CN107360179A - A kind of risk information shared method, terminal and computer-readable recording medium - Google Patents

A kind of risk information shared method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107360179A
CN107360179A CN201710643374.9A CN201710643374A CN107360179A CN 107360179 A CN107360179 A CN 107360179A CN 201710643374 A CN201710643374 A CN 201710643374A CN 107360179 A CN107360179 A CN 107360179A
Authority
CN
China
Prior art keywords
risk information
terminal
risk
identification code
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710643374.9A
Other languages
Chinese (zh)
Other versions
CN107360179B (en
Inventor
习磊
杨启波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710643374.9A priority Critical patent/CN107360179B/en
Publication of CN107360179A publication Critical patent/CN107360179A/en
Application granted granted Critical
Publication of CN107360179B publication Critical patent/CN107360179B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of method that risk information is shared, including:First terminal obtains target risk information, target risk information includes the first risk information or the second risk information, first risk information is the risk information that server is not labeled beyond the clouds that first terminal receives, and the second risk information is the risk information that the risk information place of cloud server renewal includes;First terminal generates the first identification code according to target risk information;First terminal is transmitted to second terminal or shared first identification code, so that second terminal updates the risk information storehouse of second terminal after the first identification code by scanning or receiving, the risk information storehouse that the risk information storehouse of second terminal is used for according to renewal after second terminal receives target risk information carries out indicating risk.These new risk informations are shared to second terminal by the embodiment of the present application in time by way of identification code, so as to improve the efficiency of the risk information storehouse of terminal renewal.

Description

A kind of risk information shared method, terminal and computer-readable recording medium
Technical field
The application is related to field of computer technology, and in particular to a kind of risk information shared method, terminal and computer Readable storage medium storing program for executing.
Background technology
With the development of internet, the number that terminal meets with security risk is more and more, and the type of security risk It is more and more diversified.At present, the security risk that terminal is met with generally includes:Fraudulent call, fraud text message, mobile phone viruses, risk WLAN (english abbreviation:WIFI, English full name:Wireless Fidelity) or pseudo-base station etc..
The fail-safe software of terminal installation has certain indicating risk function.The principle of the indicating risk function is high in the clouds clothes Device statistical risk of being engaged in information forms risk information storehouse, and then risk information storehouse is issued to terminal by cloud server, when terminal institute The risk information of reception is included in risk information storehouse, then terminal can show indicating risk information, such as:The phone is high-frequency electrical Words etc..
Cloud server statistical risk information is reported typically by terminal or the monitoring of risk monitoring and control platform, is reported with terminal Exemplified by, when terminal reports the number of same risk information to exceed threshold value, then the risk information is added to risk information storehouse.So And the same risk information report number not reach threshold value before, then cloud server will not update risk information storehouse, or Person's cloud server have updated risk information storehouse and terminal does not upgrade in time local because cannot connect to cloud server Risk information storehouse, cause some risk informations still many users may be caused to be cheated also in without prompting state.Thus may be used See, the renewal efficiency in the risk information storehouse of terminal is low at present, and terminal room can not share new risk information in time.
The content of the invention
Low in order to solve the renewal efficiency in the risk information storehouse of terminal in the prior art, terminal room can not be shared newly in time Risk information the problem of, the embodiment of the present application provides a kind of risk information shared method, can be received in first terminal After new risk information or first terminal have received the risk information storehouse of cloud server renewal, by way of identification code These new risk informations are shared into second terminal in time, so as to improve the efficiency of the risk information storehouse of terminal renewal.This Application embodiment additionally provides corresponding terminal and computer-readable recording medium.
The application first aspect provides a kind of risk information shared method, including:
First terminal obtains target risk information, and the target risk information includes the first risk information or the second risk is believed Breath, first risk information are the not labeled risk information of server beyond the clouds that the first terminal receives, described the Two risk informations are the risk information that the risk information place of cloud server renewal includes;
The first terminal generates the first identification code according to the target risk information;
The first terminal transmits to second terminal or shares first identification code, so that the second terminal passes through Scan or receive the risk information storehouse that the second terminal is updated after first identification code, the risk information of the second terminal The risk information storehouse that storehouse is used for according to renewal after the second terminal receives the target risk information carries out indicating risk.
The application second aspect provides a kind of risk information shared method, and methods described is applied to communicate with first terminal Second terminal, methods described includes:
The second terminal scanning receives the first identification code that the first terminal is shared, and first identification code is institute State what first terminal generated according to target risk information, the target risk information includes the first risk information or the second risk is believed Breath, first risk information are the not labeled risk information of server beyond the clouds that the first terminal receives, described the Two risk informations are the risk information that the risk information place of cloud server renewal includes;
The second terminal updates the risk information storehouse of the second terminal according to first identification code;
The second terminal carries after the target risk information is received according to the risk information storehouse progress risk of renewal Show.
The application third aspect provides a kind of terminal, and the terminal is first terminal, and the terminal includes:
Obtain program module, for obtaining target risk information, the target risk information include the first risk information or Second risk information, first risk information are the risk letter that server is not labeled beyond the clouds that the first terminal receives Breath, second risk information are the risk information that the risk information place of cloud server renewal includes;
Program module is generated, for the identification of target risk information generation first obtained according to the acquisition program module Code;
Shared routing module, for the first identification transmitted to second terminal or the shared generation program module generates Code, so that the second terminal updates the risk information of the second terminal after first identification code by scanning or receiving Storehouse, the risk information storehouse of the second terminal are used for after the second terminal receives the target risk information according to renewal Risk information storehouse carry out indicating risk.
The application fourth aspect provides a kind of terminal, and the terminal is the second terminal to be communicated with first terminal, the end End includes:
Receive program module, the first identification code shared for scanning or receiving the first terminal, first identification What code generated for the first terminal according to target risk information, the target risk information includes the first risk information or second Risk information, first risk information are the risk information that server is not labeled beyond the clouds that the first terminal receives, Second risk information is the risk information that the risk information place of cloud server renewal includes;
More new program module, for first identification code renewal described second received according to the reception program module The risk information storehouse of terminal;
The reception program module, it is additionally operable to receive the target risk information;
Attention program module, for after receiving the reception program module and receiving the target risk information according to more New risk information storehouse carries out indicating risk.
The aspect of the application the 5th provides a kind of terminal, and the terminal is first terminal, and the terminal includes:Input/output (I/O) interface, processor and memory, the shared instruction of risk information described in first aspect is stored with the memory;
The I/O interfaces, which are used to receive, to be used to obtain target risk information;
The processor is used to perform the shared instruction of the risk information stored in memory, performs described in first aspect The step of method that risk information is shared.
The aspect of the application the 6th provides a kind of terminal, and the terminal is the second terminal to be communicated with first terminal, the end End includes:Input/output (I/O) interface, processor and memory, the risk described in second aspect is stored with the memory The instruction of information sharing;
The I/O interfaces are used to scanning or receiving the first identification code that the first terminal is shared;
The processor is used to perform the shared instruction of the risk information stored in memory, performs described in second aspect The step of method that risk information is shared.
The another aspect of the application provides a kind of computer-readable recording medium, in the computer-readable recording medium Instruction is stored with, when run on a computer so that computer performs the method described in above-mentioned each side.
The another aspect of the application provides a kind of computer program product for including instruction, when it runs on computers When so that computer performs the method described in above-mentioned each side.
The embodiment of the present application in first terminal using receiving new risk information or first terminal have received high in the clouds Behind the risk information storehouse of server update, these new risk informations are shared to second eventually in time by way of identification code End, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Brief description of the drawings
Fig. 1 is an example schematic diagram of indicating risk;
Fig. 2 is an example schematic diagram in cloud server renewal risk information storehouse;
Fig. 3 is an embodiment schematic diagram of the system of the embodiment of the present application risk information sharing;
Fig. 4 is an example schematic diagram of the embodiment of the present application risk information sharing;
Fig. 5 is another example schematic diagram of the embodiment of the present application risk information sharing;
Fig. 6 is another example schematic diagram of the embodiment of the present application risk information sharing;
Fig. 7 is an embodiment schematic diagram of the method for the embodiment of the present application risk information sharing;
Fig. 8 is another embodiment schematic diagram of the method for the embodiment of the present application risk information sharing;
Fig. 9 is an embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 10 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 11 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 12 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 13 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 14 is another embodiment schematic diagram of terminal in the embodiment of the present application.
Embodiment
Below in conjunction with the accompanying drawings, embodiments herein is described, it is clear that described embodiment is only the application The embodiment of a part, rather than whole embodiments.Those of ordinary skill in the art understand, are answered with the development of technology with new With the appearance of scene, the technical scheme that the embodiment of the present application provides is equally applicable for similar technical problem.
The embodiment of the present application provides a kind of risk information shared method, and new risk letter can be received in first terminal After breath or first terminal have received the risk information storehouse of cloud server renewal, in time by these by way of identification code New risk information shares to second terminal, so as to improve the efficiency of the risk information storehouse of terminal renewal.The embodiment of the present application Additionally provide corresponding terminal and computer-readable recording medium.It is described in detail individually below.
Terminal in the embodiment of the present application can be the mobile terminals such as mobile phone, phone wrist-watch and tablet personal computer, or Personal computer (English full name:Personal computer, english abbreviation:The fixed terminal such as PC).
Risk information in network generally includes fraudulent call, fraud text message, mobile phone viruses, risk WIFI, or pseudo-base station Deng.
In order to tackle the risk information in network, in the scheme that each security provider provides, generally by cloud server Risk information is collected, then risk information is verified, forms risk information storehouse, the risk information included in risk information storehouse All it is the larger information of confirmed risk, such as:Be reported number more than preset threshold value information be identified as risk compared with Big information, it is added to risk information storehouse.Terminal can download fail-safe software client, and such terminal can is from cloud service Device downloads risk information storehouse, in the risk information in receiving risk information storehouse, will show indicating risk.
As shown in figure 1, when terminal has incoming call incoming call, if the telephone number of the incoming call has in the risk information storehouse of terminal Storage, then can show for example on the interface of the terminal:The indicating risk information of printed words such as " fraudulent call, answering with caution ".When So, the content of indicating risk information is not limited to illustrate at this, and certainly, indicating risk mode is also not necessarily limited to interface display, and this is a kind of, It can also be voice message, or other prompting modes.
Cloud server, which collects the process of risk information and the process in risk information storehouse is issued to terminal, can refer to Fig. 2 Understood, as shown in Fig. 2 by risk monitoring and control platform or the terminal monitoring risk information of fail-safe software can be installed, and will The detailed data of the risk information is reported to server, and risk monitoring and control platform herein is the device of monitoring risk information, is installed The terminal for having fail-safe software can mark risk information.
What cloud server reception risk monitoring and control platform was sent is tentatively judged that risky risk information or terminal are sent Tentatively judged risky risk information after, it will to this tentatively judged risky risk information verified and Synthetic determination, however, it is determined that this is tentatively judged that risky risk information has risk very much in maximum probability, then is believed the risk Breath adds the risk information storehouse in high in the clouds, and is sent by way of high in the clouds issues to the terminal for being connected to cloud server, terminal Local risk information storehouse will be updated, and the risk information to receiving is prompted.It should be understood that it is to lead to information that high in the clouds, which issues, The process that cloud server pushes to terminal is crossed, after terminal receives the risk information, corresponding renewal operation can be performed.
It should be understood that the risk information in risk information storehouse, can send risk information request in terminal to cloud server Afterwards, issued after being confirmed by server, to end after risk information can also being added to risk information storehouse from cloud server End equipment initiates renewal, and this is not limited here.It should be noted that risk information storehouse includes different classes of risk sample Notebook data, it can specifically include pseudo-base station list, fraudulent call number storehouse, fraud text message content library, risk WiFi lists, virus Sample Storehouse or malice URL library etc., this is not limited here.
Fig. 3 is an embodiment schematic diagram of the system of the embodiment of the present application risk information sharing.
As shown in figure 3, the system that the risk information that the embodiment of the present application provides is shared includes first terminal 10A, second eventually End 10B, network 20 and cloud server 30, first terminal 10A and second terminal 10B can pass through network 20 and cloud server 30 Communicate to connect, in the scene shown in Fig. 3, second terminal 10B is in the state for being not attached to cloud server 30, can not receive cloud The risk information storehouse for the renewal that end server 30 issues.
First terminal 10A receives a risk information, such as:First terminal receives a phone 17055667788, such as In Fig. 4 shown in (a), the phone refers to incoming information, such as telephone number, and the phone is not included in the current risk of first terminal In information bank, the preliminary judgement through the user using first terminal in the Phone process is answered, it is believed that the phone is probably swindleness Phone is deceived, then first terminal 10A can report this risk information, but cloud server 30 through user's triggering to cloud server Need just to can determine whether that the phone is fraudulent call after the number for counting the phone reaches certain threshold value, just can be by the fraudulent call Add the risk information storehouse in high in the clouds.So may result in end side can not timely update local risk information storehouse, it is also possible to It can be harassed by the fraudulent call.
In the embodiment of the present application, first terminal 10A generates the first identification code according to the fraudulent call, and first identification code can To be the identification code of Quick Response Code or other forms.So that the first identification code is Quick Response Code as an example, the generation side of the Quick Response Code Formula can be when receiving the fraudulent call that does not make marks, can under the fraudulent call by Fig. 4 in interface shown in (b) open The dynamic setting interface as shown in (c) in Fig. 4, selection " generation risk information Quick Response Code " button, then can give birth under the setting interface Quick Response Code into Fig. 4 shown in (d), the telephone number that fraudulent call is labeled as by first terminal 10A is included in the Quick Response Code, or The link information of person's telephone number.It is also possible to that risk information storehouse version information, out-of-service time letter can be shown on the Quick Response Code At least one of in breath and remark information.
The version information in risk information storehouse can be risk information storehouse version number, and the risk information storehouse version number can be used for The version for the risk information that the first identification code includes is identified, the version of risk information can be distinguished.
Out-of-service time information, the out-of-service time be the first identification code from the duration for being generated to failure, if exceed the failure Between, Quick Response Code will be regenerated, the risk information that the Quick Response Code regenerated includes and the Quick Response Code of upper one failure include Risk information it is identical, if for example, the out-of-service time be shown as 15 minutes after fail, first terminal generates newly over the course of 15 mins Quick Response Code, and new Quick Response Code is identical with the risk information that old Quick Response Code includes, but the geometric figure being distributed is different.
Remark information can be Quick Response Code remark information, for illustrating the Meaning of Information of Quick Response Code.Such as:Scanning can be total to Enjoy the risk information storehouse of the machine, including fraudulent call, fraud text message, risk WiFi and bogusware etc..
In Fig. 4 shown in (e), first terminal can be for example, by:The social mode such as wechat, microblogging is by first identification code Other users are pushed to, such as:First identification code is pushed to second terminal 10B, second terminal can also directly be swept The Quick Response Code on first terminal is retouched, need not be pushed in this case, it is necessary to illustrate, second terminal 10B, which is not limited, refers to one Individual terminal, second terminal 10B can have multiple.
After second terminal 10B receives first identification code, first identification code can be scanned, obtains first identification code Included in risk information or risk information link, second terminal 10B risk information storehouse is then updated, so, when the After two terminal 10B receive the fraudulent call, indicating risk information will be shown on second terminal 10B.The process can join The change procedure for readding a few width figures in Fig. 5 is understood that in Fig. 5 shown in (a), second terminal 10B receives Quick Response Code, Yong Huke Start the setting interface in Fig. 5 shown in (b) in a manner of by the long-press Quick Response Code, selection set in interface " Quick Response Code is known Not " button, the two-dimensional code scanning interface into Fig. 5 shown in (c), the interface scanning Quick Response Code shown in (d), is identified in Figure 5 Go out the fraudulent call encapsulated in Quick Response Code, by fraudulent call renewal into the risk information storehouse of second terminal, so, when second Terminal 10B receives the fraudulent call again, will show indicating risk information shown in (e) in Fig. 5, such as " fraudulent call, sincerely It is careful to answer ".
In addition, first terminal 10A mark the phone be fraudulent call after, after the fraudulent call is received again, just Indicating risk information can be shown on first terminal 10A.
In another situation because cloud server 30 is collecting risk information always, and can timing or it is quantitative more The risk information storehouse in new high in the clouds, and terminal is handed down in the risk information storehouse of renewal, regularly refer to periodically update, quantitatively refer to Updated when new risk information reaches a certain amount of.When second terminal 10B fails to connect to cloud server 30, then second terminal The risk information storehouse that 10B can not upgrade in time local, so, it is also possible to cause second terminal 10B to receive the risk in high in the clouds The risk information that is newly added in information bank and indicating risk can not be carried out according to the risk information storehouse of renewal, such as:When high in the clouds takes Fraudulent call 17015662033 is newly with the addition of in the risk information storehouse that business device 30 updates.If second terminal 10B is not timely more Newly, then, then can not foundation for the fraudulent call on second terminal 10B when second terminal 10B receives phone 17015662033 The risk information storehouse of renewal carries out indicating risk.
In the embodiment of the present application, for this kind of situation, what first terminal 10A can also newly issue cloud server 30 Risk information storehouse generates the first identification code, and first identification code is sent into second terminal 10B, second terminal 10B scan this One identification code, the risk information storehouse of the new renewal is therefrom obtained, and then update local risk information storehouse, it is electric when receiving swindle After words 17015662033, it is possible to which timely the risk information storehouse according to renewal carries out indicating risk.
Although the information that cloud server reports to terminal or Risk Monitoring platform can do comprehensive descision, wind is judged as The larger information in danger can just be added into risk information storehouse, but have the possibility of erroneous judgement unavoidably, the risk having in risk information storehouse Information may be misjudged, therefore, in the embodiment of the present application, is stabbed for each edition risk information storehouse all setup times, cloud service Device all generates corresponding second identification code for each edition risk information storehouse, and second identification code can also be Quick Response Code, may be used also To be the identification code of other forms, so when confirming misjudged risk information to be present in current risk information storehouse, so that it may To determine the risk information storehouse being rolled back to according to timestamp, the Quick Response Code in the risk information storehouse is scanned, it is possible to roll back to mistake Risk information storehouse before sentencing.
It can also be understood above with respect to the shared process of risk information refering to Fig. 6, embodiment bag as shown in Figure 6 Include:
S101, cloud server collect Risk Monitoring platform and are provided with the risk information that the terminal of fail-safe software reports.
The risk information can include station list, fraudulent call number storehouse, fraud text message content library, risk WiFi row Table, Virus Sample storehouse or malice URL library etc., this is not limited here.
S102, cloud server carry out risk checking and comprehensive descision to the risk information of collection.
Risk is verified and the process of comprehensive descision can count the number that same risk information occurs, or others are tested Card mode.
S103, risk information added into risk information storehouse, to update risk information storehouse.
When confirming that the information has larger risk by checking in the information being collected into, then can confirm that the information is wind For dangerous information, it is necessary to add risk information storehouse, warning terminal user wants the message risk information.
S104, risk information storehouse all setup time stamps for updating every time, so as to generate the risk letter with timestamp List is ceased, and the risk information storehouse for updating every time generates corresponding Quick Response Code.
Behind S105, cloud server renewal risk information storehouse, the risk information storehouse of renewal can be issued to terminal.
In Fig. 6, terminal A normally receives the risk information storehouse that cloud server issues, and terminal C is not attached to cloud service Device, then terminal A Quick Response Code is generated according to the risk information storehouse of the renewal, the Quick Response Code is shared into terminal C, terminal C is according to this Risk information storehouse local Quick Response Code more new terminal C.
S106, terminal B receive risk information Q, and risk information Q can be fraudulent call.
Risk information Q is also not flagged as risk information in server beyond the clouds.Terminal B generations are believed comprising the risk Q Quick Response Code is ceased, the Quick Response Code can be shared with terminal A, wind local the terminal A sweep Quick Response Code more new terminal A by terminal B Dangerous information bank, so as to which when receiving risk information Q, terminal A shows indicating risk information.The process can refer to Fig. 4 and Fig. 5 example is understood that it is no longer repeated at this place.
Fig. 7 is an embodiment schematic diagram of the method for the embodiment of the present application risk information sharing.
As shown in fig. 7, an embodiment of the method that the risk information that the embodiment of the present application provides is shared includes:
201st, first terminal obtains target risk information.
The target risk information includes the first risk information or the second risk information, and first risk information is described the The not labeled risk information of server beyond the clouds that one terminal receives, second risk information be the cloud server more The risk information that new risk information place includes.
202nd, first terminal generates the first identification code according to target risk information.
The interior perhaps link information of the target risk information is included in first identification code, and it is following be illustrated in it is described At least one of in information in first identification code, it is the version information in risk information storehouse corresponding to first identification code, described The remark information of the out-of-service time information of first identification code and first identification code.
203rd, first terminal transmits or shared the first identification code to second terminal.
204th, second terminal directly scans the first identification code, or after receiving first identification code, scans this and first knows Other code.
205th, second terminal updates the risk information storehouse of second terminal according to first identification code.
206th, second terminal is receiving the target risk information.
207th, second terminal carries out indicating risk according to the risk information storehouse of renewal.
The embodiment of the present application in first terminal using receiving new risk information or first terminal have received high in the clouds Behind the risk information storehouse of server update, these new risk informations are shared to second eventually in time by way of identification code End, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Fig. 8 is another embodiment schematic diagram of the method for the embodiment of the present application risk information sharing.
As shown in figure 8, another embodiment for the method that the risk information that the embodiment of the present application provides is shared includes:
301st, first terminal obtains the risk information storehouse of renewal from cloud server.
302nd, first terminal generates the first identification code according to the risk information storehouse of the renewal.
303rd, first terminal transmits or shared the first identification code to second terminal.
304th, the local risk information storehouse of first terminal renewal.
305th, second terminal directly scans the first identification code on first terminal interface, or second terminal receive this After one identification code, first identification code is scanned.
306th, second terminal updates the risk information storehouse of second terminal according to first identification code.
307th, second terminal is receiving target risk information.
The target risk information is risk information newly-increased in the risk information storehouse of the renewal.
308th, second terminal carries out indicating risk according to the risk information storehouse of renewal.
309th, first terminal confirms the risk information for including erroneous judgement in the risk information storehouse of renewal.
The risk information of erroneous judgement refers to risk is not present, and should not add the information in risk information storehouse.
310th, first terminal obtains second identification code in the risk information storehouse before erroneous judgement from cloud server.
311st, before the risk information storehouse of local is rolled back to erroneous judgement by first terminal according to second identification code.
It should be noted that step 303 does not have sequencing, step 305-308 and step 309-311 with step 304 There is no a sequencing, first terminal and second terminal can each perform oneself local operation, moreover, on rolling back action, It is not limited to occur on first terminal, when confirming to have the risk information of erroneous judgement in second terminal, can also performs rolling back action.
Above is the introduction of the method to the embodiment of the present application risk information sharing, introduces the application below in conjunction with the accompanying drawings Terminal in embodiment.
As shown in figure 9, the terminal 40 that the embodiment of the present application provides, when being first terminal, the terminal 40 includes:
Program module 401 is obtained, for obtaining target risk information, the target risk information includes the first risk information Or second risk information, first risk information are the not labeled risk of server beyond the clouds that the first terminal receives Information, second risk information are the risk information that the risk information place of cloud server renewal includes;
Program module 402 is generated, for the target risk information generation first obtained according to the acquisition program module 401 Identification code;
Shared routing module 403, first generated for the generation program module 402 to be transmitted or shared to second terminal Identification code, so that the second terminal updates the risk of the second terminal after first identification code by scanning or receiving Information bank, the risk information storehouse of the second terminal are used for the foundation after the second terminal receives the target risk information The risk information storehouse of renewal carries out indicating risk.
The embodiment of the present application in first terminal using receiving new risk information or first terminal have received high in the clouds Behind the risk information storehouse of server update, these new risk informations are shared to second eventually in time by way of identification code End, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Alternatively, refering to Figure 10, the terminal 40 that the embodiment of the present application provides also includes scanning imaging system module 404,
The acquisition program module 401, it is additionally operable to the risk letter comprising erroneous judgement in current risk information storehouse is got During breath, then the second identification code is obtained from the cloud server, second identification code is corresponding with the risk information storehouse before erroneous judgement;
The scanning imaging system module 404, the second identification code obtained for scanning the acquisition program module 401, from institute State the risk information storehouse that current risk information storehouse is rolled back to before the erroneous judgement.
Alternatively, refering to Figure 11, the terminal 40 that the embodiment of the present application provides also includes more new program module 405 and prompting journey Sequence module 406,
More new program module 405, for described in the target risk information updating that is obtained according to the acquisition program module the The risk information storehouse of one terminal;
The acquisition program module 401, for receiving the target risk information again;
Attention program module 406, for the target risk information that receives again of reception program module according to more New risk information storehouse carries out indicating risk.
Wherein, the interior perhaps link information of the target risk information, and following exhibitions are included in first identification code Show at least one in the information in first identification code, the version letter in risk information storehouse corresponding to first identification code The remark information of breath, the out-of-service time information of first identification code and first identification code.
Refering to Figure 12, when the terminal 50 that the embodiment of the present application provides is second terminal, an embodiment of terminal 50 includes:
Program module 501 is received, the first identification code shared for scanning or receiving the first terminal, described first knows Other code is that the first terminal generate according to target risk information, and the target risk information includes the first risk information or the Two risk informations, first risk information are the risk letter that server is not labeled beyond the clouds that the first terminal receives Breath, second risk information are the risk information that the risk information place of cloud server renewal includes;
More new program module 502, first identification code for being received according to the reception program module 501 update institute State the risk information storehouse of second terminal;
The reception program module 501, is additionally operable to receive the target risk information;
Attention program module 503, for after receiving the reception program module 501 and receiving the target risk information Risk information storehouse according to the renewal of more new program module 502 carries out indicating risk.
Alternatively, refering in another embodiment of Figure 13, the embodiment of the present application terminal 50 provided, terminal 50 also includes: Program module 504 and scanning imaging system module 505 are obtained,
The acquisition program module 504, for getting the current risk information storehouse of more new program module 502 renewal In comprising erroneous judgement risk information when, then from the cloud server obtain the second identification code, second identification code with erroneous judgement Preceding risk information storehouse is corresponding;
The scanning imaging system module 505, the second identification code obtained for scanning the acquisition program module 504, from institute State the risk information storehouse that current risk information storehouse is rolled back to before the erroneous judgement.
The embodiment of the present application provide terminal 40 can refer to previous embodiment in first terminal be understood, terminal 50 The second terminal that can be referred in previous embodiment is understood.
Below by taking mobile terminal as an example, the terminal for introducing the embodiment of the present invention realizes the shared process of risk information.
As shown in figure 14, for convenience of description, the part related to the embodiment of the present invention, particular technique details be illustrate only Do not disclose, refer to present invention method part.
Figure 14 is illustrated that the block diagram with the part-structure of mobile terminal 800 provided in an embodiment of the present invention.With reference to figure 14, Mobile terminal includes:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input block 830, display unit 840th, the part such as sensor 850, voicefrequency circuit 860, WiFi module 870, processor 880 and power supply 890.Art technology Personnel are appreciated that the mobile terminal structure shown in Figure 14 does not form the restriction to mobile terminal, can include than diagram More or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile terminal is specifically introduced with reference to Figure 14:
RF circuits 810 can be used for receive and send messages or communication process in, the reception and transmission of signal, such as:Receive target wind Dangerous information.Especially, after the downlink information of base station is received, handled to processor 880;In addition, sent out up data are designed Give base station.Generally, RF circuits 810 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low noise Amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also pass through radio communication and net Network and other equipment communication.Above-mentioned radio communication can use any communication standard or agreement, and it is mobile to include but is not limited to the whole world Communication system (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), broadband CDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storage software program and module, and processor 880 is stored in memory 820 by operation Software program and module, so as to perform the various function application of mobile terminal and data processing.Memory 820 can be main Including storing program area and storage data field, wherein, storing program area can storage program area, needed at least one function should With program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use according to mobile terminal Data (such as voice data, phone directory etc.) created etc..Stored in addition, memory 820 can include high random access Device, nonvolatile memory can also be included, a for example, at least disk memory, flush memory device or other volatibility are consolidated State memory device.
Input block 830 can be used for the operational order for receiving user, such as:The instruction of the first identification code is generated, and is produced Set with the user of mobile terminal 800 and key signals that function control is relevant input.Specifically, input block 830 may include Contact panel 831 and other input equipments 832.Contact panel 831, also referred to as touch-screen, user is collected thereon or attached Near touch operation (for example user on contact panel 831 or is being touched using any suitable objects or annex such as finger, stylus Control the operation near panel 831), and corresponding connection mobile terminal is driven according to formula set in advance.Optionally, touch surface Plate 831 may include two parts of touch detection mobile terminal and touch controller.Wherein, touch detection mobile terminal detection user Touch orientation, and detect the signal that touch operation is brought, transmit a signal to touch controller;Touch controller is examined from touch Survey on mobile terminal and receive touch information, and be converted into contact coordinate, then give processor 880, and can reception processing device 880 orders sent simultaneously are performed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Type realizes contact panel 831.Except contact panel 831, input block 830 can also include other input equipments 832.Specifically Ground, other input equipments 832 can include but is not limited to physical keyboard, function key (such as volume control button, switch key Deng), trace ball, mouse, the one or more in action bars etc..
Display unit 840 can be used for the first identification code interface of display or other setting interfaces and indicating risk interface Deng.Display unit 840 may include indicator lamp 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) refers to configure Show lamp 841.Further, contact panel 831 can cover indicator lamp 841, when contact panel 831 is detected on or near it After touch operation, processor 880 is sent to determine the type of touch event, is followed by subsequent processing class of the device 880 according to touch event Type provides corresponding visual output on indicator lamp 841.Although in fig. 14, contact panel 831 and indicator lamp 841 are as two Individual independent part realizes the input of mobile terminal and input function, but in some embodiments it is possible to by contact panel 831 integrate with indicator lamp 841 and realize input and the output function of mobile terminal.
Mobile terminal 800 may also include at least one sensor 850.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the COBBAIF between user and mobile terminal.Sound Electric signal after the voice data received conversion can be transferred to loudspeaker 861, is converted to by loudspeaker 861 by frequency circuit 860 Voice signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is received by voicefrequency circuit 860 After be converted to voice data, it is such as another to be sent to through RF circuits 810 then after voice data output processor 880 is handled Mobile terminal, or voice data is exported to memory 820 further to handle.
WiFi module 870 can be used for communicating.
Processor 880 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 820, and call and be stored in storage Data in device 820, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Can Choosing, processor 880 may include one or more processing units;Preferably, processor 880 can integrate application processor and modulation Demodulation processor, wherein, application processor mainly handles operating system, user interface and application program etc., modulation /demodulation processing Device mainly handles radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile terminal 800 also includes the power supply 890 (such as battery) to all parts power supply, it is preferred that power supply can lead to Cross power-supply management system and processor 880 be logically contiguous, so as to by power-supply management system realize management charging, electric discharge and The functions such as power managed.
Although being not shown, mobile terminal 800 can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the mobile terminal is when risk information is shared, if the mobile terminal is first terminal, Included processor 880 also has following functions:
Target risk information is obtained, the target risk information includes the first risk information or the second risk information, described First risk information is the risk information that server is not labeled beyond the clouds that the first terminal receives, the second risk letter Cease the risk information included for the risk information place of cloud server renewal;
First identification code is generated according to the target risk information;
Transmitted to second terminal or share first identification code, so that the second terminal is by scanning or receiving institute The risk information storehouse that the second terminal is updated after the first identification code is stated, the risk information storehouse of the second terminal is used for described Second terminal receives the risk information storehouse progress indicating risk of foundation renewal after the target risk information.
Alternatively, methods described also includes:
When including the risk information of erroneous judgement in getting current risk information storehouse, then obtained from the cloud server Second identification code, second identification code are corresponding with the risk information storehouse before erroneous judgement;
Second identification code is scanned, the risk information rolled back to from the current risk information storehouse before the erroneous judgement Storehouse.
Alternatively, methods described also includes:
According to the risk information storehouse of first terminal described in the target risk information updating;
Risk information storehouse when receiving the target risk information again according to renewal carries out indicating risk.
The interior perhaps link information of the target risk information is included in first identification code, and following is illustrated in institute State at least one in the information in the first identification code, the version information in risk information storehouse, institute corresponding to first identification code State the out-of-service time information of the first identification code and the remark information of first identification code.
In embodiments of the present invention, the mobile terminal is when risk information is shared, if the mobile terminal is second terminal, Included processor 880 also has following functions:
The first identification code that the first terminal is shared is scanned or receives, first identification code is the first terminal root According to the generation of target risk information, the target risk information includes the first risk information or the second risk information, and described first Risk information is the risk information that server is not labeled beyond the clouds that the first terminal receives, and second risk information is The risk information that the risk information place of the cloud server renewal includes;
The risk information storehouse of the second terminal is updated according to first identification code;
Risk information storehouse according to renewal after the target risk information is received carries out indicating risk.
Alternatively, methods described also includes:
When including the risk information of erroneous judgement in getting current risk information storehouse, then obtained from the cloud server Second identification code, second identification code are corresponding with the risk information storehouse before erroneous judgement;
Second identification code is scanned, the risk information rolled back to from the current risk information storehouse before the erroneous judgement Storehouse.
Alternatively, the risk information storehouse of the second terminal is updated according to first identification code, including:
Scan first identification code, obtain the target risk information that is included in first identification code it is interior perhaps Link information;
According to perhaps link information in the target risk information, the risk information storehouse of the second terminal is updated.
Mobile phone provided in an embodiment of the present invention can be retouched refering to Fig. 1 to Fig. 8 parts first terminal is related to second terminal State and understood, it is no longer repeated at this place.
Input/output (I/O) interface can include RF circuits 810, input block 830 and display unit 840.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real It is existing.When implemented in software, can realize in the form of a computer program product whole or in part.
The computer program product includes one or more computer instructions.Load and perform on computers the meter During calculation machine programmed instruction, produce whole or in part according to the flow or function described in the embodiment of the present application.The computer can To be all-purpose computer, special-purpose computer, computer network or other programmable devices.The computer instruction can be deposited Store up in a computer-readable storage medium, or from a computer-readable recording medium to another computer-readable recording medium Transmission, for example, the computer instruction can pass through wired (example from a web-site, computer, server or data center Such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave) mode to another website Website, computer, server or data center are transmitted.The computer-readable recording medium can be that computer can be deposited Any usable medium of storage is either set comprising data storages such as the integrated server of one or more usable mediums, data centers It is standby.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or partly lead Body medium (such as solid state hard disc Solid State Disk (SSD)) etc..
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium can include:ROM, RAM, disk or CD etc..
Method, terminal and the system that the risk information provided above the embodiment of the present application is shared have carried out detailed Jie Continue, specific case used herein is set forth to the principle and embodiment of the application, and the explanation of above example is only It is to be used to help understand the present processes and its core concept;Meanwhile for those of ordinary skill in the art, according to this Shen Thought please, there will be changes in specific embodiments and applications, in summary, this specification content should not manage Solve as the limitation to the application.

Claims (15)

1. a kind of shared method of risk information, it is characterised in that including:
First terminal obtains target risk information, and the target risk information includes the first risk information or the second risk information, The risk information that server is not labeled beyond the clouds that first risk information receives for the first terminal, second wind Dangerous information is the risk information that the risk information place of cloud server renewal includes;
The first terminal generates the first identification code according to the target risk information;
The first terminal transmits to second terminal or shares first identification code, so that the second terminal passes through scanning Or the risk information storehouse of the second terminal is updated after reception first identification code, the risk information storehouse of the second terminal is used Risk information storehouse according to renewal after the target risk information is received in the second terminal carries out indicating risk.
2. according to the method for claim 1, it is characterised in that methods described also includes:
The first terminal is when including the risk information of erroneous judgement in getting current risk information storehouse, from the cloud service Device obtains the second identification code, and second identification code is corresponding with the risk information storehouse before erroneous judgement;
The first terminal scans second identification code, the wind rolled back to from the current risk information storehouse before the erroneous judgement Dangerous information bank.
3. method according to claim 1 or 2, it is characterised in that methods described also includes:
The risk information storehouse of first terminal first terminal according to the target risk information updating;
Risk information storehouse when the first terminal receives the target risk information again according to renewal carries out indicating risk.
4. method according to claim 1 or 2, it is characterised in that the target risk is included in first identification code At least one of in the interior perhaps link information of information, and following information being illustrated in first identification code, described the The version information in risk information storehouse, the out-of-service time information of first identification code and first identification corresponding to one identification code The remark information of code.
5. a kind of shared method of risk information, it is characterised in that methods described is whole applied to second to be communicated with first terminal End, methods described include:
Second terminal scanning receives the first identification code that the first terminal is shared, and first identification code is described the One terminal generates according to target risk information, and the target risk information includes the first risk information or the second risk information, The risk information that server is not labeled beyond the clouds that first risk information receives for the first terminal, second wind Dangerous information is the risk information that the risk information place of cloud server renewal includes;
The second terminal updates the risk information storehouse of the second terminal according to first identification code;
The second terminal carries out indicating risk after the target risk information is received according to the risk information storehouse of renewal.
6. according to the method for claim 5, it is characterised in that methods described also includes:
The second terminal then takes when including the risk information of erroneous judgement in getting current risk information storehouse from the high in the clouds Business device obtains the second identification code, and second identification code is corresponding with the risk information storehouse before erroneous judgement;
The first terminal scans second identification code, the wind rolled back to from the current risk information storehouse before the erroneous judgement Dangerous information bank.
7. the method according to claim 5 or 6, it is characterised in that the second terminal according to first identification code more The risk information storehouse of the new second terminal, including:
The second terminal scans first identification code, obtains the target risk information included in first identification code Interior perhaps link information;
The second terminal is according to perhaps link information, the risk for updating the second terminal are believed in the target risk information Cease storehouse.
8. a kind of terminal, it is characterised in that the terminal is first terminal, and the terminal includes:
Program module is obtained, for obtaining target risk information, the target risk information includes the first risk information or second Risk information, first risk information are the risk information that server is not labeled beyond the clouds that the first terminal receives, Second risk information is the risk information that the risk information place of cloud server renewal includes;
Program module is generated, the target risk information for being obtained according to the acquisition program module generates the first identification code;
Shared routing module, for the first identification code of the generation program module generation to be transmitted or shared to second terminal, with The risk information storehouse of the second terminal is updated after first identification code by scanning or receiving beneficial to the second terminal, institute The risk information storehouse for stating second terminal is used for after the second terminal receives the target risk information according to the wind updated Dangerous information bank carries out indicating risk.
9. terminal according to claim 8, it is characterised in that the terminal also includes:Scanning imaging system module,
The acquisition program module, it is additionally operable to when including the risk information of erroneous judgement in getting current risk information storehouse, then The second identification code is obtained from the cloud server, second identification code is corresponding with the risk information storehouse before erroneous judgement;
The scanning imaging system module, the second identification code obtained for scanning the acquisition program module, from the current wind The risk information storehouse that dangerous information bank is rolled back to before the erroneous judgement.
10. terminal according to claim 8 or claim 9, it is characterised in that the terminal also includes:More new program module and carry Show program module,
More new program module, for first terminal described in the target risk information updating according to the acquisition program module acquisition Risk information storehouse;
The acquisition program module, for receiving the target risk information again;
Attention program module, for the risk of the target risk information foundation renewal received again to the reception program module Information bank carries out indicating risk.
11. a kind of terminal, it is characterised in that the terminal is the second terminal to be communicated with first terminal, and the terminal includes:
Program module, the first identification code shared for scanning or receiving the first terminal are received, first identification code is The first terminal generates according to target risk information, and the target risk information includes the first risk information or the second risk Information, first risk information is the risk information that server is not labeled beyond the clouds that the first terminal receives, described Second risk information is the risk information that the risk information place of cloud server renewal includes;
More new program module, first identification code for being received according to the reception program module update the second terminal Risk information storehouse;
The reception program module, it is additionally operable to receive the target risk information;
Attention program module, for the foundation renewal journey after receiving the reception program module and receiving the target risk information The risk information storehouse that sequence module 502 updates carries out indicating risk.
12. terminal according to claim 11, it is characterised in that the terminal also includes:Obtain program module and scanning Program module,
The acquisition program module, for get more new program module renewal current risk information storehouse in comprising erroneous judgement Risk information, then obtain the second identification code, second identification code and the risk information storehouse before erroneous judgement from the cloud server It is corresponding;
The scanning imaging system module, the second identification code obtained for scanning the acquisition program module, from the current wind The risk information storehouse that dangerous information bank is rolled back to before the erroneous judgement.
13. a kind of terminal, it is characterised in that the terminal is first terminal, and the terminal includes:Input/output (I/O) connects Mouthful, processor and memory, be stored with the shared instruction of any described risk informations of claim 1-4 in the memory;
The I/O interfaces, which are used to receive, to be used to obtain target risk information;
The processor is used to perform the shared instruction of the risk information stored in memory, performs as claim 1-4 is any The step of method that described risk information is shared.
14. a kind of terminal, it is characterised in that the terminal is the second terminal to be communicated with first terminal, and the terminal includes:It is defeated Enter/export (I/O) interface, processor and memory, any described risk letters of claim 5-7 are stored with the memory The shared instruction of breath;
The I/O interfaces are used to scanning or receiving the first identification code that the first terminal is shared;
The processor is used to perform the shared instruction of the risk information stored in memory, performs as claim 5-7 is any The step of method that described risk information is shared.
15. a kind of computer-readable recording medium, it is characterised in that risky letter is stored in the computer-readable recording medium The shared instruction of breath, when run on a computer so that computer performs any described sides of the claims 1-7 Method.
CN201710643374.9A 2017-07-31 2017-07-31 Risk information sharing method, terminal and computer readable storage medium Active CN107360179B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710643374.9A CN107360179B (en) 2017-07-31 2017-07-31 Risk information sharing method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710643374.9A CN107360179B (en) 2017-07-31 2017-07-31 Risk information sharing method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN107360179A true CN107360179A (en) 2017-11-17
CN107360179B CN107360179B (en) 2022-01-25

Family

ID=60286732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710643374.9A Active CN107360179B (en) 2017-07-31 2017-07-31 Risk information sharing method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN107360179B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932582A (en) * 2018-06-13 2018-12-04 平安科技(深圳)有限公司 Risk information determines method, apparatus, computer equipment and storage medium
CN110276193A (en) * 2019-05-17 2019-09-24 阿里巴巴集团控股有限公司 Feature of risk output method, using progress control method, system and device
CN110728516A (en) * 2019-10-09 2020-01-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for updating wind control model
CN111444992A (en) * 2020-03-27 2020-07-24 腾讯云计算(北京)有限责任公司 User information checking method and system based on information code

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073820A (en) * 2011-01-25 2011-05-25 潘燕辉 User sharing-based cloud scanning method
CN102945351A (en) * 2012-11-05 2013-02-27 中国科学院软件研究所 Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment
CN104125222A (en) * 2014-07-18 2014-10-29 国网上海市电力公司 Information intranet security hole monitoring processing method
CN105227439A (en) * 2015-09-25 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of sharing method of associated person information and user terminal
CN105872178A (en) * 2016-06-06 2016-08-17 北京珠穆朗玛移动通信有限公司 Contact person information sharing method and mobile terminal
US20160364805A1 (en) * 2008-09-11 2016-12-15 Asurion, Llc Account Based Handset Protection Coverage
US20160381034A1 (en) * 2015-06-29 2016-12-29 International Business Machines Corporation Managing data privacy and information safety
CN106357919A (en) * 2016-09-30 2017-01-25 珠海市魅族科技有限公司 Crank call interception method and device thereof
CN106357912A (en) * 2016-09-28 2017-01-25 北京奇虎科技有限公司 Incoming/outgoing call processing method and incoming/outgoing call processing device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160364805A1 (en) * 2008-09-11 2016-12-15 Asurion, Llc Account Based Handset Protection Coverage
CN102073820A (en) * 2011-01-25 2011-05-25 潘燕辉 User sharing-based cloud scanning method
CN102945351A (en) * 2012-11-05 2013-02-27 中国科学院软件研究所 Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment
CN104125222A (en) * 2014-07-18 2014-10-29 国网上海市电力公司 Information intranet security hole monitoring processing method
US20160381034A1 (en) * 2015-06-29 2016-12-29 International Business Machines Corporation Managing data privacy and information safety
CN105227439A (en) * 2015-09-25 2016-01-06 宇龙计算机通信科技(深圳)有限公司 A kind of sharing method of associated person information and user terminal
CN105872178A (en) * 2016-06-06 2016-08-17 北京珠穆朗玛移动通信有限公司 Contact person information sharing method and mobile terminal
CN106357912A (en) * 2016-09-28 2017-01-25 北京奇虎科技有限公司 Incoming/outgoing call processing method and incoming/outgoing call processing device
CN106357919A (en) * 2016-09-30 2017-01-25 珠海市魅族科技有限公司 Crank call interception method and device thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932582A (en) * 2018-06-13 2018-12-04 平安科技(深圳)有限公司 Risk information determines method, apparatus, computer equipment and storage medium
CN110276193A (en) * 2019-05-17 2019-09-24 阿里巴巴集团控股有限公司 Feature of risk output method, using progress control method, system and device
CN110276193B (en) * 2019-05-17 2023-08-22 创新先进技术有限公司 Risk feature output method, application operation control method, system and device
CN110728516A (en) * 2019-10-09 2020-01-24 支付宝(杭州)信息技术有限公司 Method, device and equipment for updating wind control model
CN111444992A (en) * 2020-03-27 2020-07-24 腾讯云计算(北京)有限责任公司 User information checking method and system based on information code
CN111444992B (en) * 2020-03-27 2023-04-07 腾讯云计算(北京)有限责任公司 User information checking method and system based on information code

Also Published As

Publication number Publication date
CN107360179B (en) 2022-01-25

Similar Documents

Publication Publication Date Title
CN103475996B (en) Method for connecting network, network share method and device
CN107852410B (en) Dissect rogue access point
CN102317884B (en) For supporting the wake up trigger signal of multiple user interfaces, environment and/or virtual machine
CN107360179A (en) A kind of risk information shared method, terminal and computer-readable recording medium
CN105119806B (en) message updating method and device
CN104519485B (en) Communication means, device and system between a kind of terminal
CN105871867A (en) Identity authentication method, system and equipment
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106714274B (en) access point connection method and device
CN103152462B (en) A kind of address list sharing method and device
CN107707538A (en) Data transmission method, device, mobile terminal and computer-readable recording medium
CN104852802B (en) Auth method, equipment and system
CN106341809A (en) Data transmission method and apparatus
CN106407771A (en) Message management method and device
CN105490992B (en) A kind of verification method of two dimensional code, device and system
CN107484148A (en) A kind of network search method and mobile terminal
CN103796343A (en) M2M gateway equipment and application method thereof
CN106817489A (en) The reminding method and mobile terminal of message
CN104967648B (en) A kind of dispatching method of internet protocol address, device and system
CN106022055A (en) Fingerprint unlocking control method and terminal equipment
CN107205082A (en) A kind of short message method for cleaning and mobile terminal
CN105426190A (en) Data transmission method and device
CN106156246B (en) A kind of querying method of public platform, device and system
CN106685796B (en) A kind of information identifying method, device and system
CN106066953A (en) A kind of unlocked by fingerprint control method and terminal unit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant