[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104915617B - A kind of information processing method and electronic equipment - Google Patents

A kind of information processing method and electronic equipment Download PDF

Info

Publication number
CN104915617B
CN104915617B CN201510284602.9A CN201510284602A CN104915617B CN 104915617 B CN104915617 B CN 104915617B CN 201510284602 A CN201510284602 A CN 201510284602A CN 104915617 B CN104915617 B CN 104915617B
Authority
CN
China
Prior art keywords
solicited message
electronic equipment
information
user
operational order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510284602.9A
Other languages
Chinese (zh)
Other versions
CN104915617A (en
Inventor
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510284602.9A priority Critical patent/CN104915617B/en
Publication of CN104915617A publication Critical patent/CN104915617A/en
Application granted granted Critical
Publication of CN104915617B publication Critical patent/CN104915617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information processing method and electronic equipment, methods described includes:Obtain the solicited message sent by the second electronic equipment;When the solicited message is the first solicited message, corresponding relation based on solicited message and operational order, the first operational order corresponding with first solicited message is determined, wherein, first solicited message obtains the solicited message for including non-classified information particularly for request;When the solicited message is second solicited message different from first solicited message, based on the corresponding relation, determine from second solicited message corresponding to second operational order different with first operational order, wherein, second solicited message obtains the solicited message for including classified information particularly for request.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method and electronic equipment.
Background technology
With the continuous development of scientific technology, electronic equipment has also obtained development at full speed, makes the life of people increasingly Intellectuality, user can use access card to carry out authentication, directly can be paid the bill when buying commodity using bank card etc..
In the prior art, card reader can send out electromagnetic wave with fixed frequency, when the card of user is with being operated When card reader carries out authentication operation or transactional operation, as long as after the card of user enters the radiation scope of electromagnetic wave, user's The information being stored in card is just transmitted directly to card reader by card.
It is as follows to have found that prior art is present during technical scheme in realizing the embodiment of the present application by present inventor Technical problem:
Due in the prior art when card reader need read contactless card in information when, as long as contactless card is received by Card Reader The solicited message for the reading information that device is sent, the information of contactless card memory storage will be sent to card reader, so, due to sensing Card only exists a kind of level of security, and when the packet of contactless card memory storage contains classified information, contactless card can also believe concerning security matters Breath is sent to card reader, so, the single technical problem of level of security be present in contactless card of the prior art.
The content of the invention
The embodiment of the present application provides a kind of information processing method and electronic equipment, for solving contactless card of the prior art The single technical problem of level of security be present, realize the technique effect that can meet more level of security demands.
On the one hand the embodiment of the present application provides a kind of information processing method, applied to the first electronic equipment, including:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, it is determined that Go out the first operational order corresponding with first solicited message, wherein, first solicited message obtains particularly for request The solicited message of non-classified information must be included;
When the solicited message is second solicited message different from first solicited message, based on the corresponding pass System, determine from second solicited message corresponding to second operational order different with first operational order, wherein, institute State the second solicited message and the solicited message for including classified information is obtained particularly for request.
Optionally, after the solicited message for obtaining and being sent by the second electronic equipment, methods described also includes:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
Optionally, it is described when the solicited message is the first solicited message, pair based on solicited message and operational order It should be related to, determine the first operational order corresponding with first solicited message, specifically include:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request User profile corresponding to information sends instruction;
Correspondingly, it is described determine that corresponding with first solicited message user profile sends instruction after, it is described Method also includes:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Optionally, it is described when the solicited message is second solicited message different from first solicited message, base In the corresponding relation, determine from second solicited message corresponding to second operation different with first operational order Instruction, is specifically included:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request Fingerprint authentication corresponding to information instructs;
Correspondingly, it is described determine the instruction of corresponding with second solicited message fingerprint authentication after, methods described Also include:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
Optionally, judge whether the first user fingerprints are pre-set user fingerprint described, after obtaining the second judged result, Methods described also includes:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will Second category information is sent to second electronic equipment.
Optionally, judge whether the first user fingerprints are pre-set user fingerprint described, after obtaining the second judged result, Methods described also includes:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment Breath, so that second electronic equipment can export the first miscue information.
On the other hand the embodiment of the present application provides a kind of electronic equipment, including:
First acquisition unit, for obtaining the solicited message sent by the second electronic equipment;
First determining unit, for when the solicited message is the first solicited message, being referred to based on solicited message and operation The corresponding relation of order, the first operational order corresponding with first solicited message is determined, wherein, first solicited message The solicited message for including non-classified information is obtained particularly for request;
Second determining unit, for being second solicited message different from first solicited message in the solicited message When, based on the corresponding relation, determine from second solicited message corresponding to different with first operational order Two operational orders, wherein, second solicited message obtains the solicited message for including classified information particularly for request.
The embodiment of the present application also provides a kind of electronic equipment, including:
Housing;
Receiving module, it is arranged in the housing, for obtaining the solicited message sent by the second electronic equipment;
Processor, it is arranged in the housing, for when the solicited message is the first solicited message, being believed based on request Breath and the corresponding relation of operational order, determine the first operational order corresponding with first solicited message, wherein, described the One solicited message obtains the solicited message for including non-classified information particularly for request;It is and described the in the solicited message During different the second solicited message of one solicited message, based on the corresponding relation, determine corresponding with second solicited message Second operational orders different from first operational order, wherein, second solicited message obtains particularly for request The solicited message of classified information must be included.
Optionally, the processor is additionally operable to:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
Optionally, the processor is specifically used for:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request User profile corresponding to information sends instruction;
Correspondingly, the processor is additionally operable to:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Optionally, the processor is specifically used for:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request Fingerprint authentication corresponding to information instructs;
Correspondingly, the processor is additionally operable to:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
Optionally, the processor is specifically used for:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will Second category information is sent to second electronic equipment.
Optionally, the processor is specifically used for:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment Breath, so that second electronic equipment can export the first miscue information.
Said one or multiple technical schemes in the embodiment of the present application, at least there is following one or more technology effects Fruit:
First, due to the technical scheme in the embodiment of the present application, the solicited message sent using acquisition by the second electronic equipment, When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with it is described First operational order corresponding to first solicited message, wherein, first solicited message is obtained comprising non-particularly for request The solicited message of classified information;When the solicited message is second solicited message different from first solicited message, base In the corresponding relation, determine from second solicited message corresponding to second operation different with first operational order Instruction, wherein, second solicited message obtains the technological means of the solicited message comprising classified information particularly for request, So, electronic equipment can determine level of security corresponding with solicited message based on the difference of the solicited message received, and Perform it is corresponding with level of security operation, when solicited message need obtain comprising classified information content when, determine described in ask It is high safety rank to seek information, then electronic equipment just performs instruction corresponding with high safety rank, identity is such as verified, when identity is tested Card retransmits content corresponding to solicited message after passing through, so, efficiently solve safety existing for contactless card of the prior art The single technical problem of rank, realize the technique effect that can meet more level of security demands.
2nd, due to the technical scheme in the embodiment of the present application, use when the solicited message is the second solicited message, base In the corresponding relation, fingerprint authentication instruction corresponding with second solicited message is determined, by performing the fingerprint inspection Card instruction, obtains the first user fingerprints for the first user for currently gripping first electronic equipment, judges the first user fingerprints Whether it is pre-set user fingerprint, obtains the second judged result, in second judged result for when being, acquisition please with described second The second category information corresponding to information is sought, and second category information is sent to the technological means of second electronic equipment, this Sample, as long as electronic equipment needs to send classified information, electronic equipment will obtain the user fingerprints of active user, only work as When the fingerprint of preceding user is identical with pre-set user fingerprint, electronic equipment just can send corresponding content to the second electronic equipment, this Sample, by way of fingerprint authentication, realize the technique effect for the security for further increasing electronic equipment.
3rd, due to the technical scheme in the embodiment of the present application, asked using the default concerning security matters list of types of acquisition one and with described First content type corresponding to the first request content of information is sought, whether is judged in the default concerning security matters list of types comprising described First content type, the first judged result is obtained, in first judged result for when being, it is described to determine the solicited message Second solicited message, when first judged result is no, determine the skill that the solicited message is first solicited message Art means, so, user can be needed according to the use of oneself to setting concerning security matters list of types, to be user-friendly, realize Improve the technique effect of Consumer's Experience.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, embodiment will be described below In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description be only the present invention some Embodiment.
Fig. 1 is a kind of information processing method flow chart provided in the embodiment of the present application one;
Fig. 2 be the embodiment of the present application one in when the solicited message is specially the first solicited message described information processing side The flow chart of method;
Fig. 3 be the embodiment of the present application one in when the solicited message is specially the second solicited message described information processing side The flow chart of method;
Fig. 4 is the structured flowchart of a kind of electronic equipment provided in the embodiment of the present application two;
Fig. 5 is the structured flowchart of a kind of electronic equipment provided in the embodiment of the present application three.
Embodiment
The embodiment of the present application provides a kind of information processing method and electronic equipment, for solving contactless card of the prior art The low technical problem of security be present, realize the technique effect for the security for improving contactless card.
Technical scheme in the embodiment of the present application is in order to solve the above technical problems, general thought is as follows:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, it is determined that Go out the first operational order corresponding with first solicited message, wherein, first solicited message obtains particularly for request The solicited message of non-classified information must be included;
When the solicited message is second solicited message different from first solicited message, based on the corresponding pass System, determine from second solicited message corresponding to second operational order different with first operational order, wherein, institute State the second solicited message and the solicited message for including classified information is obtained particularly for request.
In the above-mentioned technical solutions, the solicited message sent using obtaining by the second electronic equipment, in the solicited message For the first solicited message when, the corresponding relation based on solicited message and operational order, determine and first solicited message pair The first operational order answered, wherein, first solicited message obtains the request for including non-classified information particularly for request Information;When the solicited message is second solicited message different from first solicited message, based on the corresponding relation, Determine from second solicited message corresponding to second operational order different with first operational order, wherein, it is described Second solicited message obtains the technological means of the solicited message comprising classified information, so, electronic equipment particularly for request Level of security corresponding with solicited message, and execution and safe level can be determined based on the difference of the solicited message received Not corresponding operation, when solicited message needs to obtain the content comprising classified information, it is Gao An to determine the solicited message Full rank, then electronic equipment just perform it is corresponding with high safety rank instruction, such as verify identity, when authentication by after send out again Content corresponding to solicited message is sent, so, efficiently solve the single skill of level of security existing for contactless card of the prior art Art problem, realize the technique effect that can meet more level of security demands.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, technical scheme is clearly and completely described, it is clear that described embodiment is skill of the present invention The part of the embodiment of art scheme, rather than whole embodiments.It is general based on the embodiment described in present specification, this area The every other embodiment that logical technical staff is obtained under the premise of creative work is not made, belongs to the technology of the present invention side The scope of case protection.
Embodiment one
Fig. 1 is refer to, a kind of information processing method provided for the embodiment of the present application one, applied to the first electronic equipment, Methods described includes:
S101:Obtain the solicited message sent by the second electronic equipment;
S102:When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, Determine the first operational order corresponding with first solicited message, wherein, first solicited message particularly for please Seek the solicited message for obtaining and including non-classified information;
S103:When the solicited message is second solicited message different from first solicited message, based on described Corresponding relation, determine from second solicited message corresponding to second operational order different with first operational order, Wherein, second solicited message obtains the solicited message for including classified information particularly for request.
In specific implementation process, first electronic equipment is specifically as follows with processor and can receive and send The electronic equipment of function, such as intelligent SIM card, intelligent finance IC-card Contact Type Ic Card, can be used for Intelligent bus card, intelligence The non-contact IC cards such as the intelligent work card that access card, intra-company use, one schematically illustrated here, just differing.Second electronics Equipment can be specifically with the electronic equipment received with sending function, such as card reader, POS (point of sale information control system) Deng in the embodiment of the present application, by the intelligent work card used using first electronic equipment as intra-company, second electronics Equipment be card reader exemplified by, be described in detail come the specific implementation process to the method in the embodiment of the present application.
When the method in using the embodiment of the present application carries out information processing, step S101 is first carried out, i.e.,:Obtain by the The solicited message that two electronic equipments are sent.
In specific implementation process, the intelligent work card that is used using first electronic equipment as intra-company, described second Electronic equipment is exemplified by card reader, when user needs to use intelligent work card to enter company, company's access-control card reader will send One solicited message, e.g., the solicited message of " request obtains job number and name ";When user carries out bank's friendship using intelligent work card Easily, e.g., swiped the card when buying commodity on bank POS machine, now, bank POS machine can also send a solicited message, e.g., " request The solicited message of acquisition card number and password ", at this moment, intelligent work card will receive " the request acquisition sent by access-control card reader The solicited message of " request obtains card number and password " that the solicited message or bank POS machine of job number and name " are sent.Specific In implementation process, intelligent work card can obtain different solicited message according to the service condition of user, and just differ one schematically illustrates herein.
Before step S102 is performed, the information processing method in the embodiment of the present application one also includes:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
In specific implementation process, above-mentioned example is continued to use, in order to make intelligent work card according to the use needs of user come real Existing a variety of different operations, user can set a concerning security matters list of types to the intelligent work card of oneself, make the automatic root of intelligent work card Current operation is determined according to concerning security matters list of types, e.g., it is " password that user, which sets concerning security matters list of types,;The amount of money ", when intelligent work card After receiving the solicited message sent by card reader, content class corresponding to the content for wanting to obtain in solicited message will be obtained Type, e.g., when intelligent work card obtains the solicited message of " request obtains job number and name " that is sent by access-control card reader, it is determined that please The content type corresponding to content is asked to be:Job number, name, whether then judge in the concerning security matters list of types that user is set comprising acquisition Content type, due to concerning security matters list of types " password;Job number and name are not included in the amount of money ", now, intelligent work card is determined Concerning security matters, the solicited message sent by access-control card reader are not the solicited message of not concerning security matters to the content that access-control card reader request obtains.
When intelligent work card obtains the solicited message of " request obtains card number and password " that is sent by bank POS machine, then really Determining request content corresponding content type is:Card number, password, then judge whether to include in the concerning security matters list of types that user is set and obtain The content type obtained, due to concerning security matters list of types " password;" password " of request content type is included in the amount of money ", now, intelligence Work card determines the content concerning security matters that bank POS machine request obtains, and the solicited message sent by bank POS machine is believed for the request of concerning security matters Breath.
After above-mentioned steps have been performed, information processing method of the embodiment of the present application in performs step S102, i.e.,: When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with it is described First operational order corresponding to first solicited message, wherein, first solicited message is obtained comprising non-particularly for request The solicited message of classified information.
In the embodiment of the present application one, step S102 embodiment is:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request User profile corresponding to information sends instruction.
In specific implementation process, above-mentioned example is continued to use, user can set a solicited message corresponding with operational order Relation list, such as " concerning security matters solicited message corresponding user information does not send instruction;Concerning security matters solicited message corresponds to fingerprint authentication instruction ", At this moment, when it is the not solicited message of concerning security matters that intelligent work card, which is determined by the solicited message that access-control card reader is sent, set according to user The solicited message put and the corresponding relation list of operational order, determine that operational order corresponding with the solicited message of not concerning security matters is User profile sends instruction.
Correspondingly, Fig. 2 is refer to, after completion step S102 is performed, described information processing method also includes:
S104:Perform the user profile and send instruction, obtain type I information corresponding with first solicited message; And
S105:The type I information is sent to second electronic equipment.
In specific implementation process, above-mentioned example is continued to use, when intelligent work card determines to believe with the request that access-control card reader is sent Operational order corresponding to breath is the solicited message that intelligent work card is just sent according to access-control card reader after user profile sends instruction, Corresponding content is obtained, is sent to access-control card reader, e.g., the solicited message of access-control card reader is " request obtains job number and surname Name ", the job number that intelligent work card obtains user from itself memory cell is:25, name is:Zhang San, then by " job number:25;Surname Name:Zhang San " is sent to access-control card reader.
In the embodiment of the present application one, step S103 embodiment is:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request Fingerprint authentication corresponding to information instructs.
In specific implementation process, obtained " request obtains card number and password " that is sent by bank POS machine with intelligent work card Solicited message exemplified by, user can set the corresponding relation list of a solicited message and operational order, such as " concerning security matters request letter Cease corresponding user information and send instruction;Concerning security matters solicited message corresponds to fingerprint authentication instruction ", at this moment, when intelligent work card is determined by silver When the solicited message that row POS is sent is the solicited message of concerning security matters, the solicited message and pair of operational order that are set according to user Relation list is answered, determines that operational order corresponding with the solicited message of concerning security matters instructs for fingerprint authentication.
Correspondingly, Fig. 3 is refer to, after completion step S103 is performed, described information processing method also includes:
S106:Instructed by performing the fingerprint authentication, obtain the first user for currently gripping first electronic equipment The first user fingerprints;And
S107:Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result;
S108:In second judged result when being, to obtain the second category information corresponding with second solicited message, And second category information is sent to second electronic equipment;
S109:When second judged result is no, generates and simultaneously carried to the first mistake of second electronic equipment transmission Show information, so that second electronic equipment can export the first miscue information.
In specific implementation process, above-mentioned example is continued to use, when intelligent work card determines the solicited message with bank POS machine transmission Corresponding operational order is that the user that intelligent work card obtains the user of currently used intelligent work card first refers to after fingerprint authentication instructs Line, can make the whole surface of intelligent work card can obtain fingerprint, when it is determined that current operation is obtains user fingerprints, intelligence The fingerprint that the CPU of work card just activates intelligent work card surface obtains function, and now, intelligent work card just obtains the user of active user The fingerprint of employee corresponding with intelligent work card is just input to intelligent work card by fingerprint, intelligent work card before sending to employee In memory cell, then intelligent work card compares the fingerprint of acquisition with the user fingerprints that itself memory cell is stored up, and judges Whether fingerprint is consistent, and when judged result when being, then to show that active user is to block master, now, intelligent work card is just deposited from itself Content " card number corresponding with the solicited message that POS is sent is obtained in storage unit:201501020304;Password:888888 " hairs Deliver to bank POS machine.
When judged result is no, then it is not card master to show active user, and now, intelligent work card can generate a mistake letter Breath, such as " error ", and send to bank POS machine, " drop after bank POS machine receives transmission " error " information, will be sent The information of drop " is to prompt the card master that active user is not intelligent work card.
In the embodiment of the present application, second solicited message can also correspond to speech verification instruction.
In specific implementation process, obtained " request obtains card number and password " that is sent by bank POS machine with intelligent work card Solicited message exemplified by, user can set the corresponding relation list of a solicited message and operational order, such as " concerning security matters request letter Cease corresponding user information and send instruction;Concerning security matters solicited message corresponds to speech verification instruction ", at this moment, when intelligent work card is determined by silver When the solicited message that row POS is sent is the solicited message of concerning security matters, the solicited message and pair of operational order that are set according to user Relation list is answered, determines that operational order corresponding with the solicited message of concerning security matters instructs for speech verification.
Correspondingly, when intelligent work card determines that operational order corresponding with the solicited message of bank POS machine transmission is tested for voice After card instruction, intelligent work card sends voice and obtains instruction first, such as " please say name ", after user answers, will pass through voice Collecting unit obtains the user speech of the user of currently used intelligent work card, and intelligent work card, just will be with before sending to employee The phonetic entry of employee corresponding to intelligent work card into the memory cell of intelligent work card, then intelligent work card by the voice of acquisition with The pre-set user voice of itself memory cell storage compares, and extracts the characteristic vector of user speech, judges what is extracted Whether speech characteristic vector is consistent with the default speech characteristic vector in memory cell, when judged result is to be, then shows to work as Preceding user is to block master, and now, intelligent work card just obtains corresponding with the solicited message that POS is sent from itself memory cell Content " card number:201501020304;Password:888888 " send to bank POS machine.
When judged result is no, then it is not card master to show active user, and now, intelligent work card can generate a mistake letter Breath, such as " error ", and send to bank POS machine, " drop after bank POS machine receives transmission " error " information, will be sent The information of drop " is to prompt the card master that active user is not intelligent work card.
In the embodiment of the present application, second solicited message can also correspond to recognition of face instruction.
In specific implementation process, obtained " request obtains card number and password " that is sent by bank POS machine with intelligent work card Solicited message exemplified by, user can set the corresponding relation list of a solicited message and operational order, such as " concerning security matters request letter Cease corresponding user information and send instruction;Concerning security matters solicited message corresponds to recognition of face instruction ", at this moment, when intelligent work card is determined by silver When the solicited message that row POS is sent is the solicited message of concerning security matters, the solicited message and pair of operational order that are set according to user Relation list is answered, determines that operational order corresponding with the solicited message of concerning security matters instructs for face.
Correspondingly, when intelligent work card determines that operational order corresponding with the solicited message of bank POS machine transmission is that face is known Not Zhi Ling after, intelligent work card obtains user's head portrait of the user of currently used intelligent work card, intelligence by image acquisition units first Energy work card can send the phonetic order of an IMAQ, such as " please be directed at camera ", so as to obtain currently used intelligent work card User's head portrait, intelligent work card sent to before employee, and the head portrait of employee corresponding with intelligent work card just is input into intelligence In the memory cell of work card, then intelligent work card by active user's head portrait of acquisition and itself memory cell storage default use Account picture compares, and extracts the characteristic point of head portrait, judge obtain user's head portrait characteristic point whether with it is pre- in memory cell If the characteristic point of user's head portrait is consistent, when judged result when being, then to show that active user is to block to lead, now, intelligent work card Just content " card number corresponding with the solicited message that POS is sent is obtained from itself memory cell:201501020304;Password: 888888 " send to bank POS machine.
When judged result is no, then it is not card master to show active user, and now, intelligent work card can generate a mistake letter Breath, such as " error ", and send to bank POS machine, " drop after bank POS machine receives transmission " error " information, will be sent The information of drop " is to prompt the card master that active user is not intelligent work card.
In specific implementation process, those of ordinary skill in the art can set a variety of requests according to actual needs The corresponding relation of information and operational order, is not restricted in the embodiment of the present application.
Embodiment two
, please based on a kind of electronic equipment is provided with the identical inventive concept of the embodiment of the present application one, the embodiment of the present application two With reference to figure 4, including:
Housing 10;
Receiving module 20, it is arranged in housing 10, for obtaining the solicited message sent by the second electronic equipment;
Processor 30, it is arranged in 10 housings, for when the solicited message is the first solicited message, being believed based on request Breath and the corresponding relation of operational order, determine the first operational order corresponding with first solicited message, wherein, described the One solicited message obtains the solicited message for including non-classified information particularly for request;It is and described the in the solicited message During different the second solicited message of one solicited message, based on the corresponding relation, determine corresponding with second solicited message Second operational orders different from first operational order, wherein, second solicited message obtains particularly for request The solicited message of classified information must be included.
In the embodiment of the present application two, processor 30 is additionally operable to:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
In the embodiment of the present application two, processor 30 is specifically used for:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request User profile corresponding to information sends instruction;
Correspondingly, processor 30 is additionally operable to:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
In the embodiment of the present application two, processor 30 is specifically used for:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request Fingerprint authentication corresponding to information instructs;
Correspondingly, processor 30 is additionally operable to:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
In the embodiment of the present application two, processor 30 is specifically used for:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will Second category information is sent to second electronic equipment.
In the embodiment of the present application two, processor 30 is specifically used for:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment Breath, so that second electronic equipment can export the first miscue information.
Embodiment three
, please based on a kind of electronic equipment is provided with the identical inventive concept of the embodiment of the present application one, the embodiment of the present application three Reference picture 5, including:
First acquisition unit 101, for obtaining the solicited message sent by the second electronic equipment;
First determining unit 102, for when the solicited message is the first solicited message, based on solicited message and operating The corresponding relation of instruction, the first operational order corresponding with first solicited message is determined, wherein, the first request letter Cease the solicited message for being obtained particularly for request and including non-classified information;
Second determining unit 103, for being second request different from first solicited message in the solicited message During information, based on the corresponding relation, determine from second solicited message corresponding to it is different with first operational order The second operational order, wherein, second solicited message obtains particularly for request and includes the solicited message of classified information.
Optionally, in the embodiment of the present application three, the electronic equipment also includes:
Second acquisition unit 104, for obtaining a default concerning security matters list of types and being asked with the first of the solicited message First content type corresponding to content;
First judging unit 105, for judging whether include the first content class in the default concerning security matters list of types Type, obtain the first judged result;
3rd determining unit 106, during for being in first judged result, determine the solicited message for described the Two solicited messages;
4th determining unit 107, for first judged result for it is no when, determine the solicited message for described the One solicited message.
Optionally, in the embodiment of the present application three, the first determining unit 102 specifically includes:
First determining module, for when the solicited message is the first solicited message, based on the corresponding relation, it is determined that Go out user profile corresponding with first solicited message and send instruction;
Correspondingly, figure is refer to, in the embodiment of the present application three, the electronic equipment also includes:
First execution unit 108, instruction is sent for performing the user profile, is obtained and first solicited message pair The type I information answered;And
First transmitting element 109, for the type I information to be sent to second electronic equipment.
Optionally, in the embodiment of the present application three, the second determining unit 103 specifically includes:
Second determining module, for when the solicited message is the second solicited message, based on the corresponding relation, it is determined that Go out fingerprint authentication instruction corresponding with second solicited message;
Correspondingly, figure is refer to, in the embodiment of the present application three, the electronic equipment also includes:
Second execution unit 110, for being instructed by performing the fingerprint authentication, acquisition currently grips first electronics The first user fingerprints of first user of equipment;And
Second judging unit 111, for judging whether the first user fingerprints are pre-set user fingerprint, obtain second and judge knot Fruit.
Optionally, in the application implements three, the electronic equipment also includes:
Second transmitting element 112, for when second judged result is to be, obtaining and second solicited message pair The second category information answered, and second category information is sent to second electronic equipment.
Optionally, in the application implements three, the electronic equipment also includes:
First generation unit 113, for second judged result for it is no when, generate and to second electronic equipment The first miscue information is sent, so that second electronic equipment can export the first miscue information.
Pass through one or more of the embodiment of the present application technical scheme, it is possible to achieve following one or more technology effects Fruit:
First, due to the technical scheme in the embodiment of the present application, the solicited message sent using acquisition by the second electronic equipment, When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with it is described First operational order corresponding to first solicited message, wherein, first solicited message is obtained comprising non-particularly for request The solicited message of classified information;When the solicited message is second solicited message different from first solicited message, base In the corresponding relation, determine from second solicited message corresponding to second operation different with first operational order Instruction, wherein, second solicited message obtains the technological means of the solicited message comprising classified information particularly for request, So, electronic equipment can determine level of security corresponding with solicited message based on the difference of the solicited message received, and Perform it is corresponding with level of security operation, when solicited message need obtain comprising classified information content when, determine described in ask It is high safety rank to seek information, then electronic equipment just performs instruction corresponding with high safety rank, identity is such as verified, when identity is tested Card retransmits content corresponding to solicited message after passing through, so, efficiently solve safety existing for contactless card of the prior art The single technical problem of rank, realize the technique effect that can meet more level of security demands.
2nd, due to the technical scheme in the embodiment of the present application, use when the solicited message is the second solicited message, base In the corresponding relation, fingerprint authentication instruction corresponding with second solicited message is determined, by performing the fingerprint inspection Card instruction, obtains the first user fingerprints for the first user for currently gripping first electronic equipment, judges the first user fingerprints Whether it is pre-set user fingerprint, obtains the second judged result, in second judged result for when being, acquisition please with described second The second category information corresponding to information is sought, and second category information is sent to the technological means of second electronic equipment, this Sample, as long as electronic equipment needs to send classified information, electronic equipment will obtain the user fingerprints of active user, only work as When the fingerprint of preceding user is identical with pre-set user fingerprint, electronic equipment just can send corresponding content to the second electronic equipment, this Sample, by way of fingerprint authentication, realize the technique effect for the security for further increasing electronic equipment.
3rd, due to the technical scheme in the embodiment of the present application, asked using the default concerning security matters list of types of acquisition one and with described First content type corresponding to the first request content of information is sought, whether is judged in the default concerning security matters list of types comprising described First content type, the first judged result is obtained, in first judged result for when being, it is described to determine the solicited message Second solicited message, when first judged result is no, determine the skill that the solicited message is first solicited message Art means, so, user can be needed according to the use of oneself to setting concerning security matters list of types, to be user-friendly, realize Improve the technique effect of Consumer's Experience.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Specifically, computer program instructions can be stored in corresponding to the information processing method in the embodiment of the present application In the storage mediums such as CD, hard disk, USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium When one electronic equipment reads or is performed, comprise the following steps:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, it is determined that Go out the first operational order corresponding with first solicited message, wherein, first solicited message obtains particularly for request The solicited message of non-classified information must be included;
When the solicited message is second solicited message different from first solicited message, based on the corresponding pass System, determine from second solicited message corresponding to second operational order different with first operational order, wherein, institute State the second solicited message and the solicited message for including classified information is obtained particularly for request.
Optionally, stored in the storage medium and step:In the request for obtaining and being sent by the second electronic equipment After information, corresponding computer program instructions when executed, in addition to:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
Optionally, stored in the storage medium and step:When the solicited message is the first solicited message, it is based on The corresponding relation of solicited message and operational order, the first operational order corresponding with first solicited message is determined, it is corresponding Computer program instructions when executed, specifically include:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request User profile corresponding to information sends instruction;
Correspondingly, stored in the storage medium and step:It is described determine it is corresponding with first solicited message User profile send instruction after, when executed, methods described also includes corresponding computer program instructions:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Optionally, stored in the storage medium and step:It is and first solicited message in the solicited message During different second solicited message, based on the corresponding relation, determine corresponding with second solicited message with described The second different operational order of one operational order, corresponding computer program instructions when executed, specifically include:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request Fingerprint authentication corresponding to information instructs;
Correspondingly, stored in the storage medium and step:It is described determine it is corresponding with second solicited message Fingerprint authentication instruction after, when executed, methods described also includes corresponding computer program instructions:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
Optionally, stored in the storage medium and step:Judge whether the first user fingerprints are default use described Family fingerprint, after obtaining the second judged result, when executed, methods described also includes corresponding computer program instructions:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will Second category information is sent to second electronic equipment.
Optionally, stored in the storage medium and step:Judge whether the first user fingerprints are default use described Family fingerprint, after obtaining the second judged result, when executed, methods described also includes corresponding computer program instructions:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment Breath, so that second electronic equipment can export the first miscue information.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (7)

1. a kind of information processing method, applied to the first electronic equipment, including:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with First operational order corresponding to first solicited message, wherein, first solicited message is wrapped particularly for request Solicited message containing non-classified information;
When the solicited message is second solicited message different from first solicited message, based on the corresponding relation, Determine from second solicited message corresponding to second operational order different with first operational order, wherein, it is described Second solicited message obtains the solicited message for including classified information particularly for request, specifically includes:In the solicited message For the second solicited message when, based on the corresponding relation, determine fingerprint authentication instruction corresponding with second solicited message;
Correspondingly, it is described determine the instruction of corresponding with second solicited message fingerprint authentication after, methods described is also wrapped Include:
Instructed by performing the fingerprint authentication, obtain the first user for the first user for currently gripping first electronic equipment Fingerprint;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result,
In second judged result when being, to obtain the second category information corresponding with second solicited message, and by described in Second category information is sent to second electronic equipment,
When second judged result is no, generates and simultaneously send the first miscue information to second electronic equipment, with Second electronic equipment is set to export the first miscue information.
2. the method as described in claim 1, it is characterised in that in the solicited message for obtaining and being sent by the second electronic equipment Afterwards, methods described also includes:
Obtain a default concerning security matters list of types and first content type corresponding with the first request content of the solicited message;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
3. method as claimed in claim 1 or 2, it is characterised in that it is described when the solicited message is the first solicited message, Corresponding relation based on solicited message and operational order, the first operational order corresponding with first solicited message is determined, Specifically include:
When the solicited message is the first solicited message, based on the corresponding relation, determine and first solicited message Corresponding user profile sends instruction;
Correspondingly, it is described determine that corresponding with first solicited message user profile sends instruction after, methods described Also include:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
4. a kind of electronic equipment, including:
First acquisition unit, for obtaining the solicited message sent by the second electronic equipment;
First determining unit, for when the solicited message is the first solicited message, based on solicited message and operational order Corresponding relation, the first operational order corresponding with first solicited message is determined, wherein, first solicited message is specific For for asking to obtain the solicited message for including non-classified information;
Second determining unit, for when the solicited message is second solicited message different from first solicited message, Based on the corresponding relation, determine from second solicited message corresponding to second behaviour different with first operational order Instruct, wherein, second solicited message obtains the solicited message for including classified information particularly for request,
Second determining unit includes:
Second determining module, for when the solicited message is the second solicited message, based on the corresponding relation, determine with Fingerprint authentication corresponding to second solicited message instructs;
The electronic equipment also includes:
Second execution unit, for being instructed by performing the fingerprint authentication, acquisition currently grips the first of the electronic equipment The first user fingerprints of user;And
Second judging unit, for judging whether the first user fingerprints are pre-set user fingerprint, the second judged result is obtained,
Second transmitting element, during for being in second judged result, obtain corresponding with second solicited message the Two category informations, and second category information is sent to second electronic equipment,
First generation unit, for second judged result for it is no when, generate and send the to second electronic equipment One miscue information, so that second electronic equipment can export the first miscue information.
5. a kind of electronic equipment, including:
Housing;
Receiving module, it is arranged in the housing, for obtaining the solicited message sent by the second electronic equipment;
Processor, be arranged in the housing, for when the solicited message is the first solicited message, based on solicited message with The corresponding relation of operational order, the first operational order corresponding with first solicited message is determined, wherein, described first please Information is asked to obtain the solicited message for including non-classified information particularly for request;Being in the solicited message please with described first When seeking different the second solicited message of information, based on the corresponding relation, determine it is corresponding with second solicited message with The second different operational order of first operational order, wherein, second solicited message is wrapped particularly for request Solicited message containing classified information,
The processor is specifically used for:
When the solicited message is the second solicited message, based on the corresponding relation, determine and second solicited message Corresponding fingerprint authentication instruction;
Correspondingly, the processor is additionally operable to:
Instructed by performing the fingerprint authentication, the first user for obtaining the first user for currently gripping the electronic equipment refers to Line;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result,
In second judged result when being, to obtain the second category information corresponding with second solicited message, and by described in Second category information is sent to second electronic equipment,
When second judged result is no, generates and simultaneously send the first miscue information to second electronic equipment, with Second electronic equipment is set to export the first miscue information.
6. electronic equipment as claimed in claim 5, it is characterised in that the processor is additionally operable to:
Obtain a default concerning security matters list of types and first content type corresponding with the first request content of the solicited message;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
7. the electronic equipment as described in claim 5 or 6, it is characterised in that the processor is specifically used for:
When the solicited message is the first solicited message, based on the corresponding relation, determine and first solicited message Corresponding user profile sends instruction;
Correspondingly, the processor is additionally operable to:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
CN201510284602.9A 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment Active CN104915617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510284602.9A CN104915617B (en) 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510284602.9A CN104915617B (en) 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN104915617A CN104915617A (en) 2015-09-16
CN104915617B true CN104915617B (en) 2018-02-27

Family

ID=54084675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510284602.9A Active CN104915617B (en) 2015-05-28 2015-05-28 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN104915617B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002117458A (en) * 2000-10-04 2002-04-19 I Convenience:Kk Information processing system using bar-code screen
CN101165701A (en) * 2006-10-17 2008-04-23 国际商业机器公司 Methods and systems for providing radio frequency identification (RFID) security mutual authentication
CN101493899A (en) * 2009-03-06 2009-07-29 广东纺织职业技术学院 Campus card identification method based on RFID technology
CN104346550A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN104462922A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 Method for verifying authorization on basis of biological recognition

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8621557B2 (en) * 2009-02-17 2013-12-31 Nec Corporation Information processing system judging whether manipulation is possible or not based on access control policy and method of operation thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002117458A (en) * 2000-10-04 2002-04-19 I Convenience:Kk Information processing system using bar-code screen
CN101165701A (en) * 2006-10-17 2008-04-23 国际商业机器公司 Methods and systems for providing radio frequency identification (RFID) security mutual authentication
CN101493899A (en) * 2009-03-06 2009-07-29 广东纺织职业技术学院 Campus card identification method based on RFID technology
CN104346550A (en) * 2013-08-08 2015-02-11 联想(北京)有限公司 Information processing method and electronic equipment
CN104462922A (en) * 2014-12-11 2015-03-25 苏州海博智能系统有限公司 Method for verifying authorization on basis of biological recognition

Also Published As

Publication number Publication date
CN104915617A (en) 2015-09-16

Similar Documents

Publication Publication Date Title
EP3129935A1 (en) Systems and methods for transacting at an atm using a mobile device
CN107038579A (en) A kind of e-payment business processing, electric paying method and device
CN111553312A (en) Business handling method and device
CN106941503A (en) Bank data collection and authentication method and system based on smart mobile phone
EP3642776A1 (en) Facial biometrics card emulation for in-store payment authorization
CN107688940A (en) Bio-identification transaction processing method and system
CN106651372A (en) Data processing method and system
KR20230137326A (en) System and method for short-distance non-contact card communication and encryption authentication
WO2016141356A1 (en) Systems and methods for performing card authentication reads
CN104281831B (en) A kind of method and apparatus of person's handwriting checking
CN106651566A (en) Card-free withdrawal method and apparatus
CN112950219A (en) Payment processing method and system
US20170262854A1 (en) Systems and methods for processing metadata statements in payment flows
CN111882425B (en) Service data processing method, device and server
CN109313782A (en) Pre-approval financial transaction provides system and method
CN110457876A (en) Identity identifying method, apparatus and system
CN107622396B (en) Self-service transaction method, system and terminal equipment
CN106886891A (en) A kind of near field payment method, relevant device and system
CN104915617B (en) A kind of information processing method and electronic equipment
US10332082B2 (en) Method and system for issuing a payment medium
WO2017196255A1 (en) Method and system for identifying a payment card design
CN111681010A (en) Transaction verification method and device
Huizinga et al. Using NFC enabled Android devices to attack RFID systems
EP2830014A1 (en) Secure channel payment processing system and method
CN115906028A (en) User identity verification method and device and self-service terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant