CN104915617B - A kind of information processing method and electronic equipment - Google Patents
A kind of information processing method and electronic equipment Download PDFInfo
- Publication number
- CN104915617B CN104915617B CN201510284602.9A CN201510284602A CN104915617B CN 104915617 B CN104915617 B CN 104915617B CN 201510284602 A CN201510284602 A CN 201510284602A CN 104915617 B CN104915617 B CN 104915617B
- Authority
- CN
- China
- Prior art keywords
- solicited message
- electronic equipment
- information
- user
- operational order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of information processing method and electronic equipment, methods described includes:Obtain the solicited message sent by the second electronic equipment;When the solicited message is the first solicited message, corresponding relation based on solicited message and operational order, the first operational order corresponding with first solicited message is determined, wherein, first solicited message obtains the solicited message for including non-classified information particularly for request;When the solicited message is second solicited message different from first solicited message, based on the corresponding relation, determine from second solicited message corresponding to second operational order different with first operational order, wherein, second solicited message obtains the solicited message for including classified information particularly for request.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method and electronic equipment.
Background technology
With the continuous development of scientific technology, electronic equipment has also obtained development at full speed, makes the life of people increasingly
Intellectuality, user can use access card to carry out authentication, directly can be paid the bill when buying commodity using bank card etc..
In the prior art, card reader can send out electromagnetic wave with fixed frequency, when the card of user is with being operated
When card reader carries out authentication operation or transactional operation, as long as after the card of user enters the radiation scope of electromagnetic wave, user's
The information being stored in card is just transmitted directly to card reader by card.
It is as follows to have found that prior art is present during technical scheme in realizing the embodiment of the present application by present inventor
Technical problem:
Due in the prior art when card reader need read contactless card in information when, as long as contactless card is received by Card Reader
The solicited message for the reading information that device is sent, the information of contactless card memory storage will be sent to card reader, so, due to sensing
Card only exists a kind of level of security, and when the packet of contactless card memory storage contains classified information, contactless card can also believe concerning security matters
Breath is sent to card reader, so, the single technical problem of level of security be present in contactless card of the prior art.
The content of the invention
The embodiment of the present application provides a kind of information processing method and electronic equipment, for solving contactless card of the prior art
The single technical problem of level of security be present, realize the technique effect that can meet more level of security demands.
On the one hand the embodiment of the present application provides a kind of information processing method, applied to the first electronic equipment, including:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, it is determined that
Go out the first operational order corresponding with first solicited message, wherein, first solicited message obtains particularly for request
The solicited message of non-classified information must be included;
When the solicited message is second solicited message different from first solicited message, based on the corresponding pass
System, determine from second solicited message corresponding to second operational order different with first operational order, wherein, institute
State the second solicited message and the solicited message for including classified information is obtained particularly for request.
Optionally, after the solicited message for obtaining and being sent by the second electronic equipment, methods described also includes:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message
Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
Optionally, it is described when the solicited message is the first solicited message, pair based on solicited message and operational order
It should be related to, determine the first operational order corresponding with first solicited message, specifically include:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request
User profile corresponding to information sends instruction;
Correspondingly, it is described determine that corresponding with first solicited message user profile sends instruction after, it is described
Method also includes:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Optionally, it is described when the solicited message is second solicited message different from first solicited message, base
In the corresponding relation, determine from second solicited message corresponding to second operation different with first operational order
Instruction, is specifically included:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request
Fingerprint authentication corresponding to information instructs;
Correspondingly, it is described determine the instruction of corresponding with second solicited message fingerprint authentication after, methods described
Also include:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment
User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
Optionally, judge whether the first user fingerprints are pre-set user fingerprint described, after obtaining the second judged result,
Methods described also includes:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will
Second category information is sent to second electronic equipment.
Optionally, judge whether the first user fingerprints are pre-set user fingerprint described, after obtaining the second judged result,
Methods described also includes:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment
Breath, so that second electronic equipment can export the first miscue information.
On the other hand the embodiment of the present application provides a kind of electronic equipment, including:
First acquisition unit, for obtaining the solicited message sent by the second electronic equipment;
First determining unit, for when the solicited message is the first solicited message, being referred to based on solicited message and operation
The corresponding relation of order, the first operational order corresponding with first solicited message is determined, wherein, first solicited message
The solicited message for including non-classified information is obtained particularly for request;
Second determining unit, for being second solicited message different from first solicited message in the solicited message
When, based on the corresponding relation, determine from second solicited message corresponding to different with first operational order
Two operational orders, wherein, second solicited message obtains the solicited message for including classified information particularly for request.
The embodiment of the present application also provides a kind of electronic equipment, including:
Housing;
Receiving module, it is arranged in the housing, for obtaining the solicited message sent by the second electronic equipment;
Processor, it is arranged in the housing, for when the solicited message is the first solicited message, being believed based on request
Breath and the corresponding relation of operational order, determine the first operational order corresponding with first solicited message, wherein, described the
One solicited message obtains the solicited message for including non-classified information particularly for request;It is and described the in the solicited message
During different the second solicited message of one solicited message, based on the corresponding relation, determine corresponding with second solicited message
Second operational orders different from first operational order, wherein, second solicited message obtains particularly for request
The solicited message of classified information must be included.
Optionally, the processor is additionally operable to:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message
Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
Optionally, the processor is specifically used for:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request
User profile corresponding to information sends instruction;
Correspondingly, the processor is additionally operable to:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Optionally, the processor is specifically used for:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request
Fingerprint authentication corresponding to information instructs;
Correspondingly, the processor is additionally operable to:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment
User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
Optionally, the processor is specifically used for:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will
Second category information is sent to second electronic equipment.
Optionally, the processor is specifically used for:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment
Breath, so that second electronic equipment can export the first miscue information.
Said one or multiple technical schemes in the embodiment of the present application, at least there is following one or more technology effects
Fruit:
First, due to the technical scheme in the embodiment of the present application, the solicited message sent using acquisition by the second electronic equipment,
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with it is described
First operational order corresponding to first solicited message, wherein, first solicited message is obtained comprising non-particularly for request
The solicited message of classified information;When the solicited message is second solicited message different from first solicited message, base
In the corresponding relation, determine from second solicited message corresponding to second operation different with first operational order
Instruction, wherein, second solicited message obtains the technological means of the solicited message comprising classified information particularly for request,
So, electronic equipment can determine level of security corresponding with solicited message based on the difference of the solicited message received, and
Perform it is corresponding with level of security operation, when solicited message need obtain comprising classified information content when, determine described in ask
It is high safety rank to seek information, then electronic equipment just performs instruction corresponding with high safety rank, identity is such as verified, when identity is tested
Card retransmits content corresponding to solicited message after passing through, so, efficiently solve safety existing for contactless card of the prior art
The single technical problem of rank, realize the technique effect that can meet more level of security demands.
2nd, due to the technical scheme in the embodiment of the present application, use when the solicited message is the second solicited message, base
In the corresponding relation, fingerprint authentication instruction corresponding with second solicited message is determined, by performing the fingerprint inspection
Card instruction, obtains the first user fingerprints for the first user for currently gripping first electronic equipment, judges the first user fingerprints
Whether it is pre-set user fingerprint, obtains the second judged result, in second judged result for when being, acquisition please with described second
The second category information corresponding to information is sought, and second category information is sent to the technological means of second electronic equipment, this
Sample, as long as electronic equipment needs to send classified information, electronic equipment will obtain the user fingerprints of active user, only work as
When the fingerprint of preceding user is identical with pre-set user fingerprint, electronic equipment just can send corresponding content to the second electronic equipment, this
Sample, by way of fingerprint authentication, realize the technique effect for the security for further increasing electronic equipment.
3rd, due to the technical scheme in the embodiment of the present application, asked using the default concerning security matters list of types of acquisition one and with described
First content type corresponding to the first request content of information is sought, whether is judged in the default concerning security matters list of types comprising described
First content type, the first judged result is obtained, in first judged result for when being, it is described to determine the solicited message
Second solicited message, when first judged result is no, determine the skill that the solicited message is first solicited message
Art means, so, user can be needed according to the use of oneself to setting concerning security matters list of types, to be user-friendly, realize
Improve the technique effect of Consumer's Experience.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, embodiment will be described below
In the required accompanying drawing used be briefly described, it should be apparent that, drawings in the following description be only the present invention some
Embodiment.
Fig. 1 is a kind of information processing method flow chart provided in the embodiment of the present application one;
Fig. 2 be the embodiment of the present application one in when the solicited message is specially the first solicited message described information processing side
The flow chart of method;
Fig. 3 be the embodiment of the present application one in when the solicited message is specially the second solicited message described information processing side
The flow chart of method;
Fig. 4 is the structured flowchart of a kind of electronic equipment provided in the embodiment of the present application two;
Fig. 5 is the structured flowchart of a kind of electronic equipment provided in the embodiment of the present application three.
Embodiment
The embodiment of the present application provides a kind of information processing method and electronic equipment, for solving contactless card of the prior art
The low technical problem of security be present, realize the technique effect for the security for improving contactless card.
Technical scheme in the embodiment of the present application is in order to solve the above technical problems, general thought is as follows:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, it is determined that
Go out the first operational order corresponding with first solicited message, wherein, first solicited message obtains particularly for request
The solicited message of non-classified information must be included;
When the solicited message is second solicited message different from first solicited message, based on the corresponding pass
System, determine from second solicited message corresponding to second operational order different with first operational order, wherein, institute
State the second solicited message and the solicited message for including classified information is obtained particularly for request.
In the above-mentioned technical solutions, the solicited message sent using obtaining by the second electronic equipment, in the solicited message
For the first solicited message when, the corresponding relation based on solicited message and operational order, determine and first solicited message pair
The first operational order answered, wherein, first solicited message obtains the request for including non-classified information particularly for request
Information;When the solicited message is second solicited message different from first solicited message, based on the corresponding relation,
Determine from second solicited message corresponding to second operational order different with first operational order, wherein, it is described
Second solicited message obtains the technological means of the solicited message comprising classified information, so, electronic equipment particularly for request
Level of security corresponding with solicited message, and execution and safe level can be determined based on the difference of the solicited message received
Not corresponding operation, when solicited message needs to obtain the content comprising classified information, it is Gao An to determine the solicited message
Full rank, then electronic equipment just perform it is corresponding with high safety rank instruction, such as verify identity, when authentication by after send out again
Content corresponding to solicited message is sent, so, efficiently solve the single skill of level of security existing for contactless card of the prior art
Art problem, realize the technique effect that can meet more level of security demands.
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, technical scheme is clearly and completely described, it is clear that described embodiment is skill of the present invention
The part of the embodiment of art scheme, rather than whole embodiments.It is general based on the embodiment described in present specification, this area
The every other embodiment that logical technical staff is obtained under the premise of creative work is not made, belongs to the technology of the present invention side
The scope of case protection.
Embodiment one
Fig. 1 is refer to, a kind of information processing method provided for the embodiment of the present application one, applied to the first electronic equipment,
Methods described includes:
S101:Obtain the solicited message sent by the second electronic equipment;
S102:When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order,
Determine the first operational order corresponding with first solicited message, wherein, first solicited message particularly for please
Seek the solicited message for obtaining and including non-classified information;
S103:When the solicited message is second solicited message different from first solicited message, based on described
Corresponding relation, determine from second solicited message corresponding to second operational order different with first operational order,
Wherein, second solicited message obtains the solicited message for including classified information particularly for request.
In specific implementation process, first electronic equipment is specifically as follows with processor and can receive and send
The electronic equipment of function, such as intelligent SIM card, intelligent finance IC-card Contact Type Ic Card, can be used for Intelligent bus card, intelligence
The non-contact IC cards such as the intelligent work card that access card, intra-company use, one schematically illustrated here, just differing.Second electronics
Equipment can be specifically with the electronic equipment received with sending function, such as card reader, POS (point of sale information control system)
Deng in the embodiment of the present application, by the intelligent work card used using first electronic equipment as intra-company, second electronics
Equipment be card reader exemplified by, be described in detail come the specific implementation process to the method in the embodiment of the present application.
When the method in using the embodiment of the present application carries out information processing, step S101 is first carried out, i.e.,:Obtain by the
The solicited message that two electronic equipments are sent.
In specific implementation process, the intelligent work card that is used using first electronic equipment as intra-company, described second
Electronic equipment is exemplified by card reader, when user needs to use intelligent work card to enter company, company's access-control card reader will send
One solicited message, e.g., the solicited message of " request obtains job number and name ";When user carries out bank's friendship using intelligent work card
Easily, e.g., swiped the card when buying commodity on bank POS machine, now, bank POS machine can also send a solicited message, e.g., " request
The solicited message of acquisition card number and password ", at this moment, intelligent work card will receive " the request acquisition sent by access-control card reader
The solicited message of " request obtains card number and password " that the solicited message or bank POS machine of job number and name " are sent.Specific
In implementation process, intelligent work card can obtain different solicited message according to the service condition of user, and just differ one schematically illustrates herein.
Before step S102 is performed, the information processing method in the embodiment of the present application one also includes:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message
Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
In specific implementation process, above-mentioned example is continued to use, in order to make intelligent work card according to the use needs of user come real
Existing a variety of different operations, user can set a concerning security matters list of types to the intelligent work card of oneself, make the automatic root of intelligent work card
Current operation is determined according to concerning security matters list of types, e.g., it is " password that user, which sets concerning security matters list of types,;The amount of money ", when intelligent work card
After receiving the solicited message sent by card reader, content class corresponding to the content for wanting to obtain in solicited message will be obtained
Type, e.g., when intelligent work card obtains the solicited message of " request obtains job number and name " that is sent by access-control card reader, it is determined that please
The content type corresponding to content is asked to be:Job number, name, whether then judge in the concerning security matters list of types that user is set comprising acquisition
Content type, due to concerning security matters list of types " password;Job number and name are not included in the amount of money ", now, intelligent work card is determined
Concerning security matters, the solicited message sent by access-control card reader are not the solicited message of not concerning security matters to the content that access-control card reader request obtains.
When intelligent work card obtains the solicited message of " request obtains card number and password " that is sent by bank POS machine, then really
Determining request content corresponding content type is:Card number, password, then judge whether to include in the concerning security matters list of types that user is set and obtain
The content type obtained, due to concerning security matters list of types " password;" password " of request content type is included in the amount of money ", now, intelligence
Work card determines the content concerning security matters that bank POS machine request obtains, and the solicited message sent by bank POS machine is believed for the request of concerning security matters
Breath.
After above-mentioned steps have been performed, information processing method of the embodiment of the present application in performs step S102, i.e.,:
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with it is described
First operational order corresponding to first solicited message, wherein, first solicited message is obtained comprising non-particularly for request
The solicited message of classified information.
In the embodiment of the present application one, step S102 embodiment is:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request
User profile corresponding to information sends instruction.
In specific implementation process, above-mentioned example is continued to use, user can set a solicited message corresponding with operational order
Relation list, such as " concerning security matters solicited message corresponding user information does not send instruction;Concerning security matters solicited message corresponds to fingerprint authentication instruction ",
At this moment, when it is the not solicited message of concerning security matters that intelligent work card, which is determined by the solicited message that access-control card reader is sent, set according to user
The solicited message put and the corresponding relation list of operational order, determine that operational order corresponding with the solicited message of not concerning security matters is
User profile sends instruction.
Correspondingly, Fig. 2 is refer to, after completion step S102 is performed, described information processing method also includes:
S104:Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;
And
S105:The type I information is sent to second electronic equipment.
In specific implementation process, above-mentioned example is continued to use, when intelligent work card determines to believe with the request that access-control card reader is sent
Operational order corresponding to breath is the solicited message that intelligent work card is just sent according to access-control card reader after user profile sends instruction,
Corresponding content is obtained, is sent to access-control card reader, e.g., the solicited message of access-control card reader is " request obtains job number and surname
Name ", the job number that intelligent work card obtains user from itself memory cell is:25, name is:Zhang San, then by " job number:25;Surname
Name:Zhang San " is sent to access-control card reader.
In the embodiment of the present application one, step S103 embodiment is:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request
Fingerprint authentication corresponding to information instructs.
In specific implementation process, obtained " request obtains card number and password " that is sent by bank POS machine with intelligent work card
Solicited message exemplified by, user can set the corresponding relation list of a solicited message and operational order, such as " concerning security matters request letter
Cease corresponding user information and send instruction;Concerning security matters solicited message corresponds to fingerprint authentication instruction ", at this moment, when intelligent work card is determined by silver
When the solicited message that row POS is sent is the solicited message of concerning security matters, the solicited message and pair of operational order that are set according to user
Relation list is answered, determines that operational order corresponding with the solicited message of concerning security matters instructs for fingerprint authentication.
Correspondingly, Fig. 3 is refer to, after completion step S103 is performed, described information processing method also includes:
S106:Instructed by performing the fingerprint authentication, obtain the first user for currently gripping first electronic equipment
The first user fingerprints;And
S107:Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result;
S108:In second judged result when being, to obtain the second category information corresponding with second solicited message,
And second category information is sent to second electronic equipment;
S109:When second judged result is no, generates and simultaneously carried to the first mistake of second electronic equipment transmission
Show information, so that second electronic equipment can export the first miscue information.
In specific implementation process, above-mentioned example is continued to use, when intelligent work card determines the solicited message with bank POS machine transmission
Corresponding operational order is that the user that intelligent work card obtains the user of currently used intelligent work card first refers to after fingerprint authentication instructs
Line, can make the whole surface of intelligent work card can obtain fingerprint, when it is determined that current operation is obtains user fingerprints, intelligence
The fingerprint that the CPU of work card just activates intelligent work card surface obtains function, and now, intelligent work card just obtains the user of active user
The fingerprint of employee corresponding with intelligent work card is just input to intelligent work card by fingerprint, intelligent work card before sending to employee
In memory cell, then intelligent work card compares the fingerprint of acquisition with the user fingerprints that itself memory cell is stored up, and judges
Whether fingerprint is consistent, and when judged result when being, then to show that active user is to block master, now, intelligent work card is just deposited from itself
Content " card number corresponding with the solicited message that POS is sent is obtained in storage unit:201501020304;Password:888888 " hairs
Deliver to bank POS machine.
When judged result is no, then it is not card master to show active user, and now, intelligent work card can generate a mistake letter
Breath, such as " error ", and send to bank POS machine, " drop after bank POS machine receives transmission " error " information, will be sent
The information of drop " is to prompt the card master that active user is not intelligent work card.
In the embodiment of the present application, second solicited message can also correspond to speech verification instruction.
In specific implementation process, obtained " request obtains card number and password " that is sent by bank POS machine with intelligent work card
Solicited message exemplified by, user can set the corresponding relation list of a solicited message and operational order, such as " concerning security matters request letter
Cease corresponding user information and send instruction;Concerning security matters solicited message corresponds to speech verification instruction ", at this moment, when intelligent work card is determined by silver
When the solicited message that row POS is sent is the solicited message of concerning security matters, the solicited message and pair of operational order that are set according to user
Relation list is answered, determines that operational order corresponding with the solicited message of concerning security matters instructs for speech verification.
Correspondingly, when intelligent work card determines that operational order corresponding with the solicited message of bank POS machine transmission is tested for voice
After card instruction, intelligent work card sends voice and obtains instruction first, such as " please say name ", after user answers, will pass through voice
Collecting unit obtains the user speech of the user of currently used intelligent work card, and intelligent work card, just will be with before sending to employee
The phonetic entry of employee corresponding to intelligent work card into the memory cell of intelligent work card, then intelligent work card by the voice of acquisition with
The pre-set user voice of itself memory cell storage compares, and extracts the characteristic vector of user speech, judges what is extracted
Whether speech characteristic vector is consistent with the default speech characteristic vector in memory cell, when judged result is to be, then shows to work as
Preceding user is to block master, and now, intelligent work card just obtains corresponding with the solicited message that POS is sent from itself memory cell
Content " card number:201501020304;Password:888888 " send to bank POS machine.
When judged result is no, then it is not card master to show active user, and now, intelligent work card can generate a mistake letter
Breath, such as " error ", and send to bank POS machine, " drop after bank POS machine receives transmission " error " information, will be sent
The information of drop " is to prompt the card master that active user is not intelligent work card.
In the embodiment of the present application, second solicited message can also correspond to recognition of face instruction.
In specific implementation process, obtained " request obtains card number and password " that is sent by bank POS machine with intelligent work card
Solicited message exemplified by, user can set the corresponding relation list of a solicited message and operational order, such as " concerning security matters request letter
Cease corresponding user information and send instruction;Concerning security matters solicited message corresponds to recognition of face instruction ", at this moment, when intelligent work card is determined by silver
When the solicited message that row POS is sent is the solicited message of concerning security matters, the solicited message and pair of operational order that are set according to user
Relation list is answered, determines that operational order corresponding with the solicited message of concerning security matters instructs for face.
Correspondingly, when intelligent work card determines that operational order corresponding with the solicited message of bank POS machine transmission is that face is known
Not Zhi Ling after, intelligent work card obtains user's head portrait of the user of currently used intelligent work card, intelligence by image acquisition units first
Energy work card can send the phonetic order of an IMAQ, such as " please be directed at camera ", so as to obtain currently used intelligent work card
User's head portrait, intelligent work card sent to before employee, and the head portrait of employee corresponding with intelligent work card just is input into intelligence
In the memory cell of work card, then intelligent work card by active user's head portrait of acquisition and itself memory cell storage default use
Account picture compares, and extracts the characteristic point of head portrait, judge obtain user's head portrait characteristic point whether with it is pre- in memory cell
If the characteristic point of user's head portrait is consistent, when judged result when being, then to show that active user is to block to lead, now, intelligent work card
Just content " card number corresponding with the solicited message that POS is sent is obtained from itself memory cell:201501020304;Password:
888888 " send to bank POS machine.
When judged result is no, then it is not card master to show active user, and now, intelligent work card can generate a mistake letter
Breath, such as " error ", and send to bank POS machine, " drop after bank POS machine receives transmission " error " information, will be sent
The information of drop " is to prompt the card master that active user is not intelligent work card.
In specific implementation process, those of ordinary skill in the art can set a variety of requests according to actual needs
The corresponding relation of information and operational order, is not restricted in the embodiment of the present application.
Embodiment two
, please based on a kind of electronic equipment is provided with the identical inventive concept of the embodiment of the present application one, the embodiment of the present application two
With reference to figure 4, including:
Housing 10;
Receiving module 20, it is arranged in housing 10, for obtaining the solicited message sent by the second electronic equipment;
Processor 30, it is arranged in 10 housings, for when the solicited message is the first solicited message, being believed based on request
Breath and the corresponding relation of operational order, determine the first operational order corresponding with first solicited message, wherein, described the
One solicited message obtains the solicited message for including non-classified information particularly for request;It is and described the in the solicited message
During different the second solicited message of one solicited message, based on the corresponding relation, determine corresponding with second solicited message
Second operational orders different from first operational order, wherein, second solicited message obtains particularly for request
The solicited message of classified information must be included.
In the embodiment of the present application two, processor 30 is additionally operable to:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message
Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
In the embodiment of the present application two, processor 30 is specifically used for:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request
User profile corresponding to information sends instruction;
Correspondingly, processor 30 is additionally operable to:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
In the embodiment of the present application two, processor 30 is specifically used for:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request
Fingerprint authentication corresponding to information instructs;
Correspondingly, processor 30 is additionally operable to:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment
User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
In the embodiment of the present application two, processor 30 is specifically used for:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will
Second category information is sent to second electronic equipment.
In the embodiment of the present application two, processor 30 is specifically used for:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment
Breath, so that second electronic equipment can export the first miscue information.
Embodiment three
, please based on a kind of electronic equipment is provided with the identical inventive concept of the embodiment of the present application one, the embodiment of the present application three
Reference picture 5, including:
First acquisition unit 101, for obtaining the solicited message sent by the second electronic equipment;
First determining unit 102, for when the solicited message is the first solicited message, based on solicited message and operating
The corresponding relation of instruction, the first operational order corresponding with first solicited message is determined, wherein, the first request letter
Cease the solicited message for being obtained particularly for request and including non-classified information;
Second determining unit 103, for being second request different from first solicited message in the solicited message
During information, based on the corresponding relation, determine from second solicited message corresponding to it is different with first operational order
The second operational order, wherein, second solicited message obtains particularly for request and includes the solicited message of classified information.
Optionally, in the embodiment of the present application three, the electronic equipment also includes:
Second acquisition unit 104, for obtaining a default concerning security matters list of types and being asked with the first of the solicited message
First content type corresponding to content;
First judging unit 105, for judging whether include the first content class in the default concerning security matters list of types
Type, obtain the first judged result;
3rd determining unit 106, during for being in first judged result, determine the solicited message for described the
Two solicited messages;
4th determining unit 107, for first judged result for it is no when, determine the solicited message for described the
One solicited message.
Optionally, in the embodiment of the present application three, the first determining unit 102 specifically includes:
First determining module, for when the solicited message is the first solicited message, based on the corresponding relation, it is determined that
Go out user profile corresponding with first solicited message and send instruction;
Correspondingly, figure is refer to, in the embodiment of the present application three, the electronic equipment also includes:
First execution unit 108, instruction is sent for performing the user profile, is obtained and first solicited message pair
The type I information answered;And
First transmitting element 109, for the type I information to be sent to second electronic equipment.
Optionally, in the embodiment of the present application three, the second determining unit 103 specifically includes:
Second determining module, for when the solicited message is the second solicited message, based on the corresponding relation, it is determined that
Go out fingerprint authentication instruction corresponding with second solicited message;
Correspondingly, figure is refer to, in the embodiment of the present application three, the electronic equipment also includes:
Second execution unit 110, for being instructed by performing the fingerprint authentication, acquisition currently grips first electronics
The first user fingerprints of first user of equipment;And
Second judging unit 111, for judging whether the first user fingerprints are pre-set user fingerprint, obtain second and judge knot
Fruit.
Optionally, in the application implements three, the electronic equipment also includes:
Second transmitting element 112, for when second judged result is to be, obtaining and second solicited message pair
The second category information answered, and second category information is sent to second electronic equipment.
Optionally, in the application implements three, the electronic equipment also includes:
First generation unit 113, for second judged result for it is no when, generate and to second electronic equipment
The first miscue information is sent, so that second electronic equipment can export the first miscue information.
Pass through one or more of the embodiment of the present application technical scheme, it is possible to achieve following one or more technology effects
Fruit:
First, due to the technical scheme in the embodiment of the present application, the solicited message sent using acquisition by the second electronic equipment,
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with it is described
First operational order corresponding to first solicited message, wherein, first solicited message is obtained comprising non-particularly for request
The solicited message of classified information;When the solicited message is second solicited message different from first solicited message, base
In the corresponding relation, determine from second solicited message corresponding to second operation different with first operational order
Instruction, wherein, second solicited message obtains the technological means of the solicited message comprising classified information particularly for request,
So, electronic equipment can determine level of security corresponding with solicited message based on the difference of the solicited message received, and
Perform it is corresponding with level of security operation, when solicited message need obtain comprising classified information content when, determine described in ask
It is high safety rank to seek information, then electronic equipment just performs instruction corresponding with high safety rank, identity is such as verified, when identity is tested
Card retransmits content corresponding to solicited message after passing through, so, efficiently solve safety existing for contactless card of the prior art
The single technical problem of rank, realize the technique effect that can meet more level of security demands.
2nd, due to the technical scheme in the embodiment of the present application, use when the solicited message is the second solicited message, base
In the corresponding relation, fingerprint authentication instruction corresponding with second solicited message is determined, by performing the fingerprint inspection
Card instruction, obtains the first user fingerprints for the first user for currently gripping first electronic equipment, judges the first user fingerprints
Whether it is pre-set user fingerprint, obtains the second judged result, in second judged result for when being, acquisition please with described second
The second category information corresponding to information is sought, and second category information is sent to the technological means of second electronic equipment, this
Sample, as long as electronic equipment needs to send classified information, electronic equipment will obtain the user fingerprints of active user, only work as
When the fingerprint of preceding user is identical with pre-set user fingerprint, electronic equipment just can send corresponding content to the second electronic equipment, this
Sample, by way of fingerprint authentication, realize the technique effect for the security for further increasing electronic equipment.
3rd, due to the technical scheme in the embodiment of the present application, asked using the default concerning security matters list of types of acquisition one and with described
First content type corresponding to the first request content of information is sought, whether is judged in the default concerning security matters list of types comprising described
First content type, the first judged result is obtained, in first judged result for when being, it is described to determine the solicited message
Second solicited message, when first judged result is no, determine the skill that the solicited message is first solicited message
Art means, so, user can be needed according to the use of oneself to setting concerning security matters list of types, to be user-friendly, realize
Improve the technique effect of Consumer's Experience.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Specifically, computer program instructions can be stored in corresponding to the information processing method in the embodiment of the present application
In the storage mediums such as CD, hard disk, USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium
When one electronic equipment reads or is performed, comprise the following steps:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, it is determined that
Go out the first operational order corresponding with first solicited message, wherein, first solicited message obtains particularly for request
The solicited message of non-classified information must be included;
When the solicited message is second solicited message different from first solicited message, based on the corresponding pass
System, determine from second solicited message corresponding to second operational order different with first operational order, wherein, institute
State the second solicited message and the solicited message for including classified information is obtained particularly for request.
Optionally, stored in the storage medium and step:In the request for obtaining and being sent by the second electronic equipment
After information, corresponding computer program instructions when executed, in addition to:
Obtain a default concerning security matters list of types and first content class corresponding with the first request content of the solicited message
Type;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
Optionally, stored in the storage medium and step:When the solicited message is the first solicited message, it is based on
The corresponding relation of solicited message and operational order, the first operational order corresponding with first solicited message is determined, it is corresponding
Computer program instructions when executed, specifically include:
When the solicited message is the first solicited message, based on the corresponding relation, determine and the described first request
User profile corresponding to information sends instruction;
Correspondingly, stored in the storage medium and step:It is described determine it is corresponding with first solicited message
User profile send instruction after, when executed, methods described also includes corresponding computer program instructions:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Optionally, stored in the storage medium and step:It is and first solicited message in the solicited message
During different second solicited message, based on the corresponding relation, determine corresponding with second solicited message with described
The second different operational order of one operational order, corresponding computer program instructions when executed, specifically include:
When the solicited message is the second solicited message, based on the corresponding relation, determine and the described second request
Fingerprint authentication corresponding to information instructs;
Correspondingly, stored in the storage medium and step:It is described determine it is corresponding with second solicited message
Fingerprint authentication instruction after, when executed, methods described also includes corresponding computer program instructions:
Instructed by performing the fingerprint authentication, obtain the first of the first user for currently gripping first electronic equipment
User fingerprints;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result.
Optionally, stored in the storage medium and step:Judge whether the first user fingerprints are default use described
Family fingerprint, after obtaining the second judged result, when executed, methods described also includes corresponding computer program instructions:
In second judged result when being, to obtain the second category information corresponding with second solicited message, and will
Second category information is sent to second electronic equipment.
Optionally, stored in the storage medium and step:Judge whether the first user fingerprints are default use described
Family fingerprint, after obtaining the second judged result, when executed, methods described also includes corresponding computer program instructions:
When second judged result is no, generates and simultaneously send the first miscue letter to second electronic equipment
Breath, so that second electronic equipment can export the first miscue information.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (7)
1. a kind of information processing method, applied to the first electronic equipment, including:
Obtain the solicited message sent by the second electronic equipment;
When the solicited message is the first solicited message, the corresponding relation based on solicited message and operational order, determine with
First operational order corresponding to first solicited message, wherein, first solicited message is wrapped particularly for request
Solicited message containing non-classified information;
When the solicited message is second solicited message different from first solicited message, based on the corresponding relation,
Determine from second solicited message corresponding to second operational order different with first operational order, wherein, it is described
Second solicited message obtains the solicited message for including classified information particularly for request, specifically includes:In the solicited message
For the second solicited message when, based on the corresponding relation, determine fingerprint authentication instruction corresponding with second solicited message;
Correspondingly, it is described determine the instruction of corresponding with second solicited message fingerprint authentication after, methods described is also wrapped
Include:
Instructed by performing the fingerprint authentication, obtain the first user for the first user for currently gripping first electronic equipment
Fingerprint;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result,
In second judged result when being, to obtain the second category information corresponding with second solicited message, and by described in
Second category information is sent to second electronic equipment,
When second judged result is no, generates and simultaneously send the first miscue information to second electronic equipment, with
Second electronic equipment is set to export the first miscue information.
2. the method as described in claim 1, it is characterised in that in the solicited message for obtaining and being sent by the second electronic equipment
Afterwards, methods described also includes:
Obtain a default concerning security matters list of types and first content type corresponding with the first request content of the solicited message;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
3. method as claimed in claim 1 or 2, it is characterised in that it is described when the solicited message is the first solicited message,
Corresponding relation based on solicited message and operational order, the first operational order corresponding with first solicited message is determined,
Specifically include:
When the solicited message is the first solicited message, based on the corresponding relation, determine and first solicited message
Corresponding user profile sends instruction;
Correspondingly, it is described determine that corresponding with first solicited message user profile sends instruction after, methods described
Also include:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
4. a kind of electronic equipment, including:
First acquisition unit, for obtaining the solicited message sent by the second electronic equipment;
First determining unit, for when the solicited message is the first solicited message, based on solicited message and operational order
Corresponding relation, the first operational order corresponding with first solicited message is determined, wherein, first solicited message is specific
For for asking to obtain the solicited message for including non-classified information;
Second determining unit, for when the solicited message is second solicited message different from first solicited message,
Based on the corresponding relation, determine from second solicited message corresponding to second behaviour different with first operational order
Instruct, wherein, second solicited message obtains the solicited message for including classified information particularly for request,
Second determining unit includes:
Second determining module, for when the solicited message is the second solicited message, based on the corresponding relation, determine with
Fingerprint authentication corresponding to second solicited message instructs;
The electronic equipment also includes:
Second execution unit, for being instructed by performing the fingerprint authentication, acquisition currently grips the first of the electronic equipment
The first user fingerprints of user;And
Second judging unit, for judging whether the first user fingerprints are pre-set user fingerprint, the second judged result is obtained,
Second transmitting element, during for being in second judged result, obtain corresponding with second solicited message the
Two category informations, and second category information is sent to second electronic equipment,
First generation unit, for second judged result for it is no when, generate and send the to second electronic equipment
One miscue information, so that second electronic equipment can export the first miscue information.
5. a kind of electronic equipment, including:
Housing;
Receiving module, it is arranged in the housing, for obtaining the solicited message sent by the second electronic equipment;
Processor, be arranged in the housing, for when the solicited message is the first solicited message, based on solicited message with
The corresponding relation of operational order, the first operational order corresponding with first solicited message is determined, wherein, described first please
Information is asked to obtain the solicited message for including non-classified information particularly for request;Being in the solicited message please with described first
When seeking different the second solicited message of information, based on the corresponding relation, determine it is corresponding with second solicited message with
The second different operational order of first operational order, wherein, second solicited message is wrapped particularly for request
Solicited message containing classified information,
The processor is specifically used for:
When the solicited message is the second solicited message, based on the corresponding relation, determine and second solicited message
Corresponding fingerprint authentication instruction;
Correspondingly, the processor is additionally operable to:
Instructed by performing the fingerprint authentication, the first user for obtaining the first user for currently gripping the electronic equipment refers to
Line;And
Judge whether the first user fingerprints are pre-set user fingerprint, obtain the second judged result,
In second judged result when being, to obtain the second category information corresponding with second solicited message, and by described in
Second category information is sent to second electronic equipment,
When second judged result is no, generates and simultaneously send the first miscue information to second electronic equipment, with
Second electronic equipment is set to export the first miscue information.
6. electronic equipment as claimed in claim 5, it is characterised in that the processor is additionally operable to:
Obtain a default concerning security matters list of types and first content type corresponding with the first request content of the solicited message;
Judge the first content type whether is included in the default concerning security matters list of types, obtain the first judged result;
In first judged result for when being, it is second solicited message to determine the solicited message;
When first judged result is no, it is first solicited message to determine the solicited message.
7. the electronic equipment as described in claim 5 or 6, it is characterised in that the processor is specifically used for:
When the solicited message is the first solicited message, based on the corresponding relation, determine and first solicited message
Corresponding user profile sends instruction;
Correspondingly, the processor is additionally operable to:
Perform the user profile and send instruction, obtain type I information corresponding with first solicited message;And
The type I information is sent to second electronic equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510284602.9A CN104915617B (en) | 2015-05-28 | 2015-05-28 | A kind of information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510284602.9A CN104915617B (en) | 2015-05-28 | 2015-05-28 | A kind of information processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104915617A CN104915617A (en) | 2015-09-16 |
CN104915617B true CN104915617B (en) | 2018-02-27 |
Family
ID=54084675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510284602.9A Active CN104915617B (en) | 2015-05-28 | 2015-05-28 | A kind of information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104915617B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002117458A (en) * | 2000-10-04 | 2002-04-19 | I Convenience:Kk | Information processing system using bar-code screen |
CN101165701A (en) * | 2006-10-17 | 2008-04-23 | 国际商业机器公司 | Methods and systems for providing radio frequency identification (RFID) security mutual authentication |
CN101493899A (en) * | 2009-03-06 | 2009-07-29 | 广东纺织职业技术学院 | Campus card identification method based on RFID technology |
CN104346550A (en) * | 2013-08-08 | 2015-02-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104462922A (en) * | 2014-12-11 | 2015-03-25 | 苏州海博智能系统有限公司 | Method for verifying authorization on basis of biological recognition |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8621557B2 (en) * | 2009-02-17 | 2013-12-31 | Nec Corporation | Information processing system judging whether manipulation is possible or not based on access control policy and method of operation thereof |
-
2015
- 2015-05-28 CN CN201510284602.9A patent/CN104915617B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002117458A (en) * | 2000-10-04 | 2002-04-19 | I Convenience:Kk | Information processing system using bar-code screen |
CN101165701A (en) * | 2006-10-17 | 2008-04-23 | 国际商业机器公司 | Methods and systems for providing radio frequency identification (RFID) security mutual authentication |
CN101493899A (en) * | 2009-03-06 | 2009-07-29 | 广东纺织职业技术学院 | Campus card identification method based on RFID technology |
CN104346550A (en) * | 2013-08-08 | 2015-02-11 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104462922A (en) * | 2014-12-11 | 2015-03-25 | 苏州海博智能系统有限公司 | Method for verifying authorization on basis of biological recognition |
Also Published As
Publication number | Publication date |
---|---|
CN104915617A (en) | 2015-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3129935A1 (en) | Systems and methods for transacting at an atm using a mobile device | |
CN107038579A (en) | A kind of e-payment business processing, electric paying method and device | |
CN111553312A (en) | Business handling method and device | |
CN106941503A (en) | Bank data collection and authentication method and system based on smart mobile phone | |
EP3642776A1 (en) | Facial biometrics card emulation for in-store payment authorization | |
CN107688940A (en) | Bio-identification transaction processing method and system | |
CN106651372A (en) | Data processing method and system | |
KR20230137326A (en) | System and method for short-distance non-contact card communication and encryption authentication | |
WO2016141356A1 (en) | Systems and methods for performing card authentication reads | |
CN104281831B (en) | A kind of method and apparatus of person's handwriting checking | |
CN106651566A (en) | Card-free withdrawal method and apparatus | |
CN112950219A (en) | Payment processing method and system | |
US20170262854A1 (en) | Systems and methods for processing metadata statements in payment flows | |
CN111882425B (en) | Service data processing method, device and server | |
CN109313782A (en) | Pre-approval financial transaction provides system and method | |
CN110457876A (en) | Identity identifying method, apparatus and system | |
CN107622396B (en) | Self-service transaction method, system and terminal equipment | |
CN106886891A (en) | A kind of near field payment method, relevant device and system | |
CN104915617B (en) | A kind of information processing method and electronic equipment | |
US10332082B2 (en) | Method and system for issuing a payment medium | |
WO2017196255A1 (en) | Method and system for identifying a payment card design | |
CN111681010A (en) | Transaction verification method and device | |
Huizinga et al. | Using NFC enabled Android devices to attack RFID systems | |
EP2830014A1 (en) | Secure channel payment processing system and method | |
CN115906028A (en) | User identity verification method and device and self-service terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |