CN106022196B - A kind of method and intelligent terminal of information sharing - Google Patents

A kind of method and intelligent terminal of information sharing Download PDF

Info

Publication number
CN106022196B
CN106022196B CN201610513570.XA CN201610513570A CN106022196B CN 106022196 B CN106022196 B CN 106022196B CN 201610513570 A CN201610513570 A CN 201610513570A CN 106022196 B CN106022196 B CN 106022196B
Authority
CN
China
Prior art keywords
level
data
dimensional code
information
feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610513570.XA
Other languages
Chinese (zh)
Other versions
CN106022196A (en
Inventor
陈锟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Software Technology Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610513570.XA priority Critical patent/CN106022196B/en
Publication of CN106022196A publication Critical patent/CN106022196A/en
Application granted granted Critical
Publication of CN106022196B publication Critical patent/CN106022196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10257Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Electromagnetism (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The method and intelligent terminal shared the embodiment of the invention provides a kind of information, it is related to field of terminal technology, this method comprises: the information content to sharing is classified, determine the corresponding encryption level of all types of data in the information content, wherein, encryption level includes first level and second level, and first level is lower than second level;Corresponding target user is configured for the second level;Partitioned storage is carried out to all types of data according to the encryption level, generates the corresponding feature two dimensional code of the target user;Shared according to the feature two dimensional code.The embodiment of the present invention is ensured information security by the user that feature user can be used for limiting the data for obtaining the second level in feature two dimensional code to solve the problems, such as information leakage in two dimensional code sharing mode.

Description

A kind of method and intelligent terminal of information sharing
Technical field
The present invention relates to field of terminal technology, a kind of method shared more particularly to information and a kind of intelligent terminal.
Background technique
With the fast development of Internet technology, the intelligent terminals such as smart phone are more more and more universal, intelligent terminal at For the main tool of people's sharing information.
In daily life, people often share some information of oneself to others, such as personal business card or some net The link etc. of disk.Currently, the sharing mode based on intelligent terminal mainly has duplication text, screenshot, sends file, sends unified money Source finger URL (Uniform Resource Locator, URL), two dimensional code (Quick Response Code, QR Code) etc.. Wherein, there is two dimensional code fault tolerance can still be scanned by intelligent terminal such as after two-dimension code image is blocked a part Come.Therefore, compared with other sharing modes, it is more convenient that two dimensional code shares mode, but the problem of there is also information leakages.Example Such as, the two dimensional code comprising personal telephone number can be sent to user B by user A, so that user B can be somebody's turn to do by scanning Two dimensional code gets the personal telephone number of user A.If the two dimensional code is sent to other users, other users by user B The available telephone number to user A, and then can make nuisance calls to user A.
Summary of the invention
In view of the above problems, the embodiment of the present invention proposes a kind of method that information is shared and a kind of corresponding intelligence eventually End, to solve the problems, such as information leakage in a manner of two dimensional code sharing, to ensure information security.
To solve the above-mentioned problems, the embodiment of the invention discloses a kind of methods that information is shared, comprising:
The information content of sharing is classified, determines the corresponding encryption level of all types of data in the information content, Wherein, encryption level includes first level and second level, and first level is lower than second level;For second level configuration pair The target user answered;Partitioned storage is carried out to all types of data according to the encryption level, it is corresponding to generate the target user Feature two dimensional code;Shared according to the feature two dimensional code.
The embodiment of the invention also discloses the methods that another information is shared, comprising: is scanned to feature two dimensional code;? In scanning process, data are extracted from the corresponding subregion of first level;Detection scanning user whether with the feature two dimensional code Target user's matching;If the scanning user matches with target user, data are extracted from the corresponding subregion of second level;It is right Extracted data are saved.
Correspondingly, the embodiment of the invention also discloses a kind of intelligent terminals, comprising:
Encryption level determining module determines all kinds of in the information content for being classified to the information content of sharing The corresponding encryption level of type data, wherein encryption level includes first level and second level, and first level is lower than the second level Not;
Target user's configuration module, for configuring corresponding target user for the second level;
Two-dimensional code generation module, for carrying out partitioned storage to all types of data according to the encryption level, described in generation The corresponding feature two dimensional code of target user;
Sharing module, for being shared according to the feature two dimensional code.
The embodiment of the invention also discloses another intelligent terminals, comprising:
Scan module, for being scanned to feature two dimensional code;
First extraction module, for during the scanning process, extracting data from the corresponding subregion of first level;
User's matching module, for detecting whether scanning user matches with the target user of the feature two dimensional code;If institute It states scanning user to match with target user, then triggers the second extraction module;
Second extraction module, for extracting data from the corresponding subregion of second level;
Preserving module, for being saved to first extraction module and the extracted data of the second extraction module.
The embodiment of the present invention includes following advantages:
Firstly, the present invention is implemented by being classified to the information content of required sharing, so as to according to encryption stage Jiang partitioned storage not carried out to the data of each encryption level, generate the corresponding feature two dimensional code of feature user.Wherein, this feature is used Family can be used for limiting the user for obtaining the data of the second level in feature two dimensional code, so that solving two dimensional code shares mode The problem of middle information leakage, ensures information security.
Secondly, whether the present invention implements to match with the target user of feature two dimensional code by detection scanning user, with determination Whether scanning user belongs to the target user of this feature two dimensional code, and uses in the target that scanning user belongs to this feature two dimensional code The data in the corresponding subregion of second level are extracted when family, if the target user that scanning user is not belonging to this feature two dimensional code The data in the corresponding subregion of first level are only extracted, i.e., for same Zhang Tezheng two dimensional code, different people can be scanned not The same information content improves feature two dimension so as to avoid making the awkward situation of different two dimensional codes for different people The utilization rate of code.
Detailed description of the invention
Fig. 1 is the step flow chart for the embodiment of the method that a kind of information of the invention is shared;
Fig. 2 is the step flow chart for the method alternative embodiment that a kind of information of the invention is shared;
Fig. 3 is the schematic diagram of the business card of required sharing in specific example of the present invention;
Fig. 4 is a kind of schematic diagram of the quick response code business card generated in specific example of the present invention;
Fig. 5 is the flow diagram that feature two dimensional code is sent in a specific example of the invention;
Fig. 6 is the step flow chart for the embodiment of the method that another information of the invention is shared;
Fig. 7 is the step flow chart for the method alternative embodiment that another information of the invention is shared;
Fig. 8 A is a kind of structural block diagram of intelligent terminal embodiment of the invention;
Fig. 8 B is a kind of structural block diagram of intelligent terminal alternative embodiment of the invention;
Fig. 9 A is the structural block diagram of another intelligent terminal embodiment of the invention;
Fig. 9 B is the structural block diagram of another intelligent terminal alternative embodiment of the invention;
Figure 10 is the structural block diagram of the intelligent terminal of another embodiment of the present invention;
Figure 11 is the structural schematic diagram of the intelligent terminal of another embodiment of the invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, with reference to the accompanying drawing and specific real Applying mode, the present invention is described in further detail.
Embodiment one
The present embodiment is described information sharing method provided by the present invention based on the generating process of two dimensional code.
Referring to Fig.1, the step flow chart for the embodiment of the method that a kind of information of the invention is shared is shown, specifically can wrap Include following steps:
Step 101, the information content of sharing is classified, determine in the information content all types of data it is corresponding plus Level of confidentiality is other.
As a kind of concrete application of the invention, such as mobile phone, tablet computer, personal computer (Personal Computer, PC) etc. intelligent terminals the information content of sharing required for user can be converted into two dimensional code (Quick Response Code, QR Code) so that user can be used the two dimensional code and carry out information sharing.
In embodiments of the present invention, intelligent terminal can determine the corresponding information content according to the operation of user, and can Using the information content by the identified information content as sharing, and then can be according to preset grade scale to the information content It is classified, determines the corresponding encryption level of all types of data in the information content.The encryption level can specifically include first Rank, second level, third level etc., wherein third level can be higher than second level, and second level can be higher than the first order Not, the present invention is not specifically limited the setting of encryption level.
Step 102, corresponding target user is configured for second level.
In the present embodiment, it is corresponding that each encryption level can be arranged based on the user information of operation user's input in intelligent terminal Target user, so as to limit user or the terminal of the data for obtaining each encryption level respectively.The user information can be used for Corresponding user or terminal are identified, such as identity number (Identity, ID), user name, Internet protocol (Internet Protocol, IP) address, any of them such as EIC equipment identification code or several, the embodiment of the present invention this is not made specifically limit limit System.
As a specific example of the invention, intelligent terminal can detected for second level or second level It is that second level configures corresponding target user according to the user information when data input user information, it is such as that user name is corresponding User as target user, so as to limit the user for reading the second level data, other users is avoided illegally to obtain The data of the second level;Or it using the corresponding terminal of the EIC equipment identification code as target user, is somebody's turn to do so as to limit to read The intelligent terminal of second level data avoids other terminals from illegally obtaining the data of the second level.Wherein, which can To have the permission for the data for reading second level.
Step 103, partitioned storage is carried out to all types of data according to the encryption level, it is corresponding generates the target user Feature two dimensional code.
Intelligent terminal can be based in the generating process of two dimensional code, and intelligent terminal can be corresponding based on each categorical data Encryption level determine storage location of the type data in two dimension.Respectively add specifically, intelligent terminal can be pre-set The not corresponding subregion of level of confidentiality, so as to during generating two dimensional code based on encryption level respectively by the number of each encryption level According to being encapsulated into corresponding subregion, then by synthesizing to all subregions, corresponding feature two dimensional code is generated.This feature Two dimensional code may include user information, and the user information for being included is determined for corresponding feature user.
Step 104, shared according to the feature two dimensional code.
This feature two dimensional code can be fed back to user after generating feature two dimensional code by intelligent terminal, so that user can be with Information sharing is carried out using this feature two dimensional code.For example, intelligent terminal can in the display interface carry out this feature two dimensional code It shows, other intelligent terminals is allowed to scan this feature two dimensional code;It can also be applied by instant message applications etc. This feature two dimensional code is sent to target terminal by program, so that target terminal can receive this feature two dimensional code, and The information content entrained by this feature two dimensional code is obtained by scanning this feature two dimensional code, to achieve the purpose that information is shared. Certainly, this feature two dimensional code can also be shared with other terminals using other modes by intelligent terminal, as this feature two dimensional code is beaten It prints off and, other users are scanned to the feature two dimensional code code of printing, sharing of the present invention to feature two dimensional code Mode is not specifically limited.
The present invention is implemented by being classified to the information content of required sharing, so as to according to encryption level prize pair The data of each encryption level carry out partitioned storage, generate the corresponding feature two dimensional code of feature user.Wherein, this feature user can be with For limiting the user for obtaining the data of the second level in feature two dimensional code, to solve information in two dimensional code sharing mode The problem of leakage, ensures information security.
Referring to Fig. 2, the step flow chart for the method alternative embodiment that a kind of information of the invention is shared is shown, specifically may be used To include the following steps:
Step 201, the information content of sharing is classified, determine in the information content all types of data it is corresponding plus Level of confidentiality is other.
Intelligent terminal is classified the information content of sharing, determines the corresponding encryption of all types of data in the information content Rank can specifically include: for each categorical data in the information content, based on determining pair of rank selection operation of input The encryption level answered;Or keyword in each categorical data is detected, determine corresponding encryption level.Wherein, it encrypts Rank may include first level and second level, and first level is lower than second level.
Specifically, the information content of sharing can be divided by intelligent terminal according to the significance level of privacy of user is related to: Degree of privacy is the private information generally to maintain secrecy for public information, the degree of privacy without secrecy and degree of privacy is the exhausted of top secret Confidential information;And the corresponding encryption level of each degree of privacy is set, the corresponding first level that maintains secrecy, general secrecy and top secret are such as not necessarily to Corresponding second level.The data of second level can specifically include: top-secret information and private information.
For sharing personal business card, as shown in figure 3, the business card of required sharing can specifically include: " name ", " love It is good ", " QQ ", the account of communication softwares such as " microblogging ", the information contents such as " address " and " personal call ".Intelligent terminal can be with It is classified according to the information content of the user's operation to the business card, determines the corresponding encryption level of all types of data, such as according to use Family is " without secrecy " that the encryption level of " name ", " hobby " is arranged for " name ", " hobby " selected degree of privacy For the first estate corresponding " without secrecy ";It is for " QQ ", " microblogging " and " address " selected degree of privacy according to user The encryption level of " QQ ", " microblogging " and " address " are set " general secrecy " corresponding second level by " general secrecy ";And It sets the encryption level of " personal call " to " absolutely for " top secret " for " personal call " selected degree of privacy according to user It is close " corresponding second level.
Certainly, intelligent terminal can also be each in the information content to determine by detecting to the information content of sharing The corresponding encryption level of categorical data.Specifically, intelligent terminal is by detecting in the business card for needing to share in all types of data Keyword detects that the corresponding preset degree of privacy of keyword determines corresponding safety of the type data etc. so as to foundation Grade then can be according to the corresponding preset degree of privacy of " phone " this keyword " absolutely if detection " phone " this keyword It is close " " personal call " corresponding encryption level is determined as second level.
Optionally, intelligent terminal, can be in modification information content when converting two dimensional code for the information content of sharing The corresponding security level of all types of data or degree of privacy.For example, intelligence is eventually when first time converting two dimensional code for business card Default view as shown in Figure 3 can be used in end.User can drag the entry in default view, such as long-pressing " QQ " entry, with " QQ " is dragged into " top secret " from " general secrecy ", so that intelligent terminal modifies its corresponding degree of privacy;It can also incite somebody to action " microblogging " entry is dragged to from " general secrecy " " without secrecy ", so that intelligent terminal is modifying its corresponding degree of privacy While modify its corresponding encryption level.
Step 202, corresponding target user is configured for second level.
In the embodiment of the present invention, intelligent terminal can add trust list in two dimensional code, so that in trust list In user can just read the data of the second level in two dimensional code, as in two dimensional code private information and top-secret information.It can Choosing, intelligent terminal is that the second level configures corresponding target user, be can specifically include: contact person's letter based on input Breath generates trust list, and each user in the trust list is target user;Create the pass between trust list and second level Connection relationship.Certainly, intelligent terminal can also preset trust list, to input in the information content of the user for sharing User information when, corresponding user object is added in trust list, i.e., sets target user for the user object, with The data for the second level for reading the user object in the feature two dimension that the information content of the sharing is converted into.
Step 203, partitioned storage is carried out to all types of data according to the encryption level, it is corresponding generates the target user Feature two dimensional code.
It should be noted that data field is usually as two dimensional code storage true data content according to the standard of two dimensional code Place, and error correction area is only used for storage error correcting code, so that intelligent terminal in the case where pollution, breakage occurs in two dimensional code, is based on Error correcting code can still read the data content stored in data field.Wherein, two dimensional code serious forgiveness can be indicated with letter, Fault-tolerant ability grade can be divided into: L (7%), M (15%), Q (25%), H (30%) level Four.Each version of two dimensional code combines Data volume, character types and level of error correction are equipped with corresponding most input number of characters, also that is, needing if increasing data volume Two dimensional code is formed using more symbols, two dimensional code will become much larger.
The embodiment of the present invention can go to account for during generating two dimensional code by private data as that piece of pollution There is the memory space of two dimensional code a part.If the private data of insertion is without departing from the error tolerance of two dimensional code, two-dimentional yardage It will not be affected according to the integrity degree in area.Therefore, the intelligent terminal in the case where meeting two dimensional code standard, in the embodiment of the present invention The information contents such as private data, trust list can be embedded into error correction area, so that not in trust list User can only scan the public information into data field, guarantee privacy of user safety.
Specifically, two dimensional code can be divided into data field and error correction area by intelligent terminal.Wherein, data field can be used for storing Without the public information of secrecy, such as the data of first level;Error correction area can be used for storing error correcting code and privacy information, and such as second The data of rank.Optionally, partitioned storage is carried out to all types of data according to the encryption level, generates the target user couple The feature two dimensional code answered, can specifically include: data and the target user to the second level encrypt, and store In error correction area, such as by trust list, second level data and trust list and second level between incidence relation encrypt It is stored in the error correction area;The data of the first level are stored in data field;Error correction area and data field are synthesized, it is raw At the feature two dimensional code.
Optionally, top-secret information can have corresponding expired time.The expired time is determined for top secret letter The term of validity of breath, thus after validity period arrives, so that intelligent terminal carries out invalidation to stored top-secret information, such as By the top secret information deletion, it is further ensured that the safety of top-secret information.In a preferred embodiment of the invention, information point The method enjoyed can also include: for the corresponding expired time of top-secret information configuration;In the generating process of the two dimensional code, by institute It states expired time and is encapsulated into error correction area.Specifically, intelligent terminal can be the information content shared according to preset parameter information In the corresponding expired time of top-secret information configuration;Or it is exhausted for this for the temporal information of the top secret information input according to user Confidential information configures corresponding expired time, and the embodiment of the present invention does not limit this specifically.
As shown in figure 4, showing a kind of specific example of the present invention schematic diagram of quick response code business card generated.Intelligent terminal During generating quick response code business card, the public informations such as name, Work Telephone can be deposited in data field, and By the top-secret information such as the private informations such as WeChat ID, microblogging, private telephone expired time corresponding with top-secret information, with And trust list is deposited in error correction area, and is encrypted, it should so that only the target user in trust list is just available The private information and top-secret information that error correction area is stored, synthesize the data field and error correction area, generate and use comprising target The quick response code business card at family and expired time.
In a preferred embodiment of the invention, the method which shares can also include: by the trust list On to cloud, the step of determining the uniform resource locator of trust list.Wherein, trust list encryption is stored in described Error correction area, can specifically include: the uniform resource locator of the trust list is stored in the error correction area.
In the present invention is implemented, in order to store mass data, intelligent terminal can be by the trust list in feature two dimensional code It is stored in cloud, the uniform resource locator (Uniform Resource Locator, URL) of the trust list beyond the clouds is added In the close error correction area for being stored in two dimensional code, so as to be that this feature two dimensional code configures more in the case where meeting two dimensional code standard More target users increases the information storage capacity of two dimensional code.Certainly, intelligent terminal can also be by the trust list Partial target user encryption in URL and the trust list is stored in error correction area, so that in scanning this feature two dimension During code, in the case where lookup in the error correction area less than corresponding target user, based on trust list in the error correction area URL obtain the corresponding trust list that is saved from cloud, and then tested using the target user saved in cloud Card.
Step 204, the feature two dimensional code is sent to target terminal.
Feature two dimensional code can be sent to target terminal by the intelligent terminal of the embodiment of the present invention, by this feature two dimensional code It is sent to sharing object, achievees the purpose that information is shared.Wherein, which can determine according to object is shared, and such as share Intelligent terminal operated by object.Specifically, intelligent terminal is after generating feature two dimensional code, or getting feature two dimensional code Afterwards, this feature two dimensional code can be sent to intelligent terminal operated by the selected sharing object of user, so as to share object It is available to arrive this feature two dimensional code.
The embodiment of the present invention can be added the user in trust list using static mode or dynamical fashion, by the use Family is set as target user.Specifically, adding the user in trust list when by the way of static, intelligent terminal can be pre- Trust list is first set, so as to which the object that private information in two dimensional code can be read to be added in trust list, i.e., will be added The object added is configured to target user, to generate the feature two dimensional code for including target user.Preferably, it is arranged using static mode The corresponding trust list of data of second level can be read, target user can be after the generation of feature two dimensional code in the trust list It immobilizes always, so as to avoid the target user in the trust list from illegally being distorted, further increases the peace of information Quan Xing.It is added the user in trust list when using dynamic mode, terminal can be added to that will share object in intelligence In the trust list of feature two dimensional code, i.e., sharing object is set to the target user of this feature two dimensional code, so as to improve Add the flexibility of target user.
In a preferred embodiment of the invention, before feature two dimensional code is sent to target terminal, further includes: test Card active user whether be the two dimensional code author;If active user is the author, will share object be added to it is described In trust list, and the feature two dimensional code is updated.Wherein, described that the feature two dimensional code is sent to target end End, comprising: updated feature two dimensional code is sent to target terminal.For example, user A has made one by operating intelligent terminal Quick response code business card 1 is opened, user B is issued;Quick response code business card 1 can be transmitted to C after receiving the quick response code business card 1 by B.This When, C is not added into trust list, therefore can not read private data in the quick response code business card 1;And B is to trust column In table, therefore the private data in the quick response code business card 1 can be read.When quick response code business card is issued D again by A, then D also can be by It is added to trust list, i.e., when this is shared with D by A, intelligent terminal operated by A can read quick response code business card 1 All data, are then added trust list for D, regenerate a two dimensional code 2 automatically and are shared with D.As it can be seen that feature two dimensional code The object that author is shared can be automatically added in trust list.
Referring to Fig. 5, the flow diagram that feature two dimensional code is sent in a specific example of the invention is shown.Specifically, The information content of business card can be classified by intelligent terminal when contents of visiting cards is arranged, be divided into public information, private information and Then public information is stored in data field by top-secret information, and by private information, top-secret information, by expired time etc. second The data encryption of rank is stored in error correction area, generates the corresponding feature two dimensional code 1 of the business card, so as to according to this feature two dimension Code 1 carries out information sharing.When sharing this feature two dimensional code, intelligent terminal can be by obtaining the current user for operating user Information with verify current operation user whether be this feature two dimensional code 1 author.If active user is the work of feature two dimensional code 1 Person will then share object and be added in trust list, and is updated to this feature two dimensional code 1, i.e. the base in feature two dimensional code 1 Updated feature two dimensional code 2 is generated on plinth, and updated feature two dimensional code 2 is then sent to target terminal.If current use When family is not the author of this feature two dimensional code, then this feature two dimensional code 1 is directly sent to target terminal.
Through this embodiment, even if intelligent terminal feature two dimensional code generated is leaked, in the privacy information of encryption In the case where not being cracked, the user in the trust list of feature two dimensional code and/or intelligent terminal can not obtain two dimension yet Privacy information in code, so as to avoid the problem that the leakage of private information in feature two dimensional code.
Embodiment two
On the basis of the above embodiments, this implementation is based on the scanning process of two dimensional code to information provided by the present invention point The method enjoyed is described.
Referring to Fig. 6, the step flow chart for the embodiment of the method that another information of the invention is shared is shown, it specifically can be with Include the following steps:
Step 601, feature two dimensional code is scanned.
In the embodiment of the present invention, intelligent terminal can be used camera and be scanned to feature two dimension;Alternatively, can pass through Camera is shot to get feature two dimensional code, to be scanned to the feature two dimensional code got, with from feature two The information content that this feature two dimensional code is stored is extracted in dimension code.Certainly, the intelligent terminal of the embodiment of the present invention can also use Its mode gets feature two dimensional code, such as receives feature two dimensional code, the embodiment of the present invention by communication mode wirelessly or non-wirelessly With no restriction to this.
Wherein, this feature two dimensional code can specifically include: by the information content of sharing carry out classification and according to point Encryption level after grade carries out partitioned storage two dimensional code generated to all types of data.Encryption level includes first level and Two ranks, first level is lower than second level, and second level has corresponding target user.
Step 602, during the scanning process, data are extracted from the corresponding subregion of first level.
In the feature two dimensional code of the embodiment of the present invention, the data that the corresponding subregion of first level is saved can not be encrypted, It can specifically include: the data of first level, such as public information without secrecy.Intelligent terminal is based on planar bar code technology, can be with The data not encrypted are extracted from the corresponding subregion of first level of this feature two dimensional code, such as the data of first level.
Step 603, whether detection scanning user matches with the target user of the feature two dimensional code.
If the scanning user matches with target user thens follow the steps 604;Otherwise step 605 execution is jumped to.
Specifically, intelligent terminal can by obtaining the user information scanning user current with determination of current operation, into And can detecte scanning user and whether matched with the target user of feature two dimensional code, whether have with the scanning user for verifying current The corresponding permission of data for obtaining second level in this feature two dimensional code, that is, detect whether scanning user belongs to this feature two dimension The target user of code.When scanning user matches with the target user of feature two dimensional code, it can determine that scanning user belongs to this When the target user of feature two dimensional code, step 604 is then executed;When scanning user and the target user of feature two dimensional code mismatch When, when can determine that scanning user is not belonging to the target user of this feature two dimensional code, step 605 can be jumped directly to and held Row.
Step 604, data are extracted in the corresponding subregion of second level.
In this step, intelligent terminal can be based on permission possessed by target user, from the corresponding subregion of second level The data for having encrypted storage are extracted, such as the data of the second level in feature two dimensional code.
Step 605, extracted data are saved.
Intelligent terminal can be automatically stored data extracted from feature two dimensional code, so as in subsequent number According to saved data are used in processing, corresponding service is provided for user, is met the needs of users, to reach information sharing Purpose.
The present invention implements whether match with the target user of feature two dimensional code by detection scanning user, to determine that scanning is used Whether family belongs to the target user of this feature two dimensional code, and mentions when scanning user belongs to the target user of this feature two dimensional code The data in the corresponding subregion of second level are taken, are only extracted if the target user that scanning user is not belonging to this feature two dimensional code Data in the corresponding subregion of first level, i.e., for same Zhang Tezheng two dimensional code, different people can scan different letters It ceases content and improves the benefit of feature two dimensional code so as to avoid making the awkward situation of different two dimensional codes for different people With rate.
Referring to Fig. 7, the step flow chart for the method alternative embodiment that another information of the invention is shared is shown, specifically It may include steps of:
Step 701, feature two dimensional code is scanned.
In embodiments of the present invention, feature two dimensional code can specifically be divided into: data field and error correction area.Wherein, first level Corresponding subregion can be the data field of feature two dimensional code, and the corresponding subregion of second level can be the error correction of feature two dimensional code Area.
Step 702, during the scanning process, the data of first level are extracted from the data field of feature two dimensional code.
During reading two dimensional code, intelligent terminal can extract first level from the data field of feature two dimensional code Data, such as degree of privacy are " name ", " hobby " public information without secrecy.
Step 703, classification detection is carried out to the data of the first level, determines corresponding information category.
Intelligent terminal can judge the first level according to preset detection mode after the data for extracting first level The information category of data such as determines the info class of this feature two dimensional code by keyword in the data of the detection first level Not.For example, when that, comprising keyword " name ", can determine the info class of this feature two dimensional code in the data for detecting first level It Wei not card information.
Step 704, corresponding target database is determined using the information type.
Wherein, target database is for storing extracted data.For example, in conjunction with above-mentioned example, terminal can be in intelligence Using the corresponding Card Database of card information as target database, the data that will be extracted are stored into Card Database.
Step 705, whether detection scanning user matches with the target user of the feature two dimensional code.
If scanning user matches with target user, 706 are thened follow the steps;Otherwise, step 707 execution is jumped to.
Step 706, the data of second level are extracted from the error correction area of feature two dimensional code.
In this step, intelligent terminal can be according to permission possessed by target user, from the error correction area of feature two dimensional code The data for extracting second level, as the top secret that the private information and degree of privacy that degree of privacy is " general secrecy " be " top secret " is believed Breath etc..
Step 707, by the storage of extracted data into target data.
Extracted data include the data of first level in the present embodiment, can also include the data of second level. Therefore, extracted data are saved, is can specifically include: the data of the data of the first order and second level are deposited Store up the target database.
In a preferred embodiment of the invention, the data of second level can specifically include: private information and top secret Information, wherein top-secret information can have corresponding expired time.Intelligent terminal can be adopted when storing extracted data The private information is stored with clear-text way;And it can be exhausted to determine by judging whether current time is more than expired time The validity of confidential information, when current time is more than expired time, intelligent terminal can determine that the top secret information is expired, and delete Top-secret information;And when current time is less than expired time, determine that the top secret information is not out of date, and is deposited using encrypted test mode Store up the top secret information.The intelligent terminal of the present embodiment is when storing top-secret information, when can be by expired in feature two dimensional code Between detect the validity of top-secret information in this feature two dimensional code, so as to carry out being automatically deleted place to expired top-secret information Reason, and not out of date top-secret information is stored using encrypted test mode, further improve the safety of information.
Optionally, intelligent terminal can also be determined top-secret after determining that the top-secret information is not out of date using expired time Information corresponding effective time, and the effective time can be present in target database, to believe using the top secret When breath, the validity of the top secret information can be detected by the effective time.Specifically, intelligent terminal is to extracted number After being saved, whether the top secret information can be detected using effective time described in application call when top secret information Effectively.When top-secret information is effective, operation can be decrypted to the top-secret information in intelligent terminal, generate corresponding plaintext number According to, and clear data fed back into application program, so that the clear data, which can be used, in application program provides service for user.
The intelligent terminal of the embodiment of the present invention can also believe the top secret after clear data is fed back the application program The data for ceasing corresponding first level are shown.Specifically, stored in using target database two-dimensional code data when, Intelligent terminal can be by judging whether the corresponding degree of privacy of data is top secret, to determine whether the producer of two dimensional code wishes The data are transmitted.If the corresponding degree of privacy of data is top secret, it can determine that the producer of two dimensional code is not intended to the number According to being transmitted.For example, the author A of two dimensional code has shared telephone number to salesman B, but A, which is not intended to B, is shared with it for number He is salesman, is also not desired to the number that B knows always him.At this point, the corresponding degree of privacy of the telephone number of A can be set to absolutely It is close, so that the phone number of A can not be shown in clear text manner, if not when showing the phone number of A in smart phone It shows the number of itself, but is shown in a manner of ciphertext, the false thing as showing similar XXX, so that B It cannot know the phone number of A, it can B is avoided to reveal the phone number of A.
As a specific example of the invention, smart phone can carry out encryption for top-secret information and show.Due to intelligence Can the system of mobile phone know encryption method, therefore internal system carried out using top-secret information operation when, smart phone can be with First by the top secret information be decrypted into clear data carry out again using.Specifically, smart phone is in storing process, it can be according to two Extracted data are stored in Card Database by the classification of information privacy in dimension code business card, and the storage formats of data can be as Shown in table 1:
Field name Field value Degree of privacy
Name Mr.k It is open
QQ 12345 Generally
Phone 12321 It is top-secret
Table 1
Wherein, encrypted telephone number can be stored in smart phone with encrypted test mode, the phone journey of smart phone Sequence can obtain true number by reverse operation.
Certainly, true number can also be stored in smart phone with clear-text way.If true number is corresponding hidden Private degree is top secret, then the telephone program of smart phone can be used true number and go to dial, but true number can not be shown It shows and, it can information itself is not shown, so as to avoid user from getting letter when using stored top-secret information Breath itself, it can avoid user by top-secret information leakage.Therefore, when business card is shared with salesman by user, without worry Salesman leaks its personal information, so as to avoid ceaselessly being connected to sale call.
It the invention be not limitedly applied to the application scenarios for sharing business card, can also be applied to share the applied field of other information Scape, such as sharing web page address, sharing video frequency, sharing video frequency application scenarios.Present invention implementation can satisfy in sharing information Classification processing is carried out to information according to the degree of privacy of information, and can realize that orientation is shared by setting target user, from And improve the flexibility of information sharing.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, embodiment of that present invention are not limited by the describe sequence of actions, because according to According to the embodiment of the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and the related movement not necessarily present invention is implemented Necessary to example.
Embodiment three
Referring to Fig. 8 A, a kind of structural block diagram of intelligent terminal embodiment of the invention is shown, can specifically include as follows Module:
Encryption level determining module 801 determines each in the information content for being classified to the information content of sharing The corresponding encryption level of categorical data.Wherein, the encryption level includes first level and second level, and first level is lower than the Two ranks.
Target user's configuration module 802, for configuring corresponding target user for the second level.
Two-dimensional code generation module 803 generates institute for carrying out partitioned storage to all types of data according to the encryption level State the corresponding feature two dimensional code of target user.
Sharing module 804, for being shared according to the feature two dimensional code.
On the basis of Fig. 8 A, optionally, two-dimensional code generation module 803 may include: encryption sub-module stored 8031, deposit It stores up submodule 8032 and generates submodule module 8033, as shown in Figure 8 B.
Wherein, encrypt sub-module stored 8031, for the second level data and the target user add It is close, and it is stored in error correction area.Sub-module stored 8032, for the data of the first level to be stored in data field.Generate son Mould module 8033 generates the feature two dimensional code for synthesizing to the error correction area and the data field.
In a preferred embodiment of the invention, encryption level determining module 801 may include following submodule:
Submodule 8011 is selected, for for each categorical data in the information content, the rank based on input to be selected Operation determines corresponding encryption level;
Detection sub-module 8012 determines corresponding encryption level for detecting to keyword in each categorical data.
In a preferred embodiment of the invention, target user's configuration module 802 specifically can be used for based on input Contact information generates trust list, and creates the incidence relation between the trust list and the second level.Wherein, believe Appointing each user in list is the target user.Sub-module stored 8031 is encrypted, specifically can be used for incidence relation, trust List and second level data encryption are stored in error correction area.
Optionally, the intelligent terminal of the embodiment of the present invention can also include: uploading module 805.The uploading module 805, can To determine the uniform resource locator of trust list for the trust list to be uploaded to cloud.Wherein, encryption storage submodule Block 8031 specifically can be also used for for the uniform resource locator of the trust list being stored in the error correction area.
In a preferred embodiment of the invention, sharing module 804 may include following submodule:
Sending submodule, for the feature two dimensional code to be sent to target terminal.
Submodule is shown, for being shown to the two dimensional code.
Optionally, the target terminal of the embodiment of the present invention can be determined according to object is shared.The sharing module 804, may be used also To include following submodule:
Verify submodule, for verify active user whether be the two dimensional code author;
Submodule is updated, is added in the trust list for object when active user is the author, will to be shared, And the feature two dimensional code is updated;And updated feature two dimensional code is sent to target end by triggering sending submodule End.
In embodiments of the present invention, the data of second level may include: top-secret information and private information.Wherein, top-secret Information has corresponding expired time.Optionally, the intelligent terminal of the embodiment of the present invention can also include following module:
Time configuration module 806, for being the corresponding expired time of the top-secret information configuration;
Time package module 807, for the expired time being encapsulated into described in the generating process of the two dimensional code Error correction area.
The intelligent terminal that the present invention is implemented is by being classified the information content of required sharing, so as to according to adding Level of confidentiality Jiang not carry out partitioned storage to the data of each encryption level, generate the corresponding feature two dimensional code of feature user.Wherein, the spy Requisition family can be used for limiting the user for obtaining the data of the second level in feature two dimensional code, to solve two dimensional code sharing In mode the problem of information leakage, ensure information security.
Referring to Fig. 9 A, show the structural block diagram of another intelligent terminal embodiment of the invention, can specifically include as Lower module:
Scan module 901, for being scanned to feature two dimensional code.
First extraction module 902, for during the scanning process, extracting data from the corresponding subregion of first level.
User's matching module 903, for detecting whether scanning user matches with the target user of the feature two dimensional code.If The scanning user matches with target user, then triggers second and extract 904 modules.
Second extraction module 904, for extracting data from the corresponding subregion of second level.
Preserving module 905, for being saved to first extraction module and the extracted data of the second extraction module.
In embodiments of the present invention, the corresponding subregion of first level can be the data field of feature two dimensional code, second level Corresponding subregion can be the error correction area of the feature two dimensional code.
On the basis of Fig. 9 A, optionally, intelligent terminal can also include: information category detection module 906 and database Determining module 907, as shown in Figure 9 B.
Wherein, information category detection module 906 can be used for carrying out classification detection to the data of the first level, really Fixed corresponding information category.Database determining module 907 can be used for determining corresponding target data using the information type Library, the target database is for storing extracted data.Preserving module 905 specifically can be used for the first order The data of data and second level are stored to the target database.
Optionally, the data of second level may include: private information and top-secret information, which has corresponding Expired time.Wherein, preserving module 905 may include following submodule:
Stored in clear submodule 9051, for storing the private information using clear-text way.
Time interpretation submodule 9052, for judging whether current time is more than the expired time.
Expired determining submodule 9053, for when current time is more than the expired time, determining the top-secret information It is expired, and delete the top-secret information.
Ciphertext sub-module stored 9054, for when current time is less than the expired time, determining the top-secret letter Cease it is not out of date, and using the encrypted test mode storage top-secret information.
In a preferred embodiment of the invention, intelligent terminal can also include following module:
The effective time determining module 908 can be used for determining the top-secret information not in the ciphertext sub-module stored After expired, the top-secret information corresponding effective time is determined using the expired time.
Validation checking module 909, when for the top secret information described in the application call, using effective time inspection Whether effective survey the top-secret information.
Deciphering module 910, for being carried out to top-secret information when validation checking module 909 determines that top-secret information is effective Operation is decrypted, corresponding clear data is generated.
Feedback module 911, for the clear data generated of deciphering module 910 to be fed back to application program.
Optionally, which can also include display module.The display module can be used for corresponding to top-secret information The data of first level be shown.
Whether the intelligent terminal that the present invention is implemented is matched by detection scanning user with the target user of feature two dimensional code, with It determines whether scanning user belongs to the target user of this feature two dimensional code, and belongs to the mesh of this feature two dimensional code in scanning user The data in the corresponding subregion of second level are extracted when marking user, if the target that scanning user is not belonging to this feature two dimensional code is used The data in the corresponding subregion of first level are then only extracted at family, i.e., for same Zhang Tezheng two dimensional code, different people can be scanned The different information content out improves feature so as to avoid making the awkward situation of different two dimensional codes for different people The utilization rate of two dimensional code.
Figure 10 is the structural block diagram of the intelligent terminal of another embodiment of the present invention.Intelligent terminal 1000 shown in Fig. 10 wraps It includes: at least one processor 1001, memory 1002, at least one network interface 1004 and other users interface 1003.Intelligence Various components in terminal 1000 are coupled by bus system 1005.It is understood that bus system 1005 is for realizing this Connection communication between a little components.Bus system 1005 except include data/address bus in addition to, further include power bus, control bus and Status signal bus in addition.But for the sake of clear explanation, various buses are all designated as bus system 1005 in Figure 10.
Wherein, user interface 1003 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 1002 in the embodiment of the present invention can be volatile memory or non-volatile memories Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), erasable programmable are read-only Memory (ErasablePROM, EPROM), electrically erasable programmable read-only memory (ElectricallyEPROM, EEPROM) Or flash memory.Volatile memory can be random access memory (RandomAccessMemory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (SynchlinkDRAM, SLDRAM) and direct rambus random access memory (DirectRambusRAM, DRRAM).The memory 1002 of system and method described herein is intended to include but is not limited to these With the memory of any other suitable type.For example, memory 1002 can store the information content of required sharing, including such as User information, expired time, trust list etc., the embodiment of the present invention to the specific content of memory with no restriction.
In some embodiments, memory 1002 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 10021 and application program 10022.
Wherein, operating system 10021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 10022 includes various application programs, such as matchmaker Body player (MediaPlayer), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 10022.
In embodiments of the present invention, by the program or instruction of calling memory 1002 to store, specifically, can be application The program or instruction stored in program 10022, processor 1001 can be used for being classified the information content of sharing, determine institute State the corresponding encryption level of all types of data in the information content, wherein the encryption level includes first level and second level, First level is lower than second level;Corresponding target user is configured for the second level;According to the encryption level to all kinds of Type data carry out partitioned storage, generate the corresponding feature two dimensional code of the target user;Divided according to the feature two dimensional code It enjoys.Certainly, processor 1001 can be used for being scanned feature two dimensional code;During the scanning process, corresponding from first level Subregion in extract data;Whether detection scanning user matches with the target user of the feature two dimensional code;If the scanning is used Family is matched with target user, then extracts data from the corresponding subregion of second level;Extracted data are saved.
The method that the embodiments of the present invention disclose can be applied in processor 1001, or real by processor 1001 It is existing.Processor 1001 may be a kind of IC chip, the processing capacity with signal.During realization, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1001 or software form.Above-mentioned Processor 1001 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), dedicated collection At circuit (ApplicationSpecific IntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic Device, discrete hardware components.It may be implemented or execute disclosed each method, step and the logical box in the embodiment of the present invention Figure.General processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with the present invention The step of method disclosed in embodiment, can be embodied directly in hardware decoding processor and execute completion, or use decoding processor In hardware and software module combination execute completion.Software module can be located at random access memory, and flash memory, read-only memory can In the storage medium of this fields such as program read-only memory or electrically erasable programmable memory, register maturation.The storage Medium is located at memory 1002, and processor 1001 reads the information in memory 1002, completes the above method in conjunction with its hardware Step.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuits (ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), programmable logic device (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, microprocessor, other electronics lists for executing function of the present invention In member or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, processor 1001 carries out partitioned storage to all types of data according to the encryption level, generates the mesh Mark the corresponding feature two dimensional code of user, comprising: data and the target user to the second level encrypt, and store In error correction area;The data of the first level are stored in data field;The error correction area and the data field are synthesized, it is raw At the feature two dimensional code.
Optionally, the information content of 1001 pairs of processor sharings is classified, and determines all types of numbers in the information content According to corresponding encryption level, comprising: for each categorical data in the information content, the rank selection operation based on input is true Fixed corresponding encryption level;Alternatively, detecting to keyword in each categorical data, corresponding encryption level is determined.
Optionally, processor 1001 is that the second level configures corresponding target user, comprising: the connection based on input People's information generates trust list, and each user in the trust list is the target user;Create the trust list and institute State the incidence relation between second level.It is wherein, described that the data of the second level and the target user are encrypted, And it is stored in error correction area, comprising: the incidence relation, the trust list and the second level data encryption are stored in institute State error correction area.
Optionally, processor 1001 is also used to: the trust list being uploaded to cloud, determines the unified money of trust list Source finger URL.Wherein, trust list encryption is stored in the error correction area, comprising: unified by the trust list provides Source finger URL is stored in the error correction area.
Optionally, the data of second level include: top-secret information and private information, and the top secret information has corresponding mistake Time phase.Processor 1001 is also used to as the corresponding expired time of the top secret information configuration;In the generation of the two dimensional code The expired time is encapsulated into the error correction area by Cheng Zhong.
Optionally, as another embodiment, processor 1001 detection scanning user whether with the feature two dimensional code Target user's matching before, be also used to: classification detection being carried out to the data of the first level, determines corresponding info class Not;Corresponding target database is determined using the information type, the target database is for storing extracted data.Its In, it is described that extracted data are saved, comprising: by the data of the data of the first order and second level storage to institute State target database.
Optionally, the data of second level include: private information and top-secret information, and the top secret information has corresponding mistake Time phase.Wherein, processor 1001 saves extracted data, comprising: stores the secret letter using clear-text way Breath;Judge whether current time is more than the expired time;When current time is more than the expired time, the top secret is determined Information is expired, and deletes the top-secret information;When current time is less than the expired time, the top-secret information is determined not It is expired, and using the encrypted test mode storage top-secret information.
Optionally, processor 1001 is also used to: true using the expired time after determining that the top-secret information is not out of date Determine the top-secret information corresponding effective time.
Optionally, processor 1001 is also used to after saving to extracted data: described in application call It is whether effective using the effective time detection top-secret information when top-secret information;When the top secret information is effective, to institute It states top-secret information and operation is decrypted, generate corresponding clear data;The clear data is fed back into the application program.
Intelligent terminal 1000 in the present embodiment can be realized each process that intelligent terminal is realized in previous embodiment, be It avoids repeating, which is not described herein again.The intelligent terminal 1000, can be by required sharing in the generating process of two dimensional code The information content be classified, and partitioned storage is carried out to the data of each encryption level according to encryption level prize, to generate spy Take over the corresponding feature two dimensional code in family for use, and this feature user can be used for limiting the number for obtaining the second level in feature two dimensional code According to user, that is, solve the problems, such as information leakage in two dimensional code sharing mode, ensure information security.In addition, intelligent terminal 1000, for same Zhang Tezheng two dimensional code, the different information contents can be scanned for different people, so as to avoid for Different people makes the awkward situation of different two dimensional codes, improves the utilization rate of feature two dimensional code.
Figure 11 is the structural schematic diagram of the intelligent terminal of another embodiment of the invention.Specifically, the intelligence in Figure 11 is whole End 1100 can be mobile phone, tablet computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted Computer etc..
Intelligent terminal 1100 in Figure 11 includes radio frequency (RadioFrequency, RF) circuit 1110, memory 1120, defeated Enter unit 1130, display unit 1140, processor 1160, voicefrequency circuit 1170, WiFi (WirelessFidelity) module 1080 and power supply 1190.
Wherein, input unit 1130 can be used for receiving the number or character information of user's input, and generate with intelligence eventually The related signal input of the user setting and function control at end 1100.Specifically, in the embodiment of the present invention, the input unit 1130 may include touch panel 1131.Touch panel 1131, also referred to as touch screen collect the touching of user on it or nearby It touches operation (for example user uses the operations of any suitable object or attachment on touch panel 1131 such as finger, stylus), and Corresponding attachment device is driven according to preset formula.Optionally, touch panel 1131 may include touch detecting apparatus and Two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into Contact coordinate, then give the processor 1160, and order that processor 1160 is sent can be received and executed.Furthermore, it is possible to Touch panel 1131 is realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1131, input unit 1130 can also include other input equipments 1132, other input equipments 1132 can include but is not limited to One of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are more Kind.
Wherein, display unit 1140 can be used for showing information input by user or be supplied to the information and intelligence of user The various menu interfaces of terminal 1100.Display unit 1140 may include display panel 1141, optionally, using LCD or can have The forms such as machine light emitting diode (OrganicLight-EmittingDiode, OLED) configure display panel 1141.
It should be noted that touch panel 1131 can cover display panel 1141, touch display screen is formed, when the touch display screen After detecting touch operation on it or nearby, processor 1160 is sent to determine the type of touch event, is followed by subsequent processing Device 1160 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 1160 is the control centre of intelligent terminal 1100, utilizes various interfaces and connection whole mobile phone Various pieces, by running or execute the software program and/or module that are stored in first memory 1121, and call and deposit The data in second memory 1122 are stored up, the various functions and processing data of intelligent terminal 1100 are executed, thus to intelligent end End 1100 carries out integral monitoring.Optionally, processor 1160 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 1121 in software program and/or module and/ Or the data in the second memory 1122, processor 1160 determine the letter for being classified to the information content of sharing Cease the corresponding encryption level of all types of data in content, wherein the encryption level includes first level and second level, described First level is lower than the second level;Corresponding target user is configured for the second level;According to the encryption level pair All types of data carry out partitioned storage, generate the corresponding feature two dimensional code of the target user;According to the feature two dimensional code into Row is shared.
Optionally, processor 1160 carries out partitioned storage to all types of data according to the encryption level, generates the mesh Mark the corresponding feature two dimensional code of user, comprising: data and the target user to the second level encrypt, and store In error correction area;The data of the first level are stored in data field;The error correction area and the data field are synthesized, it is raw At the feature two dimensional code.
Optionally, the information content of sharing is classified, determine in the information content all types of data it is corresponding plus Level of confidentiality is other, comprising: for each categorical data in the information content, determines corresponding add based on the rank selection operation of input Level of confidentiality is other;Alternatively, detecting to keyword in each categorical data, corresponding encryption level is determined.
Optionally, described to configure corresponding target user for the second level, comprising: the contact information based on input Trust list is generated, each user in the trust list is the target user;Create the trust list and described second Incidence relation between rank.Wherein, described that the data of the second level and the target user are encrypted, and store In error correction area, comprising: the incidence relation, the trust list and the second level data encryption are stored in the error correction Area.
Optionally, processor 1160 is also used to: the trust list being uploaded to cloud, determines the unified money of trust list Source finger URL.Wherein, trust list encryption is stored in the error correction area, comprising: unified by the trust list provides Source finger URL is stored in the error correction area.
Optionally, the data of second level include: top-secret information and private information, and the top secret information has corresponding mistake Time phase.Processor 1160 is also used to as the corresponding expired time of the top secret information configuration;In the generation of the two dimensional code The expired time is encapsulated into the error correction area by Cheng Zhong.
Optionally, as another embodiment, processor 1160 is also used to be scanned feature two dimensional code;Scanned Cheng Zhong extracts data from the corresponding subregion of first level;Whether detection scanning user uses with the target of the feature two dimensional code Family matching;If the scanning user matches with target user, data are extracted from the corresponding subregion of second level;To being extracted Data saved.
Optionally, whether processor 1160 with the target user of the feature two dimensional code matches it in detection scanning user Before, it is also used to: classification detection being carried out to the data of the first level, determines corresponding information category;Using the info class Type determines corresponding target database, and the target database is for storing extracted data.Wherein, described to extracted Data are saved, comprising: by the data of the data of the first order and second level storage to the target database.
Optionally, the data of the second level include: private information and top-secret information, and the top secret information, which has, to be corresponded to Expired time.Wherein, processor 1160 saves extracted data, comprising: stores the private using clear-text way Confidential information;Judge whether current time is more than the expired time;When current time is more than the expired time, described in determination Top-secret information is expired, and deletes the top-secret information;When current time is less than the expired time, the top-secret letter is determined Cease it is not out of date, and using the encrypted test mode storage top-secret information.
Optionally, processor 1160 is also used to: true using the expired time after determining that the top-secret information is not out of date Determine the top-secret information corresponding effective time.
Optionally, processor 1160 is also used to after saving to extracted data: described in application call It is whether effective using the effective time detection top-secret information when top-secret information;When the top secret information is effective, to institute It states top-secret information and operation is decrypted, generate corresponding clear data;The clear data is fed back into the application program.
As it can be seen that the intelligent terminal 1100 in the present embodiment is in the generating process of two dimensional code, it can be by required point The information content enjoyed is classified, and carries out partitioned storage according to data of the encryption level prize to each encryption level, to generate The corresponding feature two dimensional code of feature user, and this feature user can be used for limiting the second level in acquisition feature two dimensional code The user of data solves the problems, such as information leakage in two dimensional code sharing mode, ensures information security.In addition, intelligent terminal 1100, for same Zhang Tezheng two dimensional code, the different information contents can be scanned for different people, so as to avoid for Different people makes the awkward situation of different two dimensional codes, improves the utilization rate of feature two dimensional code.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided by the present invention, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (22)

1. a kind of method that information is shared characterized by comprising
The information content of sharing is classified, determines the corresponding encryption level of all types of data in the information content, wherein The encryption level includes first level and second level, and the first level is lower than the second level;
Corresponding target user is configured for the second level;
Partitioned storage is carried out to all types of data according to the encryption level, generates the corresponding feature two dimension of the target user Code, wherein the feature two dimensional code includes error correction area and data field, and the error correction area is used to store the data of the second level With the target user, the data field is used to store the data of the first level;
Shared according to the feature two dimensional code.
2. the method according to claim 1, wherein described carry out all types of data according to the encryption level Partitioned storage generates the corresponding feature two dimensional code of the target user, comprising:
Data and the target user to the second level encrypt, and are stored in error correction area;
The data of the first level are stored in data field;
The error correction area and the data field are synthesized, the feature two dimensional code is generated.
3. determining the letter the method according to claim 1, wherein the information content to sharing is classified Cease the corresponding encryption level of all types of data in content, comprising:
For each categorical data in the information content, corresponding encryption level is determined based on the rank selection operation of input; Alternatively,
Keyword in each categorical data is detected, determines corresponding encryption level.
4. according to the method described in claim 2, it is characterized in that, described configure corresponding target use for the second level Family, comprising:
Contact information based on input generates trust list, and each user in the trust list is the target user;
Create the incidence relation between the trust list and the second level;
Wherein, described that the data of the second level and the target user are encrypted, and it is stored in error correction area, comprising: The incidence relation, the trust list and the second level data encryption are stored in the error correction area.
5. according to the method described in claim 4, it is characterized by further comprising:
The trust list is uploaded to cloud, determines the uniform resource locator of trust list;
Wherein, trust list encryption is stored in the error correction area, comprising: position the unified resource of the trust list Symbol is stored in the error correction area.
6. the method according to claim 1, wherein the data of second level include: top-secret information and secret letter Breath, the top secret information have corresponding expired time, the method also includes:
For the corresponding expired time of the top secret information configuration;
In the generating process of the two dimensional code, the expired time is encapsulated into the error correction area.
7. a kind of method that information is shared characterized by comprising
Feature two dimensional code is scanned;
During the scanning process, data are extracted from the corresponding subregion of first level, wherein the corresponding subregion of the first level is The data field of the feature two dimensional code;
Whether detection scanning user matches with the target user of the feature two dimensional code;
If the scanning user matches with target user, data are extracted from the corresponding subregion of second level, wherein described The corresponding subregion of two ranks is the error correction area of the feature two dimensional code;
Extracted data are saved.
8. the method according to the description of claim 7 is characterized in that detection scanning user whether with the feature two dimensional code Before target user's matching, further includes:
Classification detection is carried out to the data of the first level, determines corresponding information category;
Corresponding target database is determined using the information type, the target database is for storing extracted data;
Wherein, described that extracted data are saved, comprising: to deposit the data of the data of the first order and second level Store up the target database.
9. the method according to the description of claim 7 is characterized in that the data of the second level include: private information and absolutely Confidential information, the top secret information have corresponding expired time;
It is wherein, described that extracted data are saved, comprising:
The private information is stored using clear-text way;
Judge whether current time is more than the expired time;
When current time is more than the expired time, determine that the top-secret information is expired, and delete the top-secret information;
When current time is less than the expired time, determine that the top-secret information is not out of date, and store using encrypted test mode The top secret information.
10. according to the method described in claim 9, it is characterized in that, after determining that the top-secret information is not out of date, further includes:
The top-secret information corresponding effective time is determined using the expired time.
11. according to the method described in claim 10, it is characterized in that, after being saved to extracted data, further includes:
It is whether effective using the effective time detection top-secret information when top secret information described in the application call;
When the top secret information is effective, operation is decrypted to the top-secret information, generates corresponding clear data;
The clear data is fed back into the application program.
12. a kind of intelligent terminal characterized by comprising
Encryption level determining module determines all types of numbers in the information content for being classified to the information content of sharing According to corresponding encryption level, wherein the encryption level includes first level and second level, and the first level is lower than described Second level;
Target user's configuration module, for configuring corresponding target user for the second level;
Two-dimensional code generation module generates the target for carrying out partitioned storage to all types of data according to the encryption level The corresponding feature two dimensional code of user, wherein the feature two dimensional code includes error correction area and data field, and the error correction area is for storing The data of the second level, the data field are used to store the data of the first level;
Sharing module, for being shared according to the feature two dimensional code.
13. intelligent terminal according to claim 12, which is characterized in that the two-dimensional code generation module, comprising:
Encrypt sub-module stored, for the second level data and the target user encrypt, and be stored in and entangle Wrong area;
Sub-module stored, for the data of the first level to be stored in data field;
It generates submodule module and generates the feature two dimensional code for synthesizing to the error correction area and the data field.
14. intelligent terminal according to claim 12, which is characterized in that the encryption level determining module, comprising:
Submodule is selected, for being determined based on the rank selection operation of input for each categorical data in the information content Corresponding encryption level;
Detection sub-module determines corresponding encryption level for detecting to keyword in each categorical data.
15. intelligent terminal according to claim 13, which is characterized in that target user's configuration module is specifically used for Contact information based on input generates trust list, and creates being associated between the trust list and the second level It is that each user in the trust list is the target user;
Wherein, the encryption sub-module stored is specifically used for the incidence relation, the trust list and the second level Data encryption is stored in the error correction area.
16. intelligent terminal according to claim 15, which is characterized in that further include:
Uploading module determines the uniform resource locator of trust list for the trust list to be uploaded to cloud;
Wherein, the encryption sub-module stored is specifically also used to for the uniform resource locator of the trust list being stored in The error correction area.
17. intelligent terminal according to claim 13, which is characterized in that the data of second level include: top-secret information and Private information, the top secret information have corresponding expired time, the intelligent terminal, further includes:
Time configuration module, for being the corresponding expired time of the top-secret information configuration;
Time package module, in the generating process of the two dimensional code, the expired time to be encapsulated into the error correction area.
18. a kind of intelligent terminal characterized by comprising
Scan module, for being scanned to feature two dimensional code;
First extraction module extracts data from the corresponding subregion of first level for during the scanning process, wherein described the The corresponding subregion of one rank is the data field of the feature two dimensional code;
User's matching module, for detecting whether scanning user matches with the target user of the feature two dimensional code;If described sweep It retouches user to match with target user, then triggers the second extraction module;
Second extraction module, for extracting data from the corresponding subregion of second level, wherein corresponding point of the second level Area is the error correction area of the feature two dimensional code;
Preserving module, for being saved to first extraction module and the extracted data of the second extraction module.
19. intelligent terminal according to claim 18, which is characterized in that further include:
Information category detection module carries out classification detection for the data to the first level, determines corresponding information category;
Database determining module, for determining that corresponding target database, the target database are used using the information type In the extracted data of storage;
Wherein, the preserving module, specifically for storing the data of the data of the first order and second level to the mesh Mark database.
20. intelligent terminal according to claim 18, which is characterized in that the data of the second level include: secret letter Breath and top-secret information, the top secret information have corresponding expired time;
Wherein, the preserving module, comprising:
Stored in clear submodule, for storing the private information using clear-text way;
Time interpretation submodule, for judging whether current time is more than the expired time;
Expired determining submodule for when current time is more than the expired time, determining that the top-secret information is expired, and is deleted Except the top-secret information;
Ciphertext sub-module stored, for when current time is less than the expired time, determining that the top-secret information is not out of date, And using the encrypted test mode storage top-secret information.
21. intelligent terminal according to claim 20, which is characterized in that further include:
Effective time determining module, for after the ciphertext sub-module stored determines that the top-secret information is not out of date, using institute It states expired time and determines the top-secret information corresponding effective time.
22. intelligent terminal according to claim 21, which is characterized in that further include:
Validation checking module, when for the top secret information described in the application call, detected using the effective time described in Whether top-secret information is effective;
Deciphering module, for when the validation checking module determines that the top-secret information is effective, to the top-secret information into Row decryption operation, generates corresponding clear data;
Feedback module, for the clear data to be fed back the application program.
CN201610513570.XA 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing Active CN106022196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610513570.XA CN106022196B (en) 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610513570.XA CN106022196B (en) 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing

Publications (2)

Publication Number Publication Date
CN106022196A CN106022196A (en) 2016-10-12
CN106022196B true CN106022196B (en) 2019-01-11

Family

ID=57106171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610513570.XA Active CN106022196B (en) 2016-06-30 2016-06-30 A kind of method and intelligent terminal of information sharing

Country Status (1)

Country Link
CN (1) CN106022196B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503133B (en) * 2016-10-19 2020-06-19 北京小米移动软件有限公司 Cloud disk data processing method and device
CN108810451A (en) * 2017-04-26 2018-11-13 杭州海康威视数字技术股份有限公司 A kind of video recording storage, access method and video recording storage system
CN109215170B (en) 2017-07-04 2021-03-02 百度在线网络技术(北京)有限公司 Driving data storage method, device and equipment
CN109726786B (en) * 2017-10-31 2023-09-26 北京京东尚科信息技术有限公司 Two-dimensional code information reading and generating method and device
CN108769403B (en) * 2018-05-24 2021-05-18 维沃移动通信有限公司 Information acquisition method, terminal and computer readable storage medium
CN109525482B (en) * 2018-11-09 2021-08-10 北京北信源软件股份有限公司 Instant messaging method based on secret level channel
CN109410083A (en) * 2018-11-20 2019-03-01 咪咕数字传媒有限公司 A kind of sharing method of information, device and storage medium
CN109635905B (en) * 2018-12-06 2022-09-02 南京中孚信息技术有限公司 Two-dimensional code generation method, device and system
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN110266683A (en) * 2019-06-18 2019-09-20 北京阿尔山区块链联盟科技有限公司 Digital asset sharing method, device and electronic equipment
CN110414241B (en) * 2019-08-05 2021-08-27 深圳市网安计算机安全检测技术有限公司 Privacy policy detection method and device, computer equipment and storage medium
CN111046350A (en) * 2019-10-31 2020-04-21 贝壳技术有限公司 Authority information processing method and system
CN111177694B (en) * 2019-12-16 2023-03-17 华为技术有限公司 Method and device for processing data
CN113132524A (en) * 2019-12-31 2021-07-16 华为技术有限公司 Method for generating contact name card and method for displaying contact information
CN113868209B (en) * 2021-12-02 2022-03-15 天津联想协同科技有限公司 Network disk-based external link sharing expiration date management method and device and storage medium
CN114549187B (en) * 2022-04-24 2022-07-08 梅州客商银行股份有限公司 Method and system for controlling marketing two-dimensional code use range by electronic bank
CN115033918B (en) * 2022-06-09 2023-05-05 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049869A (en) * 2012-12-28 2013-04-17 浙江理工大学 Two-dimensional code based clothing industry client information management method
CN103489025A (en) * 2012-06-08 2014-01-01 北京千橡网景科技发展有限公司 Method and device for sending contact information
CN104268610A (en) * 2014-09-11 2015-01-07 重庆大学 Method for generating and reading graded QR code

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2004090794A1 (en) * 2003-04-07 2006-07-06 ボーダフォン株式会社 Information processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103489025A (en) * 2012-06-08 2014-01-01 北京千橡网景科技发展有限公司 Method and device for sending contact information
CN103049869A (en) * 2012-12-28 2013-04-17 浙江理工大学 Two-dimensional code based clothing industry client information management method
CN104268610A (en) * 2014-09-11 2015-01-07 重庆大学 Method for generating and reading graded QR code

Also Published As

Publication number Publication date
CN106022196A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
CN106022196B (en) A kind of method and intelligent terminal of information sharing
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN109150910A (en) Log in token generation and verification method, device and storage medium
CN106708658B (en) A kind of data back up method, mobile terminal and storage server
US20090165121A1 (en) Touch Pad based Authentication of Users
CN106485164A (en) A kind of image processing method and mobile terminal
CN102317949A (en) Authentication device, authentication method, and program to execute same by computer
CN106027794B (en) A kind of encryption method and mobile terminal of photo
CN105956431B (en) A kind of application protection processing method and mobile terminal
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN107644170B (en) A kind of image processing method and mobile terminal
CN107180203B (en) Image encryption and decryption method, mobile terminal and computer readable storage medium
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN107506111A (en) The encryption and decryption method and terminal of a kind of terminal applies
CN106228085B (en) The method for secret protection and mobile terminal of application program
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN107465701B (en) Method and device for inputting password into interface at dynamic position
CN104424409A (en) Application unlocking method and device
CN106156600B (en) A kind of unlocking method and mobile terminal of application program
KR100996955B1 (en) Security method using virtual keyboard
CN107632870A (en) The startup method and terminal of a kind of application
CN108900553A (en) A kind of communication means, device and computer readable storage medium
Chabbi et al. Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone
CN106250757A (en) The control method of a kind of application program and mobile terminal
CN106384060B (en) A kind of mobile terminal data encryption method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201102

Address after: Room 708, 7 / F, 101, floors 1-7, building 205, yard a 10, Jiuxianqiao North Road, Chaoyang District, Beijing 100016

Patentee after: WEIWO SOFTWARE TECHNOLOGY Co.,Ltd.

Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd.