CN113556330A - Business card information management method, mobile terminal and storage medium - Google Patents

Business card information management method, mobile terminal and storage medium Download PDF

Info

Publication number
CN113556330A
CN113556330A CN202110765447.8A CN202110765447A CN113556330A CN 113556330 A CN113556330 A CN 113556330A CN 202110765447 A CN202110765447 A CN 202110765447A CN 113556330 A CN113556330 A CN 113556330A
Authority
CN
China
Prior art keywords
business card
card information
information
signature
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110765447.8A
Other languages
Chinese (zh)
Other versions
CN113556330B (en
Inventor
殷秀玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanying Information Technology Co Ltd
Original Assignee
Shanghai Chuanying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanying Information Technology Co Ltd filed Critical Shanghai Chuanying Information Technology Co Ltd
Priority to CN202110765447.8A priority Critical patent/CN113556330B/en
Publication of CN113556330A publication Critical patent/CN113556330A/en
Application granted granted Critical
Publication of CN113556330B publication Critical patent/CN113556330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a business card information management method, a mobile terminal and a storage medium, wherein the business card information management method comprises the following steps: acquiring at least one piece of business card information, and determining the security level corresponding to each piece of business card information; encrypting the business card information according to the security levels to obtain target business card information; and acquiring signature information, and constructing a target business card based on the signature information and the target business card information. The method and the device improve the safety of the business card information.

Description

Business card information management method, mobile terminal and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a business card information management method, a mobile terminal, and a storage medium.
Background
The business card is taken as reference information for enhancing communication and mutual trust among users, and is more and more popular and even more cool along with the prevalence of social networks, for example, an AR (Augmented Reality) business card is appeared, which is obtained by enhancing an image technology through an AR, scanning and identifying a specific picture by using specific AR application software, and displaying a three-dimensional model matched with the specific picture or all corresponding business card information to the user in an AR form after identifying the specific picture.
In the course of conceiving and implementing the present application, the inventors found that at least the following problems existed: by adopting the scheme to manage the business card information, potential safety hazards exist, for example, no safety level division and verification exists for sensitive information, and all business card information can be displayed only after specific pictures are scanned and identified through AR application software, so that the sensitive information is easily leaked. Therefore, how to improve the safety of the business card information becomes a technical problem which needs to be solved urgently at present.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
In view of the above technical problems, the present application provides a business card information management method, a mobile terminal, and a storage medium, which can improve the security of business card information.
In order to solve the above technical problem, the present application provides a business card information management method, applied to a mobile terminal, including:
acquiring at least one piece of business card information, and determining the security level corresponding to each piece of business card information;
encrypting the business card information according to the security levels to obtain target business card information;
and acquiring signature information, and constructing a target business card based on the signature information and the target business card information.
Optionally, the step of obtaining at least one business card information includes:
starting a specified program entry website in a first mobile terminal, starting an information input page according to the started specified program entry website, and acquiring at least one piece of business card information in the information input page.
Optionally, the step of encrypting each piece of business card information according to each security level to obtain target business card information includes:
traversing each business card information, determining a traversal security level corresponding to the traversed business card information based on each security level, and determining whether to receive security verification information according to the traversal security level;
and if the safety verification information is received, encrypting the traversed business card information according to the safety verification information to obtain target business card information corresponding to the traversed business card information.
Optionally, the step of constructing a target business card based on the signature information and the target business card information includes:
identifying the signature information, optionally identifying the signature information based on a preset font model;
if the signature style in the signature information and/or the information definition of the signature information are identified, the signature information is used as a special signature, the incidence relation between the special signature and the target business card information is constructed, and the target business card is constructed according to the incidence relation.
Optionally, the business card information management method further includes the steps of:
determining stored business card information corresponding to the target signature information;
and acquiring verification information according to the security level corresponding to the stored business card information, and determining whether to output the stored business card information based on a verification result of the verification information.
Optionally, the step of determining the stored business card information corresponding to the target signature information includes:
starting a designated program website in a second mobile terminal, scanning a preset target signature according to the designated program website to acquire target signature information, and determining stored business card information corresponding to the target signature information.
Optionally, the step of determining the stored business card information corresponding to the target signature information includes:
determining whether the second mobile terminal supports a preset mode display requirement;
and if the second mobile terminal supports a preset mode display requirement, acquiring mode business card information corresponding to the target signature information, and taking the mode business card information as stored business card information.
Optionally, after the step of determining whether the second mobile terminal supports the preset mode display requirement, the method further includes:
and if the second mobile terminal does not support the preset mode display requirement, acquiring mode business card information corresponding to the target signature information, converting the mode business card information into webpage business card information supporting webpage display, and taking the webpage business card information as stored business card information.
Optionally, before the step of obtaining the verification information according to the security level corresponding to the stored business card information, the method further includes:
determining whether all sub-business card information in the stored business card information has security level setting;
and if target sub-business card information with safety level setting exists in each piece of sub-business card information, determining the safety level corresponding to the target sub-business card information, and taking the safety level corresponding to the target sub-business card information as the safety level corresponding to the stored business card information.
Optionally, the step of determining whether to output the stored business card information based on the verification result of the verification information includes:
if the verification result of the verification information is correct, outputting the stored business card information; or the like, or, alternatively,
and if the verification result of the verification information is wrong, continuously acquiring new verification information, and executing the step of determining whether to output the stored business card information based on the verification result of the verification information according to the new verification information.
Optionally, after the step of continuing to acquire new verification information, the method further includes:
counting the total times of acquiring new checking information and the checking information, and determining whether the total times is greater than or equal to a preset time;
and if the total times is greater than or equal to the preset times, stopping outputting the stored business card information.
The present application further provides a mobile terminal, including: the business card information management system comprises a memory and a processor, wherein the memory stores a business card information management program, and the business card information management program realizes the steps of the method when being executed by the processor.
The present application also provides a computer storage medium having a computer program stored thereon, which, when being executed by a processor, carries out the steps of the method as described above.
As described above, according to the business card information management method, the security level corresponding to at least one piece of business card information is determined, the business card information is encrypted according to the security levels to obtain the target business card information, and the target business card is constructed according to the signature information and the target business card information, so that the phenomenon that the business card information is leaked due to the fact that the business card information is not encrypted is avoided, and the security of the business card information is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic hardware structure diagram of a mobile terminal implementing various embodiments of the present application;
fig. 2 is a communication network system architecture diagram according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a business card information management method according to the first embodiment;
fig. 4 is a flowchart illustrating a business card information management method according to a third embodiment;
FIG. 5 is a schematic diagram of a scene of a handwritten signature in the business card information management method of the present application;
FIG. 6 is a schematic view of a process for inputting business card information in the business card information management method of the present application;
fig. 7 is a schematic view of a flow chart for viewing business card information in the business card information management method of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings. With the above figures, there are shown specific embodiments of the present application, which will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of an element by the phrase "comprising an … …" does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element, and further, where similarly-named elements, features, or elements in different embodiments of the disclosure may have the same meaning, or may have different meanings, that particular meaning should be determined by their interpretation in the embodiment or further by context with the embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or," "and/or," "including at least one of the following," and the like, as used herein, are to be construed as inclusive or mean any one or any combination. For example, "includes at least one of: A. b, C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C ", again for example," A, B or C "or" A, B and/or C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C'. An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that step numbers such as S10 and S20 are used herein for the purpose of more clearly and briefly describing the corresponding content, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S20 first and then S10 in specific implementation, which should be within the scope of the present application.
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
The mobile terminal may be implemented in various forms. For example, the mobile terminal described in the present application may include mobile terminals such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and fixed terminals such as a Digital TV, a desktop computer, and the like.
The following description will be given taking a mobile terminal as an example, and it will be understood by those skilled in the art that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present application, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Optionally, the light sensor includes an ambient light sensor that may adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 1061 and/or the backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Alternatively, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Optionally, the touch detection device detects a touch orientation of a user, detects a signal caused by a touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. Optionally, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited thereto.
Alternatively, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a program storage area and a data storage area, and optionally, the program storage area may store an operating system, an application program (such as a sound playing function, an image playing function, and the like) required by at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor and a modem processor, optionally, the application processor mainly handles operating systems, user interfaces, application programs, etc., and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present application, a communication network system on which the mobile terminal of the present application is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present disclosure, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Optionally, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Alternatively, the eNodeB2021 may be connected with other enodebs 2022 through a backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. Optionally, the MME2031 is a control node that handles signaling between the UE201 and the EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present application is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, various embodiments of the present application are provided.
First embodiment, referring to fig. 3, fig. 3 is a schematic flow chart of a first embodiment of a business card information management method of the present invention, and the business card information management method includes:
step S10, obtaining at least one business card information, and determining the security level corresponding to each business card information;
because the current business card information (such as AR (Augmented Reality) business card information) needs to be acquired by adopting the mobile terminal to support the AR device, and a specific APP (application) application needs to be downloaded in the mobile terminal, and the specific picture is scanned by the APP application to be acquired, the convenience of sharing and using is reduced. And after the scanning identification succeeds, all the business card information can be directly displayed, sensitive information is easy to leak, and the safety of the business card information cannot be guaranteed. Therefore, in this embodiment, when the user enters the business card information and/or obtains the business card information, the user does not need to download the specified APP application from the mobile terminal, and the specified website can be opened by using the Web browser, so that the business card information can be managed and controlled when the mobile terminal does not support the AR device, for example, the business card information is entered or displayed. In the embodiment, the identity recognition can be realized in a handwriting signature machine recognition mode without using a specific pattern or a card with the specific pattern, that is, a user can perform the identity recognition by using a handwriting signature at any time and any place, that is, a specified website is directly opened through a browser, an AR is started to scan the handwriting signature for the identity recognition, and after the identity recognition is successful, business card information corresponding to the signature is presented in an AR form or other forms (such as a webpage form).
In addition, in the embodiment, a security level and a security verification mode can be set for each business card information, so that the security of each business card information is protected, and information leakage is avoided. Therefore, when the business card is created, corresponding safety level and safety verification mode can be set for each business card information, so that certain protection measures can be provided during subsequent business card information display, and the business card information is prevented from being leaked. Therefore, in this embodiment, when the business card creator opens the specified program entry website through the browser of the mobile terminal (i.e., the first mobile terminal) owned by the business card creator and enters the corresponding information input page, the first mobile terminal may obtain at least one piece of business card information (such as identity information, telephone number, position, and other information) of the business card creator, and obtain the security level of each business card information of the business card creator, so as to determine the security level corresponding to each business card information.
The business card information can be obtained by local selection or network downloading besides the user input path.
Step S20, encrypting each business card information according to each security level to obtain target business card information;
after the security level corresponding to each business card information is determined, each business card information can be encrypted according to different security levels, and different verification modes can be set for the business card information with different security levels. For example, basic information such as user name, gender and the like can be set without safety restriction, namely the safety level is lowest, and a business card viewer can view the information without verifying the information; the user photo, the phone, the mailbox and other privacy safety information set higher safety levels, different privacy safety information can set different verification modes, and a subsequent business card viewer can only view the corresponding privacy safety information by inputting correct verification information. And the setting of the verification mode can be from simple to difficult security verification information according to different levels of security levels, such as setting simple verification information (such as 'last name' of a business card owner) and setting complex verification information (such as a special information password). And in the present embodiment, each encrypted business card information is taken as the target business card information.
And step S30, acquiring signature information, and constructing a target business card based on the signature information and the target business card information.
The first mobile terminal obtains at least one piece of business card information of a business card creator, performs encryption setting, and obtains target business card information, and then needs to obtain signature information entered by the business card creator, wherein the method for obtaining the signature information may be that the business card creator writes at least one signature on a card or paper by hand, as shown in fig. 5, the signature is "tecno" by hand. And then, scanning through the first mobile terminal to extract signature information of the handwritten signature, identifying the extracted signature information according to a preset acquired handwritten font model, if key characteristic points (namely, signature style) in the signature information and the meaning (namely, information definition) of the signature information can be identified, directly taking the signature corresponding to the signature information as a special signature, then creating an association relationship between the special signature and target business card information, and after the creation of the association relationship is completed, taking the special signature and the target business card information as the target business card created by a business card creator. The subsequent business card creator can provide the handwritten signature to others, so that others can check the target business card of the business card creator according to the handwritten signature to obtain the target business card information contained in the target business card. In addition, it should be noted that, in the present embodiment, the creation process of the AR business card may be performed with reference to the above steps, but the business card in the present embodiment is not limited to the AR business card.
In addition, to assist understanding of the process of creating the target business card in the present embodiment, the following description is made by way of example.
As shown in fig. 6, at the beginning of the business card creation, the business card creator may first open the smart device browser, that is, the browser of the first mobile terminal is opened, and a Web (World Wide Web) program website is input in the browser, so as to open the Web program website, input AR business card information into the page opened by the Web program website, set the security level of the identity information in the business card according to the input AR business card information, setting different business card information check information according to different security levels to complete encryption of each business card information to obtain target business card information, then acquiring handwritten signature information input by a business card creator, identifying, after the identification is successful, the signature is used as a special signature, the association relationship between the special signature and the target business card information is established, and the special signature (namely, a handwritten signature) is used as a medium for acquiring the target business card information. Subsequent business card creators may share business cards with handwritten signatures or their photographs until the end.
In this embodiment, the security level corresponding to at least one piece of business card information is determined, each piece of business card information is encrypted according to each security level to obtain target business card information, and a target business card is constructed according to the signature information and the target business card information, so that the phenomenon that the business card information is leaked due to the fact that each piece of business card information is not encrypted is avoided, and the security of the business card information is improved.
Optionally, based on the first embodiment of the present invention, a second embodiment of the business card information management method of the present invention is provided, in this embodiment, step S10 in the above embodiment is a refinement of the step of obtaining at least one piece of business card information, and includes:
step a, starting a specified program entry website in a first mobile terminal, starting an information input page according to the started specified program entry website, and acquiring at least one piece of business card information in the information input page.
In this embodiment, a target business card is created in a first mobile terminal, and when at least one piece of business card information of a business card creator is obtained, a browser in the first mobile terminal may be started first, a specified program entry website (i.e., a page website) in the browser is started, an information input page is opened according to the started specified program entry website, and the information input page is displayed on a display page of the first mobile terminal, so that the business card creator inputs corresponding business card information in the information input page, that is, the first mobile terminal obtains at least one piece of business card information (such as identity, contact information and the like) of the business card creator through the information input page.
In the embodiment, at least one piece of business card information is acquired from the information input page corresponding to the started specified program entry website, so that the phenomenon that the mobile terminal needs to download a specific application program to enter the business card information is avoided.
Optionally, the step of encrypting each piece of business card information according to each security level to obtain target business card information includes:
b, traversing each business card information, determining a traversal security level corresponding to the traversed business card information based on each security level, and determining whether security verification information is received or not according to the traversal security level;
in this embodiment, after receiving each piece of business card information, each piece of business card information may be traversed, and according to a security level set in advance, a security level corresponding to the traversed business card information is determined, and is used as a traversal security level, and it is then determined whether the traversed business card information needs to be encrypted under the traversal security level, and if the traversed business card information needs to be encrypted, security verification information of a business card creator needs to be acquired, so as to facilitate encryption. It is therefore necessary to determine whether security authentication information is received in the first mobile terminal in order to perform different operations according to different determination results. Alternatively, the security verification information may be any information of the creator of the business card, such as a special character, a name, and the like.
And c, if the safety verification information is received, encrypting the traversed business card information according to the safety verification information to obtain target business card information corresponding to the traversed business card information.
After the security verification information is received in the first mobile terminal, the traversed business card information can be directly encrypted according to the security verification information, namely when the traversed business card information is to be viewed subsequently, the right of viewing is granted only by inputting correct security verification information, and after the encryption is completed, the encrypted traversed business card information is used as the target business card information corresponding to the traversed business card information. In addition, in this embodiment, at least one piece of business card information is operated in the same manner to obtain corresponding target business card information.
In this embodiment, by traversing each piece of business card information and determining the traversal security level corresponding to the traversed business card information, if the security verification information is received, the traversed business card information is encrypted according to the security verification information to obtain the target business card information corresponding to the traversed business card information, thereby ensuring effective encryption of the business card information and avoiding leakage of the business card information.
Optionally, the step of constructing a target business card based on the signature information and the target business card information includes:
d, identifying the signature information, and optionally identifying the signature information based on a preset font model;
and e, if the signature style in the signature information and/or the information definition of the signature information are identified, taking the signature corresponding to the signature information as a special signature, constructing an association relation between the special signature and the target business card information, and constructing the target business card according to the association relation.
In this embodiment, after the signature information is scanned, the signature information is identified through a font model set in advance, if a key feature point (i.e., a signature style, such as a regular script, an song script, and the like) in the signature information and a meaning (i.e., an information definition, such as a name, and the like) of the signature information can be identified, a signature corresponding to the signature information is directly used as a special signature, then an association relationship between the special signature and target business card information is created, and after the association relationship is created, the special signature and the target business card information can be used as a target business card created by a business card creator. The subsequent business card creator can provide the handwritten signature to others, so that others can check the target business card of the business card creator according to the handwritten signature to obtain the target business card information contained in the target business card. Optionally, if the identification fails or the signature style and/or the information definition in the signature information cannot be identified, the new signature information is obtained again, and the identification operation is continued until the signature style and/or the information definition of the new signature information is identified, so as to determine the special signature.
In the embodiment, the signature information is identified according to the font model set in advance, and when the signature style and/or the information definition are identified, the signature information is used as the special signature, and then the association relationship between the special signature and the target business card information is constructed to construct the target business card, so that the accuracy of the obtained target business card is guaranteed.
Optionally, based on the first or second embodiment of the present invention, a third embodiment of the business card information management method of the present invention is provided, referring to fig. 4, where fig. 4 is a flowchart illustrating the third embodiment of the business card information management method of the present invention, the business card information management method further includes:
step S40, determining the stored business card information corresponding to the target signature information;
in this embodiment, after the target business card is created, if the business card information of a certain business card needs to be acquired and displayed, at this time, a business card viewer (i.e., a user who needs to view the business card) can open a terminal (i.e., a second mobile terminal) held by the business card viewer. At this time, the browser of the intelligent device in the second mobile terminal is started, and enters the designated program website, that is, the designated program entry website, and starts the corresponding webpage, and then the card or paper with the signature held by the name card viewer is scanned through the scanning function in the webpage to obtain the signature information, and the signature information is used as the target signature information. And identifying the target signature information to determine business card information corresponding to the target signature information, namely storing the business card information.
Step S50, obtaining verification information according to the security level corresponding to the stored business card information, and determining whether to output the stored business card information based on the verification result of the verification information.
After the stored business card information corresponding to the target signature information is obtained, it is required to determine whether security level setting exists in at least one piece of business card information (namely sub-business card information) in the stored business card information. If the security level is not set, the security level of all the sub-business card information is defaulted to be the lowest, and then all the stored business card information can be output. And/or if the security level setting exists, acquiring verification information of the business card viewer, verifying the verification information, and if the verification result is successful, outputting corresponding sub-business card information. And/or if the verification result is failure, continuously acquiring new verification information and continuously performing verification. If the number of times of failure of the verification result exceeds a certain number of times, namely the total number of times of all the acquired verification information is greater than or equal to a preset number of times (which can be any number of times set in advance by a user or any number of times automatically determined or generated according to user use habits or big data analysis), at this moment, warning information can be sent to a business card owner corresponding to the stored business card information, and the stored business card information is stopped being output.
In addition, in order to assist understanding of the process of acquiring business card information in the present embodiment, an example is described below.
For example, as shown in fig. 7, when the business Card information viewing operation is started, the browser of the smart device is opened, that is, the browser of the second mobile terminal is opened, and the Web site of the Web program is input into the browser, so as to open the Web site of the Web program, then the Card or the paper with the business Card signature information is scanned, and it is detected whether the second mobile terminal supports the AR platform, if so, the AR Card (that is, the AR business Card information) is attached to the Card/paper to move. And/or if not, converting the AR Card (namely AR business Card information) into webpage business Card information and presenting the webpage business Card information in a static state. And when the business card information has the security level, the identity business card information with the security level can be checked, the password of the business card viewer is acquired, the password is checked, and if the password is correct, the business card information is checked and acquired. And/or, if wrong, re-checking, i.e. acquiring a new checking "password". And after detecting and finding errors for multiple times (for example, the error times reach the preset times, such as 3 times), the server side sends warning information to the name card owner, so that the name card owner can modify the information security level and verify the password until the end.
For another example, the name card viewer may simulate the signature handwriting of the name card owner on paper, scan and identify the signature handwriting through the opened website in the second mobile terminal, determine whether the handwritten signature is wrong, and if the handwritten signature is determined to be wrong, no name card information may be displayed. If the identification is successful, the system determines the sense of the handwritten signature, if the sense is identified as 'Tecno' and the signature system has a sense 'Tecno' signature, the system automatically sends a safety warning when the sense of the signature is identified more than twice and the comprehensive matching rate of signature characteristics is below 85 percent: the "someone is imitating signature information" is notified to the business card owner. And/or if the signature meanings are the same and the comprehensive matching rate of signature characteristics is more than 85%, the business card viewer can scan and obtain business card information according to correct signature information, the business card viewer can click an address information button on the second mobile terminal at the moment, the second mobile terminal can pop up a security check password for verification, the business card viewer can input a corresponding password for verification, and if the verification is successful, the correct business card information can be popped up for the business card viewer to view.
In this embodiment, the stored business card information corresponding to the target signature information is determined, the verification information is obtained according to the security level corresponding to the stored business card information, and whether the stored business card information is output or not is determined based on the verification result of the verification information, so that the phenomenon that the business card information is leaked due to the fact that the business card information is not encrypted is avoided, and the security of the business card information is improved.
Optionally, based on the third embodiment of the present invention, a fourth embodiment of the business card information management method of the present invention is proposed, in this embodiment, in step S40 in the above embodiment, a refinement of the step of determining the stored business card information corresponding to the target signature information includes:
step g, starting a designated program website in the second mobile terminal, scanning a preset target signature according to the designated program website to obtain target signature information, and determining the stored business card information corresponding to the target signature information.
In this embodiment, when the business card information is viewed, the browser in the second mobile terminal is started, the specified program website (i.e., the page website) in the browser is started, and then the card or paper with the signature held by the business card viewer is scanned according to the scanning function carried in the started specified program website to obtain the signature information, which is used as the target signature information. And identifying the target signature information to determine business card information corresponding to the target signature information, namely storing the business card information.
In this embodiment, the preset target signature is scanned according to the started designated program website to obtain the target signature information, and then the stored business card information corresponding to the target signature information is determined, so that the accuracy of the obtained stored business card information is guaranteed.
Optionally, the step of determining the stored business card information corresponding to the target signature information includes:
step h, determining whether the second mobile terminal supports a preset mode display requirement;
in this embodiment, after determining to store the business card information, it is further required to determine whether the second mobile terminal supports a preset mode display requirement, so as to perform different operations according to different determination results. Optionally, the mode display requirement may be that the stored business card information is output in different display modes, such as AR platform display requirement.
And k, if the second mobile terminal supports a preset mode display requirement, acquiring mode business card information corresponding to the target signature information, and taking the mode business card information as stored business card information.
When the second mobile terminal supports the preset mode display requirement, the mode business card information corresponding to the target signature information can be directly acquired from the webpage corresponding to the appointed program website, the mode business card information is used as the stored business card information, and the mode business card information is directly output in the format corresponding to the mode display requirement when the stored business card information is output. For example, the AR platform requires the corresponding mode to display and store the business card information.
In this embodiment, when it is determined that the second mobile terminal supports the preset mode display requirement, the mode signature information corresponding to the target signature information is acquired and is used as the stored business card information, so that the validity of the acquired stored business card information is guaranteed.
Optionally, after the step of determining whether the second mobile terminal supports the preset mode display requirement, the method further includes:
and m, if the second mobile terminal does not support the preset mode display requirement, acquiring mode business card information corresponding to the target signature information, converting the mode business card information into webpage business card information supporting webpage display, and taking the webpage business card information as stored business card information.
In this embodiment, when it is determined that the second mobile terminal does not support the preset mode display requirement, the mode business card information corresponding to the target signature information may be directly obtained from the web page corresponding to the specified program website, the mode business card information may be converted into web page business card information supporting web page display, the web page business card information may be used as stored business card information, and the stored business card information may be output in a manner of presenting static web page information when the stored business card information is output.
In this embodiment, when the second mobile terminal does not support the preset mode display requirement, the mode business card information corresponding to the target signature information is converted into the web page business card information, and the web page business card information is used as the stored business card information, so that the effectiveness of the acquired stored business card information is guaranteed.
Optionally, before the step of obtaining the verification information according to the security level corresponding to the stored business card information, the method further includes:
n, determining whether all sub-business card information in the stored business card information has security level setting;
in this embodiment, after determining to store the business card information, all sub-business card information, such as identity information, mailbox information, telephone information, address information, and the like, in the stored business card information needs to be determined first. And detecting whether the sub-business card information has the security level setting or not, and executing different operations according to different determination results.
And p, if target sub-business card information with safety level setting exists in each piece of sub-business card information, determining the safety level corresponding to the target sub-business card information, and taking the safety level corresponding to the target sub-business card information as the safety level corresponding to the stored business card information.
When it is found through judgment that sub-business card information with safety level setting exists in each sub-business card information, namely target sub-business card information, the safety level corresponding to the target sub-business card information needs to be determined, and the safety level corresponding to the target sub-business card information is used as the safety level corresponding to the stored business card information, at the moment, verification information for decrypting the target sub-business card information needs to be acquired, so that the stored business card information is displayed.
In this embodiment, when it is determined that the stored business card information has the target sub-business card information with the set security level, the security level corresponding to the target sub-business card information is used as the security level corresponding to the stored business card information, so that the validity of the security level corresponding to the obtained stored business card information is ensured.
Optionally, the step of determining whether to output the stored business card information based on the verification result of the verification information includes:
step q, if the verification result of the verification information is correct, outputting the stored business card information; or the like, or, alternatively,
in this embodiment, after the verification information is acquired and verified, if the verification result of the verification information is correct, the sub-business card information corresponding to the verification information may be output, and all the sub-business card information is verified, and the verification result is correct, the complete stored business card information may be output.
And step x, if the verification result of the verification information is wrong, continuously acquiring new verification information, and executing the step of determining whether to output the stored business card information based on the verification result of the verification information according to the new verification information.
And when the verification result of the verification information is judged to be an error, continuously acquiring new verification information and verifying the new verification information. When the number of times that the verification result is detected to be failed exceeds a certain number of times, namely the total number of times of all the acquired verification information is greater than or equal to a preset number of times (which can be any number of times set by a user in advance, or any number of times automatically determined or generated according to user use habits or big data analysis), at the moment, warning information can be sent to a business card owner corresponding to the stored business card information, and the stored business card information is stopped from being output.
In this embodiment, when the verification result of the verification information is determined to be correct, the stored business card information is output, or when the verification result is failed, new verification information is acquired, and the step of determining whether to output the stored business card information based on the verification result of the verification information is performed in a centralized manner, so that the leakage of the business card information is avoided.
Optionally, after the step of continuing to acquire new verification information, the method further includes:
step y, counting the total times of acquiring new checking information and the checking information, and determining whether the total times is greater than or equal to a preset time;
in this embodiment, when the new verification information is continuously obtained, the number of times of obtaining the new verification information and the verification information, that is, the total number of times, is also counted, the total number of times is compared with the preset number of times, whether the total number of times is greater than or equal to the preset number of times is determined, and different operations are executed according to different determination results.
And step z, if the total times is greater than or equal to the preset times, stopping outputting the stored business card information.
And when the total times is larger than or equal to the preset times through judgment, stopping outputting the stored business card information, and sending warning information to a business card owner corresponding to the stored business card information through the server so that the business card owner can modify the information security level and check the information.
In this embodiment, when the total number of times of counting the new verification information and the verification information is greater than or equal to the preset number of times, the business card information is stopped being output and stored, so that the business card information is prevented from being leaked, and the safety of the business card information is guaranteed.
The application also provides a mobile terminal, which comprises a memory and a processor, wherein the memory is stored with a business card information management program, and the business card information management program realizes the steps of the business card information management method in any embodiment when being executed by the processor.
The present application further provides a computer-readable storage medium, in which a business card information management program is stored, and when being executed by a processor, the business card information management program implements the steps of the business card information management method in any of the above embodiments.
In the embodiments of the mobile terminal and the computer-readable storage medium provided by the present application, all technical features of the embodiments of the business card information management method are included, and the expanding and explaining contents of the specification are basically the same as those of the embodiments of the method, and are not described herein again.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method in the above various possible embodiments.
Embodiments of the present application further provide a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method in the above various possible embodiments.
It is to be understood that the foregoing scenarios are only examples, and do not constitute a limitation on application scenarios of the technical solutions provided in the embodiments of the present application, and the technical solutions of the present application may also be applied to other scenarios. For example, as can be known by those skilled in the art, with the evolution of system architecture and the emergence of new service scenarios, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device in the embodiment of the application can be merged, divided and deleted according to actual needs.
In the present application, the same or similar term concepts, technical solutions and/or application scenario descriptions will be generally described only in detail at the first occurrence, and when the description is repeated later, the detailed description will not be repeated in general for brevity, and when understanding the technical solutions and the like of the present application, reference may be made to the related detailed description before the description for the same or similar term concepts, technical solutions and/or application scenario descriptions and the like which are not described in detail later.
In the present application, each embodiment is described with emphasis, and reference may be made to the description of other embodiments for parts that are not described or illustrated in any embodiment.
The technical features of the technical solution of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present application should be considered as being described in the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, memory Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (13)

1. A business card information management method is characterized by comprising the following steps:
acquiring at least one piece of business card information, and determining the security level corresponding to each piece of business card information;
encrypting the business card information according to the security levels to obtain target business card information;
and acquiring signature information, and constructing a target business card based on the signature information and the target business card information.
2. The method of claim 1, wherein the step of obtaining at least one business card information comprises:
starting a specified program entry website in a first mobile terminal, starting an information input page according to the started specified program entry website, and acquiring at least one piece of business card information in the information input page.
3. The method of claim 1, wherein said step of encrypting each of said business card information according to each of said security levels to obtain target business card information comprises:
traversing each business card information, determining a traversal security level corresponding to the traversed business card information based on each security level, and determining whether to receive security verification information according to the traversal security level;
and if the safety verification information is received, encrypting the traversed business card information according to the safety verification information to obtain target business card information corresponding to the traversed business card information.
4. The method of claim 1, wherein said step of constructing a target business card based on said signature information and said target business card information comprises:
identifying the signature information based on a preset font model;
if the signature style in the signature information and/or the information definition of the signature information are identified, the signature information is used as a special signature, the incidence relation between the special signature and the target business card information is constructed, and the target business card is constructed according to the incidence relation.
5. The method of any one of claims 1 to 4, further comprising the steps of:
determining stored business card information corresponding to the target signature information;
and acquiring verification information according to the security level corresponding to the stored business card information, and determining whether to output the stored business card information based on a verification result of the verification information.
6. The method of claim 5, wherein the step of determining the stored business card information corresponding to the target signature information comprises:
starting a designated program website in a second mobile terminal, scanning a preset target signature according to the designated program website to acquire target signature information, and determining stored business card information corresponding to the target signature information.
7. The method of claim 6, wherein the step of determining the stored business card information corresponding to the target signature information comprises:
determining whether the second mobile terminal supports a preset mode display requirement;
and if the second mobile terminal supports a preset mode display requirement, acquiring mode business card information corresponding to the target signature information, and taking the mode business card information as stored business card information.
8. The method of claim 7, wherein the step of determining whether the second mobile terminal supports the preset mode display requirement is followed by further comprising:
and if the second mobile terminal does not support the preset mode display requirement, acquiring mode business card information corresponding to the target signature information, converting the mode business card information into webpage business card information supporting webpage display, and taking the webpage business card information as stored business card information.
9. The method as claimed in claim 5, wherein before the step of obtaining the verification information according to the security level corresponding to the stored business card information, the method further comprises:
determining whether all sub-business card information in the stored business card information has security level setting;
and if target sub-business card information with safety level setting exists in each piece of sub-business card information, determining the safety level corresponding to the target sub-business card information, and taking the safety level corresponding to the target sub-business card information as the safety level corresponding to the stored business card information.
10. The method of claim 5, wherein the step of determining whether to output the stored business card information based on the result of the verification information comprises:
if the verification result of the verification information is correct, outputting the stored business card information; or the like, or, alternatively,
and if the verification result of the verification information is wrong, continuously acquiring new verification information, and executing the step of determining whether to output the stored business card information based on the verification result of the verification information according to the new verification information.
11. The method of claim 10, wherein after the step of continuing to obtain new verification information, further comprising:
counting the total times of acquiring new checking information and the checking information, and determining whether the total times is greater than or equal to a preset time;
and if the total times is greater than or equal to the preset times, stopping outputting the stored business card information.
12. A mobile terminal, characterized in that the mobile terminal comprises: a memory, a processor, wherein said memory has stored thereon a business card information management program, said business card information management program when executed by said processor implementing the steps of a business card information management method according to any one of claims 1 to 11.
13. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when executed by a processor, realizes the steps of the business card information management method according to any one of claims 1 to 11.
CN202110765447.8A 2021-07-06 2021-07-06 Business card information management method, mobile terminal and storage medium Active CN113556330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110765447.8A CN113556330B (en) 2021-07-06 2021-07-06 Business card information management method, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110765447.8A CN113556330B (en) 2021-07-06 2021-07-06 Business card information management method, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN113556330A true CN113556330A (en) 2021-10-26
CN113556330B CN113556330B (en) 2023-03-24

Family

ID=78102790

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110765447.8A Active CN113556330B (en) 2021-07-06 2021-07-06 Business card information management method, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113556330B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007288546A (en) * 2006-04-18 2007-11-01 Nippon Telegr & Teleph Corp <Ntt> Method of verifying name card with autograph, and encryption communication method using the same
US20120190405A1 (en) * 2011-01-23 2012-07-26 YouSendIt System and Method for Capturing Augmented Reality Electronic Signatures
CN102982100A (en) * 2012-11-05 2013-03-20 上海合合信息科技发展有限公司 Method for visiting card electronization
CN103235946A (en) * 2013-04-08 2013-08-07 上海合合信息科技发展有限公司 Divulgence-preventive processing method for artificially identifying information of business cards
US20140164772A1 (en) * 2012-12-07 2014-06-12 At&T Intellectual Property I, L.P. Augmented reality based privacy and decryption
CN107370840A (en) * 2017-08-17 2017-11-21 深圳增强现实技术有限公司 Name card management system and augmented reality terminal
CN107862096A (en) * 2017-12-08 2018-03-30 快创科技(大连)有限公司 A kind of company information AC system based on AR augmented realities
CN109117778A (en) * 2018-08-06 2019-01-01 百度在线网络技术(北京)有限公司 Information processing method, device, server and storage medium
CN109155750A (en) * 2017-01-22 2019-01-04 华为技术有限公司 A kind of communication means and equipment
CN109660359A (en) * 2019-01-22 2019-04-19 上海易酷信息技术服务有限公司 Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card
CN112597851A (en) * 2020-12-15 2021-04-02 泰康保险集团股份有限公司 Signature acquisition method and device, electronic equipment and storage medium
CN112769674A (en) * 2019-11-06 2021-05-07 腾讯科技(深圳)有限公司 Mailbox signature generation method and device, readable storage medium and computer equipment
US20210150773A1 (en) * 2019-11-19 2021-05-20 Brightline System and method for generating an augmented reality experience
WO2021112340A1 (en) * 2019-12-06 2021-06-10 주식회사 시큐브 Apparatus and method for authenticating concealed handwritten signature

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007288546A (en) * 2006-04-18 2007-11-01 Nippon Telegr & Teleph Corp <Ntt> Method of verifying name card with autograph, and encryption communication method using the same
US20120190405A1 (en) * 2011-01-23 2012-07-26 YouSendIt System and Method for Capturing Augmented Reality Electronic Signatures
CN102982100A (en) * 2012-11-05 2013-03-20 上海合合信息科技发展有限公司 Method for visiting card electronization
US20140164772A1 (en) * 2012-12-07 2014-06-12 At&T Intellectual Property I, L.P. Augmented reality based privacy and decryption
CN103235946A (en) * 2013-04-08 2013-08-07 上海合合信息科技发展有限公司 Divulgence-preventive processing method for artificially identifying information of business cards
CN109155750A (en) * 2017-01-22 2019-01-04 华为技术有限公司 A kind of communication means and equipment
CN107370840A (en) * 2017-08-17 2017-11-21 深圳增强现实技术有限公司 Name card management system and augmented reality terminal
CN107862096A (en) * 2017-12-08 2018-03-30 快创科技(大连)有限公司 A kind of company information AC system based on AR augmented realities
CN109117778A (en) * 2018-08-06 2019-01-01 百度在线网络技术(北京)有限公司 Information processing method, device, server and storage medium
CN109660359A (en) * 2019-01-22 2019-04-19 上海易酷信息技术服务有限公司 Generate the method, equipment and the method for generating the credible address of HD wallet of HD wallet business card
CN112769674A (en) * 2019-11-06 2021-05-07 腾讯科技(深圳)有限公司 Mailbox signature generation method and device, readable storage medium and computer equipment
US20210150773A1 (en) * 2019-11-19 2021-05-20 Brightline System and method for generating an augmented reality experience
WO2021112340A1 (en) * 2019-12-06 2021-06-10 주식회사 시큐브 Apparatus and method for authenticating concealed handwritten signature
CN112597851A (en) * 2020-12-15 2021-04-02 泰康保险集团股份有限公司 Signature acquisition method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113556330B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN107506646B (en) Malicious application detection method and device and computer readable storage medium
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN107240157B (en) Near field communication security control method, mobile terminal and computer readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN110180181B (en) Method and device for capturing wonderful moment video and computer readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN107422956B (en) Mobile terminal operation response method, mobile terminal and readable storage medium
US20220215680A1 (en) Note information display method, note information sending method, and electronic device
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN109446794B (en) Password input method and mobile terminal thereof
WO2021083086A1 (en) Information processing method and device
CN109547622B (en) Verification method and terminal equipment
CN111931155A (en) Verification code input method, verification code input equipment and storage medium
CN109711198B (en) Application management method, mobile terminal and storage medium
CN108400994B (en) User authentication method, mobile terminal, server, and computer-readable storage medium
CN107172076B (en) Security verification method, mobile terminal and server side
CN113556330B (en) Business card information management method, mobile terminal and storage medium
CN115617293A (en) Data processing method, source end screen projection equipment and storage medium
CN110717163B (en) Interaction method and terminal equipment
CN108197490B (en) Method and terminal for preventing malicious acquisition of user authorization information
CN108377236B (en) Verification method and mobile terminal
CN107563210B (en) Information processing method, terminal and computer readable storage medium
CN114125851B (en) Information processing method, mobile terminal and readable storage medium
CN107563322B (en) Fingerprint input device, fingerprint input method and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant