CN116828461A - Method, device and storage medium for outputting terminal equipment message - Google Patents

Method, device and storage medium for outputting terminal equipment message Download PDF

Info

Publication number
CN116828461A
CN116828461A CN202310803974.2A CN202310803974A CN116828461A CN 116828461 A CN116828461 A CN 116828461A CN 202310803974 A CN202310803974 A CN 202310803974A CN 116828461 A CN116828461 A CN 116828461A
Authority
CN
China
Prior art keywords
terminal device
message
target message
target
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310803974.2A
Other languages
Chinese (zh)
Inventor
刘莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Douku Software Technology Co Ltd
Original Assignee
Hangzhou Douku Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Douku Software Technology Co Ltd filed Critical Hangzhou Douku Software Technology Co Ltd
Priority to CN202310803974.2A priority Critical patent/CN116828461A/en
Publication of CN116828461A publication Critical patent/CN116828461A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses a method, a device and a storage medium for outputting a message of terminal equipment, which are used for outputting the target message only when at least one of output authority authentication, decoding and message fusion is needed when the terminal equipment receives the target message and at least one of the output authority authentication, decoding authority and message fusion is successfully authenticated, so that the privacy of a user is protected and the safety of the target message is improved. The method of the embodiment of the application comprises the following steps: under the condition that the first terminal equipment receives the first target message, target processing is carried out; outputting the first target message under the condition that target processing is successful; the target processing includes: at least one of output authority authentication, decoding, and message fusion.

Description

Method, device and storage medium for outputting terminal equipment message
Technical Field
The present application relates to the field of terminal devices, and in particular, to a method, an apparatus, and a storage medium for outputting a message from a terminal device.
Background
When the terminal equipment receives the target message, the terminal equipment directly outputs the target message under the condition of unlocking, so that the safety of the information cannot be ensured, and the privacy of the user is easy to infringe.
Disclosure of Invention
The embodiment of the application provides a method, a device and a storage medium for outputting a message of terminal equipment, which are used for outputting the target message only when at least one of output authority authentication, decoding and message fusion is needed when the terminal equipment receives the target message and at least one of the output authority authentication, decoding authority and message fusion is successfully authenticated, so that the privacy of a user is protected and the safety of the target message is improved.
The first aspect of the present application provides a method for outputting a terminal device message, which may include: under the condition that the first terminal equipment receives the first target message, target processing is carried out; outputting the first target message under the condition that target processing is successful; the target processing includes: at least one of output authority authentication, decoding, and message fusion.
The second aspect of the present application provides an output device for a terminal device message, which may include:
the processing module is used for carrying out target processing under the condition that the first terminal equipment receives the first target message;
the output module is used for outputting the first target message under the condition that the target processing is successful;
The target processing includes: at least one of output authority authentication, decoding, and message fusion.
A third aspect of the present application provides a terminal device, which may include:
a memory storing executable program code;
a processor coupled to the memory;
the processor is configured to correspondingly perform the method according to the first aspect of the application.
A further aspect of an embodiment of the application provides a computer readable storage medium comprising instructions which, when run on a processor, cause the processor to perform the method of the first aspect of the application.
In yet another aspect, an embodiment of the application discloses a computer program product for causing a computer to perform the method according to the first aspect of the application when the computer program product is run on the computer.
In yet another aspect, an embodiment of the present application discloses an application publishing platform, which is configured to publish a computer program product, where the computer program product, when run on a computer, causes the computer to perform the method according to the first aspect of the present application.
From the above technical solutions, the embodiment of the present application has the following advantages:
in the embodiment of the application, under the condition that the first terminal equipment receives the first target message, target processing is carried out; outputting the first target message under the condition that target processing is successful; the target processing includes: at least one of output authority authentication, decoding, and message fusion. Because the terminal equipment needs to carry out at least one of output authority authentication, decoding and message fusion when receiving the target message, the target message is only output under the condition of successfully authenticating at least one of the output authority, decoding authority and message fusion; even if the password of the terminal equipment is revealed, at least one of the output authority, the decoding authority and the message fusion is not successfully authenticated, other users cannot acquire the target message, so that the user privacy is protected, and the safety of the target information is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments and the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings.
Fig. 1 is a schematic diagram of an embodiment of a message output method based on near field communication NFC in an embodiment of the present application;
FIG. 2A is a flow chart of output authority authentication in an embodiment of the application;
fig. 2B is a schematic diagram of output authority authentication by using an NFC card according to an embodiment of the present application;
FIG. 2C is a flow chart of decoding according to an embodiment of the present application;
fig. 2D is a schematic diagram illustrating decoding by an NFC card according to an embodiment of the present application;
FIG. 2E is a flow chart of message fusion in an embodiment of the application;
fig. 2F is a schematic diagram of message fusion performed by a mobile phone a and a mobile phone B through an NFC function in an embodiment of the present application;
fig. 3 is a schematic diagram of an output device of a terminal device message in an embodiment of the present application;
fig. 4 is a schematic diagram of an embodiment of a terminal device according to an embodiment of the present application;
Fig. 5 is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a method, a device and a storage medium for outputting a message of terminal equipment, which are used for outputting the target message only when at least one of output authority authentication, decoding and message fusion is needed when the terminal equipment receives the target message and at least one of the output authority authentication, decoding authority and message fusion is successfully authenticated, so that the privacy of a user is protected and the safety of the target message is improved.
In order that those skilled in the art will better understand the present application, reference will now be made to the accompanying drawings in which embodiments of the application are illustrated, it being apparent that the embodiments described are only some, but not all, of the embodiments of the application. Based on the embodiments of the present application, it should be understood that the present application is within the scope of protection.
Some terms that are relevant to the present application will be briefly described as follows:
near field communication (Near Field Communication, NFC) is an emerging technology, devices (such as mobile phones) using NFC technology can exchange data in the condition of being close to each other, and the devices are integrated and evolved by non-contact radio frequency identification (Radio Frequency Identification, RFID) and interconnection and intercommunication technologies, and through integrating functions of an inductive card reader, an inductive card and point-to-point communication on a single chip, mobile terminal is utilized to realize applications such as mobile payment, electronic ticketing, access control, mobile identity recognition and anti-counterfeiting.
The NFC function is a short-range wireless communication function. A device using NFC technology is provided with a near field communication function.
The NFC function use of the terminal device (e.g., mobile phone) is as follows:
1. mobile payment, when wallet is used. Such as: apple Apply Pay, android cloud flash Pay. (the bank card is bound on the mobile phone, then the mobile phone is close to the POS machine embedded with the NFC module to pay, and the transaction is confirmed)
2. When the bus card is used. Taking the subway and the bus, and using the bus card as a bus card. (the mobile phone storing the ticket password is only needed to be close to the card reader)
3. Inquiring and recharging the bus card. The balance of the bus card can be inquired, and the bus card can be directly recharged.
4. For transferring files. The mobile phones with NFC function are connected, the two mobile phones can perform point-to-point data transmission by closing to the NFC function, and the address books for downloading music, picture mutual transmission and exchange and the like are downloaded.
5. When bluetooth is used. The usage is the same as Bluetooth, and the devices at both ends can be used as long as the devices have NFC functions.
6. When the access control card is used. Similar to a bus card or the like. (the mobile phone storing the door control password is only needed to be close to the card reader)
Decoding is the inverse of encoding while removing noise that is mixed in the bit stream during propagation. The process of translating a word into a set of numbers using a code table or translating a series of signals representing an item of information into a word using a code table is called decoding.
A decoder is a multiple-input multiple-output combinational logic circuit in electronic technology, which is responsible for translating binary codes into specific objects (such as logic levels, etc.), and functions opposite to an encoder. Decoders are generally divided into two general categories, namely, universal decoders and digital display decoders.
In digital circuits, a decoder (e.g., an n-line-2 n-line BCD decoder) can act as a multiple-input multiple-output logic gate, converting an encoded input into an encoded output, where the encoding of the input and output is different. The input enable signal must be connected to the decoder to make it work properly, otherwise the output will be an invalid codeword. Decoding is necessary in multiplexing, seven-segment nixie tube and memory address decoding applications.
The information fusion is also called data fusion, and can also be called sensor information fusion or multi-sensor information fusion, and is an information processing process for correlating, correlating and synthesizing data and information acquired from single and multiple information sources to obtain accurate position and identity estimation and comprehensively and timely evaluating situation, threat and importance degree thereof; the process is a continuous refining (refinishing) process for estimating, evaluating and evaluating the requirement of additional information sources, and is also a process for continuously self-correcting the information processing process so as to obtain the improvement of the result. The information fusion technique can be summarized as: the computer technology is used to automatically analyze and comprehensively process the observation information of a plurality of sensors obtained in time sequence under a certain criterion so as to complete the information processing process of the required decision and estimation tasks. According to the definition, the multi-sensor system is a hardware basis of information fusion, multi-source information is a processing object of the information fusion, and coordination optimization and comprehensive processing are cores of the information fusion.
In one implementation manner, a data protection method, a storage device and a terminal device are provided, where the storage device includes: the device comprises a storage medium, a processor, a power supply circuit, an interface and a detection circuit; the interface is respectively connected with the storage medium, the processor, the power supply circuit and the detection circuit; the power supply circuit is connected with the storage medium, the processor and the detection circuit; the processor is configured to control the detection circuit to send detection information to the terminal equipment through the interface so that the terminal equipment can identify whether the storage equipment has an automatic encryption function according to the detection information; the processor is further configured to encrypt a storage space for storing data in the storage medium according to the received encryption password sent by the terminal device, the data is sent to the storage device by the terminal device, the encryption password is set by the terminal device, the copied file or the storage area of the data is encrypted, and the file and private information in the storage device are protected from being utilized or stolen by others.
In one implementation mode, a short message management method, a terminal and a device are provided, and belong to the technical field of information. The method comprises the following steps: when the short message to be sent is detected to be encrypted, acquiring the confidentiality authority of the short message; generating a short message sending packet according to the identification code and the short message corresponding to the confidentiality authority; and sending the short message sending packet to the second terminal, and displaying the short message by the second terminal according to the confidentiality authority determined by the identification code in the short message sending packet in a corresponding display mode. According to the identification code and the short message corresponding to the security authority, the generated short message sending packet is sent to the second terminal, and the second terminal displays the short message in a corresponding display mode according to the security authority determined by the identification code in the short message sending packet, so that the user privacy is protected, and meanwhile, the safety of the short message is improved.
In the scheme, the equipment actively encrypts and decrypts, and no user participates.
In the technical scheme of the application, the user actively encrypts and decrypts the information, which is equivalent to the secondary encryption of the user on the basis of the terminal equipment itself, thereby further protecting the privacy of the user and improving the security of the target information.
In the embodiment of the present application, the terminal device may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented Reality (Augmented Reality, AR) terminal device, a wireless terminal device in industrial control (industrial control), a wireless terminal device in unmanned driving (self driving), a wireless terminal device in remote medical (remote medical), a wireless terminal device in smart grid (smart grid), a wireless terminal device in transportation security (transportation safety), a wireless terminal device in smart city (smart city), or a wireless terminal device in smart home (smart home), and the like.
By way of example, and not limitation, in embodiments of the present application, the terminal device may also be a wearable device. The wearable device can also be called as a wearable intelligent device, and is a generic name for intelligently designing daily wear by applying wearable technology and developing wearable devices, such as glasses, gloves, watches, clothes, shoes and the like. The wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also can realize a powerful function through software support, data interaction and cloud interaction. The generalized wearable intelligent device includes full functionality, large size, and may not rely on the smart phone to implement complete or partial functionality, such as: smart watches or smart glasses, etc., and focus on only certain types of application functions, and need to be used in combination with other devices, such as smart phones, for example, various smart bracelets, smart jewelry, etc. for physical sign monitoring.
In the following, by way of example, the technical solution of the present application is further described, as shown in fig. 1, which is a schematic diagram of an embodiment of a message output method based on NFC in the embodiment of the present application, and may include:
101. and under the condition that the first terminal equipment receives the first target message, target processing is carried out.
The target processing includes: at least one of output authority authentication, decoding, and message fusion.
Optionally, the first target message includes a specific message such as a short message, a micro message or a verification code.
Optionally, the type of the first target message may include at least one type of text, picture, audio, and video. When the type of the first target message is text and picture, outputting through a display interface of the first terminal equipment; outputting, by a speaker of the first terminal device, when the type of the first target message is audio; when the type of the first target message is video, the first target message is output through a display interface and a speaker of the first terminal device.
Optionally, in the case that the first terminal device receives the first target message, performing target processing may include: and under the condition that the first terminal equipment receives the first target message, if the first terminal equipment is not unlocked, unlocking the first terminal equipment and performing target processing.
Optionally, the unlocking manner of the first terminal device may include unlocking by inputting a password by a user, or unlocking by fingerprint, or unlocking by facial recognition, etc., which is not limited herein.
1. Output rights authentication
Optionally, the performing output authority authentication when the first terminal device receives the first target message may include: and under the condition that the first terminal equipment receives the first target message, carrying out output authority authentication through the first NFC card.
Optionally, the performing, by the first NFC card, output authority authentication in the case that the first terminal device receives the first target message may include: outputting a first prompt message under the condition that the first terminal equipment receives the first target message; and carrying out output authority authentication by using the first NFC card according to the first prompt message, wherein the first prompt message is used for prompting a user to carry out card swiping operation by using the first NFC card.
Optionally, the performing, by the first NFC card, output authority authentication in the case that the first terminal device receives the first target message may include: and under the condition that the first terminal equipment receives the first target message, if the identification or the specific content of the first NFC card is matched with a preset output key, the output authority authentication is considered to be successful.
Optionally, the method may further include: if the identification or specific content of the first NFC card is not matched with the preset output key, the output authority authentication is considered to be failed, and indication information of the failure of the output authority authentication is prompted.
Optionally, the performing output authority authentication when the first terminal device receives the first target message may include: and under the condition that the first terminal equipment receives the first target message and the second terminal equipment receives the output key, if the distance between the first terminal equipment and the second terminal equipment is within a preset range, carrying out output authority authentication through NFC functions of the first terminal equipment and the second terminal equipment.
In an exemplary embodiment, when the first terminal device receives the first target message and the second terminal device receives the output key, the first terminal device does not immediately output the first target message, but performs output authority authentication through NFC functions of the two terminal devices, for example, the two terminal devices are bumped together to complete the output authority authentication, and the first target message is output after the authentication is successful.
Alternatively, the first NFC card may include a traffic card (bus/subway card), a work card, an access card, a car key, a house card, and the like.
2. Decoding
Optionally, decoding, when the first terminal device receives the first target message, may include: and decoding through the second NFC card under the condition that the first terminal equipment receives the first target message.
Optionally, decoding, by the second NFC card, when the first terminal device receives the first target message may include: outputting a second prompt message under the condition that the first terminal equipment receives the first target message; and decoding by using a second NFC card according to the second prompting message, wherein the second prompting message is used for prompting a user to use the second NFC card to perform card swiping operation.
Optionally, decoding, by the second NFC card, when the first terminal device receives the first target message may include: and under the condition that the first terminal equipment receives the first target message, if the identification or the specific content of the second NFC card is matched with the preset decoding key, the decoding is considered to be successful.
Optionally, the method further comprises: and if the identification or specific content of the second NFC card is not matched with the preset decoding key, judging that decoding fails, and prompting indication information of decoding failure.
Optionally, decoding, when the first terminal device receives the first target message, may include: and under the condition that the first terminal equipment receives the first target message and the second terminal equipment receives the decoding key, if the distance between the first terminal equipment and the second terminal equipment is within a preset range, decoding is carried out through NFC functions of the first terminal equipment and the second terminal equipment.
In an exemplary embodiment, when the first terminal device receives the first target message and the second terminal device receives the decoding key, the first terminal device does not immediately output the first target message, but decodes the first target message through the NFC functions of the two terminal devices, for example, bumps the two terminal devices, completes decoding, and outputs the decoded first target message.
Alternatively, the second NFC card may include a traffic card (bus/subway card), a work card, an access card, a car key, a house card, and the like.
3. Message fusion
Optionally, the message fusion may be performed when the first terminal device receives the first target message, which may include: under the condition that a first terminal device receives a first target message and a second terminal device receives a second target message, if the distance between the first terminal device and the second terminal device is within a preset range, message fusion is carried out on the first target message and the second target message through NFC functions of the first terminal device and the second terminal device.
It will be appreciated that the first target message received by the first terminal device is part of the data and the second target message received by the second terminal device is the remainder of the data.
In an exemplary case where the first terminal device receives the first target message (half graph), and the second terminal device receives the second target message (half graph), the first terminal device will not immediately output the first target message, and the second terminal device will not immediately output the second target message. The message fusion is performed through the NFC functions of the two terminal devices, for example, the two terminal devices are bumped to finish the message fusion, and after authentication is successful, the message fusion is performed and the fused message (for example, a whole image) is output.
102. And outputting the first target message under the condition that target processing is successful.
1. Output rights authentication
Optionally, outputting the first target message when the target processing is successful may include: and outputting the first target message under the condition that the output authority authentication is successful.
An exemplary flow chart of the output authority authentication in the embodiment of the application is shown in fig. 2A. When the first terminal device receives the short message, the WeChat or other specific messages, the first terminal device does not output immediately, but needs to perform output authority authentication. For example, the first terminal device is a mobile phone, and the mobile phone receives the micro-message, wherein when the type of the micro-message is a text type, the mobile phone interface does not immediately display the micro-message, but needs to authenticate the display authority. The authentication mode can be through NFC card, NFC card can be user's public transit card, worker card etc.. The preset output key may be an Identity (ID) number unique to the NFC card, or specific content (e.g., content of a specific partition). When the mobile phone reads the current output key through the NFC function and confirms that the current output key is matched with the preset output key, the WeChat message can be displayed, otherwise, the WeChat message cannot be displayed.
For example, the first terminal device is a mobile phone, and the mobile phone receives the WeChat message, wherein when the WeChat message is of a video type, the mobile phone interface does not immediately play the video, but needs to authenticate the display authority and the play authority. The authentication mode can be through NFC card, NFC card can be user's public transit card, worker card etc.. Fig. 2B is a schematic diagram illustrating output authority authentication by the NFC card according to an embodiment of the present application. The preset output key may be an Identity (ID) number unique to the NFC card, or specific content (e.g., content of a specific partition). When the mobile phone reads the current output key through the NFC function and confirms that the current output key is matched with the preset output key, the WeChat message can be displayed and played, otherwise, the WeChat message cannot be displayed and played.
For example, the first terminal device is a mobile phone, and the mobile phone receives the micro-message, wherein when the type of the micro-message is an audio type, the mobile phone interface does not immediately play audio, but needs to authenticate the playing authority. The authentication mode can be through NFC card, NFC card can be user's public transit card, worker card etc.. The preset output key may be an Identity (ID) number unique to the NFC card, or specific content (e.g., content of a specific partition). When the mobile phone reads the current output key through the NFC function and confirms that the current output key is matched with the preset output key, the WeChat message can be played, otherwise, the WeChat message cannot be played.
It can be understood that the preset output key may be set by the user on the first terminal device in advance, and when the first terminal device receives the first target message, the first terminal device obtains the current output key through the NFC function, and if the first target message is successfully matched, the first target message is output; or the target message is sent externally, the target message is provided with a preset output key, the target message needs to be matched with the current output key obtained by the NFC function on the terminal equipment, and if the matching is successful, the first target message is output.
In the embodiment of the application, if the terminal equipment has the equipment password, the terminal equipment password and the NFC card are encrypted, and even if the terminal equipment password is leaked, the terminal equipment still cannot output the target message without the NFC card carried by the terminal equipment user. If the terminal device is not provided with a password, other users besides the terminal device user can be prevented from snooping the target message.
2. Decoding
Optionally, outputting the first target message when the target processing is successful may include: and outputting the decoded first target message under the condition that decoding is successful.
Exemplary, as shown in fig. 2C, a flow chart of decoding in the embodiment of the present application is shown. When the first terminal device receives the short message, the WeChat or other specific messages, the first terminal device does not output immediately, but needs to decode. For example, the first terminal device is a mobile phone, and the mobile phone receives the micro-message, where the type of the micro-message is a text type, and the mobile phone needs to decode the first target message first, and optionally, the terminal device may prompt the user to perform the NFC card swiping operation. Fig. 2D is a schematic diagram illustrating decoding by the NFC card according to an embodiment of the application. The preset decoding key can be provided by an NFC card, wherein the NFC card can be a public transport card, a work card and the like of a user. The preset decoding key may be an Identity (ID) number unique to the NFC card, or specific content (e.g., content of a specific partition). When the mobile phone reads the current decoding key through the NFC function and confirms that the current decoding key is matched with the preset decoding key, the correct first target message can be decoded, then the first target message is displayed, and otherwise, the decoding of the messy code or the failure of analysis results in failure.
For example, the first terminal device is a mobile phone, and the mobile phone receives the micro-message, where the type of the micro-message is a video type, and the mobile phone needs to decode the first target message first, and the decoding needs to authenticate the decoding authority first. Optionally, the terminal device may prompt the user to perform the NFC card swiping operation. The preset decoding key can be provided by an NFC card, wherein the NFC card can be a public transport card, a work card and the like of a user. The preset decoding key may be an Identity (ID) number unique to the NFC card, or specific content (e.g., content of a specific partition). When the mobile phone reads the current decoding key through the NFC function and confirms that the current decoding key is matched with the preset decoding key, the correct first target message can be decoded, then the first target message is displayed and played, and otherwise, the decoding of the messy code or the failure of analysis results in failure.
For example, the first terminal device is a mobile phone, and the mobile phone receives the micro-message, where the type of the micro-message is an audio type, and the mobile phone needs to decode the first target message first, and the decoding needs to authenticate the decoding authority first. Optionally, the terminal device may prompt the user to perform the NFC card swiping operation. The preset decoding key can be provided by an NFC card, wherein the NFC card can be a public transport card, a work card and the like of a user. The preset decoding key may be an Identity (ID) number unique to the NFC card, or specific content (e.g., content of a specific partition). When the mobile phone reads the current decoding key through the NFC function and confirms that the current decoding key is matched with the preset decoding key, the mobile phone can decode the correct first target message and then play the first target message, otherwise, the mobile phone decodes the messy code or fails to analyze and causes failure.
It can be understood that the preset decoding key may be set by the user on the first terminal device in advance, and when the first terminal device receives the first target message, the first terminal device obtains the current decoding key through the NFC function, and if the first target message is successfully matched, the decoding is correct and the first target message is output; or the target message is sent externally, the target message is provided with a preset decoding key, the target message needs to be matched with the current decoding key obtained by the NFC function on the terminal equipment, and if the matching is successful, the decoding is correct and the first target message is output.
In the embodiment of the application, if the terminal equipment has the equipment password, the terminal equipment password and the NFC card are encrypted, and even if the terminal equipment password is leaked, the terminal equipment cannot decode the NFC card carried by the user of the terminal equipment, and the target message cannot be output. If the terminal device is not provided with a password, other users besides the terminal device user can be prevented from snooping the target message.
It should be noted that, the decoding herein may be understood as decoding authority authentication, or decoding authority authentication may be performed on the first target message by using the NFC card, if the authentication is successful, decoding is performed, otherwise, decoding a messy code or prompting that failing indication information cannot be resolved.
3. Message fusion
Optionally, outputting the first target message when the target processing is successful may include: outputting the fused information under the condition that the information fusion is successful.
Exemplary, as shown in fig. 2E, a flow chart of message fusion in an embodiment of the present application is shown. For example, the first terminal device is a mobile phone a, the mobile phone a receives the first target message, the second terminal device is a mobile phone B, and the mobile phone B receives the second target message; and the message fusion is carried out through NFC functions of the two terminal devices, for example, the mobile phone A and the mobile phone B are bumped, the message fusion is completed, a complete target message (comprising a first target message and a second target message) is output after authentication is successful, and indication information of message fusion failure is output after authentication failure. Fig. 2F is a schematic diagram of message fusion by the NFC function between the mobile phone a and the mobile phone B in the embodiment of the present application.
It should be noted that, in the embodiment of the present application, when the terminal device receives the first target message, only output authority authentication may be performed, only decoding may be performed, only message fusion may be performed, only output authority authentication may be performed after decoding, only output authority authentication may be performed after message fusion, only message fusion may be performed after decoding, and only output authority authentication may be performed after message fusion.
In the embodiment of the application, under the condition that the first terminal equipment receives the first target message, target processing is carried out; outputting the first target message under the condition that target processing is successful; the target processing includes: at least one of output authority authentication, decoding, and message fusion. Because the terminal equipment needs to carry out at least one of output authority authentication, decoding and message fusion when receiving the target message, the target message is only output under the condition of successfully authenticating at least one of the output authority, decoding authority and message fusion; even if the password of the terminal equipment is revealed, at least one of the output authority, the decoding authority and the message fusion is not successfully authenticated, other users cannot acquire the target message, so that the user privacy is protected, and the safety of the target information is improved.
As shown in fig. 3, a schematic diagram of an output device of a terminal device message in an embodiment of the present application may include:
a processing module 301, configured to perform target processing when the first terminal device receives the first target message;
an output module 302, configured to output the first target message if target processing is successful;
The target processing includes: at least one of rights authentication and decoding is output.
Optionally, the processing module 301 is specifically configured to, if the first terminal device receives the first target message, unlock the first terminal device and perform target processing if the first terminal device is not unlocked.
Optionally, the processing module 301 is specifically configured to perform output authority authentication through the first NFC card when the first terminal device receives the first target message;
the output module 302 is specifically configured to output the first target message if the output authority authentication is successful.
Optionally, the processing module 301 is specifically configured to, when the first terminal device receives the first target message, consider that the output authority authentication is successful if the identifier or the specific content of the first NFC card matches with a preset output key.
Optionally, the processing module 301 is specifically configured to decode through the second NFC card when the first terminal device receives the first target message;
the output module 302 is specifically configured to output the decoded first target message if decoding is successful.
Optionally, the processing module 301 is specifically configured to, when the first terminal device receives the first target message, consider that the decoding is successful if the identifier or the specific content of the second NFC card matches with a preset decoding key.
Optionally, the processing module 301 is specifically configured to, when the first terminal device receives the first target message and the second terminal device receives the output key or the decoding key, perform output authority authentication or decoding through NFC functions of the first terminal device and the second terminal device if a distance between the first terminal device and the second terminal device is within a preset range;
the output module 302 is specifically configured to output the first target message when the output authority authentication is successful; or outputting the decoded first target message under the condition that the decoding is successful.
Optionally, the processing module 301 is specifically configured to, when the first terminal device receives the first target message and the second terminal device receives the second target message, perform message fusion on the first target message and the second target message through NFC functions of the first terminal device and the second terminal device if a distance between the first terminal device and the second terminal device is within a preset range;
the output module 302 is specifically configured to output the fused message if the message fusion is successful.
As shown in fig. 4, which is a schematic diagram of an embodiment of a terminal device according to the embodiment of the present application, the output device of the terminal device message shown in fig. 3 may be included.
Fig. 5 is a schematic diagram of another embodiment of a terminal device according to an embodiment of the present application. May include:
the following describes the components of the mobile phone in the terminal device specifically with reference to fig. 5:
the RF circuit 510 may be used for receiving and transmitting signals during a message or a call, and in particular, after receiving downlink information of a base station, the signal is processed by the processor 580; in addition, the data of the design uplink is sent to the base station. Typically, the RF circuitry 510 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like. In addition, the RF circuitry 510 may also communicate with networks and other devices via wireless communications. The wireless communications may use any communication standard or protocol including, but not limited to, global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), email, short message service (Short Messaging Service, SMS), and the like.
The memory 520 may be used to store software programs and modules, and the processor 580 performs various functional applications and data processing of the cellular phone by executing the software programs and modules stored in the memory 520. The memory 520 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 520 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The input unit 530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the handset. In particular, the input unit 530 may include a touch panel 531 and other input devices 532. The touch panel 531, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 531 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.), and drive the corresponding connection device according to a predetermined program. Alternatively, the touch panel 531 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device and converts it into touch point coordinates, which are then sent to the processor 580, and can receive commands from the processor 580 and execute them. In addition, the touch panel 531 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 530 may include other input devices 532 in addition to the touch panel 531. In particular, other input devices 532 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc.
The display unit 540 may be used to display information input by a user or information provided to the user and various menus of the mobile phone. The display unit 540 may include a display panel 541, and alternatively, the display panel 541 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 531 may cover the display panel 541, and when the touch panel 531 detects a touch operation thereon or thereabout, the touch operation is transferred to the processor 580 to determine the type of the touch event, and then the processor 580 provides a corresponding visual output on the display panel 541 according to the type of the touch event. Although in fig. 5, the touch panel 531 and the display panel 541 are two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 531 and the display panel 541 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 550, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 541 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 541 and/or the backlight when the mobile phone moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for applications of recognizing the gesture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured with the handset are not described in detail herein.
Audio circuitry 560, speakers 561, microphone 562 may provide an audio interface between the user and the handset. The audio circuit 560 may transmit the received electrical signal converted from audio data to the speaker 561, and the electrical signal is converted into a sound signal by the speaker 561 and output; on the other hand, microphone 562 converts the collected sound signals into electrical signals, which are received by audio circuit 560 and converted into audio data, which are processed by audio data output processor 580 for transmission to, for example, another cell phone via RF circuit 510, or for output to memory 520 for further processing.
Wi-Fi belongs to a short-distance wireless transmission technology, and a mobile phone can help a user to send and receive e-mails, browse web pages, access streaming media and the like through a Wi-Fi module 570, so that wireless broadband Internet access is provided for the user. Although fig. 5 shows Wi-Fi module 570, it is to be understood that it does not belong to the necessary constitution of the handset, and can be omitted entirely as required within the scope of not changing the essence of the invention.
Processor 580 is the control center of the handset, connects the various parts of the entire handset using various interfaces and lines, and performs various functions and processes of the handset by running or executing software programs and/or modules stored in memory 520, and invoking data stored in memory 520, thereby performing overall monitoring of the handset. Optionally, processor 580 may include one or more processing units; preferably, processor 580 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 580.
The handset further includes a power supply 590 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 580 via a power management system so as to perform functions such as managing charging, discharging, and power consumption by the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which will not be described herein.
Optionally, the processor 580 is configured to perform target processing if the first terminal device receives the first target message; outputting the first target message under the condition that target processing is successful;
the target processing includes: at least one of rights authentication and decoding is output.
Optionally, the processor 580 is specifically configured to, if the first terminal device receives the first target message, unlock the first terminal device and perform target processing if the first terminal device is not unlocked.
Optionally, the processor 580 is specifically configured to perform output authority authentication through the first NFC card when the first terminal device receives the first target message; and outputting the first target message under the condition that the output authority authentication is successful.
Optionally, the processor 580 is specifically configured to, if the first terminal device receives the first target message, consider that the output authority authentication is successful if the identifier or the specific content of the first NFC card matches with a preset output key.
Optionally, the processor 580 is specifically configured to decode through the second NFC card when the first terminal device receives the first target message; and outputting the decoded first target message under the condition that decoding is successful.
Optionally, the processor 580 is specifically configured to, if the first terminal device receives the first target message, consider that the decoding is successful if the identifier or the specific content of the second NFC card matches with a preset decoding key.
Optionally, the processor 580 is specifically configured to, if the first terminal device receives the first target message and the second terminal device receives the output key or the decoding key, perform output authority authentication or decoding through NFC functions of the first terminal device and the second terminal device if a distance between the first terminal device and the second terminal device is within a preset range; outputting the first target message under the condition that the output authority authentication is successful; or outputting the decoded first target message under the condition that the decoding is successful.
Optionally, the processor 580 is specifically configured to, when the first terminal device receives the first target message and the second terminal device receives the second target message, perform message fusion on the first target message and the second target message through NFC functions of the first terminal device and the second terminal device if a distance between the first terminal device and the second terminal device is within a preset range; outputting the fused information under the condition that the information fusion is successful.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (11)

1. A method for outputting a message from a terminal device, comprising:
under the condition that the first terminal equipment receives the first target message, target processing is carried out;
outputting the first target message under the condition that target processing is successful;
the target processing includes: at least one of output authority authentication, decoding, and message fusion.
2. The method according to claim 1, wherein, in case the first terminal device receives the first target message, performing the target processing comprises:
and under the condition that the first terminal equipment receives the first target message, if the first terminal equipment is not unlocked, unlocking the first terminal equipment and performing target processing.
3. The method according to claim 2, wherein the output authority authentication is performed in case the first terminal device receives the first target message, comprising:
under the condition that the first terminal equipment receives the first target message, output authority authentication is carried out through the first NFC card;
outputting the first target message under the condition that target processing is successful, including:
and outputting the first target message under the condition that the output authority authentication is successful.
4. A method according to claim 3, wherein the authenticating the output rights by the first NFC card in case the first terminal device receives the first target message comprises:
and under the condition that the first terminal equipment receives the first target message, if the identification or the specific content of the first NFC card is matched with a preset output key, the output authority authentication is considered to be successful.
5. The method according to any of claims 1-4, wherein decoding in case the first terminal device receives the first target message comprises:
decoding by the second NFC card under the condition that the first terminal equipment receives the first target message;
Outputting the first target message under the condition that target processing is successful, including:
and outputting the decoded first target message under the condition that decoding is successful.
6. The method according to claim 5, wherein decoding by the second NFC card in case the first terminal device receives the first target message, comprises:
and under the condition that the first terminal equipment receives the first target message, if the identification or the specific content of the second NFC card is matched with the preset decoding key, the decoding is considered to be successful.
7. The method according to any of claims 1-4, wherein said performing the target processing in case the first terminal device receives the first target message comprises:
under the condition that a first terminal device receives a first target message and a second terminal device receives an output key or a decoding key, if the distance between the first terminal device and the second terminal device is within a preset range, performing output authority authentication or decoding through NFC functions of the first terminal device and the second terminal device;
outputting the first target message under the condition that target processing is successful, including:
Outputting the first target message under the condition that the output authority authentication is successful; or alternatively, the first and second heat exchangers may be,
and outputting the decoded first target message under the condition that decoding is successful.
8. The method according to any of claims 1-4, wherein said performing the target processing in case the first terminal device receives the first target message comprises:
under the condition that a first terminal device receives a first target message and a second terminal device receives a second target message, if the distance between the first terminal device and the second terminal device is within a preset range, message fusion is carried out on the first target message and the second target message through NFC functions of the first terminal device and the second terminal device;
outputting the first target message under the condition that target processing is successful, including:
outputting the fused information under the condition that the information fusion is successful.
9. An output device of a terminal device message, comprising:
the processing module is used for carrying out target processing under the condition that the first terminal equipment receives the first target message;
the output module is used for outputting the first target message under the condition that the target processing is successful;
The target processing includes: at least one of output authority authentication, decoding, and message fusion.
10. A terminal device, comprising:
a memory storing executable program code;
a processor coupled to the memory;
the processor being adapted to correspondingly perform the method of any one of claims 1-8.
11. A computer readable storage medium comprising instructions which, when run on a processor, cause the processor to perform the method of any of claims 1-8.
CN202310803974.2A 2023-06-30 2023-06-30 Method, device and storage medium for outputting terminal equipment message Pending CN116828461A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310803974.2A CN116828461A (en) 2023-06-30 2023-06-30 Method, device and storage medium for outputting terminal equipment message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310803974.2A CN116828461A (en) 2023-06-30 2023-06-30 Method, device and storage medium for outputting terminal equipment message

Publications (1)

Publication Number Publication Date
CN116828461A true CN116828461A (en) 2023-09-29

Family

ID=88121886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310803974.2A Pending CN116828461A (en) 2023-06-30 2023-06-30 Method, device and storage medium for outputting terminal equipment message

Country Status (1)

Country Link
CN (1) CN116828461A (en)

Similar Documents

Publication Publication Date Title
CN109472166B (en) Electronic signature method, device, equipment and medium
US11488234B2 (en) Method, apparatus, and system for processing order information
CN105515768B (en) A kind of methods, devices and systems of more new key
CN107483213B (en) Security authentication method, related device and system
WO2015101273A1 (en) Security verification method, and related device and system
CN107070909A (en) Method for sending information, message receiving method, apparatus and system
EP3401864A1 (en) Method for selecting transaction application, and terminal
CN103701605A (en) Data authentication method and device
KR20180107162A (en) Method, device, system and storage medium for controlling intelligent facilities
CN111512618B (en) Electronic device for transmitting and receiving message including emoticon and control method thereof
CN105190661A (en) Secure mobile payment using media binding
CN104954126B (en) Sensitive operation verification method, device and system
CN106255102B (en) Terminal equipment identification method and related equipment
CN106550361B (en) Data transmission method, equipment and computer readable storage medium
CN111181909B (en) Identity information acquisition method and related device
CN102377769A (en) Communication system providing wireless authentication for private data access and related methods
CN107911818B (en) Method and device for data transmission between mobile terminals and mobile terminal
CN104901806B (en) A kind of virtual resource processing method, device and system
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
US20160128118A1 (en) Secure pairing of personal device with host device
CN104899488A (en) Numerical value transferring method and device
CN108985768B (en) Data transfer system, method and device
CN106815510B (en) Data processing method and terminal
CN107172718B (en) Information processing method and electronic equipment
KR101853970B1 (en) Method for Relaying Authentication Number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination