CN106022196B - A kind of method and intelligent terminal of information sharing - Google Patents
A kind of method and intelligent terminal of information sharing Download PDFInfo
- Publication number
- CN106022196B CN106022196B CN201610513570.XA CN201610513570A CN106022196B CN 106022196 B CN106022196 B CN 106022196B CN 201610513570 A CN201610513570 A CN 201610513570A CN 106022196 B CN106022196 B CN 106022196B
- Authority
- CN
- China
- Prior art keywords
- level
- data
- dimensional code
- information
- feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The method and intelligent terminal shared the embodiment of the invention provides a kind of information, it is related to field of terminal technology, this method comprises: the information content to sharing is classified, determine the corresponding encryption level of all types of data in the information content, wherein, encryption level includes first level and second level, and first level is lower than second level;Corresponding target user is configured for the second level;Partitioned storage is carried out to all types of data according to the encryption level, generates the corresponding feature two dimensional code of the target user;Shared according to the feature two dimensional code.The embodiment of the present invention is ensured information security by the user that feature user can be used for limiting the data for obtaining the second level in feature two dimensional code to solve the problems, such as information leakage in two dimensional code sharing mode.
Description
Technical field
The present invention relates to field of terminal technology, a kind of method shared more particularly to information and a kind of intelligent terminal.
Background technique
With the fast development of Internet technology, the intelligent terminals such as smart phone are more more and more universal, intelligent terminal at
For the main tool of people's sharing information.
In daily life, people often share some information of oneself to others, such as personal business card or some net
The link etc. of disk.Currently, the sharing mode based on intelligent terminal mainly has duplication text, screenshot, sends file, sends unified money
Source finger URL (Uniform Resource Locator, URL), two dimensional code (Quick Response Code, QR Code) etc..
Wherein, there is two dimensional code fault tolerance can still be scanned by intelligent terminal such as after two-dimension code image is blocked a part
Come.Therefore, compared with other sharing modes, it is more convenient that two dimensional code shares mode, but the problem of there is also information leakages.Example
Such as, the two dimensional code comprising personal telephone number can be sent to user B by user A, so that user B can be somebody's turn to do by scanning
Two dimensional code gets the personal telephone number of user A.If the two dimensional code is sent to other users, other users by user B
The available telephone number to user A, and then can make nuisance calls to user A.
Summary of the invention
In view of the above problems, the embodiment of the present invention proposes a kind of method that information is shared and a kind of corresponding intelligence eventually
End, to solve the problems, such as information leakage in a manner of two dimensional code sharing, to ensure information security.
To solve the above-mentioned problems, the embodiment of the invention discloses a kind of methods that information is shared, comprising:
The information content of sharing is classified, determines the corresponding encryption level of all types of data in the information content,
Wherein, encryption level includes first level and second level, and first level is lower than second level;For second level configuration pair
The target user answered;Partitioned storage is carried out to all types of data according to the encryption level, it is corresponding to generate the target user
Feature two dimensional code;Shared according to the feature two dimensional code.
The embodiment of the invention also discloses the methods that another information is shared, comprising: is scanned to feature two dimensional code;?
In scanning process, data are extracted from the corresponding subregion of first level;Detection scanning user whether with the feature two dimensional code
Target user's matching;If the scanning user matches with target user, data are extracted from the corresponding subregion of second level;It is right
Extracted data are saved.
Correspondingly, the embodiment of the invention also discloses a kind of intelligent terminals, comprising:
Encryption level determining module determines all kinds of in the information content for being classified to the information content of sharing
The corresponding encryption level of type data, wherein encryption level includes first level and second level, and first level is lower than the second level
Not;
Target user's configuration module, for configuring corresponding target user for the second level;
Two-dimensional code generation module, for carrying out partitioned storage to all types of data according to the encryption level, described in generation
The corresponding feature two dimensional code of target user;
Sharing module, for being shared according to the feature two dimensional code.
The embodiment of the invention also discloses another intelligent terminals, comprising:
Scan module, for being scanned to feature two dimensional code;
First extraction module, for during the scanning process, extracting data from the corresponding subregion of first level;
User's matching module, for detecting whether scanning user matches with the target user of the feature two dimensional code;If institute
It states scanning user to match with target user, then triggers the second extraction module;
Second extraction module, for extracting data from the corresponding subregion of second level;
Preserving module, for being saved to first extraction module and the extracted data of the second extraction module.
The embodiment of the present invention includes following advantages:
Firstly, the present invention is implemented by being classified to the information content of required sharing, so as to according to encryption stage
Jiang partitioned storage not carried out to the data of each encryption level, generate the corresponding feature two dimensional code of feature user.Wherein, this feature is used
Family can be used for limiting the user for obtaining the data of the second level in feature two dimensional code, so that solving two dimensional code shares mode
The problem of middle information leakage, ensures information security.
Secondly, whether the present invention implements to match with the target user of feature two dimensional code by detection scanning user, with determination
Whether scanning user belongs to the target user of this feature two dimensional code, and uses in the target that scanning user belongs to this feature two dimensional code
The data in the corresponding subregion of second level are extracted when family, if the target user that scanning user is not belonging to this feature two dimensional code
The data in the corresponding subregion of first level are only extracted, i.e., for same Zhang Tezheng two dimensional code, different people can be scanned not
The same information content improves feature two dimension so as to avoid making the awkward situation of different two dimensional codes for different people
The utilization rate of code.
Detailed description of the invention
Fig. 1 is the step flow chart for the embodiment of the method that a kind of information of the invention is shared;
Fig. 2 is the step flow chart for the method alternative embodiment that a kind of information of the invention is shared;
Fig. 3 is the schematic diagram of the business card of required sharing in specific example of the present invention;
Fig. 4 is a kind of schematic diagram of the quick response code business card generated in specific example of the present invention;
Fig. 5 is the flow diagram that feature two dimensional code is sent in a specific example of the invention;
Fig. 6 is the step flow chart for the embodiment of the method that another information of the invention is shared;
Fig. 7 is the step flow chart for the method alternative embodiment that another information of the invention is shared;
Fig. 8 A is a kind of structural block diagram of intelligent terminal embodiment of the invention;
Fig. 8 B is a kind of structural block diagram of intelligent terminal alternative embodiment of the invention;
Fig. 9 A is the structural block diagram of another intelligent terminal embodiment of the invention;
Fig. 9 B is the structural block diagram of another intelligent terminal alternative embodiment of the invention;
Figure 10 is the structural block diagram of the intelligent terminal of another embodiment of the present invention;
Figure 11 is the structural schematic diagram of the intelligent terminal of another embodiment of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real
Applying mode, the present invention is described in further detail.
Embodiment one
The present embodiment is described information sharing method provided by the present invention based on the generating process of two dimensional code.
Referring to Fig.1, the step flow chart for the embodiment of the method that a kind of information of the invention is shared is shown, specifically can wrap
Include following steps:
Step 101, the information content of sharing is classified, determine in the information content all types of data it is corresponding plus
Level of confidentiality is other.
As a kind of concrete application of the invention, such as mobile phone, tablet computer, personal computer (Personal
Computer, PC) etc. intelligent terminals the information content of sharing required for user can be converted into two dimensional code (Quick
Response Code, QR Code) so that user can be used the two dimensional code and carry out information sharing.
In embodiments of the present invention, intelligent terminal can determine the corresponding information content according to the operation of user, and can
Using the information content by the identified information content as sharing, and then can be according to preset grade scale to the information content
It is classified, determines the corresponding encryption level of all types of data in the information content.The encryption level can specifically include first
Rank, second level, third level etc., wherein third level can be higher than second level, and second level can be higher than the first order
Not, the present invention is not specifically limited the setting of encryption level.
Step 102, corresponding target user is configured for second level.
In the present embodiment, it is corresponding that each encryption level can be arranged based on the user information of operation user's input in intelligent terminal
Target user, so as to limit user or the terminal of the data for obtaining each encryption level respectively.The user information can be used for
Corresponding user or terminal are identified, such as identity number (Identity, ID), user name, Internet protocol (Internet
Protocol, IP) address, any of them such as EIC equipment identification code or several, the embodiment of the present invention this is not made specifically limit limit
System.
As a specific example of the invention, intelligent terminal can detected for second level or second level
It is that second level configures corresponding target user according to the user information when data input user information, it is such as that user name is corresponding
User as target user, so as to limit the user for reading the second level data, other users is avoided illegally to obtain
The data of the second level;Or it using the corresponding terminal of the EIC equipment identification code as target user, is somebody's turn to do so as to limit to read
The intelligent terminal of second level data avoids other terminals from illegally obtaining the data of the second level.Wherein, which can
To have the permission for the data for reading second level.
Step 103, partitioned storage is carried out to all types of data according to the encryption level, it is corresponding generates the target user
Feature two dimensional code.
Intelligent terminal can be based in the generating process of two dimensional code, and intelligent terminal can be corresponding based on each categorical data
Encryption level determine storage location of the type data in two dimension.Respectively add specifically, intelligent terminal can be pre-set
The not corresponding subregion of level of confidentiality, so as to during generating two dimensional code based on encryption level respectively by the number of each encryption level
According to being encapsulated into corresponding subregion, then by synthesizing to all subregions, corresponding feature two dimensional code is generated.This feature
Two dimensional code may include user information, and the user information for being included is determined for corresponding feature user.
Step 104, shared according to the feature two dimensional code.
This feature two dimensional code can be fed back to user after generating feature two dimensional code by intelligent terminal, so that user can be with
Information sharing is carried out using this feature two dimensional code.For example, intelligent terminal can in the display interface carry out this feature two dimensional code
It shows, other intelligent terminals is allowed to scan this feature two dimensional code;It can also be applied by instant message applications etc.
This feature two dimensional code is sent to target terminal by program, so that target terminal can receive this feature two dimensional code, and
The information content entrained by this feature two dimensional code is obtained by scanning this feature two dimensional code, to achieve the purpose that information is shared.
Certainly, this feature two dimensional code can also be shared with other terminals using other modes by intelligent terminal, as this feature two dimensional code is beaten
It prints off and, other users are scanned to the feature two dimensional code code of printing, sharing of the present invention to feature two dimensional code
Mode is not specifically limited.
The present invention is implemented by being classified to the information content of required sharing, so as to according to encryption level prize pair
The data of each encryption level carry out partitioned storage, generate the corresponding feature two dimensional code of feature user.Wherein, this feature user can be with
For limiting the user for obtaining the data of the second level in feature two dimensional code, to solve information in two dimensional code sharing mode
The problem of leakage, ensures information security.
Referring to Fig. 2, the step flow chart for the method alternative embodiment that a kind of information of the invention is shared is shown, specifically may be used
To include the following steps:
Step 201, the information content of sharing is classified, determine in the information content all types of data it is corresponding plus
Level of confidentiality is other.
Intelligent terminal is classified the information content of sharing, determines the corresponding encryption of all types of data in the information content
Rank can specifically include: for each categorical data in the information content, based on determining pair of rank selection operation of input
The encryption level answered;Or keyword in each categorical data is detected, determine corresponding encryption level.Wherein, it encrypts
Rank may include first level and second level, and first level is lower than second level.
Specifically, the information content of sharing can be divided by intelligent terminal according to the significance level of privacy of user is related to:
Degree of privacy is the private information generally to maintain secrecy for public information, the degree of privacy without secrecy and degree of privacy is the exhausted of top secret
Confidential information;And the corresponding encryption level of each degree of privacy is set, the corresponding first level that maintains secrecy, general secrecy and top secret are such as not necessarily to
Corresponding second level.The data of second level can specifically include: top-secret information and private information.
For sharing personal business card, as shown in figure 3, the business card of required sharing can specifically include: " name ", " love
It is good ", " QQ ", the account of communication softwares such as " microblogging ", the information contents such as " address " and " personal call ".Intelligent terminal can be with
It is classified according to the information content of the user's operation to the business card, determines the corresponding encryption level of all types of data, such as according to use
Family is " without secrecy " that the encryption level of " name ", " hobby " is arranged for " name ", " hobby " selected degree of privacy
For the first estate corresponding " without secrecy ";It is for " QQ ", " microblogging " and " address " selected degree of privacy according to user
The encryption level of " QQ ", " microblogging " and " address " are set " general secrecy " corresponding second level by " general secrecy ";And
It sets the encryption level of " personal call " to " absolutely for " top secret " for " personal call " selected degree of privacy according to user
It is close " corresponding second level.
Certainly, intelligent terminal can also be each in the information content to determine by detecting to the information content of sharing
The corresponding encryption level of categorical data.Specifically, intelligent terminal is by detecting in the business card for needing to share in all types of data
Keyword detects that the corresponding preset degree of privacy of keyword determines corresponding safety of the type data etc. so as to foundation
Grade then can be according to the corresponding preset degree of privacy of " phone " this keyword " absolutely if detection " phone " this keyword
It is close " " personal call " corresponding encryption level is determined as second level.
Optionally, intelligent terminal, can be in modification information content when converting two dimensional code for the information content of sharing
The corresponding security level of all types of data or degree of privacy.For example, intelligence is eventually when first time converting two dimensional code for business card
Default view as shown in Figure 3 can be used in end.User can drag the entry in default view, such as long-pressing " QQ " entry, with
" QQ " is dragged into " top secret " from " general secrecy ", so that intelligent terminal modifies its corresponding degree of privacy;It can also incite somebody to action
" microblogging " entry is dragged to from " general secrecy " " without secrecy ", so that intelligent terminal is modifying its corresponding degree of privacy
While modify its corresponding encryption level.
Step 202, corresponding target user is configured for second level.
In the embodiment of the present invention, intelligent terminal can add trust list in two dimensional code, so that in trust list
In user can just read the data of the second level in two dimensional code, as in two dimensional code private information and top-secret information.It can
Choosing, intelligent terminal is that the second level configures corresponding target user, be can specifically include: contact person's letter based on input
Breath generates trust list, and each user in the trust list is target user;Create the pass between trust list and second level
Connection relationship.Certainly, intelligent terminal can also preset trust list, to input in the information content of the user for sharing
User information when, corresponding user object is added in trust list, i.e., sets target user for the user object, with
The data for the second level for reading the user object in the feature two dimension that the information content of the sharing is converted into.
Step 203, partitioned storage is carried out to all types of data according to the encryption level, it is corresponding generates the target user
Feature two dimensional code.
It should be noted that data field is usually as two dimensional code storage true data content according to the standard of two dimensional code
Place, and error correction area is only used for storage error correcting code, so that intelligent terminal in the case where pollution, breakage occurs in two dimensional code, is based on
Error correcting code can still read the data content stored in data field.Wherein, two dimensional code serious forgiveness can be indicated with letter,
Fault-tolerant ability grade can be divided into: L (7%), M (15%), Q (25%), H (30%) level Four.Each version of two dimensional code combines
Data volume, character types and level of error correction are equipped with corresponding most input number of characters, also that is, needing if increasing data volume
Two dimensional code is formed using more symbols, two dimensional code will become much larger.
The embodiment of the present invention can go to account for during generating two dimensional code by private data as that piece of pollution
There is the memory space of two dimensional code a part.If the private data of insertion is without departing from the error tolerance of two dimensional code, two-dimentional yardage
It will not be affected according to the integrity degree in area.Therefore, the intelligent terminal in the case where meeting two dimensional code standard, in the embodiment of the present invention
The information contents such as private data, trust list can be embedded into error correction area, so that not in trust list
User can only scan the public information into data field, guarantee privacy of user safety.
Specifically, two dimensional code can be divided into data field and error correction area by intelligent terminal.Wherein, data field can be used for storing
Without the public information of secrecy, such as the data of first level;Error correction area can be used for storing error correcting code and privacy information, and such as second
The data of rank.Optionally, partitioned storage is carried out to all types of data according to the encryption level, generates the target user couple
The feature two dimensional code answered, can specifically include: data and the target user to the second level encrypt, and store
In error correction area, such as by trust list, second level data and trust list and second level between incidence relation encrypt
It is stored in the error correction area;The data of the first level are stored in data field;Error correction area and data field are synthesized, it is raw
At the feature two dimensional code.
Optionally, top-secret information can have corresponding expired time.The expired time is determined for top secret letter
The term of validity of breath, thus after validity period arrives, so that intelligent terminal carries out invalidation to stored top-secret information, such as
By the top secret information deletion, it is further ensured that the safety of top-secret information.In a preferred embodiment of the invention, information point
The method enjoyed can also include: for the corresponding expired time of top-secret information configuration;In the generating process of the two dimensional code, by institute
It states expired time and is encapsulated into error correction area.Specifically, intelligent terminal can be the information content shared according to preset parameter information
In the corresponding expired time of top-secret information configuration;Or it is exhausted for this for the temporal information of the top secret information input according to user
Confidential information configures corresponding expired time, and the embodiment of the present invention does not limit this specifically.
As shown in figure 4, showing a kind of specific example of the present invention schematic diagram of quick response code business card generated.Intelligent terminal
During generating quick response code business card, the public informations such as name, Work Telephone can be deposited in data field, and
By the top-secret information such as the private informations such as WeChat ID, microblogging, private telephone expired time corresponding with top-secret information, with
And trust list is deposited in error correction area, and is encrypted, it should so that only the target user in trust list is just available
The private information and top-secret information that error correction area is stored, synthesize the data field and error correction area, generate and use comprising target
The quick response code business card at family and expired time.
In a preferred embodiment of the invention, the method which shares can also include: by the trust list
On to cloud, the step of determining the uniform resource locator of trust list.Wherein, trust list encryption is stored in described
Error correction area, can specifically include: the uniform resource locator of the trust list is stored in the error correction area.
In the present invention is implemented, in order to store mass data, intelligent terminal can be by the trust list in feature two dimensional code
It is stored in cloud, the uniform resource locator (Uniform Resource Locator, URL) of the trust list beyond the clouds is added
In the close error correction area for being stored in two dimensional code, so as to be that this feature two dimensional code configures more in the case where meeting two dimensional code standard
More target users increases the information storage capacity of two dimensional code.Certainly, intelligent terminal can also be by the trust list
Partial target user encryption in URL and the trust list is stored in error correction area, so that in scanning this feature two dimension
During code, in the case where lookup in the error correction area less than corresponding target user, based on trust list in the error correction area
URL obtain the corresponding trust list that is saved from cloud, and then tested using the target user saved in cloud
Card.
Step 204, the feature two dimensional code is sent to target terminal.
Feature two dimensional code can be sent to target terminal by the intelligent terminal of the embodiment of the present invention, by this feature two dimensional code
It is sent to sharing object, achievees the purpose that information is shared.Wherein, which can determine according to object is shared, and such as share
Intelligent terminal operated by object.Specifically, intelligent terminal is after generating feature two dimensional code, or getting feature two dimensional code
Afterwards, this feature two dimensional code can be sent to intelligent terminal operated by the selected sharing object of user, so as to share object
It is available to arrive this feature two dimensional code.
The embodiment of the present invention can be added the user in trust list using static mode or dynamical fashion, by the use
Family is set as target user.Specifically, adding the user in trust list when by the way of static, intelligent terminal can be pre-
Trust list is first set, so as to which the object that private information in two dimensional code can be read to be added in trust list, i.e., will be added
The object added is configured to target user, to generate the feature two dimensional code for including target user.Preferably, it is arranged using static mode
The corresponding trust list of data of second level can be read, target user can be after the generation of feature two dimensional code in the trust list
It immobilizes always, so as to avoid the target user in the trust list from illegally being distorted, further increases the peace of information
Quan Xing.It is added the user in trust list when using dynamic mode, terminal can be added to that will share object in intelligence
In the trust list of feature two dimensional code, i.e., sharing object is set to the target user of this feature two dimensional code, so as to improve
Add the flexibility of target user.
In a preferred embodiment of the invention, before feature two dimensional code is sent to target terminal, further includes: test
Card active user whether be the two dimensional code author;If active user is the author, will share object be added to it is described
In trust list, and the feature two dimensional code is updated.Wherein, described that the feature two dimensional code is sent to target end
End, comprising: updated feature two dimensional code is sent to target terminal.For example, user A has made one by operating intelligent terminal
Quick response code business card 1 is opened, user B is issued;Quick response code business card 1 can be transmitted to C after receiving the quick response code business card 1 by B.This
When, C is not added into trust list, therefore can not read private data in the quick response code business card 1;And B is to trust column
In table, therefore the private data in the quick response code business card 1 can be read.When quick response code business card is issued D again by A, then D also can be by
It is added to trust list, i.e., when this is shared with D by A, intelligent terminal operated by A can read quick response code business card 1
All data, are then added trust list for D, regenerate a two dimensional code 2 automatically and are shared with D.As it can be seen that feature two dimensional code
The object that author is shared can be automatically added in trust list.
Referring to Fig. 5, the flow diagram that feature two dimensional code is sent in a specific example of the invention is shown.Specifically,
The information content of business card can be classified by intelligent terminal when contents of visiting cards is arranged, be divided into public information, private information and
Then public information is stored in data field by top-secret information, and by private information, top-secret information, by expired time etc. second
The data encryption of rank is stored in error correction area, generates the corresponding feature two dimensional code 1 of the business card, so as to according to this feature two dimension
Code 1 carries out information sharing.When sharing this feature two dimensional code, intelligent terminal can be by obtaining the current user for operating user
Information with verify current operation user whether be this feature two dimensional code 1 author.If active user is the work of feature two dimensional code 1
Person will then share object and be added in trust list, and is updated to this feature two dimensional code 1, i.e. the base in feature two dimensional code 1
Updated feature two dimensional code 2 is generated on plinth, and updated feature two dimensional code 2 is then sent to target terminal.If current use
When family is not the author of this feature two dimensional code, then this feature two dimensional code 1 is directly sent to target terminal.
Through this embodiment, even if intelligent terminal feature two dimensional code generated is leaked, in the privacy information of encryption
In the case where not being cracked, the user in the trust list of feature two dimensional code and/or intelligent terminal can not obtain two dimension yet
Privacy information in code, so as to avoid the problem that the leakage of private information in feature two dimensional code.
Embodiment two
On the basis of the above embodiments, this implementation is based on the scanning process of two dimensional code to information provided by the present invention point
The method enjoyed is described.
Referring to Fig. 6, the step flow chart for the embodiment of the method that another information of the invention is shared is shown, it specifically can be with
Include the following steps:
Step 601, feature two dimensional code is scanned.
In the embodiment of the present invention, intelligent terminal can be used camera and be scanned to feature two dimension;Alternatively, can pass through
Camera is shot to get feature two dimensional code, to be scanned to the feature two dimensional code got, with from feature two
The information content that this feature two dimensional code is stored is extracted in dimension code.Certainly, the intelligent terminal of the embodiment of the present invention can also use
Its mode gets feature two dimensional code, such as receives feature two dimensional code, the embodiment of the present invention by communication mode wirelessly or non-wirelessly
With no restriction to this.
Wherein, this feature two dimensional code can specifically include: by the information content of sharing carry out classification and according to point
Encryption level after grade carries out partitioned storage two dimensional code generated to all types of data.Encryption level includes first level and
Two ranks, first level is lower than second level, and second level has corresponding target user.
Step 602, during the scanning process, data are extracted from the corresponding subregion of first level.
In the feature two dimensional code of the embodiment of the present invention, the data that the corresponding subregion of first level is saved can not be encrypted,
It can specifically include: the data of first level, such as public information without secrecy.Intelligent terminal is based on planar bar code technology, can be with
The data not encrypted are extracted from the corresponding subregion of first level of this feature two dimensional code, such as the data of first level.
Step 603, whether detection scanning user matches with the target user of the feature two dimensional code.
If the scanning user matches with target user thens follow the steps 604;Otherwise step 605 execution is jumped to.
Specifically, intelligent terminal can by obtaining the user information scanning user current with determination of current operation, into
And can detecte scanning user and whether matched with the target user of feature two dimensional code, whether have with the scanning user for verifying current
The corresponding permission of data for obtaining second level in this feature two dimensional code, that is, detect whether scanning user belongs to this feature two dimension
The target user of code.When scanning user matches with the target user of feature two dimensional code, it can determine that scanning user belongs to this
When the target user of feature two dimensional code, step 604 is then executed;When scanning user and the target user of feature two dimensional code mismatch
When, when can determine that scanning user is not belonging to the target user of this feature two dimensional code, step 605 can be jumped directly to and held
Row.
Step 604, data are extracted in the corresponding subregion of second level.
In this step, intelligent terminal can be based on permission possessed by target user, from the corresponding subregion of second level
The data for having encrypted storage are extracted, such as the data of the second level in feature two dimensional code.
Step 605, extracted data are saved.
Intelligent terminal can be automatically stored data extracted from feature two dimensional code, so as in subsequent number
According to saved data are used in processing, corresponding service is provided for user, is met the needs of users, to reach information sharing
Purpose.
The present invention implements whether match with the target user of feature two dimensional code by detection scanning user, to determine that scanning is used
Whether family belongs to the target user of this feature two dimensional code, and mentions when scanning user belongs to the target user of this feature two dimensional code
The data in the corresponding subregion of second level are taken, are only extracted if the target user that scanning user is not belonging to this feature two dimensional code
Data in the corresponding subregion of first level, i.e., for same Zhang Tezheng two dimensional code, different people can scan different letters
It ceases content and improves the benefit of feature two dimensional code so as to avoid making the awkward situation of different two dimensional codes for different people
With rate.
Referring to Fig. 7, the step flow chart for the method alternative embodiment that another information of the invention is shared is shown, specifically
It may include steps of:
Step 701, feature two dimensional code is scanned.
In embodiments of the present invention, feature two dimensional code can specifically be divided into: data field and error correction area.Wherein, first level
Corresponding subregion can be the data field of feature two dimensional code, and the corresponding subregion of second level can be the error correction of feature two dimensional code
Area.
Step 702, during the scanning process, the data of first level are extracted from the data field of feature two dimensional code.
During reading two dimensional code, intelligent terminal can extract first level from the data field of feature two dimensional code
Data, such as degree of privacy are " name ", " hobby " public information without secrecy.
Step 703, classification detection is carried out to the data of the first level, determines corresponding information category.
Intelligent terminal can judge the first level according to preset detection mode after the data for extracting first level
The information category of data such as determines the info class of this feature two dimensional code by keyword in the data of the detection first level
Not.For example, when that, comprising keyword " name ", can determine the info class of this feature two dimensional code in the data for detecting first level
It Wei not card information.
Step 704, corresponding target database is determined using the information type.
Wherein, target database is for storing extracted data.For example, in conjunction with above-mentioned example, terminal can be in intelligence
Using the corresponding Card Database of card information as target database, the data that will be extracted are stored into Card Database.
Step 705, whether detection scanning user matches with the target user of the feature two dimensional code.
If scanning user matches with target user, 706 are thened follow the steps;Otherwise, step 707 execution is jumped to.
Step 706, the data of second level are extracted from the error correction area of feature two dimensional code.
In this step, intelligent terminal can be according to permission possessed by target user, from the error correction area of feature two dimensional code
The data for extracting second level, as the top secret that the private information and degree of privacy that degree of privacy is " general secrecy " be " top secret " is believed
Breath etc..
Step 707, by the storage of extracted data into target data.
Extracted data include the data of first level in the present embodiment, can also include the data of second level.
Therefore, extracted data are saved, is can specifically include: the data of the data of the first order and second level are deposited
Store up the target database.
In a preferred embodiment of the invention, the data of second level can specifically include: private information and top secret
Information, wherein top-secret information can have corresponding expired time.Intelligent terminal can be adopted when storing extracted data
The private information is stored with clear-text way;And it can be exhausted to determine by judging whether current time is more than expired time
The validity of confidential information, when current time is more than expired time, intelligent terminal can determine that the top secret information is expired, and delete
Top-secret information;And when current time is less than expired time, determine that the top secret information is not out of date, and is deposited using encrypted test mode
Store up the top secret information.The intelligent terminal of the present embodiment is when storing top-secret information, when can be by expired in feature two dimensional code
Between detect the validity of top-secret information in this feature two dimensional code, so as to carry out being automatically deleted place to expired top-secret information
Reason, and not out of date top-secret information is stored using encrypted test mode, further improve the safety of information.
Optionally, intelligent terminal can also be determined top-secret after determining that the top-secret information is not out of date using expired time
Information corresponding effective time, and the effective time can be present in target database, to believe using the top secret
When breath, the validity of the top secret information can be detected by the effective time.Specifically, intelligent terminal is to extracted number
After being saved, whether the top secret information can be detected using effective time described in application call when top secret information
Effectively.When top-secret information is effective, operation can be decrypted to the top-secret information in intelligent terminal, generate corresponding plaintext number
According to, and clear data fed back into application program, so that the clear data, which can be used, in application program provides service for user.
The intelligent terminal of the embodiment of the present invention can also believe the top secret after clear data is fed back the application program
The data for ceasing corresponding first level are shown.Specifically, stored in using target database two-dimensional code data when,
Intelligent terminal can be by judging whether the corresponding degree of privacy of data is top secret, to determine whether the producer of two dimensional code wishes
The data are transmitted.If the corresponding degree of privacy of data is top secret, it can determine that the producer of two dimensional code is not intended to the number
According to being transmitted.For example, the author A of two dimensional code has shared telephone number to salesman B, but A, which is not intended to B, is shared with it for number
He is salesman, is also not desired to the number that B knows always him.At this point, the corresponding degree of privacy of the telephone number of A can be set to absolutely
It is close, so that the phone number of A can not be shown in clear text manner, if not when showing the phone number of A in smart phone
It shows the number of itself, but is shown in a manner of ciphertext, the false thing as showing similar XXX, so that B
It cannot know the phone number of A, it can B is avoided to reveal the phone number of A.
As a specific example of the invention, smart phone can carry out encryption for top-secret information and show.Due to intelligence
Can the system of mobile phone know encryption method, therefore internal system carried out using top-secret information operation when, smart phone can be with
First by the top secret information be decrypted into clear data carry out again using.Specifically, smart phone is in storing process, it can be according to two
Extracted data are stored in Card Database by the classification of information privacy in dimension code business card, and the storage formats of data can be as
Shown in table 1:
Field name | Field value | Degree of privacy |
Name | Mr.k | It is open |
12345 | Generally | |
Phone | 12321 | It is top-secret |
Table 1
Wherein, encrypted telephone number can be stored in smart phone with encrypted test mode, the phone journey of smart phone
Sequence can obtain true number by reverse operation.
Certainly, true number can also be stored in smart phone with clear-text way.If true number is corresponding hidden
Private degree is top secret, then the telephone program of smart phone can be used true number and go to dial, but true number can not be shown
It shows and, it can information itself is not shown, so as to avoid user from getting letter when using stored top-secret information
Breath itself, it can avoid user by top-secret information leakage.Therefore, when business card is shared with salesman by user, without worry
Salesman leaks its personal information, so as to avoid ceaselessly being connected to sale call.
It the invention be not limitedly applied to the application scenarios for sharing business card, can also be applied to share the applied field of other information
Scape, such as sharing web page address, sharing video frequency, sharing video frequency application scenarios.Present invention implementation can satisfy in sharing information
Classification processing is carried out to information according to the degree of privacy of information, and can realize that orientation is shared by setting target user, from
And improve the flexibility of information sharing.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to
According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented
Necessary to example.
Embodiment three
Referring to Fig. 8 A, a kind of structural block diagram of intelligent terminal embodiment of the invention is shown, can specifically include as follows
Module:
Encryption level determining module 801 determines each in the information content for being classified to the information content of sharing
The corresponding encryption level of categorical data.Wherein, the encryption level includes first level and second level, and first level is lower than the
Two ranks.
Target user's configuration module 802, for configuring corresponding target user for the second level.
Two-dimensional code generation module 803 generates institute for carrying out partitioned storage to all types of data according to the encryption level
State the corresponding feature two dimensional code of target user.
Sharing module 804, for being shared according to the feature two dimensional code.
On the basis of Fig. 8 A, optionally, two-dimensional code generation module 803 may include: encryption sub-module stored 8031, deposit
It stores up submodule 8032 and generates submodule module 8033, as shown in Figure 8 B.
Wherein, encrypt sub-module stored 8031, for the second level data and the target user add
It is close, and it is stored in error correction area.Sub-module stored 8032, for the data of the first level to be stored in data field.Generate son
Mould module 8033 generates the feature two dimensional code for synthesizing to the error correction area and the data field.
In a preferred embodiment of the invention, encryption level determining module 801 may include following submodule:
Submodule 8011 is selected, for for each categorical data in the information content, the rank based on input to be selected
Operation determines corresponding encryption level;
Detection sub-module 8012 determines corresponding encryption level for detecting to keyword in each categorical data.
In a preferred embodiment of the invention, target user's configuration module 802 specifically can be used for based on input
Contact information generates trust list, and creates the incidence relation between the trust list and the second level.Wherein, believe
Appointing each user in list is the target user.Sub-module stored 8031 is encrypted, specifically can be used for incidence relation, trust
List and second level data encryption are stored in error correction area.
Optionally, the intelligent terminal of the embodiment of the present invention can also include: uploading module 805.The uploading module 805, can
To determine the uniform resource locator of trust list for the trust list to be uploaded to cloud.Wherein, encryption storage submodule
Block 8031 specifically can be also used for for the uniform resource locator of the trust list being stored in the error correction area.
In a preferred embodiment of the invention, sharing module 804 may include following submodule:
Sending submodule, for the feature two dimensional code to be sent to target terminal.
Submodule is shown, for being shown to the two dimensional code.
Optionally, the target terminal of the embodiment of the present invention can be determined according to object is shared.The sharing module 804, may be used also
To include following submodule:
Verify submodule, for verify active user whether be the two dimensional code author;
Submodule is updated, is added in the trust list for object when active user is the author, will to be shared,
And the feature two dimensional code is updated;And updated feature two dimensional code is sent to target end by triggering sending submodule
End.
In embodiments of the present invention, the data of second level may include: top-secret information and private information.Wherein, top-secret
Information has corresponding expired time.Optionally, the intelligent terminal of the embodiment of the present invention can also include following module:
Time configuration module 806, for being the corresponding expired time of the top-secret information configuration;
Time package module 807, for the expired time being encapsulated into described in the generating process of the two dimensional code
Error correction area.
The intelligent terminal that the present invention is implemented is by being classified the information content of required sharing, so as to according to adding
Level of confidentiality Jiang not carry out partitioned storage to the data of each encryption level, generate the corresponding feature two dimensional code of feature user.Wherein, the spy
Requisition family can be used for limiting the user for obtaining the data of the second level in feature two dimensional code, to solve two dimensional code sharing
In mode the problem of information leakage, ensure information security.
Referring to Fig. 9 A, show the structural block diagram of another intelligent terminal embodiment of the invention, can specifically include as
Lower module:
Scan module 901, for being scanned to feature two dimensional code.
First extraction module 902, for during the scanning process, extracting data from the corresponding subregion of first level.
User's matching module 903, for detecting whether scanning user matches with the target user of the feature two dimensional code.If
The scanning user matches with target user, then triggers second and extract 904 modules.
Second extraction module 904, for extracting data from the corresponding subregion of second level.
Preserving module 905, for being saved to first extraction module and the extracted data of the second extraction module.
In embodiments of the present invention, the corresponding subregion of first level can be the data field of feature two dimensional code, second level
Corresponding subregion can be the error correction area of the feature two dimensional code.
On the basis of Fig. 9 A, optionally, intelligent terminal can also include: information category detection module 906 and database
Determining module 907, as shown in Figure 9 B.
Wherein, information category detection module 906 can be used for carrying out classification detection to the data of the first level, really
Fixed corresponding information category.Database determining module 907 can be used for determining corresponding target data using the information type
Library, the target database is for storing extracted data.Preserving module 905 specifically can be used for the first order
The data of data and second level are stored to the target database.
Optionally, the data of second level may include: private information and top-secret information, which has corresponding
Expired time.Wherein, preserving module 905 may include following submodule:
Stored in clear submodule 9051, for storing the private information using clear-text way.
Time interpretation submodule 9052, for judging whether current time is more than the expired time.
Expired determining submodule 9053, for when current time is more than the expired time, determining the top-secret information
It is expired, and delete the top-secret information.
Ciphertext sub-module stored 9054, for when current time is less than the expired time, determining the top-secret letter
Cease it is not out of date, and using the encrypted test mode storage top-secret information.
In a preferred embodiment of the invention, intelligent terminal can also include following module:
The effective time determining module 908 can be used for determining the top-secret information not in the ciphertext sub-module stored
After expired, the top-secret information corresponding effective time is determined using the expired time.
Validation checking module 909, when for the top secret information described in the application call, using effective time inspection
Whether effective survey the top-secret information.
Deciphering module 910, for being carried out to top-secret information when validation checking module 909 determines that top-secret information is effective
Operation is decrypted, corresponding clear data is generated.
Feedback module 911, for the clear data generated of deciphering module 910 to be fed back to application program.
Optionally, which can also include display module.The display module can be used for corresponding to top-secret information
The data of first level be shown.
Whether the intelligent terminal that the present invention is implemented is matched by detection scanning user with the target user of feature two dimensional code, with
It determines whether scanning user belongs to the target user of this feature two dimensional code, and belongs to the mesh of this feature two dimensional code in scanning user
The data in the corresponding subregion of second level are extracted when marking user, if the target that scanning user is not belonging to this feature two dimensional code is used
The data in the corresponding subregion of first level are then only extracted at family, i.e., for same Zhang Tezheng two dimensional code, different people can be scanned
The different information content out improves feature so as to avoid making the awkward situation of different two dimensional codes for different people
The utilization rate of two dimensional code.
Figure 10 is the structural block diagram of the intelligent terminal of another embodiment of the present invention.Intelligent terminal 1000 shown in Fig. 10 wraps
It includes: at least one processor 1001, memory 1002, at least one network interface 1004 and other users interface 1003.Intelligence
Various components in terminal 1000 are coupled by bus system 1005.It is understood that bus system 1005 is for realizing this
Connection communication between a little components.Bus system 1005 except include data/address bus in addition to, further include power bus, control bus and
Status signal bus in addition.But for the sake of clear explanation, various buses are all designated as bus system 1005 in Figure 10.
Wherein, user interface 1003 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 1002 in the embodiment of the present invention can be volatile memory or non-volatile memories
Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory
(Read-OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), erasable programmable are read-only
Memory (ErasablePROM, EPROM), electrically erasable programmable read-only memory (ElectricallyEPROM, EEPROM)
Or flash memory.Volatile memory can be random access memory (RandomAccessMemory, RAM), be used as external high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory
(SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory
(DirectRambusRAM, DRRAM).The memory 1002 of system and method described herein is intended to include but is not limited to these
With the memory of any other suitable type.For example, memory 1002 can store the information content of required sharing, including such as
User information, expired time, trust list etc., the embodiment of the present invention to the specific content of memory with no restriction.
In some embodiments, memory 1002 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 10021 and application program 10022.
Wherein, operating system 10021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 10022 includes various application programs, such as matchmaker
Body player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 10022.
In embodiments of the present invention, by the program or instruction of calling memory 1002 to store, specifically, can be application
The program or instruction stored in program 10022, processor 1001 can be used for being classified the information content of sharing, determine institute
State the corresponding encryption level of all types of data in the information content, wherein the encryption level includes first level and second level,
First level is lower than second level;Corresponding target user is configured for the second level;According to the encryption level to all kinds of
Type data carry out partitioned storage, generate the corresponding feature two dimensional code of the target user;Divided according to the feature two dimensional code
It enjoys.Certainly, processor 1001 can be used for being scanned feature two dimensional code;During the scanning process, corresponding from first level
Subregion in extract data;Whether detection scanning user matches with the target user of the feature two dimensional code;If the scanning is used
Family is matched with target user, then extracts data from the corresponding subregion of second level;Extracted data are saved.
The method that the embodiments of the present invention disclose can be applied in processor 1001, or real by processor 1001
It is existing.Processor 1001 may be a kind of IC chip, the processing capacity with signal.During realization, the above method
Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1001 or software form.Above-mentioned
Processor 1001 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), dedicated collection
At circuit (ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic
Device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention
Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention
The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor
In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can
In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage
Medium is located at memory 1002, and processor 1001 reads the information in memory 1002, completes the above method in conjunction with its hardware
Step.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuits
(ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device
(ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray,
FPGA), general processor, controller, microcontroller, microprocessor, other electronics lists for executing function of the present invention
In member or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein
The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or
It is realized outside processor.
Optionally, processor 1001 carries out partitioned storage to all types of data according to the encryption level, generates the mesh
Mark the corresponding feature two dimensional code of user, comprising: data and the target user to the second level encrypt, and store
In error correction area;The data of the first level are stored in data field;The error correction area and the data field are synthesized, it is raw
At the feature two dimensional code.
Optionally, the information content of 1001 pairs of processor sharings is classified, and determines all types of numbers in the information content
According to corresponding encryption level, comprising: for each categorical data in the information content, the rank selection operation based on input is true
Fixed corresponding encryption level;Alternatively, detecting to keyword in each categorical data, corresponding encryption level is determined.
Optionally, processor 1001 is that the second level configures corresponding target user, comprising: the connection based on input
People's information generates trust list, and each user in the trust list is the target user;Create the trust list and institute
State the incidence relation between second level.It is wherein, described that the data of the second level and the target user are encrypted,
And it is stored in error correction area, comprising: the incidence relation, the trust list and the second level data encryption are stored in institute
State error correction area.
Optionally, processor 1001 is also used to: the trust list being uploaded to cloud, determines the unified money of trust list
Source finger URL.Wherein, trust list encryption is stored in the error correction area, comprising: unified by the trust list provides
Source finger URL is stored in the error correction area.
Optionally, the data of second level include: top-secret information and private information, and the top secret information has corresponding mistake
Time phase.Processor 1001 is also used to as the corresponding expired time of the top secret information configuration;In the generation of the two dimensional code
The expired time is encapsulated into the error correction area by Cheng Zhong.
Optionally, as another embodiment, processor 1001 detection scanning user whether with the feature two dimensional code
Target user's matching before, be also used to: classification detection being carried out to the data of the first level, determines corresponding info class
Not;Corresponding target database is determined using the information type, the target database is for storing extracted data.Its
In, it is described that extracted data are saved, comprising: by the data of the data of the first order and second level storage to institute
State target database.
Optionally, the data of second level include: private information and top-secret information, and the top secret information has corresponding mistake
Time phase.Wherein, processor 1001 saves extracted data, comprising: stores the secret letter using clear-text way
Breath;Judge whether current time is more than the expired time;When current time is more than the expired time, the top secret is determined
Information is expired, and deletes the top-secret information;When current time is less than the expired time, the top-secret information is determined not
It is expired, and using the encrypted test mode storage top-secret information.
Optionally, processor 1001 is also used to: true using the expired time after determining that the top-secret information is not out of date
Determine the top-secret information corresponding effective time.
Optionally, processor 1001 is also used to after saving to extracted data: described in application call
It is whether effective using the effective time detection top-secret information when top-secret information;When the top secret information is effective, to institute
It states top-secret information and operation is decrypted, generate corresponding clear data;The clear data is fed back into the application program.
Intelligent terminal 1000 in the present embodiment can be realized each process that intelligent terminal is realized in previous embodiment, be
It avoids repeating, which is not described herein again.The intelligent terminal 1000, can be by required sharing in the generating process of two dimensional code
The information content be classified, and partitioned storage is carried out to the data of each encryption level according to encryption level prize, to generate spy
Take over the corresponding feature two dimensional code in family for use, and this feature user can be used for limiting the number for obtaining the second level in feature two dimensional code
According to user, that is, solve the problems, such as information leakage in two dimensional code sharing mode, ensure information security.In addition, intelligent terminal
1000, for same Zhang Tezheng two dimensional code, the different information contents can be scanned for different people, so as to avoid for
Different people makes the awkward situation of different two dimensional codes, improves the utilization rate of feature two dimensional code.
Figure 11 is the structural schematic diagram of the intelligent terminal of another embodiment of the invention.Specifically, the intelligence in Figure 11 is whole
End 1100 can be mobile phone, tablet computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted
Computer etc..
Intelligent terminal 1100 in Figure 11 includes radio frequency (RadioFrequency, RF) circuit 1110, memory 1120, defeated
Enter unit 1130, display unit 1140, processor 1160, voicefrequency circuit 1170, WiFi (WirelessFidelity) module
1080 and power supply 1190.
Wherein, input unit 1130 can be used for receiving the number or character information of user's input, and generate with intelligence eventually
The related signal input of the user setting and function control at end 1100.Specifically, in the embodiment of the present invention, the input unit
1130 may include touch panel 1131.Touch panel 1131, also referred to as touch screen collect the touching of user on it or nearby
It touches operation (for example user uses the operations of any suitable object or attachment on touch panel 1131 such as finger, stylus), and
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 1131 may include touch detecting apparatus and
Two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter
Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into
Contact coordinate, then give the processor 1160, and order that processor 1160 is sent can be received and executed.Furthermore, it is possible to
Touch panel 1131 is realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1131, input unit 1130 can also include other input equipments 1132, other input equipments 1132 can include but is not limited to
One of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are more
Kind.
Wherein, display unit 1140 can be used for showing information input by user or be supplied to the information and intelligence of user
The various menu interfaces of terminal 1100.Display unit 1140 may include display panel 1141, optionally, using LCD or can have
The forms such as machine light emitting diode (OrganicLight-EmittingDiode, OLED) configure display panel 1141.
It should be noted that touch panel 1131 can cover display panel 1141, touch display screen is formed, when the touch display screen
After detecting touch operation on it or nearby, processor 1160 is sent to determine the type of touch event, is followed by subsequent processing
Device 1160 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area
And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area
Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example,
Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 1160 is the control centre of intelligent terminal 1100, utilizes various interfaces and connection whole mobile phone
Various pieces, by running or execute the software program and/or module that are stored in first memory 1121, and call and deposit
The data in second memory 1122 are stored up, the various functions and processing data of intelligent terminal 1100 are executed, thus to intelligent end
End 1100 carries out integral monitoring.Optionally, processor 1160 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 1121 in software program and/or module and/
Or the data in the second memory 1122, processor 1160 determine the letter for being classified to the information content of sharing
Cease the corresponding encryption level of all types of data in content, wherein the encryption level includes first level and second level, described
First level is lower than the second level;Corresponding target user is configured for the second level;According to the encryption level pair
All types of data carry out partitioned storage, generate the corresponding feature two dimensional code of the target user;According to the feature two dimensional code into
Row is shared.
Optionally, processor 1160 carries out partitioned storage to all types of data according to the encryption level, generates the mesh
Mark the corresponding feature two dimensional code of user, comprising: data and the target user to the second level encrypt, and store
In error correction area;The data of the first level are stored in data field;The error correction area and the data field are synthesized, it is raw
At the feature two dimensional code.
Optionally, the information content of sharing is classified, determine in the information content all types of data it is corresponding plus
Level of confidentiality is other, comprising: for each categorical data in the information content, determines corresponding add based on the rank selection operation of input
Level of confidentiality is other;Alternatively, detecting to keyword in each categorical data, corresponding encryption level is determined.
Optionally, described to configure corresponding target user for the second level, comprising: the contact information based on input
Trust list is generated, each user in the trust list is the target user;Create the trust list and described second
Incidence relation between rank.Wherein, described that the data of the second level and the target user are encrypted, and store
In error correction area, comprising: the incidence relation, the trust list and the second level data encryption are stored in the error correction
Area.
Optionally, processor 1160 is also used to: the trust list being uploaded to cloud, determines the unified money of trust list
Source finger URL.Wherein, trust list encryption is stored in the error correction area, comprising: unified by the trust list provides
Source finger URL is stored in the error correction area.
Optionally, the data of second level include: top-secret information and private information, and the top secret information has corresponding mistake
Time phase.Processor 1160 is also used to as the corresponding expired time of the top secret information configuration;In the generation of the two dimensional code
The expired time is encapsulated into the error correction area by Cheng Zhong.
Optionally, as another embodiment, processor 1160 is also used to be scanned feature two dimensional code;Scanned
Cheng Zhong extracts data from the corresponding subregion of first level;Whether detection scanning user uses with the target of the feature two dimensional code
Family matching;If the scanning user matches with target user, data are extracted from the corresponding subregion of second level;To being extracted
Data saved.
Optionally, whether processor 1160 with the target user of the feature two dimensional code matches it in detection scanning user
Before, it is also used to: classification detection being carried out to the data of the first level, determines corresponding information category;Using the info class
Type determines corresponding target database, and the target database is for storing extracted data.Wherein, described to extracted
Data are saved, comprising: by the data of the data of the first order and second level storage to the target database.
Optionally, the data of the second level include: private information and top-secret information, and the top secret information, which has, to be corresponded to
Expired time.Wherein, processor 1160 saves extracted data, comprising: stores the private using clear-text way
Confidential information;Judge whether current time is more than the expired time;When current time is more than the expired time, described in determination
Top-secret information is expired, and deletes the top-secret information;When current time is less than the expired time, the top-secret letter is determined
Cease it is not out of date, and using the encrypted test mode storage top-secret information.
Optionally, processor 1160 is also used to: true using the expired time after determining that the top-secret information is not out of date
Determine the top-secret information corresponding effective time.
Optionally, processor 1160 is also used to after saving to extracted data: described in application call
It is whether effective using the effective time detection top-secret information when top-secret information;When the top secret information is effective, to institute
It states top-secret information and operation is decrypted, generate corresponding clear data;The clear data is fed back into the application program.
As it can be seen that the intelligent terminal 1100 in the present embodiment is in the generating process of two dimensional code, it can be by required point
The information content enjoyed is classified, and carries out partitioned storage according to data of the encryption level prize to each encryption level, to generate
The corresponding feature two dimensional code of feature user, and this feature user can be used for limiting the second level in acquisition feature two dimensional code
The user of data solves the problems, such as information leakage in two dimensional code sharing mode, ensures information security.In addition, intelligent terminal
1100, for same Zhang Tezheng two dimensional code, the different information contents can be scanned for different people, so as to avoid for
Different people makes the awkward situation of different two dimensional codes, improves the utilization rate of feature two dimensional code.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided by the present invention, it should be understood that disclosed device and method can pass through others
Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit
It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code
Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (22)
1. a kind of method that information is shared characterized by comprising
The information content of sharing is classified, determines the corresponding encryption level of all types of data in the information content, wherein
The encryption level includes first level and second level, and the first level is lower than the second level;
Corresponding target user is configured for the second level;
Partitioned storage is carried out to all types of data according to the encryption level, generates the corresponding feature two dimension of the target user
Code, wherein the feature two dimensional code includes error correction area and data field, and the error correction area is used to store the data of the second level
With the target user, the data field is used to store the data of the first level;
Shared according to the feature two dimensional code.
2. the method according to claim 1, wherein described carry out all types of data according to the encryption level
Partitioned storage generates the corresponding feature two dimensional code of the target user, comprising:
Data and the target user to the second level encrypt, and are stored in error correction area;
The data of the first level are stored in data field;
The error correction area and the data field are synthesized, the feature two dimensional code is generated.
3. determining the letter the method according to claim 1, wherein the information content to sharing is classified
Cease the corresponding encryption level of all types of data in content, comprising:
For each categorical data in the information content, corresponding encryption level is determined based on the rank selection operation of input;
Alternatively,
Keyword in each categorical data is detected, determines corresponding encryption level.
4. according to the method described in claim 2, it is characterized in that, described configure corresponding target use for the second level
Family, comprising:
Contact information based on input generates trust list, and each user in the trust list is the target user;
Create the incidence relation between the trust list and the second level;
Wherein, described that the data of the second level and the target user are encrypted, and it is stored in error correction area, comprising:
The incidence relation, the trust list and the second level data encryption are stored in the error correction area.
5. according to the method described in claim 4, it is characterized by further comprising:
The trust list is uploaded to cloud, determines the uniform resource locator of trust list;
Wherein, trust list encryption is stored in the error correction area, comprising: position the unified resource of the trust list
Symbol is stored in the error correction area.
6. the method according to claim 1, wherein the data of second level include: top-secret information and secret letter
Breath, the top secret information have corresponding expired time, the method also includes:
For the corresponding expired time of the top secret information configuration;
In the generating process of the two dimensional code, the expired time is encapsulated into the error correction area.
7. a kind of method that information is shared characterized by comprising
Feature two dimensional code is scanned;
During the scanning process, data are extracted from the corresponding subregion of first level, wherein the corresponding subregion of the first level is
The data field of the feature two dimensional code;
Whether detection scanning user matches with the target user of the feature two dimensional code;
If the scanning user matches with target user, data are extracted from the corresponding subregion of second level, wherein described
The corresponding subregion of two ranks is the error correction area of the feature two dimensional code;
Extracted data are saved.
8. the method according to the description of claim 7 is characterized in that detection scanning user whether with the feature two dimensional code
Before target user's matching, further includes:
Classification detection is carried out to the data of the first level, determines corresponding information category;
Corresponding target database is determined using the information type, the target database is for storing extracted data;
Wherein, described that extracted data are saved, comprising: to deposit the data of the data of the first order and second level
Store up the target database.
9. the method according to the description of claim 7 is characterized in that the data of the second level include: private information and absolutely
Confidential information, the top secret information have corresponding expired time;
It is wherein, described that extracted data are saved, comprising:
The private information is stored using clear-text way;
Judge whether current time is more than the expired time;
When current time is more than the expired time, determine that the top-secret information is expired, and delete the top-secret information;
When current time is less than the expired time, determine that the top-secret information is not out of date, and store using encrypted test mode
The top secret information.
10. according to the method described in claim 9, it is characterized in that, after determining that the top-secret information is not out of date, further includes:
The top-secret information corresponding effective time is determined using the expired time.
11. according to the method described in claim 10, it is characterized in that, after being saved to extracted data, further includes:
It is whether effective using the effective time detection top-secret information when top secret information described in the application call;
When the top secret information is effective, operation is decrypted to the top-secret information, generates corresponding clear data;
The clear data is fed back into the application program.
12. a kind of intelligent terminal characterized by comprising
Encryption level determining module determines all types of numbers in the information content for being classified to the information content of sharing
According to corresponding encryption level, wherein the encryption level includes first level and second level, and the first level is lower than described
Second level;
Target user's configuration module, for configuring corresponding target user for the second level;
Two-dimensional code generation module generates the target for carrying out partitioned storage to all types of data according to the encryption level
The corresponding feature two dimensional code of user, wherein the feature two dimensional code includes error correction area and data field, and the error correction area is for storing
The data of the second level, the data field are used to store the data of the first level;
Sharing module, for being shared according to the feature two dimensional code.
13. intelligent terminal according to claim 12, which is characterized in that the two-dimensional code generation module, comprising:
Encrypt sub-module stored, for the second level data and the target user encrypt, and be stored in and entangle
Wrong area;
Sub-module stored, for the data of the first level to be stored in data field;
It generates submodule module and generates the feature two dimensional code for synthesizing to the error correction area and the data field.
14. intelligent terminal according to claim 12, which is characterized in that the encryption level determining module, comprising:
Submodule is selected, for being determined based on the rank selection operation of input for each categorical data in the information content
Corresponding encryption level;
Detection sub-module determines corresponding encryption level for detecting to keyword in each categorical data.
15. intelligent terminal according to claim 13, which is characterized in that target user's configuration module is specifically used for
Contact information based on input generates trust list, and creates being associated between the trust list and the second level
It is that each user in the trust list is the target user;
Wherein, the encryption sub-module stored is specifically used for the incidence relation, the trust list and the second level
Data encryption is stored in the error correction area.
16. intelligent terminal according to claim 15, which is characterized in that further include:
Uploading module determines the uniform resource locator of trust list for the trust list to be uploaded to cloud;
Wherein, the encryption sub-module stored is specifically also used to for the uniform resource locator of the trust list being stored in
The error correction area.
17. intelligent terminal according to claim 13, which is characterized in that the data of second level include: top-secret information and
Private information, the top secret information have corresponding expired time, the intelligent terminal, further includes:
Time configuration module, for being the corresponding expired time of the top-secret information configuration;
Time package module, in the generating process of the two dimensional code, the expired time to be encapsulated into the error correction area.
18. a kind of intelligent terminal characterized by comprising
Scan module, for being scanned to feature two dimensional code;
First extraction module extracts data from the corresponding subregion of first level for during the scanning process, wherein described the
The corresponding subregion of one rank is the data field of the feature two dimensional code;
User's matching module, for detecting whether scanning user matches with the target user of the feature two dimensional code;If described sweep
It retouches user to match with target user, then triggers the second extraction module;
Second extraction module, for extracting data from the corresponding subregion of second level, wherein corresponding point of the second level
Area is the error correction area of the feature two dimensional code;
Preserving module, for being saved to first extraction module and the extracted data of the second extraction module.
19. intelligent terminal according to claim 18, which is characterized in that further include:
Information category detection module carries out classification detection for the data to the first level, determines corresponding information category;
Database determining module, for determining that corresponding target database, the target database are used using the information type
In the extracted data of storage;
Wherein, the preserving module, specifically for storing the data of the data of the first order and second level to the mesh
Mark database.
20. intelligent terminal according to claim 18, which is characterized in that the data of the second level include: secret letter
Breath and top-secret information, the top secret information have corresponding expired time;
Wherein, the preserving module, comprising:
Stored in clear submodule, for storing the private information using clear-text way;
Time interpretation submodule, for judging whether current time is more than the expired time;
Expired determining submodule for when current time is more than the expired time, determining that the top-secret information is expired, and is deleted
Except the top-secret information;
Ciphertext sub-module stored, for when current time is less than the expired time, determining that the top-secret information is not out of date,
And using the encrypted test mode storage top-secret information.
21. intelligent terminal according to claim 20, which is characterized in that further include:
Effective time determining module, for after the ciphertext sub-module stored determines that the top-secret information is not out of date, using institute
It states expired time and determines the top-secret information corresponding effective time.
22. intelligent terminal according to claim 21, which is characterized in that further include:
Validation checking module, when for the top secret information described in the application call, detected using the effective time described in
Whether top-secret information is effective;
Deciphering module, for when the validation checking module determines that the top-secret information is effective, to the top-secret information into
Row decryption operation, generates corresponding clear data;
Feedback module, for the clear data to be fed back the application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513570.XA CN106022196B (en) | 2016-06-30 | 2016-06-30 | A kind of method and intelligent terminal of information sharing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610513570.XA CN106022196B (en) | 2016-06-30 | 2016-06-30 | A kind of method and intelligent terminal of information sharing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106022196A CN106022196A (en) | 2016-10-12 |
CN106022196B true CN106022196B (en) | 2019-01-11 |
Family
ID=57106171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610513570.XA Active CN106022196B (en) | 2016-06-30 | 2016-06-30 | A kind of method and intelligent terminal of information sharing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022196B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503133B (en) * | 2016-10-19 | 2020-06-19 | 北京小米移动软件有限公司 | Cloud disk data processing method and device |
CN108810451A (en) * | 2017-04-26 | 2018-11-13 | 杭州海康威视数字技术股份有限公司 | A kind of video recording storage, access method and video recording storage system |
CN109215170B (en) | 2017-07-04 | 2021-03-02 | 百度在线网络技术(北京)有限公司 | Driving data storage method, device and equipment |
CN109726786B (en) * | 2017-10-31 | 2023-09-26 | 北京京东尚科信息技术有限公司 | Two-dimensional code information reading and generating method and device |
CN108769403B (en) * | 2018-05-24 | 2021-05-18 | 维沃移动通信有限公司 | Information acquisition method, terminal and computer readable storage medium |
CN109525482B (en) * | 2018-11-09 | 2021-08-10 | 北京北信源软件股份有限公司 | Instant messaging method based on secret level channel |
CN109410083A (en) * | 2018-11-20 | 2019-03-01 | 咪咕数字传媒有限公司 | A kind of sharing method of information, device and storage medium |
CN109635905B (en) * | 2018-12-06 | 2022-09-02 | 南京中孚信息技术有限公司 | Two-dimensional code generation method, device and system |
CN109410413A (en) * | 2018-12-28 | 2019-03-01 | 北京百佑科技有限公司 | A kind of entrance guard management system and method |
CN110266683A (en) * | 2019-06-18 | 2019-09-20 | 北京阿尔山区块链联盟科技有限公司 | Digital asset sharing method, device and electronic equipment |
CN110414241B (en) * | 2019-08-05 | 2021-08-27 | 深圳市网安计算机安全检测技术有限公司 | Privacy policy detection method and device, computer equipment and storage medium |
CN111046350A (en) * | 2019-10-31 | 2020-04-21 | 贝壳技术有限公司 | Authority information processing method and system |
CN111177694B (en) * | 2019-12-16 | 2023-03-17 | 华为技术有限公司 | Method and device for processing data |
CN113132524A (en) * | 2019-12-31 | 2021-07-16 | 华为技术有限公司 | Method for generating contact name card and method for displaying contact information |
CN113868209B (en) * | 2021-12-02 | 2022-03-15 | 天津联想协同科技有限公司 | Network disk-based external link sharing expiration date management method and device and storage medium |
CN114549187B (en) * | 2022-04-24 | 2022-07-08 | 梅州客商银行股份有限公司 | Method and system for controlling marketing two-dimensional code use range by electronic bank |
CN115033918B (en) * | 2022-06-09 | 2023-05-05 | 易顺云(深圳)科技有限公司 | Enterprise integrated information management method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049869A (en) * | 2012-12-28 | 2013-04-17 | 浙江理工大学 | Two-dimensional code based clothing industry client information management method |
CN103489025A (en) * | 2012-06-08 | 2014-01-01 | 北京千橡网景科技发展有限公司 | Method and device for sending contact information |
CN104268610A (en) * | 2014-09-11 | 2015-01-07 | 重庆大学 | Method for generating and reading graded QR code |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2004090794A1 (en) * | 2003-04-07 | 2006-07-06 | ボーダフォン株式会社 | Information processing method |
-
2016
- 2016-06-30 CN CN201610513570.XA patent/CN106022196B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103489025A (en) * | 2012-06-08 | 2014-01-01 | 北京千橡网景科技发展有限公司 | Method and device for sending contact information |
CN103049869A (en) * | 2012-12-28 | 2013-04-17 | 浙江理工大学 | Two-dimensional code based clothing industry client information management method |
CN104268610A (en) * | 2014-09-11 | 2015-01-07 | 重庆大学 | Method for generating and reading graded QR code |
Also Published As
Publication number | Publication date |
---|---|
CN106022196A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106022196B (en) | A kind of method and intelligent terminal of information sharing | |
CN106127076B (en) | A kind of inspection method and mobile terminal of photograph album photo | |
CN109150910A (en) | Log in token generation and verification method, device and storage medium | |
CN106708658B (en) | A kind of data back up method, mobile terminal and storage server | |
US20090165121A1 (en) | Touch Pad based Authentication of Users | |
CN106485164A (en) | A kind of image processing method and mobile terminal | |
CN102317949A (en) | Authentication device, authentication method, and program to execute same by computer | |
CN106027794B (en) | A kind of encryption method and mobile terminal of photo | |
CN105956431B (en) | A kind of application protection processing method and mobile terminal | |
CN107390991B (en) | A kind of processing method and mobile terminal of screenshot | |
CN107644170B (en) | A kind of image processing method and mobile terminal | |
CN107180203B (en) | Image encryption and decryption method, mobile terminal and computer readable storage medium | |
CN106203061A (en) | The encryption method of a kind of application program and mobile terminal | |
CN107506111A (en) | The encryption and decryption method and terminal of a kind of terminal applies | |
CN106228085B (en) | The method for secret protection and mobile terminal of application program | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN107465701B (en) | Method and device for inputting password into interface at dynamic position | |
CN104424409A (en) | Application unlocking method and device | |
CN106156600B (en) | A kind of unlocking method and mobile terminal of application program | |
KR100996955B1 (en) | Security method using virtual keyboard | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN108900553A (en) | A kind of communication means, device and computer readable storage medium | |
Chabbi et al. | Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone | |
CN106250757A (en) | The control method of a kind of application program and mobile terminal | |
CN106384060B (en) | A kind of mobile terminal data encryption method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201102 Address after: Room 708, 7 / F, 101, floors 1-7, building 205, yard a 10, Jiuxianqiao North Road, Chaoyang District, Beijing 100016 Patentee after: WEIWO SOFTWARE TECHNOLOGY Co.,Ltd. Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd. |