CN111191747A - Information management method, processing method, device and storage medium - Google Patents
Information management method, processing method, device and storage medium Download PDFInfo
- Publication number
- CN111191747A CN111191747A CN201811360658.8A CN201811360658A CN111191747A CN 111191747 A CN111191747 A CN 111191747A CN 201811360658 A CN201811360658 A CN 201811360658A CN 111191747 A CN111191747 A CN 111191747A
- Authority
- CN
- China
- Prior art keywords
- bar code
- barcode
- information
- abnormal information
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information management method, a processing method, equipment and a storage medium. The information management method comprises the following steps: sending a bar code to detect whether the bar code contains abnormal information; and when the bar code has abnormal information, performing corresponding operation on the bar code. In other words, when the barcode is detected to have the abnormal information, the barcode corresponding to the abnormal information is correspondingly operated, and after the barcode is correspondingly operated, the user can be prevented from directly using the barcode, or the user can know that the barcode has the abnormal information and can consider to perform selective processing.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an information management method, a processing method, an apparatus, and a storage medium.
Background
The two-dimensional code is a new generation bar code technology for recording data symbol information by using black and white rectangular matrixes which are distributed on a plane (in a two-dimensional direction) according to a certain rule by using specific geometric figures, and belongs to one kind of bar codes. The user can omit the complicated process of inputting a link address (URL for short) on the mobile phone by scanning or identifying the bar code, and the functions of website skipping, information acquisition, advertisement pushing, mobile phone e-commerce, anti-counterfeiting traceability, one-key payment and the like are realized.
However, sometimes the content of the barcode is hidden with a malicious link address, or user personal information, causing the user's economic interests and personal privacy to be compromised.
Disclosure of Invention
In order to solve the above problems, the present invention provides an information management method, a processing method, an apparatus, and a storage medium.
In a first aspect, an information management method provided by the present invention is applied to a terminal, and the information management method includes: sending a bar code to detect whether the bar code contains abnormal information; when the bar code has abnormal information, the bar code corresponding to the abnormal information is correspondingly operated, and after the bar code is correspondingly operated, the bar code can be prevented from being directly used by a user, or the user can know that the bar code has the abnormal information and can consider to carry out selective processing.
In a second aspect, the present invention provides an information processing method applied to a server, the information processing method including: receiving a bar code sent by a terminal; analyzing the bar code, obtaining an address link, and inquiring whether the address link contains abnormal information or not; and when the address link contains abnormal information, returning the address link corresponding to the abnormal information to the terminal, and adding the address link corresponding to the abnormal information into a blacklist database.
In a third aspect, the present invention provides an apparatus comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the method as described above.
In a fourth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as described above.
According to the information management method, when the bar code is detected to have abnormal information, the bar code corresponding to the abnormal information is operated, and after the bar code is correspondingly operated, the bar code can be prevented from being directly used by a user, or the user can know that the bar code has the abnormal information and can consider to carry out selective processing, so that the risk that the economic benefit and the personal privacy of the user are damaged is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart of an information management method in an exemplary embodiment of the invention;
fig. 2 is a first diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 3 is a second diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 4 is a third diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 5 is a fourth diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 6 is a fifth diagram illustrating an information management method according to an exemplary embodiment of the invention;
FIG. 7 is a flow chart of a method of information processing in an exemplary embodiment of the invention;
fig. 8 is a block diagram of a terminal in an exemplary embodiment of the invention;
fig. 9 is a block diagram of a server in an exemplary embodiment of the invention.
Description of the drawings:
100-a terminal; 10-a transmission detection module; 20-exception handling module;
200-a server; 210-receive picture module; 220-a resolution module; 230-a query module; 240-exception information return module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of an information management method in an exemplary embodiment of the invention. The information management method comprises the following steps:
s05: and sending the bar code to detect whether the bar code contains abnormal information. Specifically, the content of the barcode may be sent to detect whether the content of the barcode contains abnormal information, where the content of the barcode refers to information or data that can be skipped to display through an address link after the address link is resolved according to the content of the barcode.
S06: and when the bar code has abnormal information, performing corresponding operation on the bar code. Specifically, after the address connection corresponding to the abnormal information returned by the server is received, the corresponding bar code content is obtained to have the abnormal information, so that the situation that the user directly uses the bar code can be avoided, or the user can know that the bar code has the abnormal information and can consider to carry out selective processing, and therefore the risk that the economic benefit and the personal privacy of the user are damaged is reduced.
Specifically, the barcode includes a two-dimensional code or a barcode, but may be other types of barcodes.
Prior to S05, S01 and S02 are also included.
S01: and when the stored or scanned picture is detected to be the bar code, reading the content of the bar code. The terminal may detect a barcode from the picture library. The picture library has a plurality of pictures, such as self-portrait pictures, photos, videos, and bar codes. By reading the content of the bar code, namely reading the data symbol information recorded by the bar code, the bar code can be conveniently executed with relevant operations according to the data symbol information.
S01 may further include S011: and when the stored picture is detected to be the bar code, placing the bar code in the corresponding folder. Specifically, the bar code may be placed in a corresponding bar code folder, or placed in a camera directory together with a non-bar code. Specifically, the barcode folder may include a two-dimensional barcode folder or a barcode file. The two-dimensional code picture can be placed in a corresponding two-dimensional code folder (see fig. 2), or placed under a camera directory together with the non-two-dimensional code (see fig. 3).
In S01, when it is detected that the stored picture is a barcode, the content of the barcode is read automatically, or when the terminal displays a screen, or within a preset time, or after receiving a content reading instruction for the barcode. The content of the bar code is read when the user turns on the screen, so that the memory occupation of the user when using the terminal can be reduced. The preset time can be set by a user, for example, from 0 to 3 in the morning, or the time period occupied by the terminal memory is automatically set as the preset time after the time period is obtained according to the use habits of the user. Or inquiring whether the user reads the content of the bar code or not, and executing the reading of the content of the bar code after receiving the corresponding instruction.
S02: and judging the category of the bar code according to the content, and sorting the bar code to a corresponding position according to the category. According to the content of the bar code, the data symbol information recorded by the bar code is obtained, and the type of the bar code can be judged according to the symbol information, such as public numbers, WeChat contacts, payment with payment function or other types.
As shown in fig. 4, the two-dimensional code folder may include a public number folder, a wechat contacts folder, a payment folder, or other folders. If the bar code is judged to be of the payment type, sorting the bar code into a payment type folder according to the type; if the bar code is judged to be of the public number type, the bar code is sorted into the public number type folder according to the type.
S051 may also be included in S05.
S051: and after receiving an abnormal detection instruction aiming at the content of the bar code, sending the content of the bar code to detect whether the bar code contains abnormal information. Namely, after the user outputs an abnormal detection instruction for the content of the bar code, the terminal sends an instruction for detecting whether the bar code contains abnormal information after receiving the instruction. Of course, the abnormal detection instruction for the barcode does not need to be received, and once the stored or scanned picture is detected to be the barcode, the content of the barcode may be sent, and the content of the barcode may be subjected to abnormal detection.
In S051, the sent barcode may be a preset type barcode. The preset type can be a specific type of bar code set by a user, or a default bar code, or a bar code with abnormal information ratio exceeding a set value in a plurality of types of bar codes. As described above, the types of the barcode may be classified into a public number type, a WeChat contact person type, a payment type having a payment function, and other types. The barcode with the payment category may have abnormal information, which may easily cause the economic benefit of the user to be impaired, and thus the preset type may include the barcode with the payment category. Of course, the type of the barcode which needs to be detected whether the abnormal message is contained can be flexibly set according to the requirement.
Of course, all types of barcodes may be sent to the server in S051, so as to detect whether the barcodes contain abnormal information.
Between S02 and S05, S03 may also be included. S03: and setting a mark corresponding to the content of the bar code on the bar code according to the content of the bar code. The bar code is marked so that a user can quickly recognize the information contained in the bar code from the mark. For example, if the barcode is a WeChat contact, the label may be at least one of the name, work unit, gender, etc. of the WeChat contact; if the bar code is a public number, the mark can be at least one of a public number name, a latest pushed article name and the like.
Specifically, the mark may be prompt information displayed on a grid thumbnail of the two-dimensional code (see fig. 3), or may be a detailed information window displayed on a detailed graph of the barcode (see fig. 5), or both the prompt information on the thumbnail and the detailed information window on the detailed graph. The detailed view is opposite to the thumbnail and can be considered as an enlarged view. The content displayed by the detailed information window includes but is not limited to: description, security level, and whether sharing is allowed, etc.
It should be noted that when the barcode and the non-barcode are placed in the same directory together, a prompt message may be displayed on a thumbnail of the barcode (or the two-dimensional code), as shown in fig. 3, so as to quickly identify the barcode (or the two-dimensional code).
The terminal can automatically set a mark corresponding to the barcode content, or set the mark after receiving an instruction input by a user.
Between S03 and S05, S041 and S042 may also be included.
S041: and when an editing instruction aiming at the mark is received, updating the mark according to the content input by the editing instruction. Specifically, updating the content on the mark includes updating the prompt information displayed on the thumbnail and updating the detailed information window displayed on the detailed chart of the barcode. As shown in fig. 5, the user may enter the markup editing page as described in fig. 6 after clicking the detailed information window.
S042: when a sharing instruction for the mark is received, the mark is sent to a server. The tags may be stored in a tag database in the server. When the terminal receives a request of whether the address link of other clients contains abnormal information, the server can find the mark matched with the address link from the mark database and return the mark to the client.
S06 includes S061 and S062.
S061: and receiving the address link corresponding to the abnormal information returned by the server. And finding out the corresponding bar code according to the address information.
S062: and searching the corresponding bar code with the abnormal information according to the address link.
In S06, the corresponding operation includes a direct operation for the barcode or an optional operation selected by the user.
Wherein the direct operation comprises directly warning, disabling or deleting the barcode.
The selectable operation item of the selectable operation comprises at least one of warning, forbidding, deleting or ignoring, for example, if the bar code has abnormal information, a report window can pop up, and the report window is provided with the selectable operation for the user to select. Specifically, when the user selects the warning, the terminal warns the barcode corresponding to the abnormal information, and when the user needs to identify the barcode, the user can consider whether to identify the barcode or not due to the warning effect. When the user selects to disable, the terminal disables the bar code corresponding to the abnormal information, and the bar code is disabled, so that the terminal cannot jump to a corresponding page based on the bar code, and therefore the situation that the abnormal information is released and the economic benefit and the personal privacy of the user are threatened is avoided. When the user selects to delete, the terminal deletes the bar code corresponding to the abnormal information, so that the bar code with the abnormal information in the terminal is cleaned, and the safety of the terminal is improved. When the user chooses to ignore, the user can be known not to recognize the abnormal information in the bar code after consideration. No matter which item in the report processing is selected by the user, the customer can know that the bar code has abnormal information through detection because the report window can be popped up.
Fig. 7 is a flowchart of an information processing method in another exemplary embodiment of the present invention, the information processing method including:
s11: and receiving the content of the bar code sent by the terminal. Specifically, the content of the preset type of barcode returned from the terminal may be received.
S12: and analyzing the bar code and obtaining an address link. And analyzing and reading the address link corresponding to the bar code according to the content of the bar code.
S13: and inquiring whether the address link contains abnormal information or not. Whether the address link contains abnormal information or not is queried, and the method comprises the following two methods: the first is that the address link is compared with the address link in the blacklist database in the server; the second method is to inquire whether the website link has a special symbol, wherein the special symbol is a symbol pointing to information such as Trojan horse, malicious link and the like.
S14: and when the address link contains abnormal information, returning the address link corresponding to the abnormal information to the terminal, and adding the address link corresponding to the abnormal information into a blacklist database. Specifically, the server returns the barcode with the abnormal information to the terminal in the form of a json string. It should be noted that the server may only return the address link corresponding to the abnormal information to the terminal, so that the terminal can obtain the address link corresponding to the abnormal information, and alert, disable, delete, or the like the corresponding barcode. And adding the address link corresponding to the abnormal information into the blacklist data, and comparing and judging the address link with the address link in the blacklist database when the other servers receive the content of the bar code again.
Before S11, S10, S10: and receiving the mark sent by the client, and storing the mark into a mark database. When the terminal receives a request of whether the address link of other clients contains abnormal information, the server can find the mark matched with the address link from the mark database and return the mark to the client.
Fig. 8 is a block diagram of the terminal 100 in still another exemplary embodiment of the present invention. The terminal 100 includes:
a sending detection module 10, configured to send a barcode to detect whether the barcode contains abnormal information;
and the exception handling module 20 is configured to perform corresponding operation on the barcode when the barcode has exception information.
The terminal 100 further includes:
the content reading module is used for reading the content of the bar code when the stored or scanned picture is detected to be the bar code;
and the classification module is used for judging the category of the bar code according to the content and sorting the bar code to the corresponding position according to the category.
The transmission detection module 10 includes:
and the instruction receiving and sending submodule is used for sending the content of the bar code to detect whether the bar code contains abnormal information or not after receiving the abnormal detection instruction, wherein the sent bar code is a preset type bar code.
The terminal 100 further includes:
the marking module is used for setting a mark corresponding to the content of the bar code on the bar code according to the content of the bar code; wherein the mark comprises: and displaying prompt information on the thumbnail of the bar code or displaying at least one of detailed information windows on the detailed graph of the bar code.
The terminal 100 further includes:
the editing module is used for updating the mark according to the content input by the editing instruction when the editing instruction aiming at the mark is received;
and the sharing module is used for sending the mark to a server when receiving a sharing instruction aiming at the mark.
In the content reading module, the content of the barcode may be read automatically, or when the terminal turns off the screen, or within a preset time, or after receiving a content reading instruction for the barcode.
The exception handling module 20 includes:
the receiving exception submodule is used for receiving the address link which is returned by the server and corresponds to the exception information;
and the searching submodule is used for searching the corresponding bar code with the abnormal information according to the address link.
The bar code includes a two-dimensional code or a bar code.
The corresponding operation comprises a direct operation or an optional operation; the direct operation comprises warning, forbidding or deleting the bar code corresponding to the abnormal information; the optional operation item of the optional operation comprises at least one of warning, disabling, deleting or ignoring.
The terminal system provided in the embodiment of the present application may further execute the method executed by the terminal in fig. 1, and implement the functions of the terminal in the embodiment shown in fig. 1, which are not described herein again.
Fig. 9 is a block diagram of a server in accordance with still another exemplary embodiment of the present invention. The server 200 includes:
a picture receiving module 210, configured to receive a barcode sent by a terminal;
the analysis module 220 is used for analyzing the bar code and obtaining an address link;
the query module 230 is configured to query whether the address link contains abnormal information;
and an abnormal information returning module 240, configured to, when the address link contains abnormal information, return the address link corresponding to the abnormal information to the terminal, and add the address link corresponding to the abnormal information to a blacklist database.
An embodiment of the present invention further provides an apparatus, including: a memory, a processor and a computer program stored on said memory and executable on said processor, the computer program realizing the steps of the above-mentioned information management method when executed by said processor.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the processing method embodiment of the fingerprint unlocking operation, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, it should be understood that the above embodiments are only examples of the present invention and are not intended to limit the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. An information management method applied to a terminal is characterized by comprising the following steps:
sending a bar code to detect whether the bar code contains abnormal information;
and when the bar code has abnormal information, performing corresponding operation on the bar code.
2. The information management method according to claim 1, before said transmitting the barcode to detect whether the barcode contains abnormal information, further comprising:
when the stored or scanned picture is detected to be a bar code, reading the content of the bar code;
and judging the category of the bar code according to the content, and sorting the bar code to a corresponding position according to the category.
3. The information management method according to claim 2, wherein said sending a barcode to detect whether the barcode contains abnormal information comprises:
after receiving an abnormality detection instruction, sending the content of a bar code to detect whether the bar code contains abnormal information, wherein the sent bar code is a preset type of bar code.
4. The information management method according to claim 3, wherein after the sorting into the corresponding positions according to the categories and before the sending of the bar code to detect whether the bar code contains abnormal information further comprises:
setting a mark corresponding to the content of the bar code on the bar code according to the content of the bar code; the marking includes: and displaying prompt information on the thumbnail of the bar code and/or displaying a detailed information window on the detailed graph of the bar code.
5. The information management method according to claim 4, wherein after setting a mark corresponding to the content of the barcode on the barcode according to the content of the barcode and before sending the barcode to detect whether the barcode contains abnormal information, the method further comprises:
when an editing instruction aiming at the mark is received, updating the mark according to the content input by the editing instruction;
when a sharing instruction for the mark is received, the mark is sent to a server.
6. The information management method according to claim 2, wherein when it is detected that the saved picture is a barcode, the content of the barcode is read automatically, or when the terminal turns off the screen, or within a preset time, or after a content reading instruction for the barcode is received.
7. The information management method according to claim 1, wherein the when the barcode has the abnormality information includes:
receiving an address link which is returned by the server and corresponds to the abnormal information;
searching a corresponding bar code with abnormal information according to the address link;
and/or
The bar code comprises a two-dimensional code or a bar code;
and/or
The corresponding operation comprises a direct operation or an optional operation; the direct operation comprises warning, forbidding or deleting the bar code corresponding to the abnormal information; the optional operation item of the optional operation comprises at least one of warning, disabling, deleting or ignoring.
8. An information processing method applied to a server is characterized by comprising the following steps:
receiving a bar code sent by a terminal;
analyzing the bar code and obtaining an address link;
inquiring whether the address link contains abnormal information or not;
and when the address link contains abnormal information, returning the address link corresponding to the abnormal information to the terminal, and adding the address link corresponding to the abnormal information into a blacklist database.
9. An apparatus, comprising: memory, processor and computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, carries out the steps of the method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811360658.8A CN111191747B (en) | 2018-11-15 | 2018-11-15 | Information management method, processing method, device and storage medium |
PCT/CN2019/101437 WO2020098326A1 (en) | 2018-11-15 | 2019-08-19 | Information management method and processing method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811360658.8A CN111191747B (en) | 2018-11-15 | 2018-11-15 | Information management method, processing method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111191747A true CN111191747A (en) | 2020-05-22 |
CN111191747B CN111191747B (en) | 2023-09-01 |
Family
ID=70707119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811360658.8A Active CN111191747B (en) | 2018-11-15 | 2018-11-15 | Information management method, processing method, device and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111191747B (en) |
WO (1) | WO2020098326A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115766786B (en) * | 2022-11-11 | 2024-05-14 | 四川启睿克科技有限公司 | Investigation system and method for business abnormality of intelligent household appliance terminal |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366149A (en) * | 2013-06-05 | 2013-10-23 | 北京奇虎科技有限公司 | Method and device for processing visual graphic code for mobile terminal |
CN103647779A (en) * | 2013-12-16 | 2014-03-19 | 北京奇虎科技有限公司 | Method and device for detecting fishing fraud information through two-dimensional code |
CN105162603A (en) * | 2015-09-15 | 2015-12-16 | 重庆智韬信息技术中心 | Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes |
CN105224644A (en) * | 2015-09-28 | 2016-01-06 | 小米科技有限责任公司 | Information classification approach and device |
WO2017166616A1 (en) * | 2016-03-29 | 2017-10-05 | 乐视控股(北京)有限公司 | Information processing method and apparatus, and electronic device |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929411B (en) * | 2013-01-16 | 2017-05-24 | 深圳市腾讯计算机系统有限公司 | Information displaying method, terminal, safety server and system |
CN105718792A (en) * | 2015-08-13 | 2016-06-29 | 哈尔滨安天科技股份有限公司 | Sandbox based two-dimensional code detection method and system |
-
2018
- 2018-11-15 CN CN201811360658.8A patent/CN111191747B/en active Active
-
2019
- 2019-08-19 WO PCT/CN2019/101437 patent/WO2020098326A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103366149A (en) * | 2013-06-05 | 2013-10-23 | 北京奇虎科技有限公司 | Method and device for processing visual graphic code for mobile terminal |
CN103647779A (en) * | 2013-12-16 | 2014-03-19 | 北京奇虎科技有限公司 | Method and device for detecting fishing fraud information through two-dimensional code |
CN105162603A (en) * | 2015-09-15 | 2015-12-16 | 重庆智韬信息技术中心 | Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes |
CN105224644A (en) * | 2015-09-28 | 2016-01-06 | 小米科技有限责任公司 | Information classification approach and device |
WO2017166616A1 (en) * | 2016-03-29 | 2017-10-05 | 乐视控股(北京)有限公司 | Information processing method and apparatus, and electronic device |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN111191747B (en) | 2023-09-01 |
WO2020098326A1 (en) | 2020-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105391674B (en) | Information processing method and system, server and client | |
JP7025354B2 (en) | Automation of image validation | |
CN103279730B (en) | Mobile terminal processes the method and apparatus of visual graphic code | |
CN108366058B (en) | Method, device, equipment and storage medium for preventing traffic hijacking of advertisement operator | |
US20190286680A1 (en) | Interactive barcodes | |
KR101554518B1 (en) | Information obtaining method and apparatus | |
CN103401857B (en) | The exchange method and system of 2 D code information, client, server | |
CN103366149B (en) | The method and apparatus that mobile terminal processes visual graphic code | |
JP2005174317A5 (en) | ||
CN110417718B (en) | Method, device, equipment and storage medium for processing risk data in website | |
WO2021138007A1 (en) | Dynamically providing safe phone numbers for responding to inbound communications | |
JP7066865B2 (en) | Information processing system, information code generation system, information processing method, and information code generation method | |
US20130146655A1 (en) | Code for anonymous user notification | |
KR20190020963A (en) | Protecting personal information leakage interception system | |
CN111191747B (en) | Information management method, processing method, device and storage medium | |
CN109978114A (en) | Data processing method, device, server and storage medium | |
US20140351933A1 (en) | System and method for inspecting harmful information of mobile device | |
CN106650547A (en) | Method and system for recording two-dimensional code scanning information by mobile terminal | |
CN107516042B (en) | Method, device and system for previewing two-dimensional code and website link screenshot | |
US20070215704A1 (en) | Image processing device | |
US20150149562A1 (en) | System and Method for Lost Item and Product Alerts, Notifications, and Messaging Communications | |
NL1040219C2 (en) | AUTOMATIC SEARCH SYSTEM FOR REGISTERED OBJECTS. | |
KR101060122B1 (en) | Method and device for processing spam message | |
US11531711B1 (en) | Forensic criminal investigation digital data intersection | |
CN117332799A (en) | Method and system for carrying out data transmission based on scan head calling interface method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |