CN114125851B - Information processing method, mobile terminal and readable storage medium - Google Patents

Information processing method, mobile terminal and readable storage medium Download PDF

Info

Publication number
CN114125851B
CN114125851B CN202111053833.0A CN202111053833A CN114125851B CN 114125851 B CN114125851 B CN 114125851B CN 202111053833 A CN202111053833 A CN 202111053833A CN 114125851 B CN114125851 B CN 114125851B
Authority
CN
China
Prior art keywords
signature
preset
information
terminal
business card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111053833.0A
Other languages
Chinese (zh)
Other versions
CN114125851A (en
Inventor
殷秀玉
彭京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Holdings Co Ltd
Original Assignee
Shenzhen Transsion Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Holdings Co Ltd filed Critical Shenzhen Transsion Holdings Co Ltd
Priority to CN202111053833.0A priority Critical patent/CN114125851B/en
Publication of CN114125851A publication Critical patent/CN114125851A/en
Application granted granted Critical
Publication of CN114125851B publication Critical patent/CN114125851B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location

Abstract

The application discloses an information processing method, a mobile terminal and a readable storage medium, wherein the information processing method comprises the following steps: confirming target signature information corresponding to the first picture; acquiring a preset position corresponding to the target signature information, and judging whether the terminal position is matched with the preset position; and displaying corresponding information according to the matching result. The business card information checking method and device can guarantee the safety of business card information and improve the convenience of business card information checking.

Description

Information processing method, mobile terminal and readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an information processing method, a mobile terminal, and a readable storage medium.
Background
The business card is used as a reference information for enhancing communication and mutual trust among users, is popular and even cool with the prevalence of social networks, and is characterized in that an AR (Augmented Reality ) business card is generated, a specific image is scanned and identified by using specific AR application software, and after the specific image is identified, a three-dimensional model matched with the specific image or all corresponding business card information is displayed to the users in an AR mode.
In the process of designing and implementing the present application, the inventors found that at least the following problems exist: by adopting the scheme to manage the business card information, potential safety hazards exist, even if a verification process is additionally arranged for checking the business card information, the verification process does not distinguish the positions of the users, for example, the safety places where the business card is checked frequently are compared with the safety undetermined places where the business card is checked frequently, so that the users need to verify even in the safety places, the unnecessary verification time is increased, and the user experience is poor.
The foregoing description is provided for general background information and does not necessarily constitute prior art.
Disclosure of Invention
Aiming at the technical problems, the application provides an information processing method, a mobile terminal and a storage medium, which can improve the convenience of viewing business card information while ensuring the safety of the business card information.
In order to solve the technical problems, the application provides an information processing method which can be applied to a mobile terminal and comprises the following steps:
s20, acquiring a preset position corresponding to the target signature information, and judging whether the terminal position is matched with the preset position;
s30, displaying corresponding information according to the matching result.
Optionally, before the step S20, the method further includes:
s10, confirming target signature information corresponding to the first picture.
Optionally, the step of confirming the target signature information corresponding to the first picture includes:
carrying out signature recognition on the first picture to obtain a first signature meaning and a first signature characteristic of signature handwriting in the first picture;
acquiring a first preset signature characteristic corresponding to the first signature meaning, and determining the characteristic matching degree of the first preset signature characteristic and the first signature characteristic;
and if the feature matching degree is greater than or equal to a preset matching degree threshold, taking the first signature meaning and the first preset signature feature as target signature information.
Optionally, after the step of performing signature recognition on the first picture to obtain the first signature meaning and the first signature feature of the signature handwriting in the first picture, the method further includes:
determining whether the first signature meaning exists in a preset signature database;
if yes, a first preset signature feature corresponding to the first signature meaning is obtained, and the feature matching degree of the first preset signature feature and the first signature feature is determined; and/or the number of the groups of groups,
If not, a prompt that the first picture does not contain business card information is sent to the terminal.
Optionally, after the step of determining the feature matching degree of the preset signature feature and the first signature feature, at least one of the following is further included:
if the feature matching degree is smaller than a preset matching degree threshold, a signature recognition error prompt is sent to the terminal, and/or the times that the feature matching degree is smaller than the preset matching degree threshold are recorded;
and if the number of times that the feature matching degree is smaller than the preset matching degree threshold is larger than or equal to a first preset number of times threshold, sending a signature forging warning to a signature attribution user corresponding to the first preset signature feature.
Optionally, the step S20 includes at least one of:
if the terminal position is the same as the preset safe place set, determining that the terminal position is matched with the preset position;
and if the terminal position does not exist in the preset safe place set corresponding to the target signature information, determining that the terminal position is not matched with the preset position.
Optionally, the step S20 includes:
determining the distance between the terminal position and a preset safe place in a preset safe place set corresponding to the target signature information;
If the distance between the terminal position and at least one preset safety place is smaller than or equal to a preset distance threshold value, determining that the terminal position is matched with the preset position; and/or the number of the groups of groups,
and if the distance between the terminal position and any preset safety place is greater than a preset distance threshold value, determining that the terminal position is not matched with the preset position.
Optionally, the step S30 includes:
if the terminal position is matched with the preset position, acquiring target business card information corresponding to the target signature information;
and sending the target business card information to the terminal so as to display the target business card information through the terminal.
Optionally, the method further comprises:
receiving a verification information modification instruction, and determining new verification information according to the verification information modification instruction, wherein the verification information modification instruction is optionally sent by a signature attribution user;
and outputting the new verification information through the terminal so as to carry out information security verification through the new verification information.
Optionally, before step S10, the method further includes:
receiving a second picture sent by a second terminal and a preset security location corresponding to the second picture;
identifying the second picture and determining second signature information corresponding to the second picture;
Storing the second signature information in association with the preset security location;
the step S20 comprises the following steps:
and acquiring the associated preset safe place according to the target signature information as a preset position.
Optionally, the step S30 further includes:
determining whether the terminal supports a preset display mode;
if yes, controlling the terminal to display corresponding information in a preset display mode according to the position security verification result; and/or the number of the groups of groups,
if not, the terminal is controlled to display the corresponding information in other display modes according to the position security verification result.
Optionally, after step S30, the method further includes:
recording the showing times of the target business card information corresponding to the target signature information successfully showing at the terminal position;
and when the display times are greater than or equal to a preset display times threshold value, setting the terminal position as a preset safety place corresponding to the target signature information.
The application also provides a mobile terminal, comprising: the system comprises a memory and a processor, wherein the memory stores an information processing program, and the information processing program realizes the steps of the method when being executed by the processor.
The present application also provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method as described above.
As described herein, the information processing method of the present application includes: confirming target signature information corresponding to the first picture; acquiring a preset position corresponding to the target signature information, and judging whether the terminal position is matched with the preset position; and displaying corresponding information according to the matching result. The business card information checking method and device can guarantee the safety of business card information and improve the convenience of business card information checking.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic hardware structure of a mobile terminal implementing various embodiments of the present application;
fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present application;
fig. 3 is a flow chart of an information processing method shown according to the first embodiment;
Fig. 4 is a flow chart of an information processing method shown according to a second embodiment;
fig. 5 is a flow chart of an information processing method according to the third embodiment.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings. Specific embodiments thereof have been shown by way of example in the drawings and will herein be described in more detail. These drawings and the written description are not intended to limit the scope of the inventive concepts in any way, but to illustrate the concepts of the present application to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the element defined by the phrase "comprising one … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element, and furthermore, elements having the same name in different embodiments of the present application may have the same meaning or may have different meanings, a particular meaning of which is to be determined by its interpretation in this particular embodiment or by further combining the context of this particular embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or," "and/or," "including at least one of," and the like, as used herein, may be construed as inclusive, or meaning any one or any combination. For example, "including at least one of: A. b, C "means" any one of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; a and B and C ", again as examples," A, B or C "or" A, B and/or C "means" any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; a and B and C). An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should be noted that, in this document, step numbers such as S10 and S20 are adopted, and the purpose of the present invention is to more clearly and briefly describe the corresponding content, and not to constitute a substantial limitation on the sequence, and those skilled in the art may execute S20 first and then execute S10 when implementing the present invention, which is within the scope of protection of the present application.
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present application, and are not of specific significance per se. Thus, "module," "component," or "unit" may be used in combination.
Mobile terminals may be implemented in a variety of forms. For example, mobile terminals described in the present application may include mobile terminals such as cell phones, tablet computers, notebook computers, palm computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, wearable devices, smart bracelets, pedometers, and stationary terminals such as digital TVs, desktop computers, and the like.
The following description will be given taking a mobile terminal as an example, and those skilled in the art will understand that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for a moving purpose.
Referring to fig. 1, which is a schematic hardware structure of a mobile terminal implementing various embodiments of the present application, the mobile terminal 100 may include: an RF (Radio Frequency) unit 101, a WiFi module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal structure shown in fig. 1 is not limiting of the mobile terminal and that the mobile terminal may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be used for receiving and transmitting signals during the information receiving or communication process, specifically, after receiving downlink information of the base station, processing the downlink information by the processor 110; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol including, but not limited to, GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service ), CDMA2000 (Code Division Multiple Access, 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access ), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, time Division synchronous code Division multiple access), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency Division duplex long term evolution), TDD-LTE (Time Division Duplexing-Long Term Evolution, time Division duplex long term evolution), and 5G, among others.
WiFi belongs to a short-distance wireless transmission technology, and a mobile terminal can help a user to send and receive e-mails, browse web pages, access streaming media and the like through the WiFi module 102, so that wireless broadband Internet access is provided for the user. Although fig. 1 shows a WiFi module 102, it is understood that it does not belong to the necessary constitution of a mobile terminal, and can be omitted entirely as required within a range that does not change the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a talk mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the mobile terminal 100. The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive an audio or video signal. The a/V input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, the graphics processor 1041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 can receive sound (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, and the like, and can process such sound into audio data. The processed audio (voice) data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 101 in the case of a telephone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting the audio signal.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Optionally, the light sensor includes an ambient light sensor and a proximity sensor, optionally, the ambient light sensor may adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1061 and/or the backlight when the mobile terminal 100 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for applications of recognizing the gesture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; as for other sensors such as fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured in the mobile phone, the detailed description thereof will be omitted.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. Alternatively, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1071 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Optionally, the touch detection device detects the touch azimuth of the user, detects a signal brought by touch operation, and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 110, and can receive and execute commands sent from the processor 110. Further, the touch panel 1071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 107 may include other input devices 1072 in addition to the touch panel 1071. Alternatively, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc., as specifically not limited herein.
Alternatively, the touch panel 1071 may overlay the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or thereabout, the touch panel 1071 is transferred to the processor 110 to determine the type of touch event, and the processor 110 then provides a corresponding visual output on the display panel 1061 according to the type of touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 may be integrated with the display panel 1061 to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device can be connected with the mobile terminal 100. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and an external device.
Memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, and alternatively, the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 109 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor and a modem processor, the application processor optionally handling mainly an operating system, a user interface, an application program, etc., the modem processor handling mainly wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power source 111 (e.g., a battery) for supplying power to the respective components, and preferably, the power source 111 may be logically connected to the processor 110 through a power management system, so as to perform functions of managing charging, discharging, and power consumption management through the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described herein.
In order to facilitate understanding of the embodiments of the present application, a communication network system on which the mobile terminal of the present application is based will be described below.
Referring to fig. 2, fig. 2 is a schematic diagram of a communication network system provided in the embodiment of the present application, where the communication network system is an LTE system of a general mobile communication technology, and the LTE system includes a UE (User Equipment) 201, an e-UTRAN (Evolved UMTS Terrestrial Radio Access Network ) 202, an epc (Evolved Packet Core, evolved packet core) 203, and an IP service 204 of an operator that are sequentially connected in communication.
Alternatively, the UE201 may be the terminal 100 described above, which is not described here again.
The E-UTRAN202 includes eNodeB2021 and other eNodeB2022, etc. Alternatively, the eNodeB2021 may connect with other enodebs 2022 over a backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide access for the UE201 to the EPC 203.
EPC203 may include MME (Mobility Management Entity ) 2031, hss (Home Subscriber Server, home subscriber server) 2032, other MMEs 2033, SGW (Serving Gate Way) 2034, pgw (PDN Gate Way) 2035 and PCRF (Policy and Charging Rules Function, policy and tariff function entity) 2036, and so on. Optionally, MME2031 is a control node that handles signaling between UE201 and EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location registers (not shown) and to hold user specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034 and PGW2035 may provide IP address allocation and other functions for UE201, PCRF2036 is a policy and charging control policy decision point for traffic data flows and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem ), or other IP services, etc.
Although the LTE system is described above as an example, it should be understood by those skilled in the art that the present application is not limited to LTE systems, but may be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems (e.g., 5G), etc.
Based on the above-mentioned mobile terminal hardware structure and communication network system, various embodiments of the present application are presented.
First embodiment
Referring to fig. 3, fig. 3 is a flowchart illustrating a first embodiment of an information processing method of the present application, where the information processing method includes:
s10, confirming target signature information corresponding to the first picture;
the business card is used as a reference information for enhancing communication and mutual trust among users, is popular and even cool with the prevalence of social networks, and is characterized in that an AR (Augmented Reality ) business card is generated, a specific image is scanned and identified by using specific AR application software, and after the specific image is identified, a three-dimensional model matched with the specific image or all corresponding business card information is displayed to the users in an AR mode. By adopting the scheme to manage the business card information, potential safety hazards exist, and in the process of conception and realization of the application, the inventor finds that at least the following problems exist: even if a verification process is added for checking the business card information, the verification process does not distinguish the position of the user, for example, aiming at a safe place where the business card is checked frequently and a safe undetermined place where the business card is not checked frequently, the user needs to verify the business card information every time even in the safe place, unnecessary verification time is increased, and user experience is poor.
In this case, the present embodiment provides an information processing method.
The information processing method of the embodiment is applied to an information processing device, which may be a terminal, a robot or a PC device.
When a business card viewer needs to view a business card, a picture containing a signature, namely a first picture, can be obtained by executing preset operation through a terminal, and after the first picture is obtained, the first picture can be identified, and target signature information corresponding to the picture is determined. Optionally, the preset operation of obtaining the first picture may be that the terminal scans a carrier picture including the signature, or that the terminal shoots a carrier including the signature, or that the terminal inputs a user name and/or a verification code of a user to which the signature belongs to obtain the first picture, or that the first picture is selected locally or downloaded from a network, which is not limited in this embodiment.
Optionally, in the step S10, the step of confirming the target signature information corresponding to the first picture includes:
s11, carrying out signature recognition on the first picture to obtain a first signature meaning and a first signature characteristic of signature handwriting in the first picture;
s12, acquiring a first preset signature feature corresponding to the first signature meaning, and determining feature matching degree of the first preset signature feature and the first signature feature;
And S13, if the feature matching degree is greater than or equal to a preset matching degree threshold, taking the first signature meaning and the first preset signature feature as target signature information.
Optionally, a huge amount of signature pictures and associated preset signature information are pre-stored in a preset signature database, and the preset signature information comprises preset signature names and preset signature features of the associated signature carrier pictures.
In this embodiment, after the first picture is obtained, signature recognition may be performed on the first picture through a preset signature recognition model, so as to obtain a signature meaning and a signature feature of the signature handwriting in the first picture, that is, a first signature meaning and a first signature feature. Alternatively, by signature name is meant the literal content of the signature script (e.g., the characters of the name), and signature features are meant key features of the signature script, such as stroke features, track features, and/or font features, among others.
The information processing system acquires the associated first preset signature characteristic according to the first signature name, compares the first preset signature characteristic with the first signature characteristic, and determines the characteristic matching degree of the first preset signature characteristic and the first signature characteristic; if the feature matching degree of the signature and the signature is larger than or equal to a preset matching degree threshold, taking the first signature meaning and the first preset signature feature as target signature information; and/or if the feature matching degree of the two is smaller than the preset matching degree threshold value, sending a signature recognition error prompt to the terminal.
Optionally, if the feature matching degree of the two is smaller than a preset matching degree threshold, sending a signature recognition error prompt to the terminal, and/or recording the times that the feature matching degree is smaller than the preset matching degree threshold; and/or if the number of times that the feature matching degree is smaller than the preset matching degree threshold is greater than or equal to the first preset number of times threshold, sending a signature forging warning to the signature attribution user corresponding to the first preset signature feature.
Optionally, after step S11, the method further includes:
s111, determining whether the first signature meaning exists in a preset signature database;
s112, if yes, acquiring a first preset signature feature corresponding to the first signature name, and determining feature matching degree of the first preset signature feature and the first signature feature; and/or the number of the groups of groups,
and S113, if not, sending a prompt that the first picture does not contain business card information to the terminal.
In this embodiment, after the first picture is obtained, the information processing system first determines whether a first signature meaning exists in the preset signature database, and optionally, determines whether the first signature meaning exists in the preset signature database according to whether the preset signature meaning identical to the first signature meaning exists in the preset signature database. If yes, executing S12; and/or if not, sending a prompt that the first picture does not contain the business card information to the terminal so as to prompt a business card viewer to acquire a new signature carrier picture again through the terminal.
S20, acquiring a preset position corresponding to the target signature information, and judging whether the terminal position is matched with the preset position;
optionally, the preset signature database also stores a secure location and business card information associated with the preset signature information, and the preset location refers to a secure location where no verification other than location security verification is required for the terminal when the business card information is displayed. The preset position may be manually set by the signature attribution user, or may be automatically set by the information processing system according to the frequency at which the business card information is displayed at a specific location, and the embodiment is not particularly limited; the preset position may be one or more, and the embodiment is not particularly limited.
Optionally, before step S10, the method further includes:
s01, receiving a second picture sent by a second terminal and a preset security location corresponding to the second picture;
s02, identifying the second picture and determining second signature information corresponding to the second picture;
s03, storing the second signature information and the preset security location in an associated mode;
the embodiment describes a process that a signature attribution user sets signature information and a security place corresponding to business card information. The signature attribution user can input a handwritten signature picture of the signature attribution user, namely a second picture through the second terminal, and optionally, the number of the second pictures can be one or a plurality of second pictures; the number of preset safe places can be one or a plurality of preset safe places.
After receiving a second picture and a preset security place which are sent by a signature attribution user through a second terminal, carrying out signature recognition on the second picture through a preset signature recognition model to obtain second signature information of signature handwriting in the second picture, and then storing the second signature information and the preset security place in a preset signature database in an associated mode. Optionally, the second signature information includes a signature intent and a preset signature feature.
Correspondingly, in step S20, the step of obtaining the preset position corresponding to the target signature information includes:
s21, acquiring an associated preset safety place according to the target signature information as a preset position.
After the signature attribution user is set, the information processing system can acquire the associated preset safe place in the preset signature database according to the target signature information to serve as the preset position.
And acquiring the associated preset safe place in a preset signature database according to the target signature information to serve as a preset position. The terminal position of the terminal is acquired, and the terminal position reflects the current position of the terminal. And carrying out position safety verification on the terminal position according to the preset position.
In one embodiment, the location security verification process is: if the terminal position exists in the preset safe place set corresponding to the target signature information, determining that the terminal position is matched with the preset position; and/or if the terminal position does not exist in the preset safe place set corresponding to the target signature information, determining that the terminal position is not matched with the preset position.
Optionally, the preset position is a preset safe place set, the terminal position is directly compared with the preset safe place set, if the terminal position exists in the preset safe place set corresponding to the target signature information, the terminal position is determined to be matched with the preset position, and otherwise, the terminal position is not matched with the preset position.
In yet another embodiment, the process of location security verification is: determining the distance between the terminal position and a preset safe place in a preset safe place set corresponding to the target signature information; if the distance between the terminal position and at least one preset safety place is smaller than or equal to a preset distance threshold value, determining that the terminal position is matched with the preset position; and/or if the distance between the terminal position and any preset safety place is greater than a preset distance threshold, determining that the terminal position is not matched with the preset position.
Optionally, the preset position is a preset safe place set, firstly, determining the distance between the terminal position and each preset safe place in the preset safe place set, and if the distance between at least one preset safe place and the terminal position is smaller than or equal to a preset distance threshold value, determining that the terminal position is matched with the preset position; and/or if not, determining that the terminal position is not matched with the preset position. Alternatively, the preset distance threshold may be set manually by the signature attribution user as needed, or may be set automatically by the information processing system.
S30, displaying corresponding information according to the matching result.
Optionally, the matching result (position security verification result) has two kinds of success and failure, and different results correspond to different business card information display flows.
Optionally, the step S30 includes:
s31, if the terminal position is matched with the preset position, acquiring target business card information corresponding to the target signature information;
s32, sending the target business card information to the terminal so as to display the target business card information through the terminal.
In this embodiment, if the terminal position of the terminal position matches with the preset position, the target business card information corresponding to the target signature information is directly obtained, the target business card information is sent to the terminal, and the target business card information is displayed through the terminal.
Optionally, the step S30 includes:
s33, if the position of the terminal is not matched with the preset position, outputting verification information through the terminal so as to carry out information security verification through the verification information;
s34, displaying corresponding information according to the information security check result.
In this embodiment, if the location security verification of the location of the terminal fails, it is indicated that the terminal, that is, the business card viewer is not currently located at the secure location corresponding to the target signature information, further information security needs to be performed on the terminal. Optionally, the verification information is output through the terminal so as to carry out information security verification through the verification information. Optionally, the output verification information may be prompt information for prompting the business card viewer to input the verification password, and a verification control for inputting the verification password, where the business card viewer may input the verification password through the verification space.
Optionally, the information security check results also have two kinds of success and failure, and different results correspond to different business card information display flows. And if the position of the terminal is matched with the preset position, acquiring target business card information corresponding to the target signature information, sending the target business card information to the terminal, and displaying the target business card information through the terminal.
In this embodiment, the target signature information corresponding to the first picture is confirmed; acquiring a preset position corresponding to the target signature information, and judging whether the terminal position is matched with the preset position; and displaying corresponding information according to the matching result. The embodiment realizes that the convenience of viewing the business card information for the user at the safe place is improved while the safety of the business card information is ensured.
Second embodiment
Based on the above embodiments, a second embodiment of the information processing method of the present application is proposed. Referring to fig. 4, fig. 4 is a flowchart of a second embodiment of the information processing method of the present application.
The step S34 further includes:
and a1, if the information security check fails, sending an information security check failure prompt to the terminal.
In this embodiment, if the information security check on the terminal fails, an information security check failure prompt, for example, "check password input error", is sent to the terminal to inform the business card viewer of the reason of the failure of checking the business card, and the information security check can be performed again.
Optionally, step a1 includes:
a2, if the information security check fails, sending an information security check failure prompt to the terminal and/or recording the number of times of information security check failure;
and a3, if the number of times of information security check failure is greater than or equal to a second preset number of times threshold, sending a signature cracking warning to a signature attribution user corresponding to the target signature information.
In order to avoid the condition that the illegal user maliciously breaks the business card information, optionally, when detecting that the information security check fails, in addition to sending an information security check failure prompt to the terminal, recording the number of times of the information security check failure, if the number of times of the information security check failure is greater than or equal to a second preset number threshold value, indicating that the terminal has suspicion of maliciously breaking the business card information, sending a signature breaking warning to a signature attribution user corresponding to the target signature information, and timely informing the signature attribution user that the business card information of the signature attribution user is maliciously broken, so that the signature attribution user can timely take countermeasures, and the security of the business card information is improved.
Optionally, if the number of times of information security check failure is greater than or equal to the second preset number of times threshold, the terminal may be prohibited from performing information security check again. Alternatively, the prohibiting may have a time limitation, for example, the terminal performs the information security check again within 24 hours, or may have no time limitation.
Optionally, step a3 further includes:
a4, receiving a verification information modification instruction, and determining new verification information according to the verification information modification instruction, wherein the verification information modification instruction is optionally sent by a signature attribution user;
and a5, outputting the new verification information through the terminal so as to carry out information security verification through the new verification information.
The embodiment provides a scheme for supporting signature attribution users to modify verification information so as to further improve the security of business card information. The signature attribution user can initiate a modification instruction of the verification information corresponding to the business card information, the information processing system can modify the verification information corresponding to the business card information of the signature attribution user according to the modification instruction after receiving the modification instruction to obtain new verification information, and then the new verification information is output to a business card viewer through the terminal so as to carry out information security verification through the new verification information.
Third embodiment
Based on the above-described second embodiment, a third embodiment of the information processing method of the present application is proposed. Referring to fig. 5, fig. 5 is a flowchart of a third embodiment of an information processing method of the present application.
The step S33 comprises the following steps:
b1, outputting encrypted target business card information corresponding to the target signature information through the terminal if the position of the terminal is not matched with the preset position;
b2, outputting sub-verification information corresponding to the sub-encrypted business card information through the terminal when receiving a checking instruction of the sub-encrypted business card information in the encrypted target business card information, so as to carry out sub-information security verification through the sub-verification information;
correspondingly, the step S34 includes:
and b3, executing a corresponding business card information display flow according to the result of the sub-information security check.
In this embodiment, if the terminal position does not match the preset position, outputting encrypted target business card information corresponding to the target signature information through the terminal, where the encrypted target business card information, as the name implies, is obtained by encrypting the target business card information corresponding to the target signature information, where the encrypted target business card information includes at least one piece of sub-encrypted business card information; the sub-business card information is different types of information in the business card information, such as name, position, address, telephone, mailbox and the like, can encrypt each sub-business card information to obtain sub-encrypted business card information, and sets corresponding sub-verification information for the sub-encrypted business card information, and a business card viewer can view the sub-business card information corresponding to the sub-encrypted business card information only after the sub-verification information passes through the sub-information security verification process.
Optionally, the sub-verification information corresponding to different sub-encrypted business card information may be the same or different, and may be set as required.
Alternatively, the encrypting the target business card information may be encrypting all the sub business card information in the target business card information, or encrypting the sub business card information with higher partial privacy according to the user requirement, which is not limited in particular.
For example, if the target business card information is the name "Zhang San", the job position "Lifour higher manager", the address "A province B city C district D street 88", the phone "12345678901", the mailbox "123@456.com", the encrypted target business card information may be the name "Zhang Xo", the job position "address" Xo ", the phone" Xo ", the mailbox" Xo ".
Optionally, the sub-information security check results also have two kinds of success and failure, and different results correspond to different business card information display flows. If the sub-information security check is successful, sub-business card information which is checked successfully is obtained, the sub-business card information is sent to the terminal, and the sub-business card information is displayed through the terminal; if the sub-information security check fails, a sub-information security check failure prompt is sent to the terminal.
Optionally, the step S30 further includes:
step c1, determining whether the terminal supports a preset display mode;
c2, if so, controlling the terminal to display corresponding information in a preset display mode according to the position security verification result; and/or the number of the groups of groups,
and c3, if not, controlling the terminal to display corresponding information in other display modes according to the position security verification result.
In this embodiment, before displaying the corresponding information, it is first determined whether the terminal of the business card viewer supports a preset display mode, where the preset display mode refers to a business card information output mode preset by the signature attribution user or default in information processing.
Optionally, the preset display mode may be voice output or image output, and the image output may be static page display or AR display.
If the terminal supports the preset display mode, the terminal can be controlled to display corresponding information in the preset display mode according to the position security verification result; if the terminal does not support the preset display mode, the terminal can be controlled to display corresponding information in other display modes supported by the terminal according to the position security verification result.
For example, assuming that the preset display mode is AR display, if the terminal supports AR display, displaying the target business card information in AR mode; and if the terminal does not support AR display, outputting the target business card information through a static page or voice.
According to the embodiment, when the terminal supports the preset display mode, the business card information is output in the preset display mode preferentially, when the terminal does not support the preset display mode, the business card information is output in other display modes supported by the terminal, and effective output of the business card information can be ensured.
Optionally, after step S30, the method further includes:
d1, recording the showing times of the target business card information corresponding to the target signature information successfully showing at the terminal position;
and d2, setting the terminal position as a preset safety place corresponding to the target signature information when the display times are greater than or equal to a preset display times threshold value.
In this embodiment, if the target business card information is successfully displayed at the terminal position, the displaying times of the target business card information successfully displayed at the terminal position are recorded, and if the displaying times are greater than or equal to a preset displaying times threshold, the terminal position is set as a preset security location corresponding to the target signature information.
According to the method and the device, the number of times that the target business card information is successfully displayed at each position is automatically counted, and then the safe place of the target business card information is automatically updated according to the number of times of displaying, so that the intelligence of setting the safe place is improved.
The application also provides a mobile terminal, which comprises a memory and a processor, wherein the memory stores an information processing program, and the information processing program is executed by the processor to realize the steps of the information processing method in any embodiment.
The present application also provides a computer-readable storage medium having stored thereon an information processing program which, when executed by a processor, implements the steps of the information processing method in any of the above embodiments.
Embodiments of the mobile terminal and the computer readable storage medium provided in the present application may include all technical features of any one of the embodiments of the information processing method, and the expansion and explanation contents of the description are substantially the same as those of each embodiment of the method, which are not repeated herein.
The present embodiments also provide a computer program product comprising computer program code which, when run on a computer, causes the computer to perform the method in the various possible implementations as above.
The embodiments also provide a chip including a memory for storing a computer program and a processor for calling and running the computer program from the memory, so that a device on which the chip is mounted performs the method in the above possible embodiments.
It can be understood that the above scenario is merely an example, and does not constitute a limitation on the application scenario of the technical solution provided in the embodiments of the present application, and the technical solution of the present application may also be applied to other scenarios. For example, as one of ordinary skill in the art can know, with the evolution of the system architecture and the appearance of new service scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the application can be combined, divided and pruned according to actual needs.
In this application, the same or similar term concept, technical solution, and/or application scenario description will generally be described in detail only when first appearing, and when repeated later, for brevity, will not generally be repeated, and when understanding the content of the technical solution of the present application, etc., reference may be made to the previous related detailed description thereof for the same or similar term concept, technical solution, and/or application scenario description, etc., which are not described in detail later.
In this application, the descriptions of the embodiments are focused on, and the details or descriptions of one embodiment may be found in the related descriptions of other embodiments.
The technical features of the technical solutions of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the present application.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the method of each embodiment of the present application.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, storage disks, magnetic tape), optical media (e.g., DVD), or semiconductor media (e.g., solid State Disk (SSD)), among others.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (13)

1. An information processing method, characterized by comprising the steps of:
s10, confirming target signature information corresponding to the first picture;
s20, acquiring a preset position corresponding to the target signature information, and judging whether the terminal position is matched with the preset position;
s30, displaying target business card information corresponding to the target signature information according to the matching result;
the step of displaying the target business card information corresponding to the target signature information according to the matching result comprises the following steps:
if the terminal position is matched with the preset position, acquiring target business card information corresponding to the target signature information;
the target business card information is sent to the terminal so as to display the target business card information through the terminal;
the step of displaying the target business card information corresponding to the target signature information according to the matching result further comprises the following steps:
If the terminal position is not matched with the preset position, outputting verification information through the terminal so as to carry out information security verification through the verification information;
and displaying the target business card information corresponding to the target signature information according to the information security verification result.
2. The method of claim 1, wherein the step of validating the target signature information corresponding to the first picture comprises:
carrying out signature recognition on the first picture to obtain a first signature meaning and a first signature characteristic of signature handwriting in the first picture;
acquiring a first preset signature characteristic corresponding to the first signature meaning, and determining the characteristic matching degree of the first preset signature characteristic and the first signature characteristic;
and if the feature matching degree is greater than or equal to a preset matching degree threshold, taking the first signature meaning and the first preset signature feature as target signature information.
3. The method of claim 2, wherein the step of performing signature recognition on the first picture to obtain a first signature of the signature writing and a first signature feature in the first picture further comprises:
determining whether the first signature meaning exists in a preset signature database;
If yes, a first preset signature feature corresponding to the first signature meaning is obtained, and the feature matching degree of the first preset signature feature and the first signature feature is determined; and/or the number of the groups of groups,
if not, a prompt that the first signature carrier does not contain business card information is sent to the terminal.
4. The method of claim 2, further comprising, after the step of determining a feature match of the pre-set signature feature to the first signature feature, at least one of:
if the feature matching degree is smaller than a preset matching degree threshold, a signature recognition error prompt is sent to the terminal, and/or the times that the feature matching degree is smaller than the preset matching degree threshold are recorded;
and if the number of times that the feature matching degree is smaller than the preset matching degree threshold is larger than or equal to a first preset number of times threshold, sending a signature forging warning to a signature attribution user corresponding to the first preset signature feature.
5. The method of claim 1, wherein step S20 comprises at least one of:
if the terminal position exists in the preset safe place set corresponding to the target signature information, determining that the terminal position is matched with the preset position;
And if the terminal position does not exist in the preset safe place set corresponding to the target signature information, determining that the terminal position is not matched with the preset position.
6. The method of claim 1, wherein the step S20 comprises:
determining the distance between the terminal position and a preset safe place in a preset safe place set corresponding to the target signature information;
if the distance between the terminal position and at least one preset safety place is smaller than or equal to a preset distance threshold value, determining that the terminal position is matched with the preset position; and/or the number of the groups of groups,
and if the distance between the terminal position and any preset safety place is greater than a preset distance threshold value, determining that the terminal position is not matched with the preset position.
7. The method of claim 1, wherein the step of displaying the target business card information corresponding to the target signature information according to the result of the information security check comprises:
if the terminal position is matched with the preset position, acquiring target business card information corresponding to the target signature information;
and sending the target business card information to the terminal so as to display the target business card information through the terminal.
8. The method of claim 1, wherein the method further comprises:
receiving a verification information modification instruction, and determining new verification information according to the verification information modification instruction;
and outputting the new verification information through the terminal so as to carry out information security verification through the new verification information.
9. The method according to any one of claims 1 to 8, further comprising, prior to step S10:
receiving a second picture sent by a second terminal and a preset security location corresponding to the second picture;
identifying the second picture and determining second signature information corresponding to the second picture;
storing the second signature information in association with the preset security location;
the step S20 comprises the following steps:
and acquiring the associated preset safe place according to the target signature information as a preset position.
10. The method of any one of claims 1 to 8, wherein S30 further comprises:
determining whether the terminal supports a preset display mode;
if yes, controlling the terminal to display the target business card information corresponding to the target signature information in a preset display mode according to the position security verification result; and/or the number of the groups of groups,
If not, according to the position security verification result, the terminal is controlled to display the target business card information corresponding to the target signature information in other display modes.
11. The method according to any one of claims 1 to 8, further comprising, after step S30:
recording the showing times of the target business card information corresponding to the target signature information successfully showing at the terminal position;
and when the display times are greater than or equal to a preset display times threshold value, setting the terminal position as a preset safety place corresponding to the target signature information.
12. A mobile terminal, the mobile terminal comprising: a memory, a processor, wherein the memory has stored thereon an information processing program which, when executed by the processor, implements the steps of the information processing method according to any one of claims 1 to 11.
13. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the information processing method according to any of claims 1 to 11.
CN202111053833.0A 2021-09-08 2021-09-08 Information processing method, mobile terminal and readable storage medium Active CN114125851B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111053833.0A CN114125851B (en) 2021-09-08 2021-09-08 Information processing method, mobile terminal and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111053833.0A CN114125851B (en) 2021-09-08 2021-09-08 Information processing method, mobile terminal and readable storage medium

Publications (2)

Publication Number Publication Date
CN114125851A CN114125851A (en) 2022-03-01
CN114125851B true CN114125851B (en) 2023-08-08

Family

ID=80441309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111053833.0A Active CN114125851B (en) 2021-09-08 2021-09-08 Information processing method, mobile terminal and readable storage medium

Country Status (1)

Country Link
CN (1) CN114125851B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107633002A (en) * 2017-08-04 2018-01-26 珠海市魅族科技有限公司 A kind of card information methods of exhibiting, device, computer installation and storage medium
CN108540458A (en) * 2018-03-21 2018-09-14 努比亚技术有限公司 A kind of method of client checks, equipment, server and storage medium
CN109117778A (en) * 2018-08-06 2019-01-01 百度在线网络技术(北京)有限公司 Information processing method, device, server and storage medium
CN112087709A (en) * 2020-08-26 2020-12-15 上海传英信息技术有限公司 Information pushing method and device and computer storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112651841B (en) * 2020-12-18 2024-04-19 中国平安人寿保险股份有限公司 Online business handling method, online business handling device, server and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107633002A (en) * 2017-08-04 2018-01-26 珠海市魅族科技有限公司 A kind of card information methods of exhibiting, device, computer installation and storage medium
CN108540458A (en) * 2018-03-21 2018-09-14 努比亚技术有限公司 A kind of method of client checks, equipment, server and storage medium
CN109117778A (en) * 2018-08-06 2019-01-01 百度在线网络技术(北京)有限公司 Information processing method, device, server and storage medium
CN112087709A (en) * 2020-08-26 2020-12-15 上海传英信息技术有限公司 Information pushing method and device and computer storage medium

Also Published As

Publication number Publication date
CN114125851A (en) 2022-03-01

Similar Documents

Publication Publication Date Title
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN107347011B (en) Group message processing method, equipment and computer readable storage medium
CN107506646B (en) Malicious application detection method and device and computer readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN109922078B (en) Upgrade control method, mobile terminal and computer-readable storage medium
CN110187925B (en) Desktop pre-starting control method, device and computer readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN107220554B (en) File forwarding management method, corresponding system and terminal equipment
CN109977040B (en) File read-write permission control method, device, terminal and storage medium
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN107395363B (en) Fingerprint sharing method and mobile terminal
CN107347114B (en) Voice information receiving and sending control method and terminal
CN109711198B (en) Application management method, mobile terminal and storage medium
CN108900696B (en) Data processing method, terminal and computer readable storage medium
CN108566476B (en) Information processing method, terminal and computer readable storage medium
CN107222933B (en) Communication method, terminal and computer readable storage medium
CN115617293A (en) Data processing method, source end screen projection equipment and storage medium
CN114125851B (en) Information processing method, mobile terminal and readable storage medium
CN109587345B (en) Abnormal application prompting method, mobile terminal and computer readable storage medium
CN108197490B (en) Method and terminal for preventing malicious acquisition of user authorization information
CN108243417B (en) WIFI connection-based user permission determination method, mobile terminal and storage medium
CN109495948B (en) Communication connection method, equipment and computer readable storage medium
CN112363988A (en) File sharing method, mobile terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant