CN106055693A - Information processing method and terminal - Google Patents

Information processing method and terminal Download PDF

Info

Publication number
CN106055693A
CN106055693A CN201610408154.3A CN201610408154A CN106055693A CN 106055693 A CN106055693 A CN 106055693A CN 201610408154 A CN201610408154 A CN 201610408154A CN 106055693 A CN106055693 A CN 106055693A
Authority
CN
China
Prior art keywords
code
image
characteristic information
safety detection
source image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610408154.3A
Other languages
Chinese (zh)
Other versions
CN106055693B (en
Inventor
曲大伟
王三新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610408154.3A priority Critical patent/CN106055693B/en
Publication of CN106055693A publication Critical patent/CN106055693A/en
Application granted granted Critical
Publication of CN106055693B publication Critical patent/CN106055693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/5846Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using extracted text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Library & Information Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)
  • Image Analysis (AREA)

Abstract

The embodiment of the invention discloses an information processing method and a terminal, wherein the method comprises: obtaining a source two-dimensional code image, and generating a fuzzy two-dimensional code image according to the source two-dimensional code image so as to control a target application to display the fuzzy two-dimensional code image; performing security detection on feature information of the source two-dimensional code image and obtaining a security detection result; and if the security detection result shows a legal two-dimensional code image, transferring the source two-dimensional code image to the target application for display so as to update the fuzzy two-dimensional code image, and controlling recognition of the two-dimensional code image. By adoption of the information processing method and the terminal disclosed by the invention, the recognition of the target application can be controlled by virtue of a fuzzy two-dimensional code, and security detection is performed on a source two-dimensional code to determine whether to perform two-dimensional code image recognition or not, which is beneficial for improving the security of the use of two-dimensional codes.

Description

A kind of information processing method and terminal
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of information processing method and terminal.
Background technology
Quick Response Code is a kind of chequered with black and white graphic recording data symbol by certain rule in plane or two-dimensional directional Certain specific geometric figure of information, it can be by having image input device or photoelectric scanning device automatically identifying and reading two dimension Code characteristic information.Quick Response Code can store various information such as network address, business card, text message, particular code etc..
Along with the universalness of terminal applies, Quick Response Code becomes the bridge between terminal and each platform, and user can be led to Overscanning Quick Response Code, carries out good friend's interpolation, software download, acquisition of information etc..But, it is same that Quick Response Code let us facility is lived Time, also imply various danger, such as some lawless persons and utilize planar bar code technology to propagate the most non-net of justice of malicious link information Stand or mobile phone viruses etc., the storage information in mobile phone such as bank card information, note, address list etc. can be stolen and profit With, cause the user greater loss.Therefore, the safety how improving Quick Response Code use becomes the problem currently needing solution badly.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and terminal, can improve the safety that Quick Response Code uses.
Embodiments provide a kind of information processing method, including:
Acquisition source image in 2 D code, generates fuzzy two-dimensional code image to control intended application according to described source image in 2 D code Show described fuzzy two-dimensional code image;
The characteristic information of described source image in 2 D code is carried out safety detection and obtains safety detection result;
If described safety detection result is legal image in 2 D code, source image in 2 D code is passed to described intended application and enters Row display is to update described fuzzy two-dimensional code image, and controls to be identified described image in 2 D code.
Embodiments providing a kind of terminal, it comprises the steps that
Acquiring unit, is used for obtaining source image in 2 D code;
Processing unit, shows to control intended application for generating fuzzy two-dimensional code image according to described source image in 2 D code Described fuzzy two-dimensional code image;
Detector unit, for carrying out safety detection and obtaining safety detection knot to the characteristic information of described source image in 2 D code Really;
Described processing unit, if being legal image in 2 D code for described safety detection result, passes source image in 2 D code Pass described intended application to carry out showing to update described fuzzy two-dimensional code image;
Control unit, for controlling the identification of described image in 2 D code.
The embodiment of the present invention, can generate fuzzy two by obtaining source image in 2 D code according to described source image in 2 D code Dimension code image also controls intended application and shows described fuzzy two-dimensional code image, the then characteristic information to described source image in 2 D code Carry out safety detection and obtain safety detection result, if described safety detection result is legal image in 2 D code, by source Quick Response Code Image passes to described intended application to carry out showing to update described fuzzy two-dimensional code image, and controls described image in 2 D code It is identified, it is ensured that legal image in 2 D code can be identified by intended application, improves what image in 2 D code used Safety.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, required use in embodiment being described below Accompanying drawing is briefly described, it should be apparent that, the accompanying drawing in describing below is some embodiments of the present invention, general for this area From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the first embodiment schematic flow sheet of the information processing method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the second embodiment of the information processing method that the embodiment of the present invention provides;
Fig. 3 is the first embodiment structural representation of the terminal that the embodiment of the present invention provides;
Fig. 4 is the second example structure schematic diagram of the terminal that the embodiment of the present invention provides;
Fig. 5 is the 3rd example structure schematic diagram of the terminal that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
In implementing, the terminal described in the embodiment of the present invention comprises the steps that mobile phone, panel computer, notebook computer, the palm Computer and mobile internet device (Mobile Internet Device, MID) etc., above-mentioned terminal is only citing, and Non exhaustive, including but not limited to above-mentioned terminal.
Refer to Fig. 1, be the first embodiment schematic flow sheet of the information processing method that the embodiment of the present invention provides.This reality Execute a kind of information processing method described in example, including step S101~S103.
S101, obtains source image in 2 D code, generates fuzzy two-dimensional code image to control mesh according to described source image in 2 D code Mark application shows described fuzzy two-dimensional code image.
In implementing, terminal obtains source image in 2 D code, and generates fuzzy two-dimensional code according to described source image in 2 D code Image shows described fuzzy two-dimensional code image to control intended application.In the embodiment of the present invention, terminal can comprise photographic head and use Image in 2 D code is obtained in scanning.Intended application refers to need to carry out the described terminal that is installed on of Quick Response Code scanning and identification Application program.When terminal receives that user inputs or Quick Response Code application transmission Quick Response Code scan request, terminal can open Quick Response Code is scanned, to obtain source image in 2 D code by dynamic photographic head.Wherein, described source image in 2 D code can be through right The source image in 2 D code that after burnt process, scanning is obtained.The safety used in order to ensure image in 2 D code, in intended application pair Before Quick Response Code is identified, the characteristic information to image in 2 D code is needed to carry out safety detection, the safety in the embodiment of the present invention Detection refers to detect in the characteristic information of described source image in 2 D code whether include malicious link information.In safety detection process In, need limited target application that image in 2 D code is identified.Therefore, the source image in 2 D code that the embodiment of the present invention will obtain Point two-way carries out processing, and source image in 2 D code is carried out Fuzzy processing by a road, generates fuzzy image in 2 D code, such mesh Mark application will be unable to identify the characteristic information of image in 2 D code.Optionally, in order to promote Consumer's Experience, it is to avoid this process is by user It is mistakenly considered image in 2 D code and fails to identify or scan unsuccessful etc., fuzzy image in 2 D code can be shown, or defeated Go out the information that image in 2 D code carries out detecting.
S102, carries out safety detection to the characteristic information of described source image in 2 D code and obtains safety detection result.
In implementing, described terminal carries out safety detection to the characteristic information of described source image in 2 D code and obtains safety Testing result.In the embodiment of the present invention, while source image in 2 D code is carried out Fuzzy processing by described terminal, can use another One tunnel handling process: source image in 2 D code is carried out safety detection, obtains with the characteristic information to source image in 2 D code.False If the characteristic information collection that terminal is stored is combined into legal characteristic information set, then matching process may is that as got Quick Response Code The characteristic information of image is uniform resource locator (Uniform Resource Locator, URL) address, then by described The characteristic information set that location is stored with terminal is mated, if mating inconsistent, illustrates that described address is illegal address, described Image in 2 D code is also illegal image in 2 D code, needs to limit described image in 2 D code and is delivered to described intended application or prompting Image in 2 D code described in user is illegal image in 2 D code;If coupling is consistent, then illustrate that described address is legal address, described two Dimension code image is also legal image in 2 D code, can perform step S103.In the embodiment of the present invention, the feature letter that terminal is stored Breath set can also be illegal characteristic information set, then the consistent characteristic information that described source image in 2 D code is described of coupling is illegal Image in 2 D code, otherwise, for legal image in 2 D code.
S103, if described safety detection result is legal image in 2 D code, passes to described target by source image in 2 D code Application carries out showing to update described fuzzy two-dimensional code image, and controls to be identified described image in 2 D code.
In implementing, if described safety detection result is legal image in 2 D code, described terminal is by source image in 2 D code Pass to described intended application carry out showing to update described fuzzy two-dimensional code image, and control described image in 2 D code is carried out Identify.In the embodiment of the present invention, if described safety detection result is legal image in 2 D code, illustrate that described source image in 2 D code can To allow intended application to be identified the acquisition with characteristic information, source image in 2 D code can be passed to described intended application, Described intended application will no longer be shown fuzzy image in 2 D code and shows described source image in 2 D code, then by intended application pair Image in 2 D code is identified, to obtain the characteristic information of described image in 2 D code.
The embodiment of the present invention, can generate fuzzy two by obtaining source image in 2 D code according to described source image in 2 D code Dimension code image also controls intended application and shows described fuzzy two-dimensional code image, the then characteristic information to described source image in 2 D code Carry out safety detection and obtain safety detection result, if described safety detection result is legal image in 2 D code, by source Quick Response Code Image passes to described intended application to carry out showing to update described fuzzy two-dimensional code image, and controls described image in 2 D code It is identified, it is ensured that legal image in 2 D code can be identified by intended application, improves what image in 2 D code used Safety.
Refer to Fig. 3, be the second embodiment schematic flow sheet of the information processing method that the embodiment of the present invention provides.This reality Execute a kind of information processing method described in example, including step S201~S209.
S201, obtains source image in 2 D code, generates fuzzy two-dimensional code image to control mesh according to described source image in 2 D code Mark application shows described fuzzy two-dimensional code image.
This step explain in detail step S101 that refer in Fig. 2, do not repeat them here.
S202, it may be judged whether extract the characteristic information of source image in 2 D code from image.
In implementing, whether described terminal judges extracts the characteristic information of source image in 2 D code from image.This In bright embodiment, after described terminal gets source image in 2 D code, can be by described source image in 2 D code be carried out two dimension Code identifies, extracting the characteristic information of source image in 2 D code, extracting method can be according to the most linear stack of Quick Response Code type Quick Response Code, matrix two-dimensional code or postal code etc. determine the decoding rule of correspondence, then according to described decoding Rule source two The characteristic information of dimension code image, such as, get certain website information, text message etc..
S203, if not extracting the characteristic information of source image in 2 D code in preset time range, then exports information retrieval Failed information.
S204, if extracting the characteristic information of source image in 2 D code, from described source Quick Response Code figure in preset time range Quick Response Code characteristic information is extracted in Xiang.
In implementing, if not extracting the characteristic information of source image in 2 D code in preset time range, the most described end The information that end output information retrieval is failed.In the embodiment of the present invention, terminal can be provided with the intervalometer for timing.? Carry out during the characteristic information of extraction source image in 2 D code, opening described intervalometer and carry out timing, if in default time threshold scope The most do not extract the characteristic information of source image in 2 D code, it is determined that described characteristic information may extract unsuccessfully, and output information carries Take the information of failure, be constantly in the task of information retrieval with terminal in the case of preventing characteristic information from cannot extract, By exporting the failed prompting message of information retrieval to inform that user profile is extracted unsuccessfully;If extracting in preset time range To the characteristic information of source image in 2 D code, described terminal extracts Quick Response Code characteristic information from the image in 2 D code of described source, described Characteristic information can be network address, business card, text message, particular code etc..
S205, mates described Quick Response Code characteristic information with default characteristic information set.
S206, if coupling, determines that safety detection result is legal image in 2 D code.
S207, if not mating, determines that safety detection result is illegal image in 2 D code.
In implementing, described Quick Response Code characteristic information is mated by described terminal with default characteristic information set.This In inventive embodiments, described default characteristic information set can be stored in terminal local, database server or cloud service In device, described Quick Response Code characteristic information can be preset characteristic information set with this locality and mates by terminal, or by described Quick Response Code characteristic information mates with the default characteristic information set in remote database server, or by described two dimension Code characteristic information is uploaded to cloud server, and mates with the default characteristic information set in cloud server, to carry out Safety detection.Whether the safety detection in the embodiment of the present invention refers to detect in the characteristic information of described source image in 2 D code and comprises There is malicious link information.Assume that the characteristic information collection that terminal is stored is combined into legal characteristic information set, then matching process is permissible It is: be URL address as got the characteristic information of image in 2 D code, the characteristic information that described URL address and terminal are stored The carrying out presetting URL address in set mates, if mating inconsistent, illustrates that described address is illegal address, described Quick Response Code figure As being also illegal image in 2 D code, need to limit described image in 2 D code and be delivered to described in described intended application or prompting user Image in 2 D code is illegal image in 2 D code;If coupling is consistent, then illustrate that described address is legal address, described image in 2 D code Also it is legal image in 2 D code.Optionally, the characteristic information set that terminal is stored can also be for illegal characteristic information set, then The consistent characteristic information that described source image in 2 D code is described of coupling is illegal image in 2 D code, otherwise, for legal image in 2 D code.
S208, if described safety detection result is legal image in 2 D code, passes to described target by source image in 2 D code Application carries out showing to update described fuzzy two-dimensional code image, and controls to be identified described image in 2 D code.
This step explain in detail step S103 that refer in Fig. 2, do not repeat them here.
S209, if described safety detection result is illegal image in 2 D code, exports the information of illegal image in 2 D code.
In implementing, if described safety detection result is illegal image in 2 D code, described terminal exports illegal Quick Response Code The information of image.In the embodiment of the present invention, if described safety detection result is illegal image in 2 D code, then can not be by described Illegal image in 2 D code is sent to described intended application, can export the information of illegal image in 2 D code to inform user.
The embodiment of the present invention, by obtaining source image in 2 D code and can generate fuzzy two according to described source image in 2 D code Dimension code image, it is to avoid the image in 2 D code that current safety is unknown is entered by described intended application before not carrying out safety detection Row identifies, by extracting the characteristic information of source image in 2 D code from image and mating with default characteristic information set, To determine safety detection result, just described source image in 2 D code can be exported when source image in 2 D code is legal Quick Response Code to Described intended application, improves the safety that image in 2 D code uses.
Refer to Fig. 3, for the first embodiment structural representation of the terminal that the embodiment of the present invention provides.The embodiment of the present invention Terminal include: acquiring unit 11, processing unit 12, detector unit 13 and control unit 14.
Acquiring unit 11, is used for obtaining source image in 2 D code.
Processing unit 12, shows to control intended application for generating fuzzy two-dimensional code image according to described source image in 2 D code Show described fuzzy two-dimensional code image.
Detector unit 13, for carrying out safety detection to the characteristic information of described source image in 2 D code and obtain safety detection Result.
Described processing unit 12, if being legal image in 2 D code for described safety detection result, by source image in 2 D code Pass to described intended application carry out showing to update described fuzzy two-dimensional code image.
Control unit 14, for controlling the identification of described image in 2 D code.
The relevant portion explaining in detail the embodiment of the method that refer to Fig. 1~Fig. 2 of unit in the embodiment of the present invention Explain, do not repeat them here.
Refer to Fig. 4, for the second example structure schematic diagram of the terminal that the embodiment of the present invention provides.The embodiment of the present invention Terminal include: acquiring unit 11, processing unit 12, detector unit 13, control unit 14, judging unit 15 and output unit 16。
Acquiring unit 11, is used for obtaining source image in 2 D code.
Processing unit 12, shows to control intended application for generating fuzzy two-dimensional code image according to described source image in 2 D code Show described fuzzy two-dimensional code image.
Judging unit 15, for judging whether to extract the characteristic information of source image in 2 D code from image.
Output unit 16, if for the characteristic information not extracting source image in 2 D code in preset time range, the most defeated Go out the information that information retrieval is failed.
Detector unit 13, if for the characteristic information extracting source image in 2 D code in preset time range, to described The characteristic information of source image in 2 D code carries out safety detection and obtains safety detection result.
Concrete, described detector unit 13 can include extraction unit 131, matching unit 132, first determine unit 133 Unit 134 is determined with second.
Extraction unit 131, if for the characteristic information extracting source image in 2 D code in preset time range, from described Source image in 2 D code extracts Quick Response Code characteristic information.
Matching unit 132, for mating described Quick Response Code characteristic information with default characteristic information set.
First determines unit 133, if for described Quick Response Code characteristic information and default characteristic information sets match, determining peace Full testing result is legal image in 2 D code.
Second determines unit 134, if not mating with default characteristic information set for described Quick Response Code characteristic information, determines Safety detection result is illegal image in 2 D code.
Described processing unit 12, if being legal image in 2 D code for described safety detection result, by source image in 2 D code Pass to described intended application carry out showing to update described fuzzy two-dimensional code image, and control described image in 2 D code is carried out Identify.
Described output unit 16, if being illegal image in 2 D code for described safety detection result, exports illegal Quick Response Code The information of image.
The relevant portion explaining in detail the embodiment of the method that refer to Fig. 1~Fig. 2 of unit in the embodiment of the present invention Explain, do not repeat them here.
Refer to Fig. 5, be the 3rd example structure schematic diagram of the terminal that the embodiment of the present invention provides.Institute in the present embodiment The terminal described includes: at least one outut device 1000 such as display screen;At least one processor 2000, such as CPU;Storage Device 3000;At least one input equipment 4000 such as photographic head;Above-mentioned outut device 1000, processor 2000, memorizer 3000 Connected by bus 5000 with input equipment 4000.
Wherein, above-mentioned outut device 1000, can be used for information and the output of fuzzy image in 2 D code, above-mentioned input Equipment 4000, can be used for acquisition source image in 2 D code.
Above-mentioned memorizer 3000 can be high-speed RAM memorizer, it is possible to for non-labile memorizer (non-volatile Memory), such as disk memory.Above-mentioned memorizer 3000 can be used for storing the goal-selling identification code of terminal and for storing Batch processing code, above-mentioned outut device 1000, processor 2000 and input equipment 4000 are used for calling in memorizer 3000 to be deposited The program code of storage, performs to operate as follows:
Above-mentioned processor 2000, for obtaining source image in 2 D code by described input equipment 4000, and according to described source Image in 2 D code generates fuzzy two-dimensional code image and shows described fuzzy two to control intended application by described outut device 1000 Dimension code image;
Above-mentioned processor 2000, is additionally operable to carry out the characteristic information of described source image in 2 D code safety detection and obtain peace Full testing result;
Above-mentioned processor 2000, if being additionally operable to described safety detection result is legal image in 2 D code, by source Quick Response Code figure Image relaying to described intended application to carry out showing to update described fuzzy two-dimensional code image, and controls to enter described image in 2 D code Row identifies.
In one embodiment, above-mentioned processor 2000, if being illegal image in 2 D code for described safety detection result, The information of illegal image in 2 D code is exported by described outut device 1000.
In one embodiment, above-mentioned processor 2000, it is used for judging whether from image, extract source image in 2 D code Characteristic information;If extracting the characteristic information of source image in 2 D code in preset time range, then to described source Quick Response Code figure The characteristic information of picture carries out safety detection and obtains safety detection result;If not extracting source Quick Response Code in preset time range The characteristic information of image, then the information that output information retrieval is failed.
In one embodiment, above-mentioned processor 2000, for extracting Quick Response Code feature from the image in 2 D code of described source Information;Described Quick Response Code characteristic information is mated with default characteristic information set;If coupling, determine that safety detection result is Legal image in 2 D code;If not mating, determine that safety detection result is illegal image in 2 D code.
In one embodiment, above-mentioned processor 2000, for presetting feature by described Quick Response Code characteristic information and this locality Information aggregate mates;Or described Quick Response Code characteristic information is carried out with the default characteristic information set in database server Coupling;Or described Quick Response Code characteristic information is uploaded to cloud server, and with the default characteristic information collection in cloud server Conjunction is mated.
Outut device 1000, processor 2000 and memorizer 3000 in implementing, described in the embodiment of the present invention Realization side described in the first embodiment of information processing method of embodiment of the present invention offer, the second embodiment can be provided Formula, it is possible to perform the implementation described in the terminal that the embodiment of the present invention provides, do not repeat them here.
Unit in all embodiments of the invention, can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or by ASIC (Application Specific Integrated Circuit, special IC) realize.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible Instructing relevant hardware by computer program to complete, described program can be stored in a computer read/write memory medium In, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc..
The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.

Claims (10)

1. an information processing method, it is characterised in that described method includes:
Acquisition source image in 2 D code, generates fuzzy two-dimensional code image according to described source image in 2 D code and controls intended application and show Described fuzzy two-dimensional code image;
The characteristic information of described source image in 2 D code is carried out safety detection and obtains safety detection result;
If described safety detection result is legal image in 2 D code, source image in 2 D code is passed to described intended application and shows Show to update described fuzzy two-dimensional code image, and control described image in 2 D code is identified.
Method the most according to claim 1, it is characterised in that after described acquisition safety detection result, also include:
If described safety detection result is illegal image in 2 D code, export the information of illegal image in 2 D code.
Method the most according to claim 1, it is characterised in that the described characteristic information to described source image in 2 D code is carried out Before safety detection, also include:
Judge whether to extract the characteristic information of source image in 2 D code from image
If extracting the characteristic information of source image in 2 D code in preset time range, then perform described source image in 2 D code Characteristic information carries out safety detection and obtains the step of safety detection result;
If not extracting the characteristic information of source image in 2 D code in preset time range, then the prompting that output information retrieval is failed Information.
4. according to the method described in claim 1-3 any one, it is characterised in that the described spy to described source image in 2 D code Reference breath carries out safety detection and obtains safety detection result, including:
Quick Response Code characteristic information is extracted from the image in 2 D code of described source;
Described Quick Response Code characteristic information is mated with default characteristic information set;
If coupling, determine that safety detection result is legal image in 2 D code;
If not mating, determine that safety detection result is illegal image in 2 D code.
Method the most according to claim 4, it is characterised in that described described Quick Response Code characteristic information and default feature are believed Breath set is mated, including:
With this locality, described Quick Response Code characteristic information is preset characteristic information set mate;Or,
Described Quick Response Code characteristic information is mated with the default characteristic information set in database server;Or,
Described Quick Response Code characteristic information is uploaded to cloud server, and enters with the default characteristic information set in cloud server Row coupling.
6. a terminal, it is characterised in that described method includes:
Acquiring unit, is used for obtaining source image in 2 D code;
Processing unit, shows described for generating fuzzy two-dimensional code image according to described source image in 2 D code to control intended application Fuzzy two-dimensional code image;
Detector unit, for carrying out safety detection to the characteristic information of described source image in 2 D code and obtain safety detection result;
Described processing unit, if being legal image in 2 D code for described safety detection result, passes to source image in 2 D code Described intended application carries out showing to update described fuzzy two-dimensional code image;
Control unit, for controlling the identification of described image in 2 D code.
Terminal the most according to claim 6, it is characterised in that described terminal also includes:
Output unit, if being illegal image in 2 D code for described safety detection result, exports the prompting of illegal image in 2 D code Information.
Terminal the most according to claim 6, it is characterised in that described terminal also includes judging unit;
Described judging unit, for judging whether to extract the characteristic information of source image in 2 D code from image
Described detector unit, if being additionally operable to extract the characteristic information of source image in 2 D code in preset time range, to described The characteristic information of source image in 2 D code carries out safety detection and obtains safety detection result;
Described output unit, if being additionally operable to not extract the characteristic information of source image in 2 D code in preset time range, the most defeated Go out the information that information retrieval is failed.
9. according to the terminal described in claim 6-8 any one, it is characterised in that described detector unit includes:
Extraction unit, for extracting Quick Response Code characteristic information from the image in 2 D code of described source;
Matching unit, for mating described Quick Response Code characteristic information with default characteristic information set;
First determines unit, if for described Quick Response Code characteristic information and default characteristic information sets match, determining safety detection Result is legal image in 2 D code;
Second determines unit, if not mating with default characteristic information set for described Quick Response Code characteristic information, determines safe inspection Surveying result is illegal image in 2 D code.
Terminal the most according to claim 9, it is characterised in that described matching unit specifically for:
With this locality, described Quick Response Code characteristic information is preset characteristic information set mate;Or,
Described Quick Response Code characteristic information is mated with the default characteristic information set in database server;Or,
Described Quick Response Code characteristic information is uploaded to cloud server, and enters with the default characteristic information set in cloud server Row coupling.
CN201610408154.3A 2016-06-12 2016-06-12 Information processing method and terminal Active CN106055693B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610408154.3A CN106055693B (en) 2016-06-12 2016-06-12 Information processing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610408154.3A CN106055693B (en) 2016-06-12 2016-06-12 Information processing method and terminal

Publications (2)

Publication Number Publication Date
CN106055693A true CN106055693A (en) 2016-10-26
CN106055693B CN106055693B (en) 2020-01-10

Family

ID=57169871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610408154.3A Active CN106055693B (en) 2016-06-12 2016-06-12 Information processing method and terminal

Country Status (1)

Country Link
CN (1) CN106055693B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN109756621A (en) * 2018-12-25 2019-05-14 维沃移动通信有限公司 A kind of two-dimensional code display method and terminal device
CN112561013A (en) * 2020-12-15 2021-03-26 维沃移动通信有限公司 Processing method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8296477B1 (en) * 2011-04-22 2012-10-23 Symantec Corporation Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer is malicious
CN102819723A (en) * 2011-12-26 2012-12-12 哈尔滨安天科技股份有限公司 Method and system for detecting malicious two-dimension codes
CN103166972A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Safety website access system, and equipment and method for same
CN103268328A (en) * 2013-05-02 2013-08-28 百度在线网络技术(北京)有限公司 QR (quick response) code validation method and search engine server
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN104091140A (en) * 2014-06-23 2014-10-08 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8296477B1 (en) * 2011-04-22 2012-10-23 Symantec Corporation Secure data transfer using legitimate QR codes wherein a warning message is given to the user if data transfer is malicious
CN102819723A (en) * 2011-12-26 2012-12-12 哈尔滨安天科技股份有限公司 Method and system for detecting malicious two-dimension codes
CN103166972A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Safety website access system, and equipment and method for same
CN103268328A (en) * 2013-05-02 2013-08-28 百度在线网络技术(北京)有限公司 QR (quick response) code validation method and search engine server
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN104091140A (en) * 2014-06-23 2014-10-08 联想(北京)有限公司 Information processing method and electronic device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN109756621A (en) * 2018-12-25 2019-05-14 维沃移动通信有限公司 A kind of two-dimensional code display method and terminal device
CN112561013A (en) * 2020-12-15 2021-03-26 维沃移动通信有限公司 Processing method and device and electronic equipment

Also Published As

Publication number Publication date
CN106055693B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
US10805346B2 (en) Phishing attack detection
US10733434B2 (en) Method and system for accurately detecting, extracting and representing redacted text blocks in a document
CN109376078B (en) Mobile application testing method, terminal equipment and medium
JP5387124B2 (en) Method and system for performing content type search
CN101986292B (en) Method and system for processing forms based on an image
CN104182687B (en) The safety detection method of mobile terminal input window and safety detection device
CN104134143B (en) Mobile payment security protection method, mobile payment security protection device and cloud server
CN107077570A (en) System and method for detecting the trial that sensitive information is sent by data distribution passage
WO2020000743A1 (en) Webshell detection method and related device
CN102902917A (en) Method and system for preventing phishing attacks
KR20120135041A (en) Access monitoring method, information processing apparatus, and computer-readable medium storing access monitoring program
KR20160119778A (en) Generating barcode and authenticating based on barcode
EP3792792A1 (en) Tampering detection method for paper copy and apparatus and non-transitory computer-readable storage medium
US20180288040A1 (en) System and Method for Biometric Authentication-Based Electronic Notary Public
CN106815522A (en) Mobile terminal software vacation interface identification method and device
CN104238819A (en) Detection method and system for display screen state in mobile terminal
CN109345186B (en) Service handling method based on Internet of things and terminal equipment
KR101761513B1 (en) Method and system for detecting counterfeit and falsification using image
CN109727027A (en) Account recognition methods, device, equipment and storage medium
CN106055693A (en) Information processing method and terminal
CN112417516A (en) File processing method, device, equipment and medium
JP2011060107A (en) Apparatus, method and program for deciding certificate
KR101841928B1 (en) Method for issuing document offline, method for validating issued offline document, and server using the same
CN111311550A (en) Counterfeit certificate identification method and device and electronic equipment
CN103475673A (en) Phishing website recognizing method and device and client side

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210119

Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703

Patentee after: Shenzhen Microphone Holdings Co.,Ltd.

Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong.

Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd.