CN107360179A - A kind of risk information shared method, terminal and computer-readable recording medium - Google Patents
A kind of risk information shared method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107360179A CN107360179A CN201710643374.9A CN201710643374A CN107360179A CN 107360179 A CN107360179 A CN 107360179A CN 201710643374 A CN201710643374 A CN 201710643374A CN 107360179 A CN107360179 A CN 107360179A
- Authority
- CN
- China
- Prior art keywords
- risk information
- terminal
- risk
- identification code
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 54
- 238000003384 imaging method Methods 0.000 claims description 7
- 230000009286 beneficial effect Effects 0.000 claims 1
- 230000004044 response Effects 0.000 description 30
- 238000010586 diagram Methods 0.000 description 19
- 230000006870 function Effects 0.000 description 14
- 238000012544 monitoring process Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 238000003860 storage Methods 0.000 description 8
- 230000006854 communication Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 241000700605 Viruses Species 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000005096 rolling process Methods 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 206010048669 Terminal state Diseases 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application discloses a kind of method that risk information is shared, including:First terminal obtains target risk information, target risk information includes the first risk information or the second risk information, first risk information is the risk information that server is not labeled beyond the clouds that first terminal receives, and the second risk information is the risk information that the risk information place of cloud server renewal includes;First terminal generates the first identification code according to target risk information;First terminal is transmitted to second terminal or shared first identification code, so that second terminal updates the risk information storehouse of second terminal after the first identification code by scanning or receiving, the risk information storehouse that the risk information storehouse of second terminal is used for according to renewal after second terminal receives target risk information carries out indicating risk.These new risk informations are shared to second terminal by the embodiment of the present application in time by way of identification code, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Description
Technical field
The application is related to field of computer technology, and in particular to a kind of risk information shared method, terminal and computer
Readable storage medium storing program for executing.
Background technology
With the development of internet, the number that terminal meets with security risk is more and more, and the type of security risk
It is more and more diversified.At present, the security risk that terminal is met with generally includes:Fraudulent call, fraud text message, mobile phone viruses, risk
WLAN (english abbreviation:WIFI, English full name:Wireless Fidelity) or pseudo-base station etc..
The fail-safe software of terminal installation has certain indicating risk function.The principle of the indicating risk function is high in the clouds clothes
Device statistical risk of being engaged in information forms risk information storehouse, and then risk information storehouse is issued to terminal by cloud server, when terminal institute
The risk information of reception is included in risk information storehouse, then terminal can show indicating risk information, such as:The phone is high-frequency electrical
Words etc..
Cloud server statistical risk information is reported typically by terminal or the monitoring of risk monitoring and control platform, is reported with terminal
Exemplified by, when terminal reports the number of same risk information to exceed threshold value, then the risk information is added to risk information storehouse.So
And the same risk information report number not reach threshold value before, then cloud server will not update risk information storehouse, or
Person's cloud server have updated risk information storehouse and terminal does not upgrade in time local because cannot connect to cloud server
Risk information storehouse, cause some risk informations still many users may be caused to be cheated also in without prompting state.Thus may be used
See, the renewal efficiency in the risk information storehouse of terminal is low at present, and terminal room can not share new risk information in time.
The content of the invention
Low in order to solve the renewal efficiency in the risk information storehouse of terminal in the prior art, terminal room can not be shared newly in time
Risk information the problem of, the embodiment of the present application provides a kind of risk information shared method, can be received in first terminal
After new risk information or first terminal have received the risk information storehouse of cloud server renewal, by way of identification code
These new risk informations are shared into second terminal in time, so as to improve the efficiency of the risk information storehouse of terminal renewal.This
Application embodiment additionally provides corresponding terminal and computer-readable recording medium.
The application first aspect provides a kind of risk information shared method, including:
First terminal obtains target risk information, and the target risk information includes the first risk information or the second risk is believed
Breath, first risk information are the not labeled risk information of server beyond the clouds that the first terminal receives, described the
Two risk informations are the risk information that the risk information place of cloud server renewal includes;
The first terminal generates the first identification code according to the target risk information;
The first terminal transmits to second terminal or shares first identification code, so that the second terminal passes through
Scan or receive the risk information storehouse that the second terminal is updated after first identification code, the risk information of the second terminal
The risk information storehouse that storehouse is used for according to renewal after the second terminal receives the target risk information carries out indicating risk.
The application second aspect provides a kind of risk information shared method, and methods described is applied to communicate with first terminal
Second terminal, methods described includes:
The second terminal scanning receives the first identification code that the first terminal is shared, and first identification code is institute
State what first terminal generated according to target risk information, the target risk information includes the first risk information or the second risk is believed
Breath, first risk information are the not labeled risk information of server beyond the clouds that the first terminal receives, described the
Two risk informations are the risk information that the risk information place of cloud server renewal includes;
The second terminal updates the risk information storehouse of the second terminal according to first identification code;
The second terminal carries after the target risk information is received according to the risk information storehouse progress risk of renewal
Show.
The application third aspect provides a kind of terminal, and the terminal is first terminal, and the terminal includes:
Obtain program module, for obtaining target risk information, the target risk information include the first risk information or
Second risk information, first risk information are the risk letter that server is not labeled beyond the clouds that the first terminal receives
Breath, second risk information are the risk information that the risk information place of cloud server renewal includes;
Program module is generated, for the identification of target risk information generation first obtained according to the acquisition program module
Code;
Shared routing module, for the first identification transmitted to second terminal or the shared generation program module generates
Code, so that the second terminal updates the risk information of the second terminal after first identification code by scanning or receiving
Storehouse, the risk information storehouse of the second terminal are used for after the second terminal receives the target risk information according to renewal
Risk information storehouse carry out indicating risk.
The application fourth aspect provides a kind of terminal, and the terminal is the second terminal to be communicated with first terminal, the end
End includes:
Receive program module, the first identification code shared for scanning or receiving the first terminal, first identification
What code generated for the first terminal according to target risk information, the target risk information includes the first risk information or second
Risk information, first risk information are the risk information that server is not labeled beyond the clouds that the first terminal receives,
Second risk information is the risk information that the risk information place of cloud server renewal includes;
More new program module, for first identification code renewal described second received according to the reception program module
The risk information storehouse of terminal;
The reception program module, it is additionally operable to receive the target risk information;
Attention program module, for after receiving the reception program module and receiving the target risk information according to more
New risk information storehouse carries out indicating risk.
The aspect of the application the 5th provides a kind of terminal, and the terminal is first terminal, and the terminal includes:Input/output
(I/O) interface, processor and memory, the shared instruction of risk information described in first aspect is stored with the memory;
The I/O interfaces, which are used to receive, to be used to obtain target risk information;
The processor is used to perform the shared instruction of the risk information stored in memory, performs described in first aspect
The step of method that risk information is shared.
The aspect of the application the 6th provides a kind of terminal, and the terminal is the second terminal to be communicated with first terminal, the end
End includes:Input/output (I/O) interface, processor and memory, the risk described in second aspect is stored with the memory
The instruction of information sharing;
The I/O interfaces are used to scanning or receiving the first identification code that the first terminal is shared;
The processor is used to perform the shared instruction of the risk information stored in memory, performs described in second aspect
The step of method that risk information is shared.
The another aspect of the application provides a kind of computer-readable recording medium, in the computer-readable recording medium
Instruction is stored with, when run on a computer so that computer performs the method described in above-mentioned each side.
The another aspect of the application provides a kind of computer program product for including instruction, when it runs on computers
When so that computer performs the method described in above-mentioned each side.
The embodiment of the present application in first terminal using receiving new risk information or first terminal have received high in the clouds
Behind the risk information storehouse of server update, these new risk informations are shared to second eventually in time by way of identification code
End, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Brief description of the drawings
Fig. 1 is an example schematic diagram of indicating risk;
Fig. 2 is an example schematic diagram in cloud server renewal risk information storehouse;
Fig. 3 is an embodiment schematic diagram of the system of the embodiment of the present application risk information sharing;
Fig. 4 is an example schematic diagram of the embodiment of the present application risk information sharing;
Fig. 5 is another example schematic diagram of the embodiment of the present application risk information sharing;
Fig. 6 is another example schematic diagram of the embodiment of the present application risk information sharing;
Fig. 7 is an embodiment schematic diagram of the method for the embodiment of the present application risk information sharing;
Fig. 8 is another embodiment schematic diagram of the method for the embodiment of the present application risk information sharing;
Fig. 9 is an embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 10 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 11 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 12 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 13 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 14 is another embodiment schematic diagram of terminal in the embodiment of the present application.
Embodiment
Below in conjunction with the accompanying drawings, embodiments herein is described, it is clear that described embodiment is only the application
The embodiment of a part, rather than whole embodiments.Those of ordinary skill in the art understand, are answered with the development of technology with new
With the appearance of scene, the technical scheme that the embodiment of the present application provides is equally applicable for similar technical problem.
The embodiment of the present application provides a kind of risk information shared method, and new risk letter can be received in first terminal
After breath or first terminal have received the risk information storehouse of cloud server renewal, in time by these by way of identification code
New risk information shares to second terminal, so as to improve the efficiency of the risk information storehouse of terminal renewal.The embodiment of the present application
Additionally provide corresponding terminal and computer-readable recording medium.It is described in detail individually below.
Terminal in the embodiment of the present application can be the mobile terminals such as mobile phone, phone wrist-watch and tablet personal computer, or
Personal computer (English full name:Personal computer, english abbreviation:The fixed terminal such as PC).
Risk information in network generally includes fraudulent call, fraud text message, mobile phone viruses, risk WIFI, or pseudo-base station
Deng.
In order to tackle the risk information in network, in the scheme that each security provider provides, generally by cloud server
Risk information is collected, then risk information is verified, forms risk information storehouse, the risk information included in risk information storehouse
All it is the larger information of confirmed risk, such as:Be reported number more than preset threshold value information be identified as risk compared with
Big information, it is added to risk information storehouse.Terminal can download fail-safe software client, and such terminal can is from cloud service
Device downloads risk information storehouse, in the risk information in receiving risk information storehouse, will show indicating risk.
As shown in figure 1, when terminal has incoming call incoming call, if the telephone number of the incoming call has in the risk information storehouse of terminal
Storage, then can show for example on the interface of the terminal:The indicating risk information of printed words such as " fraudulent call, answering with caution ".When
So, the content of indicating risk information is not limited to illustrate at this, and certainly, indicating risk mode is also not necessarily limited to interface display, and this is a kind of,
It can also be voice message, or other prompting modes.
Cloud server, which collects the process of risk information and the process in risk information storehouse is issued to terminal, can refer to Fig. 2
Understood, as shown in Fig. 2 by risk monitoring and control platform or the terminal monitoring risk information of fail-safe software can be installed, and will
The detailed data of the risk information is reported to server, and risk monitoring and control platform herein is the device of monitoring risk information, is installed
The terminal for having fail-safe software can mark risk information.
What cloud server reception risk monitoring and control platform was sent is tentatively judged that risky risk information or terminal are sent
Tentatively judged risky risk information after, it will to this tentatively judged risky risk information verified and
Synthetic determination, however, it is determined that this is tentatively judged that risky risk information has risk very much in maximum probability, then is believed the risk
Breath adds the risk information storehouse in high in the clouds, and is sent by way of high in the clouds issues to the terminal for being connected to cloud server, terminal
Local risk information storehouse will be updated, and the risk information to receiving is prompted.It should be understood that it is to lead to information that high in the clouds, which issues,
The process that cloud server pushes to terminal is crossed, after terminal receives the risk information, corresponding renewal operation can be performed.
It should be understood that the risk information in risk information storehouse, can send risk information request in terminal to cloud server
Afterwards, issued after being confirmed by server, to end after risk information can also being added to risk information storehouse from cloud server
End equipment initiates renewal, and this is not limited here.It should be noted that risk information storehouse includes different classes of risk sample
Notebook data, it can specifically include pseudo-base station list, fraudulent call number storehouse, fraud text message content library, risk WiFi lists, virus
Sample Storehouse or malice URL library etc., this is not limited here.
Fig. 3 is an embodiment schematic diagram of the system of the embodiment of the present application risk information sharing.
As shown in figure 3, the system that the risk information that the embodiment of the present application provides is shared includes first terminal 10A, second eventually
End 10B, network 20 and cloud server 30, first terminal 10A and second terminal 10B can pass through network 20 and cloud server 30
Communicate to connect, in the scene shown in Fig. 3, second terminal 10B is in the state for being not attached to cloud server 30, can not receive cloud
The risk information storehouse for the renewal that end server 30 issues.
First terminal 10A receives a risk information, such as:First terminal receives a phone 17055667788, such as
In Fig. 4 shown in (a), the phone refers to incoming information, such as telephone number, and the phone is not included in the current risk of first terminal
In information bank, the preliminary judgement through the user using first terminal in the Phone process is answered, it is believed that the phone is probably swindleness
Phone is deceived, then first terminal 10A can report this risk information, but cloud server 30 through user's triggering to cloud server
Need just to can determine whether that the phone is fraudulent call after the number for counting the phone reaches certain threshold value, just can be by the fraudulent call
Add the risk information storehouse in high in the clouds.So may result in end side can not timely update local risk information storehouse, it is also possible to
It can be harassed by the fraudulent call.
In the embodiment of the present application, first terminal 10A generates the first identification code according to the fraudulent call, and first identification code can
To be the identification code of Quick Response Code or other forms.So that the first identification code is Quick Response Code as an example, the generation side of the Quick Response Code
Formula can be when receiving the fraudulent call that does not make marks, can under the fraudulent call by Fig. 4 in interface shown in (b) open
The dynamic setting interface as shown in (c) in Fig. 4, selection " generation risk information Quick Response Code " button, then can give birth under the setting interface
Quick Response Code into Fig. 4 shown in (d), the telephone number that fraudulent call is labeled as by first terminal 10A is included in the Quick Response Code, or
The link information of person's telephone number.It is also possible to that risk information storehouse version information, out-of-service time letter can be shown on the Quick Response Code
At least one of in breath and remark information.
The version information in risk information storehouse can be risk information storehouse version number, and the risk information storehouse version number can be used for
The version for the risk information that the first identification code includes is identified, the version of risk information can be distinguished.
Out-of-service time information, the out-of-service time be the first identification code from the duration for being generated to failure, if exceed the failure
Between, Quick Response Code will be regenerated, the risk information that the Quick Response Code regenerated includes and the Quick Response Code of upper one failure include
Risk information it is identical, if for example, the out-of-service time be shown as 15 minutes after fail, first terminal generates newly over the course of 15 mins
Quick Response Code, and new Quick Response Code is identical with the risk information that old Quick Response Code includes, but the geometric figure being distributed is different.
Remark information can be Quick Response Code remark information, for illustrating the Meaning of Information of Quick Response Code.Such as:Scanning can be total to
Enjoy the risk information storehouse of the machine, including fraudulent call, fraud text message, risk WiFi and bogusware etc..
In Fig. 4 shown in (e), first terminal can be for example, by:The social mode such as wechat, microblogging is by first identification code
Other users are pushed to, such as:First identification code is pushed to second terminal 10B, second terminal can also directly be swept
The Quick Response Code on first terminal is retouched, need not be pushed in this case, it is necessary to illustrate, second terminal 10B, which is not limited, refers to one
Individual terminal, second terminal 10B can have multiple.
After second terminal 10B receives first identification code, first identification code can be scanned, obtains first identification code
Included in risk information or risk information link, second terminal 10B risk information storehouse is then updated, so, when the
After two terminal 10B receive the fraudulent call, indicating risk information will be shown on second terminal 10B.The process can join
The change procedure for readding a few width figures in Fig. 5 is understood that in Fig. 5 shown in (a), second terminal 10B receives Quick Response Code, Yong Huke
Start the setting interface in Fig. 5 shown in (b) in a manner of by the long-press Quick Response Code, selection set in interface " Quick Response Code is known
Not " button, the two-dimensional code scanning interface into Fig. 5 shown in (c), the interface scanning Quick Response Code shown in (d), is identified in Figure 5
Go out the fraudulent call encapsulated in Quick Response Code, by fraudulent call renewal into the risk information storehouse of second terminal, so, when second
Terminal 10B receives the fraudulent call again, will show indicating risk information shown in (e) in Fig. 5, such as " fraudulent call, sincerely
It is careful to answer ".
In addition, first terminal 10A mark the phone be fraudulent call after, after the fraudulent call is received again, just
Indicating risk information can be shown on first terminal 10A.
In another situation because cloud server 30 is collecting risk information always, and can timing or it is quantitative more
The risk information storehouse in new high in the clouds, and terminal is handed down in the risk information storehouse of renewal, regularly refer to periodically update, quantitatively refer to
Updated when new risk information reaches a certain amount of.When second terminal 10B fails to connect to cloud server 30, then second terminal
The risk information storehouse that 10B can not upgrade in time local, so, it is also possible to cause second terminal 10B to receive the risk in high in the clouds
The risk information that is newly added in information bank and indicating risk can not be carried out according to the risk information storehouse of renewal, such as:When high in the clouds takes
Fraudulent call 17015662033 is newly with the addition of in the risk information storehouse that business device 30 updates.If second terminal 10B is not timely more
Newly, then, then can not foundation for the fraudulent call on second terminal 10B when second terminal 10B receives phone 17015662033
The risk information storehouse of renewal carries out indicating risk.
In the embodiment of the present application, for this kind of situation, what first terminal 10A can also newly issue cloud server 30
Risk information storehouse generates the first identification code, and first identification code is sent into second terminal 10B, second terminal 10B scan this
One identification code, the risk information storehouse of the new renewal is therefrom obtained, and then update local risk information storehouse, it is electric when receiving swindle
After words 17015662033, it is possible to which timely the risk information storehouse according to renewal carries out indicating risk.
Although the information that cloud server reports to terminal or Risk Monitoring platform can do comprehensive descision, wind is judged as
The larger information in danger can just be added into risk information storehouse, but have the possibility of erroneous judgement unavoidably, the risk having in risk information storehouse
Information may be misjudged, therefore, in the embodiment of the present application, is stabbed for each edition risk information storehouse all setup times, cloud service
Device all generates corresponding second identification code for each edition risk information storehouse, and second identification code can also be Quick Response Code, may be used also
To be the identification code of other forms, so when confirming misjudged risk information to be present in current risk information storehouse, so that it may
To determine the risk information storehouse being rolled back to according to timestamp, the Quick Response Code in the risk information storehouse is scanned, it is possible to roll back to mistake
Risk information storehouse before sentencing.
It can also be understood above with respect to the shared process of risk information refering to Fig. 6, embodiment bag as shown in Figure 6
Include:
S101, cloud server collect Risk Monitoring platform and are provided with the risk information that the terminal of fail-safe software reports.
The risk information can include station list, fraudulent call number storehouse, fraud text message content library, risk WiFi row
Table, Virus Sample storehouse or malice URL library etc., this is not limited here.
S102, cloud server carry out risk checking and comprehensive descision to the risk information of collection.
Risk is verified and the process of comprehensive descision can count the number that same risk information occurs, or others are tested
Card mode.
S103, risk information added into risk information storehouse, to update risk information storehouse.
When confirming that the information has larger risk by checking in the information being collected into, then can confirm that the information is wind
For dangerous information, it is necessary to add risk information storehouse, warning terminal user wants the message risk information.
S104, risk information storehouse all setup time stamps for updating every time, so as to generate the risk letter with timestamp
List is ceased, and the risk information storehouse for updating every time generates corresponding Quick Response Code.
Behind S105, cloud server renewal risk information storehouse, the risk information storehouse of renewal can be issued to terminal.
In Fig. 6, terminal A normally receives the risk information storehouse that cloud server issues, and terminal C is not attached to cloud service
Device, then terminal A Quick Response Code is generated according to the risk information storehouse of the renewal, the Quick Response Code is shared into terminal C, terminal C is according to this
Risk information storehouse local Quick Response Code more new terminal C.
S106, terminal B receive risk information Q, and risk information Q can be fraudulent call.
Risk information Q is also not flagged as risk information in server beyond the clouds.Terminal B generations are believed comprising the risk
Q Quick Response Code is ceased, the Quick Response Code can be shared with terminal A, wind local the terminal A sweep Quick Response Code more new terminal A by terminal B
Dangerous information bank, so as to which when receiving risk information Q, terminal A shows indicating risk information.The process can refer to Fig. 4 and
Fig. 5 example is understood that it is no longer repeated at this place.
Fig. 7 is an embodiment schematic diagram of the method for the embodiment of the present application risk information sharing.
As shown in fig. 7, an embodiment of the method that the risk information that the embodiment of the present application provides is shared includes:
201st, first terminal obtains target risk information.
The target risk information includes the first risk information or the second risk information, and first risk information is described the
The not labeled risk information of server beyond the clouds that one terminal receives, second risk information be the cloud server more
The risk information that new risk information place includes.
202nd, first terminal generates the first identification code according to target risk information.
The interior perhaps link information of the target risk information is included in first identification code, and it is following be illustrated in it is described
At least one of in information in first identification code, it is the version information in risk information storehouse corresponding to first identification code, described
The remark information of the out-of-service time information of first identification code and first identification code.
203rd, first terminal transmits or shared the first identification code to second terminal.
204th, second terminal directly scans the first identification code, or after receiving first identification code, scans this and first knows
Other code.
205th, second terminal updates the risk information storehouse of second terminal according to first identification code.
206th, second terminal is receiving the target risk information.
207th, second terminal carries out indicating risk according to the risk information storehouse of renewal.
The embodiment of the present application in first terminal using receiving new risk information or first terminal have received high in the clouds
Behind the risk information storehouse of server update, these new risk informations are shared to second eventually in time by way of identification code
End, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Fig. 8 is another embodiment schematic diagram of the method for the embodiment of the present application risk information sharing.
As shown in figure 8, another embodiment for the method that the risk information that the embodiment of the present application provides is shared includes:
301st, first terminal obtains the risk information storehouse of renewal from cloud server.
302nd, first terminal generates the first identification code according to the risk information storehouse of the renewal.
303rd, first terminal transmits or shared the first identification code to second terminal.
304th, the local risk information storehouse of first terminal renewal.
305th, second terminal directly scans the first identification code on first terminal interface, or second terminal receive this
After one identification code, first identification code is scanned.
306th, second terminal updates the risk information storehouse of second terminal according to first identification code.
307th, second terminal is receiving target risk information.
The target risk information is risk information newly-increased in the risk information storehouse of the renewal.
308th, second terminal carries out indicating risk according to the risk information storehouse of renewal.
309th, first terminal confirms the risk information for including erroneous judgement in the risk information storehouse of renewal.
The risk information of erroneous judgement refers to risk is not present, and should not add the information in risk information storehouse.
310th, first terminal obtains second identification code in the risk information storehouse before erroneous judgement from cloud server.
311st, before the risk information storehouse of local is rolled back to erroneous judgement by first terminal according to second identification code.
It should be noted that step 303 does not have sequencing, step 305-308 and step 309-311 with step 304
There is no a sequencing, first terminal and second terminal can each perform oneself local operation, moreover, on rolling back action,
It is not limited to occur on first terminal, when confirming to have the risk information of erroneous judgement in second terminal, can also performs rolling back action.
Above is the introduction of the method to the embodiment of the present application risk information sharing, introduces the application below in conjunction with the accompanying drawings
Terminal in embodiment.
As shown in figure 9, the terminal 40 that the embodiment of the present application provides, when being first terminal, the terminal 40 includes:
Program module 401 is obtained, for obtaining target risk information, the target risk information includes the first risk information
Or second risk information, first risk information are the not labeled risk of server beyond the clouds that the first terminal receives
Information, second risk information are the risk information that the risk information place of cloud server renewal includes;
Program module 402 is generated, for the target risk information generation first obtained according to the acquisition program module 401
Identification code;
Shared routing module 403, first generated for the generation program module 402 to be transmitted or shared to second terminal
Identification code, so that the second terminal updates the risk of the second terminal after first identification code by scanning or receiving
Information bank, the risk information storehouse of the second terminal are used for the foundation after the second terminal receives the target risk information
The risk information storehouse of renewal carries out indicating risk.
The embodiment of the present application in first terminal using receiving new risk information or first terminal have received high in the clouds
Behind the risk information storehouse of server update, these new risk informations are shared to second eventually in time by way of identification code
End, so as to improve the efficiency of the risk information storehouse of terminal renewal.
Alternatively, refering to Figure 10, the terminal 40 that the embodiment of the present application provides also includes scanning imaging system module 404,
The acquisition program module 401, it is additionally operable to the risk letter comprising erroneous judgement in current risk information storehouse is got
During breath, then the second identification code is obtained from the cloud server, second identification code is corresponding with the risk information storehouse before erroneous judgement;
The scanning imaging system module 404, the second identification code obtained for scanning the acquisition program module 401, from institute
State the risk information storehouse that current risk information storehouse is rolled back to before the erroneous judgement.
Alternatively, refering to Figure 11, the terminal 40 that the embodiment of the present application provides also includes more new program module 405 and prompting journey
Sequence module 406,
More new program module 405, for described in the target risk information updating that is obtained according to the acquisition program module the
The risk information storehouse of one terminal;
The acquisition program module 401, for receiving the target risk information again;
Attention program module 406, for the target risk information that receives again of reception program module according to more
New risk information storehouse carries out indicating risk.
Wherein, the interior perhaps link information of the target risk information, and following exhibitions are included in first identification code
Show at least one in the information in first identification code, the version letter in risk information storehouse corresponding to first identification code
The remark information of breath, the out-of-service time information of first identification code and first identification code.
Refering to Figure 12, when the terminal 50 that the embodiment of the present application provides is second terminal, an embodiment of terminal 50 includes:
Program module 501 is received, the first identification code shared for scanning or receiving the first terminal, described first knows
Other code is that the first terminal generate according to target risk information, and the target risk information includes the first risk information or the
Two risk informations, first risk information are the risk letter that server is not labeled beyond the clouds that the first terminal receives
Breath, second risk information are the risk information that the risk information place of cloud server renewal includes;
More new program module 502, first identification code for being received according to the reception program module 501 update institute
State the risk information storehouse of second terminal;
The reception program module 501, is additionally operable to receive the target risk information;
Attention program module 503, for after receiving the reception program module 501 and receiving the target risk information
Risk information storehouse according to the renewal of more new program module 502 carries out indicating risk.
Alternatively, refering in another embodiment of Figure 13, the embodiment of the present application terminal 50 provided, terminal 50 also includes:
Program module 504 and scanning imaging system module 505 are obtained,
The acquisition program module 504, for getting the current risk information storehouse of more new program module 502 renewal
In comprising erroneous judgement risk information when, then from the cloud server obtain the second identification code, second identification code with erroneous judgement
Preceding risk information storehouse is corresponding;
The scanning imaging system module 505, the second identification code obtained for scanning the acquisition program module 504, from institute
State the risk information storehouse that current risk information storehouse is rolled back to before the erroneous judgement.
The embodiment of the present application provide terminal 40 can refer to previous embodiment in first terminal be understood, terminal 50
The second terminal that can be referred in previous embodiment is understood.
Below by taking mobile terminal as an example, the terminal for introducing the embodiment of the present invention realizes the shared process of risk information.
As shown in figure 14, for convenience of description, the part related to the embodiment of the present invention, particular technique details be illustrate only
Do not disclose, refer to present invention method part.
Figure 14 is illustrated that the block diagram with the part-structure of mobile terminal 800 provided in an embodiment of the present invention.With reference to figure 14,
Mobile terminal includes:Radio frequency (Radio Frequency, RF) circuit 810, memory 820, input block 830, display unit
840th, the part such as sensor 850, voicefrequency circuit 860, WiFi module 870, processor 880 and power supply 890.Art technology
Personnel are appreciated that the mobile terminal structure shown in Figure 14 does not form the restriction to mobile terminal, can include than diagram
More or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile terminal is specifically introduced with reference to Figure 14:
RF circuits 810 can be used for receive and send messages or communication process in, the reception and transmission of signal, such as:Receive target wind
Dangerous information.Especially, after the downlink information of base station is received, handled to processor 880;In addition, sent out up data are designed
Give base station.Generally, RF circuits 810 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low noise
Amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also pass through radio communication and net
Network and other equipment communication.Above-mentioned radio communication can use any communication standard or agreement, and it is mobile to include but is not limited to the whole world
Communication system (Global System of Mobile communication, GSM), general packet radio service (General
Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), broadband
CDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term
Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storage software program and module, and processor 880 is stored in memory 820 by operation
Software program and module, so as to perform the various function application of mobile terminal and data processing.Memory 820 can be main
Including storing program area and storage data field, wherein, storing program area can storage program area, needed at least one function should
With program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use according to mobile terminal
Data (such as voice data, phone directory etc.) created etc..Stored in addition, memory 820 can include high random access
Device, nonvolatile memory can also be included, a for example, at least disk memory, flush memory device or other volatibility are consolidated
State memory device.
Input block 830 can be used for the operational order for receiving user, such as:The instruction of the first identification code is generated, and is produced
Set with the user of mobile terminal 800 and key signals that function control is relevant input.Specifically, input block 830 may include
Contact panel 831 and other input equipments 832.Contact panel 831, also referred to as touch-screen, user is collected thereon or attached
Near touch operation (for example user on contact panel 831 or is being touched using any suitable objects or annex such as finger, stylus
Control the operation near panel 831), and corresponding connection mobile terminal is driven according to formula set in advance.Optionally, touch surface
Plate 831 may include two parts of touch detection mobile terminal and touch controller.Wherein, touch detection mobile terminal detection user
Touch orientation, and detect the signal that touch operation is brought, transmit a signal to touch controller;Touch controller is examined from touch
Survey on mobile terminal and receive touch information, and be converted into contact coordinate, then give processor 880, and can reception processing device
880 orders sent simultaneously are performed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Type realizes contact panel 831.Except contact panel 831, input block 830 can also include other input equipments 832.Specifically
Ground, other input equipments 832 can include but is not limited to physical keyboard, function key (such as volume control button, switch key
Deng), trace ball, mouse, the one or more in action bars etc..
Display unit 840 can be used for the first identification code interface of display or other setting interfaces and indicating risk interface
Deng.Display unit 840 may include indicator lamp 841, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) refers to configure
Show lamp 841.Further, contact panel 831 can cover indicator lamp 841, when contact panel 831 is detected on or near it
After touch operation, processor 880 is sent to determine the type of touch event, is followed by subsequent processing class of the device 880 according to touch event
Type provides corresponding visual output on indicator lamp 841.Although in fig. 14, contact panel 831 and indicator lamp 841 are as two
Individual independent part realizes the input of mobile terminal and input function, but in some embodiments it is possible to by contact panel
831 integrate with indicator lamp 841 and realize input and the output function of mobile terminal.
Mobile terminal 800 may also include at least one sensor 850.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the COBBAIF between user and mobile terminal.Sound
Electric signal after the voice data received conversion can be transferred to loudspeaker 861, is converted to by loudspeaker 861 by frequency circuit 860
Voice signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is received by voicefrequency circuit 860
After be converted to voice data, it is such as another to be sent to through RF circuits 810 then after voice data output processor 880 is handled
Mobile terminal, or voice data is exported to memory 820 further to handle.
WiFi module 870 can be used for communicating.
Processor 880 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 820, and call and be stored in storage
Data in device 820, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Can
Choosing, processor 880 may include one or more processing units;Preferably, processor 880 can integrate application processor and modulation
Demodulation processor, wherein, application processor mainly handles operating system, user interface and application program etc., modulation /demodulation processing
Device mainly handles radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile terminal 800 also includes the power supply 890 (such as battery) to all parts power supply, it is preferred that power supply can lead to
Cross power-supply management system and processor 880 be logically contiguous, so as to by power-supply management system realize management charging, electric discharge and
The functions such as power managed.
Although being not shown, mobile terminal 800 can also include camera, bluetooth module etc., will not be repeated here.
In embodiments of the present invention, the mobile terminal is when risk information is shared, if the mobile terminal is first terminal,
Included processor 880 also has following functions:
Target risk information is obtained, the target risk information includes the first risk information or the second risk information, described
First risk information is the risk information that server is not labeled beyond the clouds that the first terminal receives, the second risk letter
Cease the risk information included for the risk information place of cloud server renewal;
First identification code is generated according to the target risk information;
Transmitted to second terminal or share first identification code, so that the second terminal is by scanning or receiving institute
The risk information storehouse that the second terminal is updated after the first identification code is stated, the risk information storehouse of the second terminal is used for described
Second terminal receives the risk information storehouse progress indicating risk of foundation renewal after the target risk information.
Alternatively, methods described also includes:
When including the risk information of erroneous judgement in getting current risk information storehouse, then obtained from the cloud server
Second identification code, second identification code are corresponding with the risk information storehouse before erroneous judgement;
Second identification code is scanned, the risk information rolled back to from the current risk information storehouse before the erroneous judgement
Storehouse.
Alternatively, methods described also includes:
According to the risk information storehouse of first terminal described in the target risk information updating;
Risk information storehouse when receiving the target risk information again according to renewal carries out indicating risk.
The interior perhaps link information of the target risk information is included in first identification code, and following is illustrated in institute
State at least one in the information in the first identification code, the version information in risk information storehouse, institute corresponding to first identification code
State the out-of-service time information of the first identification code and the remark information of first identification code.
In embodiments of the present invention, the mobile terminal is when risk information is shared, if the mobile terminal is second terminal,
Included processor 880 also has following functions:
The first identification code that the first terminal is shared is scanned or receives, first identification code is the first terminal root
According to the generation of target risk information, the target risk information includes the first risk information or the second risk information, and described first
Risk information is the risk information that server is not labeled beyond the clouds that the first terminal receives, and second risk information is
The risk information that the risk information place of the cloud server renewal includes;
The risk information storehouse of the second terminal is updated according to first identification code;
Risk information storehouse according to renewal after the target risk information is received carries out indicating risk.
Alternatively, methods described also includes:
When including the risk information of erroneous judgement in getting current risk information storehouse, then obtained from the cloud server
Second identification code, second identification code are corresponding with the risk information storehouse before erroneous judgement;
Second identification code is scanned, the risk information rolled back to from the current risk information storehouse before the erroneous judgement
Storehouse.
Alternatively, the risk information storehouse of the second terminal is updated according to first identification code, including:
Scan first identification code, obtain the target risk information that is included in first identification code it is interior perhaps
Link information;
According to perhaps link information in the target risk information, the risk information storehouse of the second terminal is updated.
Mobile phone provided in an embodiment of the present invention can be retouched refering to Fig. 1 to Fig. 8 parts first terminal is related to second terminal
State and understood, it is no longer repeated at this place.
Input/output (I/O) interface can include RF circuits 810, input block 830 and display unit 840.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real
It is existing.When implemented in software, can realize in the form of a computer program product whole or in part.
The computer program product includes one or more computer instructions.Load and perform on computers the meter
During calculation machine programmed instruction, produce whole or in part according to the flow or function described in the embodiment of the present application.The computer can
To be all-purpose computer, special-purpose computer, computer network or other programmable devices.The computer instruction can be deposited
Store up in a computer-readable storage medium, or from a computer-readable recording medium to another computer-readable recording medium
Transmission, for example, the computer instruction can pass through wired (example from a web-site, computer, server or data center
Such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave) mode to another website
Website, computer, server or data center are transmitted.The computer-readable recording medium can be that computer can be deposited
Any usable medium of storage is either set comprising data storages such as the integrated server of one or more usable mediums, data centers
It is standby.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or partly lead
Body medium (such as solid state hard disc Solid State Disk (SSD)) etc..
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:ROM, RAM, disk or CD etc..
Method, terminal and the system that the risk information provided above the embodiment of the present application is shared have carried out detailed Jie
Continue, specific case used herein is set forth to the principle and embodiment of the application, and the explanation of above example is only
It is to be used to help understand the present processes and its core concept;Meanwhile for those of ordinary skill in the art, according to this Shen
Thought please, there will be changes in specific embodiments and applications, in summary, this specification content should not manage
Solve as the limitation to the application.
Claims (15)
1. a kind of shared method of risk information, it is characterised in that including:
First terminal obtains target risk information, and the target risk information includes the first risk information or the second risk information,
The risk information that server is not labeled beyond the clouds that first risk information receives for the first terminal, second wind
Dangerous information is the risk information that the risk information place of cloud server renewal includes;
The first terminal generates the first identification code according to the target risk information;
The first terminal transmits to second terminal or shares first identification code, so that the second terminal passes through scanning
Or the risk information storehouse of the second terminal is updated after reception first identification code, the risk information storehouse of the second terminal is used
Risk information storehouse according to renewal after the target risk information is received in the second terminal carries out indicating risk.
2. according to the method for claim 1, it is characterised in that methods described also includes:
The first terminal is when including the risk information of erroneous judgement in getting current risk information storehouse, from the cloud service
Device obtains the second identification code, and second identification code is corresponding with the risk information storehouse before erroneous judgement;
The first terminal scans second identification code, the wind rolled back to from the current risk information storehouse before the erroneous judgement
Dangerous information bank.
3. method according to claim 1 or 2, it is characterised in that methods described also includes:
The risk information storehouse of first terminal first terminal according to the target risk information updating;
Risk information storehouse when the first terminal receives the target risk information again according to renewal carries out indicating risk.
4. method according to claim 1 or 2, it is characterised in that the target risk is included in first identification code
At least one of in the interior perhaps link information of information, and following information being illustrated in first identification code, described the
The version information in risk information storehouse, the out-of-service time information of first identification code and first identification corresponding to one identification code
The remark information of code.
5. a kind of shared method of risk information, it is characterised in that methods described is whole applied to second to be communicated with first terminal
End, methods described include:
Second terminal scanning receives the first identification code that the first terminal is shared, and first identification code is described the
One terminal generates according to target risk information, and the target risk information includes the first risk information or the second risk information,
The risk information that server is not labeled beyond the clouds that first risk information receives for the first terminal, second wind
Dangerous information is the risk information that the risk information place of cloud server renewal includes;
The second terminal updates the risk information storehouse of the second terminal according to first identification code;
The second terminal carries out indicating risk after the target risk information is received according to the risk information storehouse of renewal.
6. according to the method for claim 5, it is characterised in that methods described also includes:
The second terminal then takes when including the risk information of erroneous judgement in getting current risk information storehouse from the high in the clouds
Business device obtains the second identification code, and second identification code is corresponding with the risk information storehouse before erroneous judgement;
The first terminal scans second identification code, the wind rolled back to from the current risk information storehouse before the erroneous judgement
Dangerous information bank.
7. the method according to claim 5 or 6, it is characterised in that the second terminal according to first identification code more
The risk information storehouse of the new second terminal, including:
The second terminal scans first identification code, obtains the target risk information included in first identification code
Interior perhaps link information;
The second terminal is according to perhaps link information, the risk for updating the second terminal are believed in the target risk information
Cease storehouse.
8. a kind of terminal, it is characterised in that the terminal is first terminal, and the terminal includes:
Program module is obtained, for obtaining target risk information, the target risk information includes the first risk information or second
Risk information, first risk information are the risk information that server is not labeled beyond the clouds that the first terminal receives,
Second risk information is the risk information that the risk information place of cloud server renewal includes;
Program module is generated, the target risk information for being obtained according to the acquisition program module generates the first identification code;
Shared routing module, for the first identification code of the generation program module generation to be transmitted or shared to second terminal, with
The risk information storehouse of the second terminal is updated after first identification code by scanning or receiving beneficial to the second terminal, institute
The risk information storehouse for stating second terminal is used for after the second terminal receives the target risk information according to the wind updated
Dangerous information bank carries out indicating risk.
9. terminal according to claim 8, it is characterised in that the terminal also includes:Scanning imaging system module,
The acquisition program module, it is additionally operable to when including the risk information of erroneous judgement in getting current risk information storehouse, then
The second identification code is obtained from the cloud server, second identification code is corresponding with the risk information storehouse before erroneous judgement;
The scanning imaging system module, the second identification code obtained for scanning the acquisition program module, from the current wind
The risk information storehouse that dangerous information bank is rolled back to before the erroneous judgement.
10. terminal according to claim 8 or claim 9, it is characterised in that the terminal also includes:More new program module and carry
Show program module,
More new program module, for first terminal described in the target risk information updating according to the acquisition program module acquisition
Risk information storehouse;
The acquisition program module, for receiving the target risk information again;
Attention program module, for the risk of the target risk information foundation renewal received again to the reception program module
Information bank carries out indicating risk.
11. a kind of terminal, it is characterised in that the terminal is the second terminal to be communicated with first terminal, and the terminal includes:
Program module, the first identification code shared for scanning or receiving the first terminal are received, first identification code is
The first terminal generates according to target risk information, and the target risk information includes the first risk information or the second risk
Information, first risk information is the risk information that server is not labeled beyond the clouds that the first terminal receives, described
Second risk information is the risk information that the risk information place of cloud server renewal includes;
More new program module, first identification code for being received according to the reception program module update the second terminal
Risk information storehouse;
The reception program module, it is additionally operable to receive the target risk information;
Attention program module, for the foundation renewal journey after receiving the reception program module and receiving the target risk information
The risk information storehouse that sequence module 502 updates carries out indicating risk.
12. terminal according to claim 11, it is characterised in that the terminal also includes:Obtain program module and scanning
Program module,
The acquisition program module, for get more new program module renewal current risk information storehouse in comprising erroneous judgement
Risk information, then obtain the second identification code, second identification code and the risk information storehouse before erroneous judgement from the cloud server
It is corresponding;
The scanning imaging system module, the second identification code obtained for scanning the acquisition program module, from the current wind
The risk information storehouse that dangerous information bank is rolled back to before the erroneous judgement.
13. a kind of terminal, it is characterised in that the terminal is first terminal, and the terminal includes:Input/output (I/O) connects
Mouthful, processor and memory, be stored with the shared instruction of any described risk informations of claim 1-4 in the memory;
The I/O interfaces, which are used to receive, to be used to obtain target risk information;
The processor is used to perform the shared instruction of the risk information stored in memory, performs as claim 1-4 is any
The step of method that described risk information is shared.
14. a kind of terminal, it is characterised in that the terminal is the second terminal to be communicated with first terminal, and the terminal includes:It is defeated
Enter/export (I/O) interface, processor and memory, any described risk letters of claim 5-7 are stored with the memory
The shared instruction of breath;
The I/O interfaces are used to scanning or receiving the first identification code that the first terminal is shared;
The processor is used to perform the shared instruction of the risk information stored in memory, performs as claim 5-7 is any
The step of method that described risk information is shared.
15. a kind of computer-readable recording medium, it is characterised in that risky letter is stored in the computer-readable recording medium
The shared instruction of breath, when run on a computer so that computer performs any described sides of the claims 1-7
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710643374.9A CN107360179B (en) | 2017-07-31 | 2017-07-31 | Risk information sharing method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710643374.9A CN107360179B (en) | 2017-07-31 | 2017-07-31 | Risk information sharing method, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107360179A true CN107360179A (en) | 2017-11-17 |
CN107360179B CN107360179B (en) | 2022-01-25 |
Family
ID=60286732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710643374.9A Active CN107360179B (en) | 2017-07-31 | 2017-07-31 | Risk information sharing method, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107360179B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108932582A (en) * | 2018-06-13 | 2018-12-04 | 平安科技(深圳)有限公司 | Risk information determines method, apparatus, computer equipment and storage medium |
CN110276193A (en) * | 2019-05-17 | 2019-09-24 | 阿里巴巴集团控股有限公司 | Feature of risk output method, using progress control method, system and device |
CN110728516A (en) * | 2019-10-09 | 2020-01-24 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for updating wind control model |
CN111444992A (en) * | 2020-03-27 | 2020-07-24 | 腾讯云计算(北京)有限责任公司 | User information checking method and system based on information code |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102073820A (en) * | 2011-01-25 | 2011-05-25 | 潘燕辉 | User sharing-based cloud scanning method |
CN102945351A (en) * | 2012-11-05 | 2013-02-27 | 中国科学院软件研究所 | Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment |
CN104125222A (en) * | 2014-07-18 | 2014-10-29 | 国网上海市电力公司 | Information intranet security hole monitoring processing method |
CN105227439A (en) * | 2015-09-25 | 2016-01-06 | 宇龙计算机通信科技(深圳)有限公司 | A kind of sharing method of associated person information and user terminal |
CN105872178A (en) * | 2016-06-06 | 2016-08-17 | 北京珠穆朗玛移动通信有限公司 | Contact person information sharing method and mobile terminal |
US20160364805A1 (en) * | 2008-09-11 | 2016-12-15 | Asurion, Llc | Account Based Handset Protection Coverage |
US20160381034A1 (en) * | 2015-06-29 | 2016-12-29 | International Business Machines Corporation | Managing data privacy and information safety |
CN106357919A (en) * | 2016-09-30 | 2017-01-25 | 珠海市魅族科技有限公司 | Crank call interception method and device thereof |
CN106357912A (en) * | 2016-09-28 | 2017-01-25 | 北京奇虎科技有限公司 | Incoming/outgoing call processing method and incoming/outgoing call processing device |
-
2017
- 2017-07-31 CN CN201710643374.9A patent/CN107360179B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160364805A1 (en) * | 2008-09-11 | 2016-12-15 | Asurion, Llc | Account Based Handset Protection Coverage |
CN102073820A (en) * | 2011-01-25 | 2011-05-25 | 潘燕辉 | User sharing-based cloud scanning method |
CN102945351A (en) * | 2012-11-05 | 2013-02-27 | 中国科学院软件研究所 | Security vulnerability fixing method based on two-dimensional code for mobile intelligent terminal in cloud environment |
CN104125222A (en) * | 2014-07-18 | 2014-10-29 | 国网上海市电力公司 | Information intranet security hole monitoring processing method |
US20160381034A1 (en) * | 2015-06-29 | 2016-12-29 | International Business Machines Corporation | Managing data privacy and information safety |
CN105227439A (en) * | 2015-09-25 | 2016-01-06 | 宇龙计算机通信科技(深圳)有限公司 | A kind of sharing method of associated person information and user terminal |
CN105872178A (en) * | 2016-06-06 | 2016-08-17 | 北京珠穆朗玛移动通信有限公司 | Contact person information sharing method and mobile terminal |
CN106357912A (en) * | 2016-09-28 | 2017-01-25 | 北京奇虎科技有限公司 | Incoming/outgoing call processing method and incoming/outgoing call processing device |
CN106357919A (en) * | 2016-09-30 | 2017-01-25 | 珠海市魅族科技有限公司 | Crank call interception method and device thereof |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108932582A (en) * | 2018-06-13 | 2018-12-04 | 平安科技(深圳)有限公司 | Risk information determines method, apparatus, computer equipment and storage medium |
CN110276193A (en) * | 2019-05-17 | 2019-09-24 | 阿里巴巴集团控股有限公司 | Feature of risk output method, using progress control method, system and device |
CN110276193B (en) * | 2019-05-17 | 2023-08-22 | 创新先进技术有限公司 | Risk feature output method, application operation control method, system and device |
CN110728516A (en) * | 2019-10-09 | 2020-01-24 | 支付宝(杭州)信息技术有限公司 | Method, device and equipment for updating wind control model |
CN111444992A (en) * | 2020-03-27 | 2020-07-24 | 腾讯云计算(北京)有限责任公司 | User information checking method and system based on information code |
CN111444992B (en) * | 2020-03-27 | 2023-04-07 | 腾讯云计算(北京)有限责任公司 | User information checking method and system based on information code |
Also Published As
Publication number | Publication date |
---|---|
CN107360179B (en) | 2022-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103475996B (en) | Method for connecting network, network share method and device | |
CN107852410B (en) | Dissect rogue access point | |
CN102317884B (en) | For supporting the wake up trigger signal of multiple user interfaces, environment and/or virtual machine | |
CN107360179A (en) | A kind of risk information shared method, terminal and computer-readable recording medium | |
CN105119806B (en) | message updating method and device | |
CN104519485B (en) | Communication means, device and system between a kind of terminal | |
CN105871867A (en) | Identity authentication method, system and equipment | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106714274B (en) | access point connection method and device | |
CN103152462B (en) | A kind of address list sharing method and device | |
CN107707538A (en) | Data transmission method, device, mobile terminal and computer-readable recording medium | |
CN104852802B (en) | Auth method, equipment and system | |
CN106341809A (en) | Data transmission method and apparatus | |
CN106407771A (en) | Message management method and device | |
CN105490992B (en) | A kind of verification method of two dimensional code, device and system | |
CN107484148A (en) | A kind of network search method and mobile terminal | |
CN103796343A (en) | M2M gateway equipment and application method thereof | |
CN106817489A (en) | The reminding method and mobile terminal of message | |
CN104967648B (en) | A kind of dispatching method of internet protocol address, device and system | |
CN106022055A (en) | Fingerprint unlocking control method and terminal equipment | |
CN107205082A (en) | A kind of short message method for cleaning and mobile terminal | |
CN105426190A (en) | Data transmission method and device | |
CN106156246B (en) | A kind of querying method of public platform, device and system | |
CN106685796B (en) | A kind of information identifying method, device and system | |
CN106066953A (en) | A kind of unlocked by fingerprint control method and terminal unit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |