CN107360322A - Information cuing method and device - Google Patents
Information cuing method and device Download PDFInfo
- Publication number
- CN107360322A CN107360322A CN201710527625.7A CN201710527625A CN107360322A CN 107360322 A CN107360322 A CN 107360322A CN 201710527625 A CN201710527625 A CN 201710527625A CN 107360322 A CN107360322 A CN 107360322A
- Authority
- CN
- China
- Prior art keywords
- information
- key
- module
- message
- text information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/40—Document-oriented image-based pattern recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72439—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for image or video messaging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Artificial Intelligence (AREA)
- User Interface Of Digital Computer (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The disclosure is directed to information cuing method and device.This method includes:The key message in Target Photo is identified, then obtains prompt message corresponding with key message, and display reminding information, wherein, key message includes:Text information;Prompt message is used to show that user can check key message, and prompt message shows key message in the form of labeling.Wherein, after Target Photo is got, the text information that can be gone out with Direct Recognition in Target Photo and display, so as to when the text information in using Target Photo, user without removing the text information in input Target Photo manually, but directly the accuracy of information alert and the efficiency of acquisition of information are effectively improved, using the text information shown by disclosed method so as to effectively improve Consumer's Experience.
Description
Technical field
This disclosure relates to technical field of information processing, more particularly to information cuing method and device.
Background technology
With the continuous development of mobile phone technique, the function of mobile phone is also stronger and stronger, and the convenience that mobile phone belt comes is also
Very important.Such as:When user runs into article interested, it is possible to take pictures or screenshotss by way of by article to scheme
The form of piece is preserved, and user can equally be preserved important information in a manner of taking pictures, by above-mentioned method just
Can be that user preserves the content that user wants to preserve.
The content of the invention
To overcome problem present in correlation technique, the embodiment of the present disclosure provides information cuing method and device.The skill
Art scheme is as follows:
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of information cuing method, including:
The key message in Target Photo is identified, the key message includes:Text information;
Prompt message corresponding with the key message is obtained, the hint instructions are for showing that it is described that user can check
Key message;
The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
The technical scheme provided by this disclosed embodiment can include the following benefits:Identify the key in Target Photo
Information, prompt message corresponding with key message, and display reminding information are then obtained, wherein, key message includes:Word is believed
Breath;Prompt message is used to show that user can check key message, and prompt message shows key message in the form of labeling.Its
In, the text information that can be gone out after Target Photo is got with Direct Recognition in Target Photo and display, so as to use target
When text information in picture, user is without the text information that go to input in Target Photo manually, but directly using leading to
The text information that disclosed method is shown is crossed, effectively improves the accuracy of information alert and the efficiency of acquisition of information, from
And effectively improve Consumer's Experience.
In one embodiment, methods described also includes:
Methods described also includes:
Detect whether the key message includes sensitive information;
When the key message includes the sensitive information, the sensitive information is added according to predetermined encryption algorithm
Close processing;
Show the key message after sensitive information is encrypted.
The technical scheme provided by this disclosed embodiment can include the following benefits:By adding to sensitive information
Close processing, effectively improve the security of information alert.
In one embodiment, after the display prompt message, in addition to:
Instruction is checked in reception, described to check that instruction checks the key message for instruction;
When the key message includes the sensitive information, the sensitive information key input window is shown;
Key input instruction is received, decruption key is carried in the key input instruction;
When it is cipher key match corresponding with the predetermined encryption algorithm to detect the decruption key, the sensitive letter is shown
Breath.
The technical scheme provided by this disclosed embodiment can include the following benefits:The decryption inputted by user is close
Key determines whether display sensitive information, effectively improves the security of user sensitive information.
In one embodiment, when the key message includes the text information, it is described output prompt message it
Afterwards, in addition to:
Edit instruction is received, the edit instruction is used to indicate to edit the text information;
According to text information described in edit mode editor specified in the edit instruction.
The technical scheme provided by this disclosed embodiment can include the following benefits:User can enter to key message
Edlin operates, and effectively improves Consumer's Experience.
In one embodiment, methods described also includes:
Identify the information of former webpage corresponding to Target Photo;
Obtain website information corresponding to the former webpage;
According to the website information of the former webpage and the text information, the text information pair in the former webpage is obtained
The comment information answered;
Identify the key character in the text information;
Obtain web page address corresponding to the key character in the text information;
Website information corresponding to the former webpage is exported in the form of labeling, and/or, the word letter in the former webpage
Comment information corresponding to breath, and/or, web page address corresponding to the key character in the text information.
The technical scheme provided by this disclosed embodiment can include the following benefits:By defeated in the form of labeling
Go out website information corresponding to former webpage, and/or, comment information corresponding to the text information in former webpage, and/or, text information
In key character corresponding to web page address so that user can check correlation content, so as to effectively lift user's body
Test.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of information presentation device, including:
First identification module, for identifying the key message in Target Photo, the key message includes:Text information;
First acquisition module, believe for obtaining prompting corresponding with the key message of first identification module identification
Breath, the hint instructions are used to show that user can check the key message;
First display module, the prompt message obtained for showing first acquisition module, wherein, the prompting
Information shows the key message in the form of labeling.
In one embodiment, described device also includes:Detection module, encrypting module and the second display module;
The detection module, for whether detecting the key message of the first identification module identification comprising sensitive letter
Breath;
The encrypting module, for detecting the key message bag of the identification module identification when the detection module
During containing the sensitive information, the sensitive information is encrypted according to predetermined encryption algorithm;
Second display module, for show the encrypting module sensitive information is encrypted after key message.
In one embodiment, described device also includes:First receiving module, the 3rd display module, the second receiving module
With the 4th display module;
First receiving module, after showing the prompt message in first display module, reception is checked
Instruction, it is described to check that instruction checks the key message for instruction;
3rd display module, the key message for being identified when the identification module include the sensitive information
When, show the sensitive information key input window;
Second receiving module, for receiving key input instruction, decruption key is carried in the key input instruction;
4th display module, for when detect the decruption key that second receiving module receives be with it is described
Corresponding to predetermined encryption algorithm during cipher key match, the sensitive information is shown.
In one embodiment, when the key message includes the text information, described device also includes:3rd
Receiving module and editor module;
3rd receiving module, after showing the prompt message in first display module, receive editor
Instruction, the edit instruction are used to indicate to edit the text information;
Word described in specified edit mode editor in the edit instruction received according to the 3rd receiving module
Information.
In one embodiment, described device also includes:Second identification module, the second acquisition module, the 3rd acquisition module,
3rd identification module, the 4th acquisition module and output module;
Second identification module, for identifying the information of former webpage corresponding to Target Photo;
Second acquisition module, the website information of the former webpage for obtaining the second identification module identification;
3rd acquisition module, for the former webpage obtained according to second acquisition module website information with
And the text information, obtain comment information corresponding to the text information in the former webpage;
3rd identification module, the keyword in the text information for identifying the first identification module identification
Symbol;
4th acquisition module, the keyword in the text information for obtaining the second acquisition module acquisition
Web page address corresponding to symbol;
The output module, for website information corresponding to the output former info web in the form of labeling, and/
Or, comment information corresponding to the text information in the former webpage, and/or, corresponding to the key character in the text information
Web page address.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of information presentation device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
The key message in Target Photo is identified, the key message includes:Text information;
Prompt message corresponding with the key message is obtained, the hint instructions are for showing that it is described that user can check
Key message;
The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
According to the fourth aspect of the embodiment of the present disclosure, there is provided a kind of computer-readable recording medium, be stored thereon with calculating
Machine instructs, and the instruction realizes following steps when being executed by processor:
The key message in Target Photo is identified, the key message includes:Text information;
Prompt message corresponding with the key message is obtained, the hint instructions are for showing that it is described that user can check
Key message;
The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is the flow chart of the information cuing method according to an exemplary embodiment one.
Fig. 2 is the display interface schematic diagram of the terminal device according to an exemplary embodiment one.
Fig. 3 is the display interface schematic diagram of the terminal device according to an exemplary embodiment two.
Fig. 4 is the display interface schematic diagram of the terminal device according to an exemplary embodiment three.
Fig. 5 is the flow chart of the information cuing method according to an exemplary embodiment two.
Fig. 6 is the flow chart of the information cuing method according to an exemplary embodiment three.
Fig. 7 is the flow chart of the information cuing method according to an exemplary embodiment four.
Fig. 8 is the display interface schematic diagram of the terminal device according to an exemplary embodiment four.
Fig. 9 is the display interface schematic diagram of the terminal device according to an exemplary embodiment five.
Figure 10 is the flow chart of the information cuing method according to an exemplary embodiment five.
Figure 11 is the display interface schematic diagram of the terminal device according to an exemplary embodiment six.
Figure 12 is the display interface schematic diagram of the terminal device according to an exemplary embodiment seven.
Figure 13 is the display interface schematic diagram of the terminal device according to an exemplary embodiment eight.
Figure 14 is the schematic diagram of the information cuing method according to an exemplary embodiment six.
Figure 15 is the block diagram of the information presentation device according to an exemplary embodiment one.
Figure 16 is the block diagram of the information presentation device according to an exemplary embodiment two.
Figure 17 is the block diagram of the information presentation device according to an exemplary embodiment three.
Figure 18 is the block diagram of the information presentation device according to an exemplary embodiment four.
Figure 19 is the block diagram of the information presentation device according to an exemplary embodiment five.
Figure 20 is a kind of block diagram for information presentation device 80 according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
In correlation technique, user can take pictures or screenshotss by way of user wanted to preserve or compare for user
Important content is preserved in a manner of picture.
When the picture preserved by the above method, it can only be checked for user, because the word in picture is not editable
With exclusive use, when user needs to use the word in above-mentioned picture, it usually needs user is against the picture of preservation
Content is manually entered oneself, when the content of input is more, this mode manually inputted, often in the process of input
The middle mistake that user occurs and can not discover, such as:What if user preserved is the photo of bank card, when user needs to use bank
During card card number, because the card number of bank card is general all longer, now, user occurs numeral input is wrong during input
By mistake situation, so as to cause business not handle or other error.
In the disclosure, the key message in Target Photo is identified, then obtains prompt message corresponding with key message, and
Display reminding information, wherein, key message includes:Text information;Prompt message is used to show that user can check key message,
Prompt message shows key message in the form of labeling.Wherein, after Target Photo is got, target can be gone out with Direct Recognition
Text information and display in picture, so as to which when the text information in using Target Photo, user is defeated without going manually
Enter the text information in Target Photo, but directly effectively improved using the text information shown by disclosed method
The accuracy of information alert and the efficiency of acquisition of information, so as to effectively improve Consumer's Experience.
Fig. 1 is the flow chart of the information cuing method according to an exemplary embodiment one, as shown in figure 1, this method
Comprise the following steps S101-S103:
In step S101, the key message in Target Photo is identified, wherein, key message includes:Text information.
Example, before the key message in identifying Target Photo, above-mentioned Target Photo can also be obtained.
Target Photo can be the picture obtained from network;It can also be the picture that other users are sent;Can also be
User's screenshot picture as obtained from intercepting the screen content in terminal device;Can also be in user's using terminal equipment
The photo that camera photographs.
Such as:Above-mentioned Target Photo can be that user includes identity card or bank card using what the camera of mobile phone was shot
Photo.
Such as:When user is browsing e-book, if running into content interested, now user can be by terminal
The screenshotss operation of equipment preserves the content in the form of picture, now just obtains the snapshot for including user's content interested
Piece, above-mentioned Target Photo is used as using the screenshot picture.
(Optical Character Recognition, it can be referred to as by optical character identification:OCR) technology is known
Key message in other Target Photo.Wherein, the method for the key message in Target Photo and related skill are identified by OCR technique
Identical in art, here is omitted.
It is worth noting that, identifying that the key message in Target Photo is a kind of citing using OCR technique, actually should
In, the key message in Target Photo can also be identified using other technologies means, how the disclosure is to not identify target
Key message in picture is any limitation as.
In step s 102, prompt message corresponding with key message is obtained, wherein, prompt message is used to show that user can
To check key message.
In a kind of achievable mode, after the text information in Target Photo is identified, directly show and identify to user
To Target Photo in text information.
In a kind of achievable mode, after the key message in Target Photo is identified, if directly output is known
Other key message can seem loftier, because user may not need to use those key messages this moment, or, if
The key message content identified is more, when directly exporting those key messages, can occupy most of space of screen, cause
Consumer's Experience is relatively low.
For example, user checks ancient Chinese prose in using terminal equipment《Vocal mimicry》When, saved by screenshotss operation as shown in Figure 2
Target Photo, after the Target Photo is identified, obtain《Vocal mimicry》Text information, and then as shown in figure 3, set by terminal
Standby screen to the text information that identifies of user's output, so as to user those words can be carried out edit operation (such as:It is multiple
System, the operation such as paste), now, if user is not intended to pair《Vocal mimicry》In text information carry out edit operation or user not
Want to check《Vocal mimicry》In text information, then, display now is obviously non-necessary.
Therefore, after the key message in identifying Target Photo, prompting letter corresponding with key message can first be determined
Breath, after prompt message corresponding with key message is determined, exports the prompt message.By above-mentioned method, due to prompting
Information is being briefly summarized for key message, therefore the character quantity of prompt message is smaller, and terminal is occupied without excessive
The on-screen display (osd) area of equipment, effectively reduce the power consumption of terminal device.
Continue according to above-mentioned example, as shown in figure 4, after the text information in Target Photo has been obtained, determine this article
Prompt message corresponding to word information is《Article content》, and then only show article content.
Can be corresponding to each key message determines it is worth noting that, when there is the key message of plurality of classes
Prompt message, and then show all prompt messages.
The mode of above-mentioned determination prompt message can use preceding several words or the identification of the key message identified
The content of the key message gone out is summarized, and the disclosure is not any limitation as to the determination mode of prompt message.
In step s 103, display reminding information, wherein, prompt message shows key message in the form of labeling.
In a kind of achievable mode, when it is determined that after prompt message, the prompt message directly being passed through into terminal device
Screen display comes out, and in order to lift perceptibility of the user to prompt message, in the achievable mode of another kind, can pass through label
The form display reminding information of change.
In the disclosure, the key message in Target Photo is identified, then obtains prompt message corresponding with key message, and
Display reminding information, wherein, key message includes:Text information;Prompt message is used to show that user can check key message,
Prompt message shows key message in the form of labeling.Wherein, after Target Photo is got, target can be gone out with Direct Recognition
Text information and display in picture, so as to which when the text information in using Target Photo, user is defeated without going manually
Enter the text information in Target Photo, but directly effectively improved using the text information shown by disclosed method
The accuracy of information alert and the efficiency of acquisition of information, so as to effectively improve Consumer's Experience.
After above-mentioned prompt message is exported, if user wants using key message or checks key message, now,
Also include after above-mentioned prompt message is exported:Receive and check that key message corresponding to prompt message checks finger for instruction
Order, output key message is instructed according to checking.
Continue according to above-mentioned example, after Fig. 4 interface is shown, if user wants to check the pass in Target Photo
Key information, then label corresponding to article content can be clicked on, now, while label is clicked on, user is just to terminal device
Have sent it is above-mentioned check instruction, after terminal device, which receives, checks instruction, just export text information as described in Figure 3.
In one embodiment, as shown in figure 5, the above method also includes step S104- steps S106:
In step S104, whether detection key message includes sensitive information.
In step S105, when key message includes sensitive information, sensitive information is carried out according to predetermined encryption algorithm
Encryption.
In step s 106, the key message after sensitive information is encrypted is shown.
When the key message detected includes sensitive information, those sensitive informations may be relevant with the privacy of user,
In order to lift the security of information, the sensitive information of those in key message can be encrypted, will be quick so as to show
Feel the key message after information is encrypted.
Such as:If the key message identified includes bank card hair fastener row information, bank card types and bank card card
Number, it is sensitive information now to identify bank card number, then to bank card number according to predetermined encryption algorithm to sensitive information
It is encrypted, the key message now obtained includes:Bank card hair fastener row information, bank card types and encryption
Bank card number.
It is worth noting that, the identification of above-mentioned sensitive information can be identified by the method for machine learning, also may be used
It is identified in a manner of by default non-sensitive information database, the disclosure is not any limitation as to the identification method of sensitive information.
The technical scheme provided by this disclosed embodiment can include the following benefits:By adding to sensitive information
Close processing, effectively improve the security of information alert.
In one embodiment, as shown in fig. 6, methods described also includes step S107- steps S1010:
In step s 107, receive and check instruction, check that instruction checks key message for instruction.
Reception checks that the mode of instruction is same as the previously described embodiments, and here is omitted.
In step S108, when key message includes sensitive information, sensitive information key input window is shown.
Whether after receiving and checking instruction, can detect in key message includes sensitive information, when detecting key message
After including sensitive information, have and carried out encryption with sensitive information, now, can be shown to user for exporting key
Input window.
In step S109, key input instruction is received, decruption key is carried in key input instruction.
User by key corresponding to the input of the key input window of display, can click on corresponding to determine prompting frame, with
Send key input instruction.
In step S1010, when it is cipher key match corresponding with predetermined encryption algorithm to detect decruption key, display is sensitive
Information.
After the decryption key of user's input is received, detecting decryption key key corresponding with predetermined encryption algorithm is
No matching, when it is cipher key match corresponding with predetermined encryption algorithm to detect decruption key, then show sensitive information to user.
Example, after receiving and checking instruction, when key message includes sensitive information, first it can be shown not to user
By the key message of encryption, at the same time, the key input window of sensitive information, the key that user passes through display are shown
Key corresponding to input window input, and then detect whether decryption key key corresponding with predetermined encryption algorithm matches, when
When detection decruption key is cipher key match corresponding with predetermined encryption algorithm, then sensitive information is shown to user.
Example, after receiving and checking instruction, when key message includes sensitive information, show the key of sensitive information
Input window, user are detected the decryption key and added with default by key corresponding to the key input window input of display
Whether key matches corresponding to close algorithm, when detect decruption key be cipher key match corresponding with predetermined encryption algorithm when, just to
User shows key message.
The technical scheme provided by this disclosed embodiment can include the following benefits:The decryption inputted by user is close
Key determines whether display sensitive information, effectively improves the security of user sensitive information.
In one embodiment, as shown in fig. 7, the above method also includes step S1011- steps S1016:
In step S1011, former info web corresponding to Target Photo is identified.
In step S1012, website information corresponding to former webpage is obtained.
In step S1013, according to the website information and text information of former webpage, the text information in former webpage is obtained
Corresponding comment information.
In step S1014, the key character in text information is identified.
In step S1015, web page address corresponding to the key character in text information is obtained.
A database can be preset, the database includes the corresponding relation of key character and web page address, is getting
After text information, by being matched with database, the key character in text information is obtained, and then obtained respectively from database
Web page address corresponding to individual key character.
Key character now can be the partial content in text information.
In step S1016, website information corresponding to former webpage is exported in the form of labeling, and/or, in former webpage
Comment information corresponding to text information, and/or, web page address corresponding to the key character in text information.
Key message in Target Photo may be a text information part, then, user may check completely
Text information, at this point it is possible to former info web corresponding to Target Photo is identified, and then, it can meet that user checks complete text
The demand of word information.
Gone on to say with the example shown in Fig. 2-Fig. 4, " looked into as shown in figure 8, can be shown while text information is shown
See former webpage " prompt message.
It is of course also possible to as shown in figure 9, the prompt message now shown not only includes " article content ", in addition to " check
Former webpage ".
Above-mentioned method also includes:Jump instruction is received, the jump instruction is used to indicate to pass through network address corresponding to former webpage
Information jumps to former webpage;And then the former webpage according to corresponding to the jump instruction jumps to Target Photo.
When user wants to check complete text information, jump instruction is sent to terminal device, now, terminal device is just
Jump to former webpage corresponding to complete text information.
Continue according to above-mentioned example, when user wants to check former webpage, then that clicks on Fig. 8 or Fig. 8 checks former webpage
Prompting frame, now, jump instruction just is sent to terminal device, after terminal device receives the jump instruction, just jumps to original
Webpage.
Above-mentioned method also includes:Jump instruction is received, the jump instruction is used to indicate to pass through the key in text information
Web page address corresponding to character jumps to former webpage corresponding to key character;And then key character is jumped to according to the jump instruction
Corresponding former webpage.
Above-mentioned step S1016 can include but is not limited to:Network address letter corresponding to former webpage is exported in the form of labeling
Comment information, the output character in the form of labeling corresponding to breath, the text information in the form of labeling in the former webpage of output
Web page address corresponding to key character in information, export in the form of labeling website information corresponding to former webpage and with label
Comment information, the net corresponding to the former webpage of output in the form of labeling corresponding to text information in the former webpage of form output of change
It is web page address corresponding to location information and key character in the form of labeling in output character information, defeated in the form of labeling
Comment information corresponding to the text information gone out in former webpage and the key character pair in the form of labeling in output character information
The web page address answered, exported in the form of labeling corresponding to text information in website information and former webpage corresponding to former webpage
Web page address corresponding to key character in comment information and text information.
The technical scheme provided by this disclosed embodiment can include the following benefits:By defeated in the form of labeling
Go out website information corresponding to former webpage, and/or, comment information corresponding to the text information in former webpage, and/or, text information
In key character corresponding to web page address so that user can check correlation content, so as to effectively lift user's body
Test.
It is worth noting that, after the information shown in the disclosure in the form of labeling, user can be by clicking on the mark
Label, so as to obtain the complete key message associated with label, or jump to the network address associated with label.
In a kind of achievable mode, after output character information, in addition to:Receive edit instruction, the edit instruction
For indicating to edit text information;And according to edit instruction editor's text information.
After output character information, user may carry out edit operation to those text informations, such as:Replicate and viscous
Patch.Now, user can be identical with the operation in correlation technique, is selected by long-press text information in the word to be replicated
Hold, that is, now, user just sends over edit instruction to terminal device, after terminal device receives edit instruction, replicate
User wants responsible word content, to allow user to paste those word contents in follow-up use.
Such as:When user is settled accounts by net purchase, bank card number is filled in if desired, then, all can be to knowing before
Other bank card number is replicated, and pastes.
It is worth noting that, above-mentioned editor includes but is not limited to:Replicate and paste.
The technical scheme provided by this disclosed embodiment can include the following benefits:User can enter to key message
Edlin operates, and effectively improves Consumer's Experience.
Implementation process is discussed in detail below by several embodiments.
Figure 10 is the flow chart of the information cuing method according to an exemplary embodiment five, and executive agent is mobile phone,
As shown in Figure 10, this method comprises the following steps:
In step s 201, Target Photo is obtained by screenshotss.
User gets the Target Photo for including bank card as shown in figure 11 by way of screenshotss.
In step S202, the key message in Target Photo is identified.
By taking Figure 11 as an example, the key message now identified is " XX banks 1,234 5,678 9,012 3,454 65 ".
In step S203, prompt message corresponding with key message is obtained.
Now, it is determined that prompt message corresponding with " XX banks 1,234 5,678 9,012 3,454 65 " is " bank card is believed
Breath ".
In step S204, labeling processing is carried out to prompt message, generates prompt message label.
In step S205, prompt message label is exported.
As shown in figure 12, Target Photo the page export " bank card information " prompt message label.
In step S206, instruction is checked in reception.
When user wants to check bank card information, the prompt message label of " bank card information " is clicked on, now, to mobile phone
Instruction is checked in transmission.
In step S207, bank card information is shown.
Show interface as shown in fig. 13 that.
In step S208, duplicate instructions are received.
In step S209, bank card information is replicated.
Bank card information " XX banks 1,234 5,678 9,012 3,454 65 " in copy pattern 13.
Figure 14 is the schematic diagram of the information cuing method according to an exemplary embodiment six, and executive agent is mobile phone,
As shown in figure 14, this method comprises the following steps:
In step S301, Target Photo is obtained by screenshotss.
User gets the Target Photo for including bank card as shown in figure 11 by way of screenshotss.
In step s 302, the key message in Target Photo is identified.
By taking Figure 11 as an example, the key message now identified is " XX banks " and " 1,234 5,678 9,012 3,454 65 ".
In step S303, detect whether above-mentioned key message includes sensitive information, wrapped in above-mentioned key message is detected
Containing sensitive information, step S304 is performed, does not include sensitive information, processing method and Figure 13 phases in above-mentioned key message is detected
Together;
Determine that " XX banks " is not sensitive information by default database, " 1,234 5,678 9,012 3,454 65 " are quick
Feel information.
In step s 304, sensitive information is encrypted according to predetermined encryption algorithm.
Sensitive information " 1,234 5,678 9,012 3,454 65 " is encrypted according to predetermined encryption algorithm.
In step S305, prompt message corresponding with key message is obtained.
Now, it is determined that prompt message corresponding with " XX banks 1,234 5,678 9,012 3,454 65 " is " bank card is believed
Breath ".
In step S306, labeling processing is carried out to prompt message, generates prompt message label.
In step S307, prompt message label is exported.
As shown in figure 12, Target Photo the page export " bank card information " prompt message label.
In step S308, instruction is checked in reception.
When user wants to check bank card information, the prompt message label of " bank card information " is clicked on, now, to mobile phone
Instruction is checked in transmission.
In step S309, whether include sensitive information, do not include in key message is detected if detecting in key message
During sensitive information, step S3013 is performed;Step S3010- steps are performed when detecting that key message includes sensitive information
S3012。
In step S3010, sensitive information key input window is shown.
In step S3011, the key input instruction for carrying decruption key is received.
In step S3012, detection decruption key is cipher key match corresponding with predetermined encryption algorithm, when detection decryption is close
When key is cipher key match corresponding with predetermined encryption algorithm, step S3013 is performed, when detection decruption key is calculated with predetermined encryption
When key corresponding to method mismatches, input error prompting message is shown.
In step S3013, key message, namely output bank card information are exported.
Figure 15 is the block diagram of the information presentation device according to an exemplary embodiment one, and the device can be by soft
Part, hardware or both are implemented in combination with as some or all of of electronic equipment.As shown in figure 15, the information presentation device
Including:
First identification module 11, for identifying the key message in Target Photo, the key message includes:Word is believed
Breath;
First acquisition module 12, for obtaining carry corresponding with the key message of first identification module 11 identification
Show information, the hint instructions are used to show that user can check the key message;
First display module 13, the prompt message obtained for showing first acquisition module 12, wherein, it is described
Prompt message shows the key message in the form of labeling.
In one embodiment, as shown in figure 16, described device also includes:Detection module 14, encrypting module 15 and second
Display module 16;
The detection module 14, for whether detecting the key message of the identification of the first identification module 11 comprising quick
Feel information;
The encrypting module 15, for detecting the crucial letter of the identification module identification when the detection module 14
When breath includes the sensitive information, the sensitive information is encrypted according to predetermined encryption algorithm;
Second display module 16, for show the encrypting module 15 sensitive information is encrypted after crucial letter
Breath.
In one embodiment, as shown in figure 17, described device also includes:First receiving module 17, the 3rd display module
18th, the second receiving module 19 and the 4th display module 110;
First receiving module 17, after showing the prompt message in first display module 13, receive
Instruction is checked, it is described to check that instruction checks the key message for instruction;
3rd display module 18, the key message for being identified when first identification module 11 include described
During sensitive information, the sensitive information key input window is shown;
Second receiving module 19, it is close to carry decryption for receiving key input instruction, in the key input instruction
Key;
4th display module 110, for being when the decruption key for detecting the reception of the second receiving module 19
During cipher key match corresponding with the predetermined encryption algorithm, the sensitive information is shown.
In one embodiment, as shown in figure 18, when the key message includes the text information, described device
Also include:3rd receiving module 111 and editor module 112;
3rd receiving module 111, after showing the prompt message in first display module 13, receive
Edit instruction, the edit instruction are used to indicate to edit the text information;
The editor module 112, specified by the edit instruction that is received according to the 3rd receiving module 111
Edit mode editor described in text information.
In one embodiment, as shown in figure 19, described device also includes:Second identification module 113, the second acquisition module
114th, the 3rd acquisition module 115, the 3rd identification module 116, the 4th acquisition module 117 and output module 118;
Second identification module 113, for identifying the information of former webpage corresponding to Target Photo;
Second acquisition module 114, the network address of the former webpage identified for obtaining second identification module 113
Information;
3rd acquisition module 115, for the network address of the former webpage obtained according to second acquisition module 114
Information and the text information, obtain comment information corresponding to the text information in the former webpage;
3rd identification module 116, in the text information identified for identifying first identification module 11
Key character;
4th acquisition module 117, in the text information for obtaining the 3rd identification module 116 identification
Web page address corresponding to key character;
The output module 118, the original obtained for exporting second acquisition module 114 in the form of labeling
Website information corresponding to info web, and/or, the text information in the former webpage that the 3rd acquisition module 115 obtains
Corresponding comment information, and/or, corresponding to the key character in the text information that the 4th acquisition module 117 obtains
Web page address.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of information presentation device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, processor is configured as:
The key message in Target Photo is identified, the key message includes:Text information;
Prompt message corresponding with the key message is obtained, the hint instructions are for showing that it is described that user can check
Key message;
The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
Above-mentioned processor is also configured to:
Methods described also includes:
Detect whether the key message includes sensitive information;
When the key message includes the sensitive information, the sensitive information is added according to predetermined encryption algorithm
Close processing;
Show the key message after sensitive information is encrypted.
After the display prompt message, in addition to:
Instruction is checked in reception, described to check that instruction checks the key message for instruction;
When the key message includes the sensitive information, the sensitive information key input window is shown;
Key input instruction is received, decruption key is carried in the key input instruction;
When it is cipher key match corresponding with the predetermined encryption algorithm to detect the decruption key, the sensitive letter is shown
Breath.
When the key message includes the text information, after the output prompt message, in addition to:
Edit instruction is received, the edit instruction is used to indicate to edit the text information;
According to text information described in edit mode editor specified in the edit instruction.
Methods described also includes:
Identify the information of former webpage corresponding to Target Photo;
Obtain website information corresponding to the former webpage;
According to the website information of the former webpage and the text information, the text information pair in the former webpage is obtained
The comment information answered;
Identify the key character in the text information;
Obtain web page address corresponding to the key character in the text information;
Website information corresponding to the former webpage is exported in the form of labeling, and/or, the word letter in the former webpage
Comment information corresponding to breath, and/or, web page address corresponding to the key character in the text information.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Figure 20 is a kind of block diagram for information presentation device 80 according to an exemplary embodiment, and the device is applicable
In terminal device.For example, device 80 can be mobile phone, and computer, digital broadcast terminal, messaging devices, game control
Platform processed, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Device 80 can include following one or more assemblies:Processing component 802, memory 804, power supply module 806 are more
Media component 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and communication component
816。
The integrated operation of the usual control device 80 of processing component 802, such as communicated with display, call, data, camera
The operation that operation and record operation are associated.Processing component 802 can carry out execute instruction including one or more processors 820,
To complete all or part of step of above-mentioned method.In addition, processing component 802 can include one or more modules, it is easy to
Interaction between processing component 802 and other assemblies.For example, processing component 802 can include multi-media module, to facilitate more matchmakers
Interaction between body component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 80.These data are shown
Example includes the instruction of any application program or method for being operated on device 80, contact data, telephone book data, disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 80.Power supply module 806 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 80.
Multimedia groupware 808 is included in the screen of one output interface of offer between described device 80 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers
Body component 808 includes a front camera and/or rear camera.When device 80 is in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 80 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone is configured
To receive external audio signal.The audio signal received can be further stored in memory 804 or via communication component
816 send.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, for providing the state estimation of various aspects for device 80.
For example, sensor cluster 814 can detect opening/closed mode of device 80, the relative positioning of component, such as the component
For the display and keypad of device 80, sensor cluster 814 can be with the position of 80 1 components of detection means 80 or device
Change, the existence or non-existence that user contacts with device 80, the orientation of device 80 or acceleration/deceleration and the temperature change of device 80.
Sensor cluster 814 can include proximity transducer, be configured to detect object nearby in no any physical contact
Presence.Sensor cluster 814 can also include optical sensor, such as CMOS or CCD photo sensors, in imaging applications
Use.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensor, magnetic sensing
Device, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 80 and other equipment.Device
80 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 80 can be believed by one or more application specific integrated circuits (ASIC), numeral
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic building bricks are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 80.For example, institute
State non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and
Optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processor of device 80
During execution so that device 80 is able to carry out above-mentioned information cuing method, and methods described includes:
The key message in Target Photo is identified, the key message includes:Text information;
Prompt message corresponding with the key message is obtained, the hint instructions are for showing that it is described that user can check
Key message;
The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
Methods described also includes:
Detect whether the key message includes sensitive information;
When the key message includes the sensitive information, the sensitive information is added according to predetermined encryption algorithm
Close processing;
Show the key message after sensitive information is encrypted.
After the display prompt message, in addition to:
Instruction is checked in reception, described to check that instruction checks the key message for instruction;
When the key message includes the sensitive information, the sensitive information key input window is shown;
Key input instruction is received, decruption key is carried in the key input instruction;
When it is cipher key match corresponding with the predetermined encryption algorithm to detect the decruption key, the sensitive letter is shown
Breath.
When the key message includes the text information, after the output prompt message, in addition to:
Edit instruction is received, the edit instruction is used to indicate to edit the text information;
According to text information described in edit mode editor specified in the edit instruction.
Methods described also includes:
Identify the information of former webpage corresponding to Target Photo;
Obtain website information corresponding to the former webpage;
According to the website information of the former webpage and the text information, the text information pair in the former webpage is obtained
The comment information answered;
Identify the key character in the text information;
Obtain web page address corresponding to the key character in the text information;
Website information corresponding to the former webpage is exported in the form of labeling, and/or, the word letter in the former webpage
Comment information corresponding to breath, and/or, web page address corresponding to the key character in the text information.
Those skilled in the art will readily occur to the disclosure its after considering specification and putting into practice disclosure disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledges in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (12)
- A kind of 1. information cuing method, it is characterised in that including:The key message in Target Photo is identified, the key message includes:Text information;Prompt message corresponding with the key message is obtained, the prompt message is used to show that user can check the key Information;The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
- 2. according to the method for claim 1, it is characterised in that methods described also includes:Detect whether the key message includes sensitive information;When the key message includes the sensitive information, place is encrypted to the sensitive information according to predetermined encryption algorithm Reason;Show the key message after sensitive information is encrypted.
- 3. according to the method for claim 2, it is characterised in that after the display prompt message, in addition to:Instruction is checked in reception, described to check that instruction checks the key message for instruction;When the key message includes the sensitive information, the sensitive information key input window is shown;Key input instruction is received, decruption key is carried in the key input instruction;When it is cipher key match corresponding with the predetermined encryption algorithm to detect the decruption key, the sensitive information is shown.
- 4. according to the method for claim 1, it is characterised in that when the key message includes the text information, After the output prompt message, in addition to:Edit instruction is received, the edit instruction is used to indicate to edit the text information;According to text information described in edit mode editor specified in the edit instruction.
- 5. according to the method described in claim any one of 1-4, it is characterised in that methods described also includes:Identify the information of former webpage corresponding to Target Photo;Obtain website information corresponding to the former webpage;According to the website information of the former webpage and the text information, obtain corresponding to the text information in the former webpage Comment information;Identify the key character in the text information;Obtain web page address corresponding to the key character in the text information;Website information corresponding to the former webpage is exported in the form of labeling, and/or, the text information pair in the former webpage The comment information answered, and/or, web page address corresponding to the key character in the text information.
- A kind of 6. information presentation device, it is characterised in that including:First identification module, for identifying the key message in Target Photo, the key message includes:Text information;First acquisition module, for obtaining prompt message corresponding with the key message of first identification module identification, The hint instructions are used to show that user can check the key message;First display module, the prompt message obtained for showing first acquisition module, wherein, the prompt message The key message is shown in the form of labeling.
- 7. device according to claim 6, it is characterised in that described device also includes:Detection module, encrypting module and Two display modules;Whether the detection module, the key message for detecting the first identification module identification include sensitive information;The encrypting module, for detecting that the key message of the identification module identification includes institute when the detection module When stating sensitive information, the sensitive information is encrypted according to predetermined encryption algorithm;Second display module, for show the encrypting module sensitive information is encrypted after key message.
- 8. device according to claim 7, it is characterised in that described device also includes:First receiving module, the 3rd display Module, the second receiving module and the 4th display module;First receiving module, after showing the prompt message in first display module, instruction is checked in reception, It is described to check that instruction checks the key message for instruction;3rd display module, the key message for being identified when first identification module include the sensitive information When, show the sensitive information key input window;Second receiving module, for receiving key input instruction, decruption key is carried in the key input instruction;4th display module, for when the decruption key for detecting the second receiving module reception being preset with described Corresponding to AES during cipher key match, the sensitive information is shown.
- 9. device according to claim 6, it is characterised in that when the key message includes the text information, Described device also includes:3rd receiving module and editor module;3rd receiving module, after showing the prompt message in first display module, edit instruction is received, The edit instruction is used to indicate to edit the text information;The editor module, for edit mode specified in the edit instruction that is received according to the 3rd receiving module Edit the text information.
- 10. according to the device described in claim any one of 6-8, it is characterised in that described device also includes:Second identification mould Block, the second acquisition module, the 3rd acquisition module, the 3rd identification module, the 4th acquisition module and output module;Second identification module, for identifying the information of former webpage corresponding to Target Photo;Second acquisition module, the website information of the former webpage for obtaining the second identification module identification;3rd acquisition module, for the website information of the former webpage obtained according to second acquisition module and institute Text information is stated, obtains comment information corresponding to the text information in the former webpage;3rd identification module, the key character in the text information for identifying the first identification module identification;4th acquisition module, the key character pair in the text information for obtaining the 3rd identification module identification The web page address answered;The output module, the former info web pair obtained for exporting second acquisition module in the form of labeling The website information answered, and/or, comment letter corresponding to the text information in the former webpage that the 3rd acquisition module obtains Breath, and/or, web page address corresponding to the key character in the text information that the 4th acquisition module obtains.
- A kind of 11. information presentation device, it is characterised in that including:Processor;For storing the memory of processor-executable instruction;Wherein, the processor is configured as:The key message in Target Photo is identified, the key message includes:Text information;Prompt message corresponding with the key message is obtained, the hint instructions are used to show that user can check the key Information;The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
- 12. a kind of computer-readable recording medium, is stored thereon with computer instruction, it is characterised in that the instruction is by processor Following steps are realized during execution:The key message in Target Photo is identified, the key message includes:Text information;Prompt message corresponding with the key message is obtained, the hint instructions are used to show that user can check the key Information;The prompt message is shown, wherein, the prompt message shows the key message in the form of labeling.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710527625.7A CN107360322B (en) | 2017-06-30 | 2017-06-30 | Information prompting method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710527625.7A CN107360322B (en) | 2017-06-30 | 2017-06-30 | Information prompting method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107360322A true CN107360322A (en) | 2017-11-17 |
CN107360322B CN107360322B (en) | 2020-03-03 |
Family
ID=60272608
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710527625.7A Active CN107360322B (en) | 2017-06-30 | 2017-06-30 | Information prompting method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107360322B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830917A (en) * | 2018-05-29 | 2018-11-16 | 努比亚技术有限公司 | A kind of information generating method, terminal and computer readable storage medium |
CN109635683A (en) * | 2018-11-27 | 2019-04-16 | 维沃移动通信有限公司 | Method for extracting content and terminal device in a kind of image |
CN110196747A (en) * | 2019-05-31 | 2019-09-03 | 北京小米智能科技有限公司 | Information processing method and device |
CN114463755A (en) * | 2021-12-13 | 2022-05-10 | 武汉中海庭数据技术有限公司 | Automatic sensitive information detection desensitization method in high-precision map-based acquired picture |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101267492A (en) * | 2003-07-09 | 2008-09-17 | 株式会社日立制作所 | Information processing apparatus, information processing method and server |
CN101676848A (en) * | 2008-09-19 | 2010-03-24 | 三星电子株式会社 | Device and method for identifying and processing image information |
CN103237165A (en) * | 2013-03-13 | 2013-08-07 | 上海合合信息科技发展有限公司 | Method and electronic equipment for checking extended name card information in real time |
CN103714333A (en) * | 2012-08-27 | 2014-04-09 | 三星电子株式会社 | Apparatus and method for recognizing a character in terminal equipment |
CN103942469A (en) * | 2014-04-14 | 2014-07-23 | 小米科技有限责任公司 | Picture processing method, device and terminal |
-
2017
- 2017-06-30 CN CN201710527625.7A patent/CN107360322B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101267492A (en) * | 2003-07-09 | 2008-09-17 | 株式会社日立制作所 | Information processing apparatus, information processing method and server |
CN101676848A (en) * | 2008-09-19 | 2010-03-24 | 三星电子株式会社 | Device and method for identifying and processing image information |
CN103714333A (en) * | 2012-08-27 | 2014-04-09 | 三星电子株式会社 | Apparatus and method for recognizing a character in terminal equipment |
CN103237165A (en) * | 2013-03-13 | 2013-08-07 | 上海合合信息科技发展有限公司 | Method and electronic equipment for checking extended name card information in real time |
CN103942469A (en) * | 2014-04-14 | 2014-07-23 | 小米科技有限责任公司 | Picture processing method, device and terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830917A (en) * | 2018-05-29 | 2018-11-16 | 努比亚技术有限公司 | A kind of information generating method, terminal and computer readable storage medium |
CN108830917B (en) * | 2018-05-29 | 2023-04-18 | 努比亚技术有限公司 | Information generation method, terminal and computer readable storage medium |
CN109635683A (en) * | 2018-11-27 | 2019-04-16 | 维沃移动通信有限公司 | Method for extracting content and terminal device in a kind of image |
CN110196747A (en) * | 2019-05-31 | 2019-09-03 | 北京小米智能科技有限公司 | Information processing method and device |
CN114463755A (en) * | 2021-12-13 | 2022-05-10 | 武汉中海庭数据技术有限公司 | Automatic sensitive information detection desensitization method in high-precision map-based acquired picture |
Also Published As
Publication number | Publication date |
---|---|
CN107360322B (en) | 2020-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104980580B (en) | Short message inspection method and device | |
CN104731688B (en) | Point out the method and device of reading progress | |
CN105654302B (en) | Payment method and device | |
CN106709399A (en) | Fingerprint identification method and device | |
CN104679599A (en) | Application program duplicating method and device | |
US10706307B2 (en) | Methods and devices for processing fingerprint information | |
CN106202150A (en) | Method for information display and device | |
CN104219053B (en) | Method for information display, information concealing method and device | |
CN104571709B (en) | The processing method of mobile terminal and virtual key | |
CN105447109A (en) | Key word searching method and apparatus | |
CN107360322A (en) | Information cuing method and device | |
CN107230137A (en) | Merchandise news acquisition methods and device | |
CN106600367A (en) | Order information processing method and order information processing device | |
CN106775202A (en) | A kind of method and device of information transfer | |
CN107045541A (en) | data display method and device | |
CN106295294A (en) | Method for controlling mobile terminal and device | |
CN107734178A (en) | Presentation of information processing method, device, equipment and storage medium | |
CN107239351A (en) | Method of attaching and device | |
CN106503537A (en) | Verification method and device based on flexible display screen | |
CN107423378A (en) | Image display method and device | |
CN106844717A (en) | Webpage search display methods and device | |
CN107885571A (en) | Show page control method and device | |
CN106708967A (en) | Page display method and device | |
CN107463809A (en) | The display methods and device of application icon | |
CN107908325A (en) | Method for showing interface and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |