is characterised in that described matching unit specifically for:
With this locality, described Quick Response Code characteristic information is preset characteristic information set mate;Or,
Described Quick Response Code characteristic information is mated with the default characteristic information set in database server;Or,
Described Quick Response Code characteristic information is uploaded to cloud server, and enters with the default characteristic information set in cloud server
Row coupling.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610408154.3A CN106055693B (en) | 2016-06-12 | 2016-06-12 | Information processing method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610408154.3A CN106055693B (en) | 2016-06-12 | 2016-06-12 | Information processing method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106055693A true CN106055693A (en) | 2016-10-26 |
CN106055693B CN106055693B (en) | 2020-01-10 |
Family
ID=57169871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610408154.3A Active CN106055693B (en) | 2016-06-12 | 2016-06-12 | Information processing method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106055693B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN109756621A (en) * | 2018-12-25 | 2019-05-14 | 维沃移动通信有限公司 | A kind of two-dimensional code display method and terminal device |
CN112561013A (en) * | 2020-12-15 | 2021-03-26 | 维沃移动通信有限公司 | Processing method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8296477B1 (en) * | 2011-04-22 | 2012-10-23 | Symantec Corporation | Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer is malicious |
CN102819723A (en) * | 2011-12-26 | 2012-12-12 | 哈尔滨安天科技股份有限公司 | Method and system for detecting malicious two-dimension codes |
CN103166972A (en) * | 2013-03-25 | 2013-06-19 | 北京奇虎科技有限公司 | Safety website access system, and equipment and method for same |
CN103268328A (en) * | 2013-05-02 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | QR (quick response) code validation method and search engine server |
CN103647779A (en) * | 2013-12-16 | 2014-03-19 | 北京奇虎科技有限公司 | Method and device for detecting fishing fraud information through two-dimensional code |
CN104091140A (en) * | 2014-06-23 | 2014-10-08 | 联想(北京)有限公司 | Information processing method and electronic device |
-
2016
- 2016-06-12 CN CN201610408154.3A patent/CN106055693B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8296477B1 (en) * | 2011-04-22 | 2012-10-23 | Symantec Corporation | Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer is malicious |
CN102819723A (en) * | 2011-12-26 | 2012-12-12 | 哈尔滨安天科技股份有限公司 | Method and system for detecting malicious two-dimension codes |
CN103166972A (en) * | 2013-03-25 | 2013-06-19 | 北京奇虎科技有限公司 | Safety website access system, and equipment and method for same |
CN103268328A (en) * | 2013-05-02 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | QR (quick response) code validation method and search engine server |
CN103647779A (en) * | 2013-12-16 | 2014-03-19 | 北京奇虎科技有限公司 | Method and device for detecting fishing fraud information through two-dimensional code |
CN104091140A (en) * | 2014-06-23 | 2014-10-08 | 联想(北京)有限公司 | Information processing method and electronic device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN109756621A (en) * | 2018-12-25 | 2019-05-14 | 维沃移动通信有限公司 | A kind of two-dimensional code display method and terminal device |
CN112561013A (en) * | 2020-12-15 | 2021-03-26 | 维沃移动通信有限公司 | Processing method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106055693B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10805346B2 (en) | Phishing attack detection | |
US10733434B2 (en) | Method and system for accurately detecting, extracting and representing redacted text blocks in a document | |
CN109376078B (en) | Mobile application testing method, terminal equipment and medium | |
JP5387124B2 (en) | Method and system for performing content type search | |
CN101986292B (en) | Method and system for processing forms based on an image | |
CN104182687B (en) | The safety detection method of mobile terminal input window and safety detection device | |
CN104134143B (en) | Mobile payment security protection method, mobile payment security protection device and cloud server | |
CN107077570A (en) | System and method for detecting the trial that sensitive information is sent by data distribution passage | |
WO2020000743A1 (en) | Webshell detection method and related device | |
CN102902917A (en) | Method and system for preventing phishing attacks | |
KR20120135041A (en) | Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program | |
KR20160119778A (en) | Generating barcode and authenticating based on barcode | |
EP3792792A1 (en) | Tampering detection method for paper copy and apparatus and non-transitory computer-readable storage medium | |
US20180288040A1 (en) | System and Method for Biometric Authentication-Based Electronic Notary Public | |
CN106815522A (en) | Mobile terminal software vacation interface identification method and device | |
CN104238819A (en) | Detection method and system for display screen state in mobile terminal | |
CN109345186B (en) | Service handling method based on Internet of things and terminal equipment | |
KR101761513B1 (en) | Method and system for detecting counterfeit and falsification using image | |
CN109727027A (en) | Account recognition methods, device, equipment and storage medium | |
CN106055693A (en) | Information processing method and terminal | |
CN112417516A (en) | File processing method, device, equipment and medium | |
JP2011060107A (en) | Apparatus, method and program for deciding certificate | |
KR101841928B1 (en) | Method for issuing document offline, method for validating issued offline document, and server using the same | |
CN111311550A (en) | Counterfeit certificate identification method and device and electronic equipment | |
CN103475673A (en) | Phishing website recognizing method and device and client side |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210119 Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703 Patentee after: Shenzhen Microphone Holdings Co.,Ltd. Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong. Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd. |