CN111191747A - Information management method, processing method, device and storage medium - Google Patents

Information management method, processing method, device and storage medium Download PDF

Info

Publication number
CN111191747A
CN111191747A CN201811360658.8A CN201811360658A CN111191747A CN 111191747 A CN111191747 A CN 111191747A CN 201811360658 A CN201811360658 A CN 201811360658A CN 111191747 A CN111191747 A CN 111191747A
Authority
CN
China
Prior art keywords
bar code
barcode
information
abnormal information
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811360658.8A
Other languages
Chinese (zh)
Other versions
CN111191747B (en
Inventor
杨冬变
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Zhongxing New Software Co Ltd
Original Assignee
Xian Zhongxing New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Zhongxing New Software Co Ltd filed Critical Xian Zhongxing New Software Co Ltd
Priority to CN201811360658.8A priority Critical patent/CN111191747B/en
Priority to PCT/CN2019/101437 priority patent/WO2020098326A1/en
Publication of CN111191747A publication Critical patent/CN111191747A/en
Application granted granted Critical
Publication of CN111191747B publication Critical patent/CN111191747B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information management method, a processing method, equipment and a storage medium. The information management method comprises the following steps: sending a bar code to detect whether the bar code contains abnormal information; and when the bar code has abnormal information, performing corresponding operation on the bar code. In other words, when the barcode is detected to have the abnormal information, the barcode corresponding to the abnormal information is correspondingly operated, and after the barcode is correspondingly operated, the user can be prevented from directly using the barcode, or the user can know that the barcode has the abnormal information and can consider to perform selective processing.

Description

Information management method, processing method, device and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an information management method, a processing method, an apparatus, and a storage medium.
Background
The two-dimensional code is a new generation bar code technology for recording data symbol information by using black and white rectangular matrixes which are distributed on a plane (in a two-dimensional direction) according to a certain rule by using specific geometric figures, and belongs to one kind of bar codes. The user can omit the complicated process of inputting a link address (URL for short) on the mobile phone by scanning or identifying the bar code, and the functions of website skipping, information acquisition, advertisement pushing, mobile phone e-commerce, anti-counterfeiting traceability, one-key payment and the like are realized.
However, sometimes the content of the barcode is hidden with a malicious link address, or user personal information, causing the user's economic interests and personal privacy to be compromised.
Disclosure of Invention
In order to solve the above problems, the present invention provides an information management method, a processing method, an apparatus, and a storage medium.
In a first aspect, an information management method provided by the present invention is applied to a terminal, and the information management method includes: sending a bar code to detect whether the bar code contains abnormal information; when the bar code has abnormal information, the bar code corresponding to the abnormal information is correspondingly operated, and after the bar code is correspondingly operated, the bar code can be prevented from being directly used by a user, or the user can know that the bar code has the abnormal information and can consider to carry out selective processing.
In a second aspect, the present invention provides an information processing method applied to a server, the information processing method including: receiving a bar code sent by a terminal; analyzing the bar code, obtaining an address link, and inquiring whether the address link contains abnormal information or not; and when the address link contains abnormal information, returning the address link corresponding to the abnormal information to the terminal, and adding the address link corresponding to the abnormal information into a blacklist database.
In a third aspect, the present invention provides an apparatus comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method as described above.
In a fourth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as described above.
According to the information management method, when the bar code is detected to have abnormal information, the bar code corresponding to the abnormal information is operated, and after the bar code is correspondingly operated, the bar code can be prevented from being directly used by a user, or the user can know that the bar code has the abnormal information and can consider to carry out selective processing, so that the risk that the economic benefit and the personal privacy of the user are damaged is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart of an information management method in an exemplary embodiment of the invention;
fig. 2 is a first diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 3 is a second diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 4 is a third diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 5 is a fourth diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 6 is a fifth diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 7 is a flow chart of a method of information processing in an exemplary embodiment of the invention;
fig. 8 is a block diagram of a terminal in an exemplary embodiment of the invention;
fig. 9 is a block diagram of a server in an exemplary embodiment of the invention.
Description of the drawings:
100-a terminal; 10-a transmission detection module; 20-exception handling module;
200-a server; 210-receive picture module; 220-a resolution module; 230-a query module; 240-exception information return module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of an information management method in an exemplary embodiment of the invention. The information management method comprises the following steps:
s05: and sending the bar code to detect whether the bar code contains abnormal information. Specifically, the content of the barcode may be sent to detect whether the content of the barcode contains abnormal information, where the content of the barcode refers to information or data that can be skipped to display through an address link after the address link is resolved according to the content of the barcode.
S06: and when the bar code has abnormal information, performing corresponding operation on the bar code. Specifically, after the address connection corresponding to the abnormal information returned by the server is received, the corresponding bar code content is obtained to have the abnormal information, so that the situation that the user directly uses the bar code can be avoided, or the user can know that the bar code has the abnormal information and can consider to carry out selective processing, and therefore the risk that the economic benefit and the personal privacy of the user are damaged is reduced.
Specifically, the barcode includes a two-dimensional code or a barcode, but may be other types of barcodes.
Prior to S05, S01 and S02 are also included.
S01: and when the stored or scanned picture is detected to be the bar code, reading the content of the bar code. The terminal may detect a barcode from the picture library. The picture library has a plurality of pictures, such as self-portrait pictures, photos, videos, and bar codes. By reading the content of the bar code, namely reading the data symbol information recorded by the bar code, the bar code can be conveniently executed with relevant operations according to the data symbol information.
S01 may further include S011: and when the stored picture is detected to be the bar code, placing the bar code in the corresponding folder. Specifically, the bar code may be placed in a corresponding bar code folder, or placed in a camera directory together with a non-bar code. Specifically, the barcode folder may include a two-dimensional barcode folder or a barcode file. The two-dimensional code picture can be placed in a corresponding two-dimensional code folder (see fig. 2), or placed under a camera directory together with the non-two-dimensional code (see fig. 3).
In S01, when it is detected that the stored picture is a barcode, the content of the barcode is read automatically, or when the terminal displays a screen, or within a preset time, or after receiving a content reading instruction for the barcode. The content of the bar code is read when the user turns on the screen, so that the memory occupation of the user when using the terminal can be reduced. The preset time can be set by a user, for example, from 0 to 3 in the morning, or the time period occupied by the terminal memory is automatically set as the preset time after the time period is obtained according to the use habits of the user. Or inquiring whether the user reads the content of the bar code or not, and executing the reading of the content of the bar code after receiving the corresponding instruction.
S02: and judging the category of the bar code according to the content, and sorting the bar code to a corresponding position according to the category. According to the content of the bar code, the data symbol information recorded by the bar code is obtained, and the type of the bar code can be judged according to the symbol information, such as public numbers, WeChat contacts, payment with payment function or other types.
As shown in fig. 4, the two-dimensional code folder may include a public number folder, a wechat contacts folder, a payment folder, or other folders. If the bar code is judged to be of the payment type, sorting the bar code into a payment type folder according to the type; if the bar code is judged to be of the public number type, the bar code is sorted into the public number type folder according to the type.
S051 may also be included in S05.
S051: and after receiving an abnormal detection instruction aiming at the content of the bar code, sending the content of the bar code to detect whether the bar code contains abnormal information. Namely, after the user outputs an abnormal detection instruction for the content of the bar code, the terminal sends an instruction for detecting whether the bar code contains abnormal information after receiving the instruction. Of course, the abnormal detection instruction for the barcode does not need to be received, and once the stored or scanned picture is detected to be the barcode, the content of the barcode may be sent, and the content of the barcode may be subjected to abnormal detection.
In S051, the sent barcode may be a preset type barcode. The preset type can be a specific type of bar code set by a user, or a default bar code, or a bar code with abnormal information ratio exceeding a set value in a plurality of types of bar codes. As described above, the types of the barcode may be classified into a public number type, a WeChat contact person type, a payment type having a payment function, and other types. The barcode with the payment category may have abnormal information, which may easily cause the economic benefit of the user to be impaired, and thus the preset type may include the barcode with the payment category. Of course, the type of the barcode which needs to be detected whether the abnormal message is contained can be flexibly set according to the requirement.
Of course, all types of barcodes may be sent to the server in S051, so as to detect whether the barcodes contain abnormal information.
Between S02 and S05, S03 may also be included. S03: and setting a mark corresponding to the content of the bar code on the bar code according to the content of the bar code. The bar code is marked so that a user can quickly recognize the information contained in the bar code from the mark. For example, if the barcode is a WeChat contact, the label may be at least one of the name, work unit, gender, etc. of the WeChat contact; if the bar code is a public number, the mark can be at least one of a public number name, a latest pushed article name and the like.
Specifically, the mark may be prompt information displayed on a grid thumbnail of the two-dimensional code (see fig. 3), or may be a detailed information window displayed on a detailed graph of the barcode (see fig. 5), or both the prompt information on the thumbnail and the detailed information window on the detailed graph. The detailed view is opposite to the thumbnail and can be considered as an enlarged view. The content displayed by the detailed information window includes but is not limited to: description, security level, and whether sharing is allowed, etc.
It should be noted that when the barcode and the non-barcode are placed in the same directory together, a prompt message may be displayed on a thumbnail of the barcode (or the two-dimensional code), as shown in fig. 3, so as to quickly identify the barcode (or the two-dimensional code).
The terminal can automatically set a mark corresponding to the barcode content, or set the mark after receiving an instruction input by a user.
Between S03 and S05, S041 and S042 may also be included.
S041: and when an editing instruction aiming at the mark is received, updating the mark according to the content input by the editing instruction. Specifically, updating the content on the mark includes updating the prompt information displayed on the thumbnail and updating the detailed information window displayed on the detailed chart of the barcode. As shown in fig. 5, the user may enter the markup editing page as described in fig. 6 after clicking the detailed information window.
S042: when a sharing instruction for the mark is received, the mark is sent to a server. The tags may be stored in a tag database in the server. When the terminal receives a request of whether the address link of other clients contains abnormal information, the server can find the mark matched with the address link from the mark database and return the mark to the client.
S06 includes S061 and S062.
S061: and receiving the address link corresponding to the abnormal information returned by the server. And finding out the corresponding bar code according to the address information.
S062: and searching the corresponding bar code with the abnormal information according to the address link.
In S06, the corresponding operation includes a direct operation for the barcode or an optional operation selected by the user.
Wherein the direct operation comprises directly warning, disabling or deleting the barcode.
The selectable operation item of the selectable operation comprises at least one of warning, forbidding, deleting or ignoring, for example, if the bar code has abnormal information, a report window can pop up, and the report window is provided with the selectable operation for the user to select. Specifically, when the user selects the warning, the terminal warns the barcode corresponding to the abnormal information, and when the user needs to identify the barcode, the user can consider whether to identify the barcode or not due to the warning effect. When the user selects to disable, the terminal disables the bar code corresponding to the abnormal information, and the bar code is disabled, so that the terminal cannot jump to a corresponding page based on the bar code, and therefore the situation that the abnormal information is released and the economic benefit and the personal privacy of the user are threatened is avoided. When the user selects to delete, the terminal deletes the bar code corresponding to the abnormal information, so that the bar code with the abnormal information in the terminal is cleaned, and the safety of the terminal is improved. When the user chooses to ignore, the user can be known not to recognize the abnormal information in the bar code after consideration. No matter which item in the report processing is selected by the user, the customer can know that the bar code has abnormal information through detection because the report window can be popped up.
Fig. 7 is a flowchart of an information processing method in another exemplary embodiment of the present invention, the information processing method including:
s11: and receiving the content of the bar code sent by the terminal. Specifically, the content of the preset type of barcode returned from the terminal may be received.
S12: and analyzing the bar code and obtaining an address link. And analyzing and reading the address link corresponding to the bar code according to the content of the bar code.
S13: and inquiring whether the address link contains abnormal information or not. Whether the address link contains abnormal information or not is queried, and the method comprises the following two methods: the first is that the address link is compared with the address link in the blacklist database in the server; the second method is to inquire whether the website link has a special symbol, wherein the special symbol is a symbol pointing to information such as Trojan horse, malicious link and the like.
S14: and when the address link contains abnormal information, returning the address link corresponding to the abnormal information to the terminal, and adding the address link corresponding to the abnormal information into a blacklist database. Specifically, the server returns the barcode with the abnormal information to the terminal in the form of a json string. It should be noted that the server may only return the address link corresponding to the abnormal information to the terminal, so that the terminal can obtain the address link corresponding to the abnormal information, and alert, disable, delete, or the like the corresponding barcode. And adding the address link corresponding to the abnormal information into the blacklist data, and comparing and judging the address link with the address link in the blacklist database when the other servers receive the content of the bar code again.
Before S11, S10, S10: and receiving the mark sent by the client, and storing the mark into a mark database. When the terminal receives a request of whether the address link of other clients contains abnormal information, the server can find the mark matched with the address link from the mark database and return the mark to the client.
Fig. 8 is a block diagram of the terminal 100 in still another exemplary embodiment of the present invention. The terminal 100 includes:
a sending detection module 10, configured to send a barcode to detect whether the barcode contains abnormal information;
and the exception handling module 20 is configured to perform corresponding operation on the barcode when the barcode has exception information.
The terminal 100 further includes:
the content reading module is used for reading the content of the bar code when the stored or scanned picture is detected to be the bar code;
and the classification module is used for judging the category of the bar code according to the content and sorting the bar code to the corresponding position according to the category.
The transmission detection module 10 includes:
and the instruction receiving and sending submodule is used for sending the content of the bar code to detect whether the bar code contains abnormal information or not after receiving the abnormal detection instruction, wherein the sent bar code is a preset type bar code.
The terminal 100 further includes:
the marking module is used for setting a mark corresponding to the content of the bar code on the bar code according to the content of the bar code; wherein the mark comprises: and displaying prompt information on the thumbnail of the bar code or displaying at least one of detailed information windows on the detailed graph of the bar code.
The terminal 100 further includes:
the editing module is used for updating the mark according to the content input by the editing instruction when the editing instruction aiming at the mark is received;
and the sharing module is used for sending the mark to a server when receiving a sharing instruction aiming at the mark.
In the content reading module, the content of the barcode may be read automatically, or when the terminal turns off the screen, or within a preset time, or after receiving a content reading instruction for the barcode.
The exception handling module 20 includes:
the receiving exception submodule is used for receiving the address link which is returned by the server and corresponds to the exception information;
and the searching submodule is used for searching the corresponding bar code with the abnormal information according to the address link.
The bar code includes a two-dimensional code or a bar code.
The corresponding operation comprises a direct operation or an optional operation; the direct operation comprises warning, forbidding or deleting the bar code corresponding to the abnormal information; the optional operation item of the optional operation comprises at least one of warning, disabling, deleting or ignoring.
The terminal system provided in the embodiment of the present application may further execute the method executed by the terminal in fig. 1, and implement the functions of the terminal in the embodiment shown in fig. 1, which are not described herein again.
Fig. 9 is a block diagram of a server in accordance with still another exemplary embodiment of the present invention. The server 200 includes:
a picture receiving module 210, configured to receive a barcode sent by a terminal;
the analysis module 220 is used for analyzing the bar code and obtaining an address link;
the query module 230 is configured to query whether the address link contains abnormal information;
and an abnormal information returning module 240, configured to, when the address link contains abnormal information, return the address link corresponding to the abnormal information to the terminal, and add the address link corresponding to the abnormal information to a blacklist database.
An embodiment of the present invention further provides an apparatus, including: a memory, a processor and a computer program stored on said memory and executable on said processor, the computer program realizing the steps of the above-mentioned information management method when executed by said processor.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the processing method embodiment of the fingerprint unlocking operation, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are only examples of the present invention and are not intended to limit the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An information management method applied to a terminal is characterized by comprising the following steps:
sending a bar code to detect whether the bar code contains abnormal information;
and when the bar code has abnormal information, performing corresponding operation on the bar code.
2. The information management method according to claim 1, before said transmitting the barcode to detect whether the barcode contains abnormal information, further comprising:
when the stored or scanned picture is detected to be a bar code, reading the content of the bar code;
and judging the category of the bar code according to the content, and sorting the bar code to a corresponding position according to the category.
3. The information management method according to claim 2, wherein said sending a barcode to detect whether the barcode contains abnormal information comprises:
after receiving an abnormality detection instruction, sending the content of a bar code to detect whether the bar code contains abnormal information, wherein the sent bar code is a preset type of bar code.
4. The information management method according to claim 3, wherein after the sorting into the corresponding positions according to the categories and before the sending of the bar code to detect whether the bar code contains abnormal information further comprises:
setting a mark corresponding to the content of the bar code on the bar code according to the content of the bar code; the marking includes: and displaying prompt information on the thumbnail of the bar code and/or displaying a detailed information window on the detailed graph of the bar code.
5. The information management method according to claim 4, wherein after setting a mark corresponding to the content of the barcode on the barcode according to the content of the barcode and before sending the barcode to detect whether the barcode contains abnormal information, the method further comprises:
when an editing instruction aiming at the mark is received, updating the mark according to the content input by the editing instruction;
when a sharing instruction for the mark is received, the mark is sent to a server.
6. The information management method according to claim 2, wherein when it is detected that the saved picture is a barcode, the content of the barcode is read automatically, or when the terminal turns off the screen, or within a preset time, or after a content reading instruction for the barcode is received.
7. The information management method according to claim 1, wherein the when the barcode has the abnormality information includes:
receiving an address link which is returned by the server and corresponds to the abnormal information;
searching a corresponding bar code with abnormal information according to the address link;
and/or
The bar code comprises a two-dimensional code or a bar code;
and/or
The corresponding operation comprises a direct operation or an optional operation; the direct operation comprises warning, forbidding or deleting the bar code corresponding to the abnormal information; the optional operation item of the optional operation comprises at least one of warning, disabling, deleting or ignoring.
8. An information processing method applied to a server is characterized by comprising the following steps:
receiving a bar code sent by a terminal;
analyzing the bar code and obtaining an address link;
inquiring whether the address link contains abnormal information or not;
and when the address link contains abnormal information, returning the address link corresponding to the abnormal information to the terminal, and adding the address link corresponding to the abnormal information into a blacklist database.
9. An apparatus, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN201811360658.8A 2018-11-15 2018-11-15 Information management method, processing method, device and storage medium Active CN111191747B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811360658.8A CN111191747B (en) 2018-11-15 2018-11-15 Information management method, processing method, device and storage medium
PCT/CN2019/101437 WO2020098326A1 (en) 2018-11-15 2019-08-19 Information management method and processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811360658.8A CN111191747B (en) 2018-11-15 2018-11-15 Information management method, processing method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111191747A true CN111191747A (en) 2020-05-22
CN111191747B CN111191747B (en) 2023-09-01

Family

ID=70707119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811360658.8A Active CN111191747B (en) 2018-11-15 2018-11-15 Information management method, processing method, device and storage medium

Country Status (2)

Country Link
CN (1) CN111191747B (en)
WO (1) WO2020098326A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766786B (en) * 2022-11-11 2024-05-14 四川启睿克科技有限公司 Investigation system and method for business abnormality of intelligent household appliance terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366149A (en) * 2013-06-05 2013-10-23 北京奇虎科技有限公司 Method and device for processing visual graphic code for mobile terminal
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN105162603A (en) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes
CN105224644A (en) * 2015-09-28 2016-01-06 小米科技有限责任公司 Information classification approach and device
WO2017166616A1 (en) * 2016-03-29 2017-10-05 乐视控股(北京)有限公司 Information processing method and apparatus, and electronic device
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929411B (en) * 2013-01-16 2017-05-24 深圳市腾讯计算机系统有限公司 Information displaying method, terminal, safety server and system
CN105718792A (en) * 2015-08-13 2016-06-29 哈尔滨安天科技股份有限公司 Sandbox based two-dimensional code detection method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366149A (en) * 2013-06-05 2013-10-23 北京奇虎科技有限公司 Method and device for processing visual graphic code for mobile terminal
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN105162603A (en) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes
CN105224644A (en) * 2015-09-28 2016-01-06 小米科技有限责任公司 Information classification approach and device
WO2017166616A1 (en) * 2016-03-29 2017-10-05 乐视控股(北京)有限公司 Information processing method and apparatus, and electronic device
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal

Also Published As

Publication number Publication date
CN111191747B (en) 2023-09-01
WO2020098326A1 (en) 2020-05-22

Similar Documents

Publication Publication Date Title
CN105391674B (en) Information processing method and system, server and client
JP7025354B2 (en) Automation of image validation
CN103279730B (en) Mobile terminal processes the method and apparatus of visual graphic code
CN108366058B (en) Method, device, equipment and storage medium for preventing traffic hijacking of advertisement operator
US20190286680A1 (en) Interactive barcodes
KR101554518B1 (en) Information obtaining method and apparatus
CN103401857B (en) The exchange method and system of 2 D code information, client, server
CN103366149B (en) The method and apparatus that mobile terminal processes visual graphic code
JP2005174317A5 (en)
CN110417718B (en) Method, device, equipment and storage medium for processing risk data in website
WO2021138007A1 (en) Dynamically providing safe phone numbers for responding to inbound communications
JP7066865B2 (en) Information processing system, information code generation system, information processing method, and information code generation method
US20130146655A1 (en) Code for anonymous user notification
KR20190020963A (en) Protecting personal information leakage interception system
CN111191747B (en) Information management method, processing method, device and storage medium
CN109978114A (en) Data processing method, device, server and storage medium
US20140351933A1 (en) System and method for inspecting harmful information of mobile device
CN106650547A (en) Method and system for recording two-dimensional code scanning information by mobile terminal
CN107516042B (en) Method, device and system for previewing two-dimensional code and website link screenshot
US20070215704A1 (en) Image processing device
US20150149562A1 (en) System and Method for Lost Item and Product Alerts, Notifications, and Messaging Communications
NL1040219C2 (en) AUTOMATIC SEARCH SYSTEM FOR REGISTERED OBJECTS.
KR101060122B1 (en) Method and device for processing spam message
US11531711B1 (en) Forensic criminal investigation digital data intersection
CN117332799A (en) Method and system for carrying out data transmission based on scan head calling interface method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant