WO2020098326A1 - 信息管理方法、处理方法、设备及存储介质 - Google Patents

信息管理方法、处理方法、设备及存储介质 Download PDF

Info

Publication number
WO2020098326A1
WO2020098326A1 PCT/CN2019/101437 CN2019101437W WO2020098326A1 WO 2020098326 A1 WO2020098326 A1 WO 2020098326A1 CN 2019101437 W CN2019101437 W CN 2019101437W WO 2020098326 A1 WO2020098326 A1 WO 2020098326A1
Authority
WO
WIPO (PCT)
Prior art keywords
barcode
abnormal information
information
content
management method
Prior art date
Application number
PCT/CN2019/101437
Other languages
English (en)
French (fr)
Inventor
杨冬变
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020098326A1 publication Critical patent/WO2020098326A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations

Definitions

  • the present invention requires the priority of a Chinese patent application filed on November 15, 2018 in the Chinese Patent Office with the application number 201811360658.8 and the invention titled "Information Management Methods, Processing Methods, Equipment and Storage Media.” The reference is incorporated in the present invention.
  • the present invention relates to the field of computer technology, and in particular, to an information management method, processing method, device, and storage medium.
  • the two-dimensional code is a new-generation bar code technology that records data symbol information using a specific geometric figure according to a certain rule and distributed on a plane (two-dimensional direction) in a black and white rectangular square matrix.
  • a link address Uniform Resource Locator, URL for short
  • the content of the barcode contains a malicious link address, or the user's personal information, which results in the violation of the user's financial interests and personal privacy.
  • the present invention provides an information management method, processing method, device and storage medium.
  • an information management method provided by the present invention is applied to a terminal.
  • the information management method includes: sending a barcode to detect whether the barcode contains abnormal information; when the barcode has abnormal information, it will communicate with the abnormal Perform the corresponding operation on the bar code corresponding to the information. After performing the corresponding operation on the bar code, you can prevent the user from directly using the bar code, or let the user know that the bar code has abnormal information, and can consider selective processing.
  • the present invention provides an information processing method applied to a server.
  • the information processing method includes: receiving a barcode sent by a terminal; parsing the barcode and obtaining an address link, and querying whether the address link contains abnormal information; When the address link contains abnormal information, the address link corresponding to the abnormal information is returned to the terminal, and the address link corresponding to the abnormal information is added to the blacklist database.
  • the present invention provides an apparatus, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the computer program is executed by the processor, it is implemented as The steps of the above method.
  • the present invention provides a computer-readable storage medium having a computer program stored on it, which when executed by a processor implements the steps of the method as described above.
  • FIG. 1 is a flowchart of an information management method in an exemplary embodiment of the invention
  • FIG. 2 is a first schematic diagram of an information management method in an exemplary embodiment of the invention.
  • FIG. 3 is a second schematic diagram of an information management method in an exemplary embodiment of the invention.
  • FIG. 4 is a third schematic diagram of an information management method in an exemplary embodiment of the invention.
  • FIG. 5 is a fourth schematic diagram of an information management method in an exemplary embodiment of the present invention.
  • FIG. 6 is a fifth schematic diagram of an information management method in an exemplary embodiment of the invention.
  • FIG. 7 is a flowchart of an information processing method in an exemplary embodiment of the present invention.
  • FIG. 8 is a block diagram of a terminal in an exemplary embodiment of the present invention.
  • FIG. 9 is a block diagram of a server in an exemplary embodiment of the invention.
  • 200-server 210-receive picture module; 220-parse module; 230-query module; 240-abnormal information return module.
  • FIG. 1 is a flowchart of an information management method in an exemplary embodiment of the present invention.
  • the information management method includes:
  • S05 Send a barcode to detect whether the barcode contains abnormal information.
  • the content of the barcode may be sent to detect whether the content of the barcode contains abnormal information, where the content of the barcode refers to the information or data that can be displayed through the address link after the address link is parsed out according to the content of the barcode .
  • S06 When the barcode has abnormal information, perform corresponding operations on the barcode. Specifically, when the address corresponding to the abnormal information returned by the server is connected, the corresponding barcode content has abnormal information, which can prevent the user from directly using the barcode, or enable the user to know that the barcode has abnormal information, and can consider Selective processing is carried out to reduce the risk of infringement of the user ’s economic interests and personal privacy.
  • the above barcode includes a two-dimensional code or a barcode, and of course, other types of barcodes may also be used.
  • the content of the barcode is read.
  • the terminal can detect the barcode from the picture library.
  • pictures in the picture library such as selfie pictures, photos, videos and barcodes.
  • S011 may also be included: when it is detected that the saved picture is a barcode, the barcode is placed in a corresponding folder.
  • the barcode can be placed in the corresponding barcode folder, or it can be placed in the camera directory together with the non-barcode.
  • the barcode folder may include a QR code folder or a barcode file. Two-dimensional code pictures can be placed in the corresponding two-dimensional code folder (see Figure 2), or together with non-two-dimensional codes in the camera directory (see Figure 3).
  • the terminal when it is detected that the saved picture is a bar code, it automatically or when the terminal holds the screen, or within a preset time, or after receiving a content reading instruction for the bar code Describe the content of the barcode. Reading the content of the barcode while holding the screen can reduce the memory consumption of the user when using the terminal.
  • the preset time can be set by the user, for example, from 0 to 3 in the morning, or according to the user's usage habits, it is determined that the time period in which the terminal memory occupies less time is automatically set as the preset time. Or it is asking the user whether to read the content of the barcode, and only after reading the corresponding instruction, the content of the barcode is read.
  • S02 According to the content, determine the type of the barcode and sort it to the corresponding position according to the type. According to the content of the barcode, the data symbol information recorded in the barcode is obtained, and the type of the barcode can be judged according to the symbol information, such as a public account type, WeChat contact human, payment type with payment function or other types, etc.
  • the two-dimensional code folder may include a public account type folder, a WeChat contact human folder, a payment type folder, or other types of folders. If it is determined that a bar code is a payment type, the bar code is sorted into the payment type folder by category; if it is determined that the bar code is a public number type, the bar code is sorted into the public number type folder.
  • S051 may also be included in S05.
  • S051 After receiving an abnormality detection instruction for the content of the barcode, send the content of the barcode to detect whether the barcode contains abnormal information. That is, after the user outputs an abnormality detection instruction for the content of the barcode, the terminal sends an instruction to detect whether the barcode contains abnormal information after receiving the instruction. Of course, it is not necessary to receive the abnormality detection instruction for the barcode, but once the saved or scanned picture is detected as a barcode, the content of the barcode is sent, and the abnormality of the barcode is detected.
  • the sent barcode may be a barcode of a preset type.
  • the preset type may be a specific type of bar code set by the user, or a bar code set by default, or a bar code with a ratio of abnormal information exceeding a set value among multiple types of bar codes.
  • the types of bar codes can be divided into public account types, WeChat contact with humans, payment types with payment functions, and other types. Among them, when the barcode with payment type has abnormal information, it is easy to damage the economic interests of the user. Therefore, the preset type may include the barcode with payment type. Of course, you can also flexibly set the type of bar code that needs to be checked for abnormal messages as needed.
  • S03 may also be included.
  • S03 Set a mark corresponding to the barcode content on the barcode according to the barcode content. Mark the barcode, so that users can quickly identify the information contained in the barcode from the mark. For example, if the barcode is for WeChat to contact humans, the mark may be at least one of the name, work unit, gender, etc. of the WeChat contact; if the barcode is a public number, the mark may be the name of the public number, the name of the latest article Wait at least one.
  • the mark may be a prompt message displayed on the palace-format thumbnail of the two-dimensional code (see FIG. 3), a detailed information window displayed on the detailed diagram of the bar code (see FIG. 5), or existing
  • the prompt information on the thumbnail also has a detailed information window on the detailed image.
  • the detailed drawing is relative to the thumbnail, and it can be considered that the detailed drawing is an enlarged view.
  • the content displayed in the detailed information window includes but is not limited to: description, security level, and whether sharing is allowed.
  • the terminal may automatically set a mark corresponding to the barcode content, or set the mark after receiving the instruction input by the user.
  • S041 and S042 may also be included.
  • update the mark according to the content input by the edit instruction includes updating the prompt information displayed on the thumbnail and updating the detailed information window displayed on the detailed image of the barcode. As shown in FIG. 5, the user can enter the mark editing page described in FIG. 6 after clicking the detailed information window.
  • Tags can be stored in a tag database in the server.
  • the server can find a tag matching the address link from the tag database and return it to the client.
  • S06 includes S061 and S062.
  • S061 Receive the address link corresponding to the abnormal information returned by the server. According to the address information, the corresponding barcode can be found.
  • S062 Search for the corresponding barcode with abnormal information according to the address link.
  • the corresponding operation includes a direct operation for the barcode or an optional operation selected by the user.
  • the direct operation includes directly warning, disabling or deleting the barcode.
  • the optional operation items of the optional operation include at least one of warning, disabling, deleting, or ignoring.
  • a report window may pop up, and the report window has optional operations for the user to select.
  • the terminal will warn the bar code corresponding to the abnormal information.
  • the user may consider whether to recognize the bar code after considering the warning function.
  • the terminal disables the bar code corresponding to the abnormal information. Because the bar code is disabled, the terminal cannot jump to the corresponding page based on the bar code, thereby avoiding the release of the abnormal information, giving the user economic benefits and Personal privacy poses a threat.
  • the terminal deletes the bar code corresponding to the abnormal information, so that the bar code with abnormal information in the terminal is cleared, and the security of the terminal is improved.
  • the user chooses to ignore, it can be known that the user does not agree with the abnormal information in the barcode after consideration. No matter which item the user selects in the report processing, since a report window can pop up, the customer can know that the barcode has abnormal information after being detected.
  • FIG. 7 is a flowchart of an information processing method in another exemplary embodiment of the present invention.
  • the information processing method includes:
  • S11 Receive the content of the barcode sent by the terminal. Specifically, the content of the barcode of the preset type returned from the terminal may be received.
  • S12 Parse the barcode and obtain an address link. According to the analysis of the content of the barcode, the address link corresponding to the barcode is interpreted.
  • S13 Inquire whether the address link contains abnormal information. Check whether the address link contains abnormal information, including but not limited to the following two methods: the first is to compare the address link with the address link in the blacklist database in the server; the second is to query the URL link Is there a special symbol in, the special symbol is a symbol that points to information such as Trojans, malicious links and so on.
  • the server returns the barcode with abnormal information to the terminal in the form of a json string. It should be noted that the server may only return the address link corresponding to the abnormal information to the terminal, so that the terminal can obtain the address link corresponding to the abnormal information, and warn or disable or delete the corresponding barcode. Add the address link corresponding to the abnormal information to the blacklist data, then when other servers receive the content of the barcode again, they can first compare and judge with the address link in the blacklist database.
  • S11 Before S11, it also includes S10, S10: receiving the mark sent by the client, and storing the mark in the mark database.
  • the server can find a tag matching the address link from the tag database and return it to the client.
  • FIG. 8 is a block diagram of the terminal 100 in another exemplary embodiment of the present invention.
  • the terminal 100 includes:
  • the sending detection module 10 is used to send a barcode to detect whether the barcode contains abnormal information
  • the exception processing module 20 is configured to perform corresponding operations on the barcode when the barcode has abnormal information.
  • the above terminal 100 also includes:
  • the content reading module is used to read the content of the barcode when the detected or scanned picture is a barcode
  • the classification module is used to determine the type of the barcode according to the content and sort it to the corresponding position according to the type.
  • the sending detection module 10 includes:
  • the instruction receiving and sending submodule is used to send the content of the barcode to detect whether the barcode contains abnormal information after receiving the abnormality detection instruction, wherein the transmitted barcode is a barcode of a preset type.
  • the above terminal 100 also includes:
  • a marking module configured to set a mark corresponding to the barcode content on the barcode according to the content of the barcode; wherein, the marking includes: displaying prompt information on the thumbnail of the barcode, or displaying At least one of the detailed information windows displayed on the detailed drawing.
  • the above terminal 100 also includes:
  • the editing module is configured to update the mark according to the content input by the edit instruction when receiving the edit instruction for the mark;
  • the sharing module is configured to send the mark to the server when receiving a sharing instruction for the mark.
  • the content reading module may read the content of the barcode automatically, or when the terminal holds the screen, or within a preset time, or after receiving a content reading instruction for the barcode.
  • the above exception handling module 20 includes:
  • Receive exception submodule used to receive the address link corresponding to the exception information returned by the server
  • the search submodule is used to search for a corresponding barcode with abnormal information according to the address link.
  • the above barcode includes a two-dimensional code or a barcode.
  • the above corresponding operations include direct operations or optional operations; the direct operations include warning, disabling, or deleting the barcode corresponding to the abnormal information; the optional operation items of the optional operations include warning, disabling, and deleting Or ignore at least one.
  • the terminal system provided by the embodiment of the present application may also execute the method executed by the terminal in FIG. 1 and implement the function of the terminal in the embodiment shown in FIG. 1, which will not be repeated here.
  • FIG. 9 is a block diagram of a server in another exemplary embodiment of the present invention.
  • the server 200 includes:
  • the receiving picture module 210 is used to receive the barcode sent by the terminal;
  • the parsing module 220 is used to parse the barcode and obtain an address link
  • the query module 230 is used to query whether the address link contains abnormal information
  • the abnormal information return module 240 is configured to return the address link corresponding to the abnormal information to the terminal when the address link contains abnormal information, and add the address link corresponding to the abnormal information to the blacklist database.
  • An embodiment of the present invention further provides a device, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, and the computer program is executed by the processor to implement the above information management method A step of.
  • Embodiments of the present invention also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, each process of the embodiment of the processing method for realizing the fingerprint unlocking operation can be achieved. The same technical effect will not be repeated here to avoid repetition.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk or optical disk, etc.
  • the information management method proposed by the present invention detects the bar code with abnormal information, it will operate the bar code corresponding to the abnormal information, and after performing the corresponding operation on the bar code, the user may be prevented from directly using the bar code, or the user may know
  • the barcode has abnormal information and can be considered for selective processing, thereby reducing the risk of infringement of the user's economic interests and personal privacy.
  • the methods in the above embodiments can be implemented by means of software plus a necessary general hardware platform, and of course, can also be implemented by hardware, but in many cases the former is better Implementation.
  • the technical solutions of the present invention can be embodied in the form of software products in essence or part of contributions to the existing technology, and the computer software products are stored in a storage medium (such as ROM / RAM, magnetic disk,
  • the CD-ROM includes several instructions to enable a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method described in each embodiment of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

一种信息管理方法、处理方法、设备及存储介质。所述信息管理方法包括:发送条码以检测所述条码是否含有异常信息(S05);当所述条码具有异常信息时,对所述条码进行相应操作(S06)。

Description

信息管理方法、处理方法、设备及存储介质
交叉引用
本发明要求在2018年11月15日提交中国专利局、申请号为201811360658.8、发明名称为“信息管理方法、处理方法、设备及存储介质”的中国专利申请的优先权,该申请的全部内容通过引用结合在本发明中。
技术领域
本发明涉及计算机技术领域,尤其涉及一种信息管理方法、处理方法、设备及存储介质。
背景技术
二维码是用特定的几何图形按一定规律在平面(二维方向上)分布的黑白相间的矩形方阵记录数据符号信息的新一代条码技术,属于条码的一种。用户通过扫描或识别条码可以省去在手机上输入链接地址(Uniform Resource Locator,简称URL)的繁琐过程,实现网站跳转、信息获取,广告推送、手机电商、防伪溯源、一键支付等功能。
然而,有时条码的内容藏有恶意链接地址,或者用户个人信息,导致用户的经济利益和个人隐私遭受侵害。
发明内容
为了解决上述问题,本发明提供一种信息管理方法、处理方法、设备及存储介质。
第一方面,本发明提供的一种信息管理方法,应用于终端,该信息管理方法包括:发送条码以检测所述条码是否含有异常信息;当所述条码具有异 常信息时,将与所述异常信息对应的条码进行相应操作,对条码进行相应操作后,可以避免用户直接使用该条码,或者使得用户可以得知该条码具有异常信息,并可以考虑进行选择性处理。
第二方面,本发明提供一种信息处理方法,应用于服务器,该信息处理方法包括:接收终端发送的条码;解析所述条码并获得地址链接,查询地址链接中是否含有异常信息;当所述地址链接含有异常信息时,将与所述异常信息对应的地址链接返回至所述终端,并将与所述异常信息对应的地址链接加入黑名单数据库中。
第三方面,本发明提供一种设备,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如上述的方法的步骤。
第四方面,本发明提供一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上述的方法的步骤。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本发明的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为本发明一示范性实施例中的信息管理方法的流程图;
图2为本发明一示范性实施例中的信息管理方法中的第一示意图;
图3为本发明一示范性实施例中的信息管理方法中的第二示意图;
图4为本发明一示范性实施例中的信息管理方法中的第三示意图;
图5为本发明一示范性实施例中的信息管理方法中的第四示意图;
图6为本发明一示范性实施例中的信息管理方法中的第五示意图;
图7为本发明一示范性实施例中的信息处理方法的流程图;
图8为本发明一示范性实施例中的终端的模块图;
图9为本发明一示范性实施例中的服务器的模块图。
附图说明:
100-终端;10-发送检测模块;20-异常处理模块;
200-服务器;210-接收图片模块;220-解析模块;230-查询模块;240-异常信息返回模块。
具体实施方式
为使本发明的目的、技术方案和优点更加清楚,下面将结合本发明具体实施例及相应的附图对本发明技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1为本发明一示范性实施例中的信息管理方法的流程图。该信息管理方法包括:
S05:发送条码以检测所述条码是否含有异常信息。具体的,可以是发送条码的内容以检测所述条码的内容是否含有异常信息,其中,条码的内容是指根据条码的内容解析出来地址链接后,通过该地址链接能够跳转显示的信息或数据。
S06:当所述条码具有异常信息时,对所述条码进行相应操作。具体的,当接收到服务器返回的异常信息对应的地址连接后,得出对应的条码内容具有异常信息,可以避免用户直接使用该条码,或者使得用户可以得知该条码具有异常信息,并可以考虑进行选择性处理,从而降低了用户经济利益和个人隐私遭受侵害的风险。
具体的,上述条码包括二维码或条形码,当然,也可以是其他类型的条 码。
在S05之前,还包括S01和S02。
S01:当检测到所保存或扫描的图片为条码时,读取所述条码的内容。终端可以从图片库中检测到条码。其中,图片库中具有多种图片,例如自拍图片、照片、视频以及条码等等。通过读取条码的内容,即读取条码所记录的数据符号信息,根据该数据符号信息,便于对条码执行相关操作。
S01中,还可以包括S011:当检测到所保存的图片为条码时,将该条码置于对应的文件夹中。具体的,可以将条码置于对应的条码文件夹中,或者是与非条码共同置于相机目录下。具体的,条码文件夹可以包括二维码文件夹或条形码文件下。二维码图片能够置于对应的二维码文件夹中(参图2),或者是与非二维码共同置于相机目录下(参图3)。
在S01中,当检测到所保存的图片为条码时,自动、或者在所述终端息屏时、或者在预设时间内、或者在接收到针对所述条码的内容读取指令后读取所述条码的内容。在息屏时读取条码的内容,可以减少用户使用终端时的内存占用。预设时间可以由用户设定,例如凌晨0点到3点,或者根据用户使用习惯,得出终端内存占用较少的时间段后将该时间段自动设置为预设时间。或者是询问用户是否针对条码的内容进行读取,在接收到对应指令后,才执行读取条码的内容。
S02:根据所述内容,判断所述条码的类别并按类整理至对应位置。根据条码的内容,即获得了条码所记录的数据符号信息,根据符号信息可以判断出来条码的类型,例如是公众号类、微信联系人类、有支付功能的支付类或其他种类等等。
如图4所示,在二维码文件夹中可以包括公众号类文件夹、微信联系人类文件夹、支付类文件夹或其他种类文件夹中。若判断出一条码为支付类,则将条码按类整理至支付类文件夹中;若判断出一条码为公众号类,则将条 码按类整理至公众号类文件夹中。
S05中还可以包括S051。
S051:在接收到针对所述条码的内容的异常检测指令后,发送条码的内容以检测条码是否含有异常信息。即用户输出针对条码的内容的异常检测指令后,终端接收到该指令后,发送检测条码是否含异常信息的指令。当然,也可以是不需要接收到针对条码的异常检测指令,而是一旦检测到保存或扫描的图片为条码时,即发送条码的内容,并对条码的内容进行异常检测。
在S051中,所述发送的条码可以为预设类型的条码。其中,预设类型可以是用户设定的特定类型的条码,或者是默认设置的条码,或者是多种类型的条码中异常信息比例超过设定值的条码。如上所述,可以将条码的类型分为公众号类、微信联系人类、具有支付功能的支付类以及其他类型。其中,具有支付类的条码具有异常信息时容易导致用户的经济利益受损,因此,预设类型可以包括支付类的条码。当然,也可以根据需要,灵活设定需要检测是否含异常消息的条码类型。
当然,S051中也可以将所有类型的条码全部发送至服务器,以检测条码是否含有异常信息。
在S02和S05之间,还可以包括S03。S03:根据所述条码的内容,在所述条码上设置与条码内容对应的标记。对条码进行标记,使得用户可以从标记上快速识别出条码所含有的信息。例如,该条码为微信联系人类,则该标记可以是微信联系人的姓名、工作单位、性别等等至少之一;如该条码为公众号,则该标记可以是公众号名称、最新推送文章名等等至少之一。
具体的,该标记可以是在二维码的宫格式缩略图上显示的提示信息(参图3),也可以是在条码的详细图上显示的详细信息窗口(参图5),或者既有缩略图上的提示信息也有详细图上的详细信息窗口。详细图与缩略图是相对的,可以认为详细图是放大图。详细信息窗口所显示的内容包括但不限于: 描述、安全级别等级,以及是否允许共享等等。
需要说明的是,当条码与非条码共同置于同一目录时,可以在条码(或二维码)的缩略图上显示提示信息,如图3所示,以便于快速识别出条码(或二维码)。
其中,终端可以自动设置与条码内容对应的标记,或者是接收到用户输入的指令之后,设置标记。
在S03和S05之间,还可以包括S041和S042。
S041:当接收到针对所述标记的编辑指令时,根据所述编辑指令输入的内容更新所述标记。具体的,更新标记上的内容,包括更新缩略图上显示提示信息,以及更新条码的详细图上显示的详细信息窗口。如图5所示,用户点击该详细信息窗口后可以进入如图6所述的标记编辑页面。
S042:当接收到针对所述标记的共享指令时,将所述标记发送至服务器。
标记可以存储于服务器中的标记数据库中。当终端收到其他客户端的地址链接是否含有异常信息的请求时,服务器可以从标记数据库中找到与该地址链接匹配的标记并返回给客户端。
S06中,包括S061和S062。
S061:接收服务器返回的异常信息对应的地址链接。根据地址信息可以找到对应的条码。
S062:根据所述地址链接,查找对应的具有异常信息条码。
S06中,相应操作包括针对该条码的直接操作或由用户选择的可选操作。
其中,直接操作包括将该条码直接进行警告、禁用或删除。
可选操作的可选操作项包括警告、禁用、删除或忽略至少之一,例如该条码具有异常信息,则可以弹出报告窗口,报告窗口上具有供用户选择的可选操作。具体的,当用户选择警告时,终端将与所述异常信息对应的条码警 示,在用户需要识别该条码时,由于具有警示作用,则用户可以考量后觉得是否识别该条码。当用户选择禁用时,终端将与所述异常信息对应的条码禁用,由于条码被禁用,使得终端无法基于该条码跳转至相应的页面中,从而避免异常信息被释放,给用户的经济利益和个人隐私造成威胁。当用户选择删除时,终端将与所述异常信息对应的条码删除,使得终端中具有异常信息的条码被清理,提高了终端的安全性。当用户选择忽略时,可知用户考量后不认同该条码中存在异常信息。无论用户选择报告处理中的哪一项,由于可以弹出报告窗口,客户都能够得知该条码经过检测存在异常信息。
图7为本发明又一示范性实施例中的信息处理方法的流程图,信息处理方法包括:
S11:接收终端发送的条码的内容。具体的,可以接收自终端返回的预设类型的条码的内容。
S12:解析所述条码并获得地址链接。根据条码的内容分析解读出该条码对应的地址链接。
S13:查询地址链接中是否含有异常信息。查询地址链接中是否含有异常信息,包括但不局限于下面两种方法:第一种是在服务器中将该地址链接与黑名单数据库中的地址链接进行比对;第二种是查询该网址链接中是否具有特殊符号,该特殊符号是指向木马、恶意链接等信息的符号。
S14:当所述地址链接含有异常信息时,将与所述异常信息对应的地址链接返回至终端,并将与异常信息对应的地址链接加入黑名单数据库中。具体的,服务器以json串的形式将具有异常信息的条码返回至终端。需要说明的是,服务器可以仅将异常信息对应的地址链接返回终端,使得终端能够得到异常信息对应的地址链接,并将对应的条码进行警示或禁用或删除等等。将与异常信息对应的地址链接加入黑名单数据中,则当其他服务器再次接收到条码的内容时可以先与黑名单数据库中的地址链接进行比对判断。
在S11之前还包括S10,S10:接收客户端发送的标记,并将标记存储至标记数据库中。当终端收到其他客户端的地址链接是否含有异常信息的请求时,服务器可以从标记数据库中找到与该地址链接匹配的标记并返回给客户端。
图8为本发明又一示范性实施例中终端100的模块图。该终端100包括:
发送检测模块10,用于发送条码以检测所述条码是否含有异常信息;
异常处理模块20,用于当所述条码具有异常信息时,将所述条码进行相应操作。
上述终端100还包括:
内容读取模块,用于当检测到所保存或扫描的图片为条码时,读取所述条码的内容;
分类模块,用于根据所述内容,判断所述条码的类别并按类整理至对应位置。
上述发送检测模块10包括:
指令接收发送子模块,用于在接收到异常检测指令后,发送条码的内容以检测所述条码是否含有异常信息,其中,所述发送的条码为预设类型的条码。
上述终端100还包括:
标记模块,用于根据所述条码的内容,在所述条码上设置与条码内容对应的标记;其中,所述标记包括:在所述条码的缩略图上显示提示信息,或在所述条码的详细图上显示的详细信息窗口的至少之一。
上述终端100还包括:
编辑模块,用于当接收到针对所述标记的编辑指令时,根据所述编辑指令输入的内容更新所述标记;
共享模块,用于当接收到针对所述标记的共享指令时,将所述标记发送至服务器。
上述内容读取模块中,可以是自动、或者在所述终端息屏时、或者在预设时间内、或者在接收到针对所述条码的内容读取指令后读取所述条码的内容。
上述异常处理模块20中包括:
接收异常子模块,用于接收服务器返回的具有异常信息对应的地址链接;
查找子模块,用于根据所述地址链接,查找对应的具有异常信息条码。
上述条码包括二维码或条形码。
上述相应操作包括直接操作或可选操作;所述直接操作包括将与所述异常信息对应的所述条码进行警告、禁用或删除;所述可选操作的可选操作项包括警告、禁用、删除或忽略至少之一。
本申请实施例提供的终端系统还可以执行图1中终端执行的方法,并实现终端在图1所示实施例的功能,在此不再赘述。
图9为本发明又一示范性实施例中服务器的模块图。该服务器200包括:
接收图片模块210,用于接收终端发送的条码;
解析模块220,用于解析所述条码并获得地址链接;
查询模块230,用于查询地址链接中是否含有异常信息;
异常信息返回模块240,用于当所述地址链接含有异常信息时,将与所述异常信息对应的地址链接返回终端,并将与所述异常信息对应的地址链接加入黑名单数据库中。
本发明实施例还提供一种设备,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,计算机程序被所述处理器执行时实现上述信息管理方法的步骤。
本发明实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上指纹解锁操作的处理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。
由于本发明提出的信息管理方法在检测到条码具有异常信息时,将与所述异常信息对应的条码进行操作,对条码进行相应操作后,可以避免用户直接使用该条码,或者使得用户可以得知该条码具有异常信息,并可以考虑进行选择性处理,从而降低了用户经济利益和个人隐私遭受侵害的风险。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
以上的具体实例,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施例而已,并不用于限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、 改进等,均应包含在本发明的保护范围之内。

Claims (10)

  1. 一种信息管理方法,应用于终端,其特征在于,包括:
    发送条码以检测所述条码是否含有异常信息;
    当所述条码具有异常信息时,将所述条码进行相应操作。
  2. 根据权利要求1所述的信息管理方法,其特征在于,在所述发送条码以检测所述条码是否含有异常信息之前,还包括:
    当检测到所保存或扫描的图片为条码时,读取所述条码的内容;
    根据所述内容,判断所述条码的类别并按类整理至对应位置。
  3. 根据权利要求2所述的信息管理方法,其特征在于,在所述发送条码以检测所述条码是否含有异常信息中包括:
    在接收到异常检测指令后,发送条码的内容以检测所述条码是否含有异常信息,其中,所述发送的条码为预设类型的条码。
  4. 根据权利要求3所述的信息管理方法,其特征在于,在所述按类整理至对应位置之后,以及发送条码以检测所述条码是否含有异常信息之前还包括:
    根据所述条码的内容,在所述条码上设置与所述条码内容对应的标记;所述标记包括:在所述条码的缩略图上显示提示信息,和/或在所述条码的详细图上显示的详细信息窗口。
  5. 根据权利要求4所述的信息管理方法,其特征在于,在根据所述条码的内容,在所述条码上设置与所述条码内容对应的标记之后,以及发送条码以检测所述条码是否含有异常信息之前,还包括:
    当接收到针对所述标记的编辑指令时,根据所述编辑指令输入的内容更新所述标记;
    当接收到针对所述标记的共享指令时,将所述标记发送至服务器。
  6. 根据权利要求2所述的信息管理方法,其特征在于,当检测到所保存的图片为条码时,自动、或者在所述终端息屏时、或者在预设时间内、或者在接收到针对所述条码的内容读取指令后读取所述条码的内容。
  7. 根据权利要求1所述的信息管理方法,其特征在于,在所述当所述条码具有异常信息包括:
    接收服务器返回的具有异常信息对应的地址链接;
    根据所述地址链接,查找对应的具有异常信息的条码;
    和/或
    所述条码包括二维码或条形码;
    和/或
    所述相应操作包括直接操作或可选操作;所述直接操作包括将与所述异常信息对应的所述条码进行警告、禁用或删除;所述可选操作的可选操作项包括警告、禁用、删除或忽略至少之一。
  8. 一种信息处理方法,应用于服务器,其特征在于,包括:
    接收终端发送的条码;
    解析所述条码并获得地址链接;
    查询地址链接中是否含有异常信息;
    当所述地址链接含有异常信息时,将与所述异常信息对应的地址链接返回至所述终端,并将与所述异常信息对应的地址链接加入黑名单数据库中。
  9. 一种设备,其特征在于,包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如权利要求1至8中任一项所述的方法的步骤。
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至8中任一项所述的方法的步骤。
PCT/CN2019/101437 2018-11-15 2019-08-19 信息管理方法、处理方法、设备及存储介质 WO2020098326A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811360658.8 2018-11-15
CN201811360658.8A CN111191747B (zh) 2018-11-15 2018-11-15 信息管理方法、处理方法、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2020098326A1 true WO2020098326A1 (zh) 2020-05-22

Family

ID=70707119

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/101437 WO2020098326A1 (zh) 2018-11-15 2019-08-19 信息管理方法、处理方法、设备及存储介质

Country Status (2)

Country Link
CN (1) CN111191747B (zh)
WO (1) WO2020098326A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766786A (zh) * 2022-11-11 2023-03-07 四川启睿克科技有限公司 一种智能家电终端业务异常的排查系统及方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103647779A (zh) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 一种通过二维码检测钓鱼欺诈信息的方法及装置
WO2014111006A1 (en) * 2013-01-16 2014-07-24 Tencent Technology (Shenzhen) Company Limited Information display method, terminal, security server and system
CN105162603A (zh) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 实现二维码的用户分发与点评及其安全检测方法
CN105718792A (zh) * 2015-08-13 2016-06-29 哈尔滨安天科技股份有限公司 一种基于沙箱的二维码检测方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103366149B (zh) * 2013-06-05 2017-05-31 北京奇付通科技有限公司 移动终端处理可视化图形编码的方法和装置
CN105224644A (zh) * 2015-09-28 2016-01-06 小米科技有限责任公司 信息分类方法及装置
CN105893870A (zh) * 2016-03-29 2016-08-24 乐视控股(北京)有限公司 一种信息处理方法及装置
CN107563244A (zh) * 2017-08-09 2018-01-09 维沃移动通信有限公司 一种二维码安全验证方法及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014111006A1 (en) * 2013-01-16 2014-07-24 Tencent Technology (Shenzhen) Company Limited Information display method, terminal, security server and system
CN103647779A (zh) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 一种通过二维码检测钓鱼欺诈信息的方法及装置
CN105718792A (zh) * 2015-08-13 2016-06-29 哈尔滨安天科技股份有限公司 一种基于沙箱的二维码检测方法及系统
CN105162603A (zh) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 实现二维码的用户分发与点评及其安全检测方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766786A (zh) * 2022-11-11 2023-03-07 四川启睿克科技有限公司 一种智能家电终端业务异常的排查系统及方法
CN115766786B (zh) * 2022-11-11 2024-05-14 四川启睿克科技有限公司 一种智能家电终端业务异常的排查系统及方法

Also Published As

Publication number Publication date
CN111191747A (zh) 2020-05-22
CN111191747B (zh) 2023-09-01

Similar Documents

Publication Publication Date Title
CN105391674B (zh) 一种信息处理方法及系统、服务器、客户端
US20190286680A1 (en) Interactive barcodes
JP3801120B2 (ja) Pda/携帯電話画面多重一次元バーコードの読み取りを基礎とする身分識別システム
JP2005174317A5 (zh)
US20160269433A1 (en) Method and system for checking security of url for mobile terminal
CA3042934A1 (en) Method and system for managing electronic documents based on sensitivity of information
TWI637279B (zh) Method, system and web server for uploading form attachments
CN110417718B (zh) 处理网站中的风险数据的方法、装置、设备及存储介质
CN103366149B (zh) 移动终端处理可视化图形编码的方法和装置
CN110035075A (zh) 钓鱼网站的检测方法、装置、计算机设备及存储介质
CN102932370A (zh) 一种安全扫描方法、设备及系统
CN102301732A (zh) 通信系统、服务器设备、显示设备、信息处理方法和程序
TW201923659A (zh) 業務過程的啟動方法和裝置
WO2020098326A1 (zh) 信息管理方法、处理方法、设备及存储介质
TWI515662B (zh) 標籤資料處理方法、標籤識別系統和通訊終端
CN109978114A (zh) 数据处理方法、装置、服务器及存储介质
CN113254577A (zh) 敏感文件检测方法、装置、设备及存储介质
US20200186668A1 (en) Method and device for recommending watermark for electronic terminal
CN116611046A (zh) 一种基于soar的弱口令处理方法、装置以及处理系统
CN106650547A (zh) 一种移动终端记录二维码扫描信息的方法及系统
US20070215704A1 (en) Image processing device
US20210271756A1 (en) System and method for detecting leaked documents on a computer network
US20150149562A1 (en) System and Method for Lost Item and Product Alerts, Notifications, and Messaging Communications
JP2009196805A (ja) 物品管理システム、仮想管理サーバ、無線通信端末、物品管理方法、プログラム及び記録媒体
NL1040219C2 (nl) Automatisch opzoeksysteem voor geregistreerde objecten.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19883849

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19883849

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 15/09/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19883849

Country of ref document: EP

Kind code of ref document: A1