CN111210220A - Two-dimensional code encryption method, mobile terminal and device with storage function - Google Patents
Two-dimensional code encryption method, mobile terminal and device with storage function Download PDFInfo
- Publication number
- CN111210220A CN111210220A CN201811401678.5A CN201811401678A CN111210220A CN 111210220 A CN111210220 A CN 111210220A CN 201811401678 A CN201811401678 A CN 201811401678A CN 111210220 A CN111210220 A CN 111210220A
- Authority
- CN
- China
- Prior art keywords
- picture
- dimensional code
- preset
- payment
- auxiliary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 77
- 238000012545 processing Methods 0.000 claims description 19
- 230000006870 function Effects 0.000 claims description 15
- 238000004422 calculation algorithm Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 230000003068 static effect Effects 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 238000003709 image segmentation Methods 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000009499 grossing Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001172 regenerating effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
- G06Q20/3274—Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being displayed on the M-device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The application discloses a two-dimensional code encryption method, a mobile terminal and a device with a storage function, wherein the method comprises the following steps: when the mobile terminal starts payment, displaying a two-dimensional code picture for payment; when a preset encryption condition is met, displaying an auxiliary picture on the two-dimensional code picture, wherein the auxiliary picture is used for shielding the two-dimensional code picture; and when the preset decryption condition is met, the display of the auxiliary picture is cancelled so as to display the two-dimensional code picture. Through the mode, the code scanning and money stealing can be avoided by lawless persons in the period of waiting for the payee to scan the payment two-dimensional code, the safety of mobile payment can be improved, and the payment experience of a user is improved.
Description
Technical Field
The application relates to the technical field of payment encryption, in particular to a two-dimensional code encryption method, a mobile terminal and a device with a storage function.
Background
With the development of mobile terminals and mobile interconnection which is more and more widely applied, the diversified development of the functions of the mobile terminals makes people gradually become accustomed to mobile payment, and the payment mode gradually develops towards paperless and cardless.
When the mobile terminal is used for mobile payment, the payee sets the amount of money to be collected, and then the payee can transfer the amount of money to be collected by the payer to the account of the payee only by scanning the two-dimensional payment code displayed on the mobile terminal by the payer.
The inventor of the application finds that the user usually opens the payment two-dimensional code page in advance during mobile payment and waits for the payee to scan in the long-term research and development process, and the password is easily scanned by lawless persons and money is stolen during the waiting period, so that economic loss is caused, and the risk of mobile payment is higher.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a two-dimensional code encryption method, a mobile terminal and a device with a storage function, and the method and the device aim to solve the problems that in the prior art, a user is scanned by lawbreakers and steals money and money while waiting for a payee to scan and pay a two-dimensional code.
In order to solve the technical problem, the application adopts a technical scheme that: a two-dimension code encryption method is provided, and the method comprises the following steps: when the mobile terminal starts payment, displaying a two-dimensional code picture for payment; when a preset encryption condition is met, displaying an auxiliary picture on the two-dimensional code picture, wherein the auxiliary picture is used for shielding the two-dimensional code picture; and when the preset decryption condition is met, the display of the auxiliary picture is cancelled so as to display the two-dimensional code picture.
The step of displaying the auxiliary picture on the two-dimensional code picture comprises the following steps: covering the auxiliary picture on the two-dimensional code picture; and the auxiliary picture is covered on the two-dimensional code picture with a preset transparency.
Before the step of overlaying the auxiliary picture on the two-dimensional code picture, the method further comprises the following steps: predefining a security payment level and payment information corresponding to each security payment level, wherein the payment information comprises at least one of payment amount and payment mode; a predetermined transparency is set for each secure payment level.
The step of displaying the auxiliary picture on the two-dimensional code picture comprises the following steps: and carrying out picture fuzzy processing on the two-dimensional code picture to obtain an auxiliary picture, and displaying the auxiliary picture.
Before the step of displaying the auxiliary picture on the two-dimensional code picture, the method further comprises: inputting preset fingerprint information into the mobile terminal, and associating the preset fingerprint information with the encryption instruction; acquiring first fingerprint information input by a user, and judging whether the first fingerprint information is matched with preset fingerprint information or not; if the matching is successful, determining that the encryption instruction input by the user meets the preset encryption condition; when detecting that the user continuously inputs the first fingerprint information, continuously displaying an auxiliary picture on the two-dimensional code picture; and when the condition that the user stops inputting the first fingerprint information is detected, the preset decryption condition is met, and the auxiliary picture is cancelled to be displayed.
Before the step of displaying the auxiliary picture on the two-dimensional code picture, the method further comprises: presetting a preset time length; timing is started when the two-dimensional code picture is displayed; when the timing time reaches the preset time length, the preset encryption condition is met; wherein the preset time is less than 1 minute.
Wherein, prior to the step of canceling the displaying of the auxiliary picture, the method further comprises: inputting preset gesture information into the mobile terminal, and associating the preset gesture information with the decryption instruction; capturing a user gesture, and judging whether the user gesture is matched with preset gesture information or not; if the matching is successful, determining that the user inputs a decryption instruction and meeting a preset decryption condition; the preset gesture is at least one of clicking the auxiliary picture, sliding the auxiliary picture, long-pressing the auxiliary picture, turning over the auxiliary picture, clicking the decryption button or sliding the screen.
Wherein, prior to the step of canceling the displaying of the auxiliary picture, the method further comprises: starting a camera of the mobile terminal; acquiring a current scene image of the mobile terminal through a camera; extracting characteristic information in a current scene image; determining a current payment scene according to the characteristic information; and when the current payment scene is the preset payment scene, the preset decryption condition is met.
In order to solve the technical problem, the application adopts a technical scheme that: a mobile terminal is provided, which comprises a processor, a memory and a display screen, wherein the processor is coupled with the memory and the display screen; the display screen is used for displaying a two-dimensional code picture for payment when the mobile terminal starts payment; the processor is used for enabling the display screen to display an auxiliary picture on the two-dimensional code picture when a preset encryption condition is met, wherein the auxiliary picture is used for encrypting the two-dimensional code picture; the processor is further used for canceling the display of the auxiliary picture when a preset decryption condition is met, so that the display screen displays the two-dimensional code picture; the memory is used for storing the two-dimensional code picture and the auxiliary picture.
In order to solve the technical problem, the application adopts a technical scheme that: there is provided a device having a storage function, the device storing program data executable to implement the two-dimensional code encryption method as described above.
The beneficial effect of this application is: be different from prior art's condition, this application is when satisfying to predetermine the encryption condition, show the supplementary picture on the two-dimensional code picture that is used for paying, in order to realize carrying out encryption processing to the two-dimensional code picture, and can be when satisfying to predetermine the decryption condition, cancel the supplementary picture of demonstration, in order to show the two-dimensional code picture, and then the payee only needs to sweep the payment two-dimensional code that the payer shows on mobile terminal, can realize paying, at this in-process, the user can encrypt the two-dimensional code picture, thereby avoid being swept the code and steal money by lawless persons in the period of waiting for the payee to scan the payment two-dimensional code, can improve the security of mobile payment, improve user's payment experience.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts. Wherein:
fig. 1 is a first flowchart of an embodiment of a two-dimensional code encryption method according to the present application;
fig. 2 is a second flowchart of an embodiment of a two-dimensional code encryption method according to the present application;
FIG. 3 is a schematic representation of a Gaussian blur before;
FIG. 4 is a schematic illustration after Gaussian blur;
fig. 5 is a schematic diagram of a third flow of an embodiment of a two-dimensional code encryption method according to the present application;
fig. 6 is a fourth flowchart illustrating a two-dimensional code encryption method according to an embodiment of the present application;
fig. 7 is a fifth flowchart illustrating a two-dimensional code encryption method according to an embodiment of the present application;
fig. 8 is a sixth flowchart illustrating a two-dimensional code encryption method according to an embodiment of the present application;
FIG. 9 is a schematic structural diagram of an embodiment of a mobile terminal according to the present application;
FIG. 10 is a schematic structural diagram of an embodiment of the apparatus with storage function according to the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a first flow chart of an embodiment of a two-dimensional code encryption method according to the present application. The two-dimensional code encryption method comprises the following steps:
s101: and when the mobile terminal starts payment, displaying a two-dimensional code picture for payment.
Specifically, the two-dimensional code image can be used for online payment or offline payment, consumption, transfer, pre-authorization and the like, and meanwhile, the two-dimensional code image can also comprise limit information of transaction.
Wherein, the two-dimensional code picture can include two kinds: the payment system comprises a static two-dimensional code picture and a dynamic two-dimensional code picture, wherein the static two-dimensional code picture is generated based on a payment account, the effective time is long, such as three months or one year, and the static two-dimensional code picture can be used in an online environment for many times; the dynamic two-dimensional code picture is generated based on the static two-dimensional code picture, the effective time is short, such as 1 minute or 30 seconds, and the dynamic two-dimensional code picture can be used only once in an online environment.
S102: and when the preset encryption condition is met, displaying the auxiliary picture on the two-dimensional code picture.
The auxiliary picture is used for encrypting the two-dimensional code picture.
Specifically, the preset encryption condition may include receiving an encryption instruction, a preset user encryption gesture, or an operation state of the mobile terminal within a certain time period.
The encryption instruction can be triggered by pressing an special key (for example, a Home key) on the terminal device by the user, or can be triggered by a specific operation (for example, a click operation or a sliding operation) input by the user on the mobile terminal or a key combination (in the form of a combination of user-defined setting keys) on the virtual keyboard. For example, the user may trigger the encryption command by clicking an "encrypt" button in the mobile terminal.
The preset user encryption gesture can be at least one of clicking the two-dimensional code picture, sliding the two-dimensional code picture, long-pressing the two-dimensional code picture, turning the two-dimensional code picture, clicking an encryption button or sliding a screen.
The operation state of the mobile terminal within a certain period of time may be no operation by the user within 5 seconds.
It should be noted that the mobile terminal may encrypt the two-dimensional code picture when the preset encryption condition is met, for example, after receiving the encryption instruction, the mobile terminal may display an auxiliary picture to the user, where the auxiliary picture may cover the two-dimensional code picture or directly replace the two-dimensional code picture.
The auxiliary picture may be an opaque picture or a partially transparent picture preset by a user, for example, a random picture or a randomly generated color picture in an album, or an auxiliary picture obtained by performing picture blurring on a two-dimensional code picture, or an auxiliary picture obtained by encrypting a two-dimensional code picture. The encryption process may be: and embedding encryption information in payment information contained in the two-dimensional code picture, and regenerating the two-dimensional code picture containing the encryption information and the payment information. After the user inputs the encryption instruction through the designated operation, the mobile terminal can encrypt the two-dimensional code picture according to the default encryption mode and the encryption key to obtain the auxiliary picture. After the auxiliary picture is displayed, even if the payee or lawless person scans the auxiliary picture, the deduction cannot be realized.
S103: and when the preset decryption condition is met, the display of the auxiliary picture is cancelled so as to display the two-dimensional code picture.
Specifically, the preset decryption condition may be a decryption instruction received, a preset user decryption gesture, or an operation state of the mobile terminal within a time period.
The decryption instruction can be triggered by pressing an ad hoc key (e.g., Home key) on the terminal device by the user, or can be triggered by a specific operation (e.g., a click operation or a sliding operation) input by the user on the mobile terminal or a key combination (in the form of a combination of user-defined setting keys) on the virtual keyboard. For example, the user may trigger the decryption instruction by clicking a "decrypt" button in the mobile terminal.
The preset user decryption gesture may be at least one of clicking the auxiliary picture, sliding the auxiliary picture, long-pressing the auxiliary picture, flipping the auxiliary picture, clicking a decryption button, or sliding the screen.
It should be noted that the mobile terminal may cancel displaying the auxiliary picture according to the received decryption instruction, for example, after receiving the encryption instruction, the mobile terminal may cancel displaying the auxiliary picture and display the two-dimensional code picture in S101 to the user.
Be different from prior art's condition, this embodiment is when satisfying to predetermine the encryption condition, show the supplementary picture on the two-dimensional code picture that is used for paying, in order to realize carrying out encryption processing to the two-dimensional code picture, and can be when satisfying to predetermine the decryption condition, cancel the supplementary picture of demonstration, in order to show the two-dimensional code picture, and then the payee only needs to sweep the payment two-dimensional code that the payer shows on mobile terminal, can realize paying, at this in-process, the user can encrypt the two-dimensional code picture, thereby avoid being swept the code and steal money and property by lawless persons in the period of waiting for the payee to scan the payment two-dimensional code, can improve the security of mobile payment, improve user's payment experience.
In one embodiment, step S102 includes the steps of: and covering the auxiliary picture on the two-dimensional code picture. And the auxiliary picture is covered on the two-dimensional code picture with a preset transparency.
Specifically, when the preset encryption condition is met, an auxiliary picture with the same shape as the two-dimensional code picture is generated, and then the auxiliary picture is covered on the two-dimensional code picture. The auxiliary picture may be set to be a picture with any transparency value greater than 0, where a transparency value of 0 is fully transparent and a transparency value of 1 is non-transparent. That is to say, in the embodiment of the present application, the transparency value of the auxiliary picture may be set to be a picture having any transparency value between full transparency and non-transparency, or the transparency value of the auxiliary picture may be set to be 1, that is, no transparency, and a specific transparency value may be set by a user, which is not specifically limited in the embodiment of the present application. For example, a mask having a color value of #000000 or # FFFFFF and a transparency value greater than 0 may be overlaid on the two-dimensional code image.
Through the shade that covers a predetermined transparency in two-dimensional code picture upper side, cover the two-dimensional code picture, and then avoid being swept the sign indicating number and stealing money by lawbreaker in the period of waiting for payee to scan the payment two-dimensional code, consequently can improve the security of mobile payment, improve user's payment experience.
Referring to fig. 2, fig. 2 is a second flow chart of an embodiment of a two-dimensional code encryption method according to the present application. Before step S102, the method further comprises the steps of:
s201: the secure payment levels and the payment information corresponding to each secure payment level are predefined.
The payment information comprises at least one of payment amount and payment mode.
Specifically, the user may pre-define the secure payment level and the payment information corresponding to each secure payment level according to the self-payment habit, where the payment information may include at least one of payment amount, payment times, and payment method. For example, the user divides the security payment level into three types of high, medium, and low, and when the payment amount is used as the payment information, the payment amount of the high security payment level may be set to 5000 yuan or more, the payment amount of the medium security payment level may be set to 300 yuan to 5000 yuan, and the payment amount of the low security payment level may be set to less than 300 yuan. Or, taking the payment treasures as an example, when the payment method is used as the payment information, the payment method of the high security payment level may be set as balance treasures payment, the payment method of the medium security payment level may be set as balance payment, and the payment method of the low security payment level may be set as beibei payment. In other embodiments, a different payment amount or payment method may be set, which is not limited herein.
S202: a predetermined transparency is set for each secure payment level.
Specifically, the transparency of the corresponding auxiliary picture may be set for three security payment levels, namely, high, medium, and low. It should be noted that the higher the security payment level is, the closer the transparency value of the auxiliary picture is to 1, for example, the transparency value corresponding to the high security payment level may be set to 1, that is, no transparency; setting the transparency value corresponding to the middle security payment level to be 0.8; the transparency value for a low security payment level is set to 0.5.
Through the method, the transparency value corresponding to the safety payment level is determined according to the corresponding relation between the preset safety payment level and the payment amount or the payment mode, the auxiliary picture is processed according to the transparency value, the transparency value of the auxiliary picture is correspondingly changed according to the safety payment level corresponding to the payment amount or the payment mode, and the convenience of user operation can be improved while the payment safety is guaranteed.
In one embodiment, step S102 includes the steps of: and carrying out picture fuzzy processing on the two-dimensional code picture to obtain an auxiliary picture, and displaying the auxiliary picture.
Specifically, the image blurring processing may adopt a common image gaussian blurring processing, wherein a principle of the gaussian blurring processing is as follows: the term "blurring" is understood to mean that the pixel value of each pixel is the average of the pixel values of the surrounding pixels, as shown in fig. 3 and 4, where fig. 3 is a schematic diagram before gaussian blurring and fig. 4 is a schematic diagram after gaussian blurring. "2" in fig. 3 is the pixel value of the middle pixel point, the pixel values of the peripheral pixel points are all 1, after gaussian blurring processing, the average value of the pixel values of the peripheral pixel points taken by the pixel value of the middle pixel point in fig. 4 becomes 1, and in terms of the value, this is smoothing processing, on the image, it is equivalent to generating a blurring effect, and the middle pixel point loses details; obviously, when calculating the average value of the pixel values of the middle pixel points, the larger the value range (i.e., the value of the number of the peripheral pixel points), the stronger the blurring effect.
When the step is executed, the current display interface is a payment interface, the image of the current display interface is the two-dimensional code picture corresponding to the payment interface, the two-dimensional code picture is subjected to Gaussian blur processing to generate a two-dimensional code picture with a blur effect (the two-dimensional code picture with the blur effect is an auxiliary picture), and the auxiliary picture is displayed on the payment interface so that a user can see the two-dimensional code picture with the blur effect.
Further, considering that the algorithm of the gaussian blur processing is complex, and the complexity of the calculation is related to the image resolution and the blur radius, in order to reduce the amount of the gaussian blur operation and increase the speed of the blur processing, generally, an original two-dimensional code image with a higher resolution is reduced to an intermediate two-dimensional code image with a lower resolution, then the gaussian blur processing is performed on the intermediate two-dimensional code image with the lower resolution, and the blurred image is enlarged to the size of the original two-dimensional code image, so that the obtained blurred image still visually approaches the blur effect of directly performing the gaussian blur processing on the original two-dimensional code image.
Through the Gaussian blur processing two-dimensional code picture, an auxiliary picture does not need to be stored in the mobile terminal, and the storage consumption of the mobile terminal is reduced.
Referring to fig. 5, fig. 5 is a third flow chart of an embodiment of the two-dimensional code encryption method according to the present application. In an embodiment, before step S102, the method further includes the steps of:
s301: and inputting preset fingerprint information into the mobile terminal, and associating the preset fingerprint information with the encryption instruction.
Specifically, a first association triggering instruction may be input to the mobile terminal to trigger the mobile terminal to enter a fingerprint information setting mode. And after entering a fingerprint information setting mode, starting to input preset fingerprint information, and associating the preset fingerprint information with the encryption instruction.
S302: the method comprises the steps of collecting first fingerprint information input by a user, and judging whether the first fingerprint information is matched with preset fingerprint information.
Specifically, first fingerprint information input by a user is collected through the fingerprint identification module, and the first fingerprint information is compared with preset fingerprint information.
S303: and if the matching is successful, determining that the encryption instruction input by the user meets the preset encryption condition.
Specifically, the preset encryption condition is an encryption instruction input by the user, when the first fingerprint information is successfully matched with the preset fingerprint information, the encryption instruction of the mobile terminal corresponding to the preset fingerprint information is searched through the preset configuration table to determine that the encryption instruction input by the user is satisfied, and at this time, the step S102 is performed.
When detecting that the user continuously inputs the first fingerprint information, continuously displaying an auxiliary picture on the two-dimensional code picture; and when the condition that the user stops inputting the first fingerprint information is detected, the preset decryption condition is met, the display of the auxiliary picture is cancelled, and the two-dimensional code picture is displayed for the user.
Further, before step S103, the method may further include: and inputting preset decryption fingerprint information into the mobile terminal, and associating the preset decryption fingerprint information with the decryption instruction. Specifically, a first association triggering instruction may be input to the mobile terminal to trigger the mobile terminal to enter a fingerprint information setting mode. And after entering a fingerprint information setting mode, starting to input preset decryption fingerprint information, and associating the preset decryption fingerprint information with a decryption instruction.
And acquiring second fingerprint information input by the user, and judging whether the second fingerprint information is matched with the preset decryption fingerprint information. Specifically, second fingerprint information input by a user is collected through the fingerprint identification module, and the second fingerprint information is compared with preset decryption fingerprint information.
And if the matching is successful, determining that the user inputs a decryption instruction and meeting the preset decryption condition. Specifically, when the second fingerprint information is successfully matched with the preset decryption fingerprint information, the decryption instruction of the mobile terminal corresponding to the preset decryption fingerprint information is searched through the preset configuration table to determine that the user inputs the decryption instruction, and at this time, the preset decryption condition is met and the step S103 is performed.
Through the method, the operation steps of sending the encryption instruction by the user can be simplified, and when the first fingerprint information input by the user is matched with the preset fingerprint information, the encryption instruction can be sent, so that the mobile terminal receives the encryption instruction, responds to the encryption instruction, and displays the auxiliary picture on the two-dimensional code picture.
Referring to fig. 6, fig. 6 is a fourth flowchart illustrating a two-dimensional code encryption method according to an embodiment of the present application. In an embodiment, before step S102, the method further includes the steps of:
s401: a preset duration is preset.
Specifically, the preset time period is less than 1 minute. Since the two-dimensional code picture may be a dynamic two-dimensional code picture, and the valid time of the two-dimensional code picture is usually 1 minute or 30 seconds, the preset time may be set to be less than 1 minute or less than 30 seconds, for example, the preset time is 3 seconds or 5 seconds, corresponding to the valid time.
S402: and when the two-dimensional code picture is displayed, timing is started.
Specifically, the mobile terminal can detect whether a two-dimensional code picture is displayed at present, and starts timing when the two-dimensional code picture is detected to be displayed.
S403: and when the timing time reaches the preset time length, the preset encryption condition is met.
Specifically, for example, when the timing time reaches a preset duration of 3 seconds, a preset encryption condition is met, and the auxiliary picture is displayed on the two-dimensional code picture.
Further, before step S103, the method may further include:
and when the auxiliary picture is displayed, timing is started. Specifically, the mobile terminal can detect whether an auxiliary picture is currently displayed, and when the auxiliary picture is detected to be displayed, timing is started.
And when the timing time reaches the preset decryption time, the preset encryption condition is met.
Specifically, the preset decryption time duration may be 15 seconds, and when the timing time reaches the preset decryption time duration of 15 seconds, the preset decryption condition is met, and the two-dimensional code picture is displayed on the two-dimensional code picture.
By the mode, the user does not need to send the operation step of the encryption instruction, the user starts the payment function, timing is started, the auxiliary picture is displayed on the two-dimensional code picture when the timing time reaches the preset time length, the operation step of displaying the auxiliary picture can be omitted, and the payment experience of the user is improved.
Referring to fig. 7, fig. 7 is a fifth flowchart illustrating a two-dimensional code encryption method according to an embodiment of the present application. In an embodiment, before step S103, the method further comprises the steps of:
s501: inputting preset gesture information into the mobile terminal, and associating the preset gesture information with the decryption instruction.
Specifically, a second correlation trigger instruction may be input to the mobile terminal to trigger the mobile terminal to enter a gesture information setting mode. And after entering a gesture information setting mode, starting to input preset gesture information, and associating the preset gesture information with the decryption instruction.
S502: capturing the user gesture, and judging whether the user gesture is matched with preset gesture information.
S503: and if the matching is successful, determining that the user inputs a decryption instruction and meeting the preset decryption condition.
Specifically, the gesture recognition module is used for collecting user gestures input by a user and comparing the user gestures with preset gesture information. When the gesture of the user is successfully matched with the preset gesture information, a decryption instruction of the mobile terminal corresponding to the preset gesture information is searched through a preset configuration table, the decryption instruction input by the user is determined, the preset decryption condition is met, and the step S103 is entered, the display of the auxiliary picture on the two-dimensional code picture is cancelled, and the two-dimensional code picture is displayed to the user. The preset gesture can be at least one of clicking the auxiliary picture, sliding the auxiliary picture, long-pressing the auxiliary picture, turning over the auxiliary picture, clicking a decryption button or sliding the screen. The decryption button may be a physical button or a virtual button.
By the aid of the method, the operation steps of the user for sending the decryption instruction can be simplified, and when the gesture of the user is successfully matched with the preset gesture information, the decryption instruction can be sent, so that the mobile terminal receives the decryption instruction, responds to the decryption instruction, and further cancels display of the auxiliary picture on the two-dimensional code picture.
Referring to fig. 8, fig. 8 is a sixth flowchart illustrating a two-dimensional code encryption method according to an embodiment of the present application. In one embodiment, the method further comprises the steps of:
s601: and starting a camera of the mobile terminal.
Specifically, when the triggering operation of the user is detected, the front camera or the rear camera of the mobile terminal can be automatically started. The triggering operation of the mobile terminal user comprises the following steps: a trigger operation based on fingerprint authentication, a trigger operation based on a slide operation, or a trigger operation based on a key.
The triggering operation based on the fingerprint authentication may be to start the interface of the initial payment mode when the mobile terminal recognizes that the received fingerprint matches a preset fingerprint of the interface of the initial payment mode. The fingerprint recognition may be performed by a fingerprint recognition key of the mobile terminal. The triggering operation based on the sliding operation may be that when the mobile terminal recognizes that the received sliding operation matches a preset sliding operation of the interface for starting the initial payment method, the interface for starting the initial payment method is started. Of course, the interface of the initial payment method may be started as long as the sliding operation is received. The key-based triggering operation may be that when the mobile terminal recognizes that a key in the received key triggering operation matches a key of a preset interface for starting an initial payment method, the interface for starting the initial payment method is started. For example, the key may be a home key, a fingerprint key, a volume key, an on/off key, and so on. It should be understood that the method of the present embodiment is not limited thereto, and other triggering operation manners are also possible.
The mobile terminal may include a plurality of cameras, i.e., two or more cameras, which are used to perform multi-angle and/or multi-position multi-point image photographing, and each camera may be a fixed camera or a movable camera.
S602: and acquiring a current scene image of the mobile terminal through the camera.
Specifically, a camera is started to acquire a current scene image where the mobile terminal is located. The current scene image can be an image collected by a front camera or a rear camera. It should be appreciated that the current scene image may specifically include a picture of a spatial still, for example, the spatial still may be a two-dimensional code scanning device or the like.
In other embodiments, the camera may also be used to detect infrared or red light of the two-dimensional code scanning device, considering that the two-dimensional code scanning device is generally provided with an infrared mechanism which emits infrared or red light. In order to further accurately detect the infrared rays, the camera may be replaced with an infrared sensor or a light sensor.
S603: and extracting characteristic information in the current scene image.
Specifically, an image segmentation algorithm is a method in image processing, and the image segmentation algorithm is to decompose an image into a set of a plurality of non-intersecting regions. In this embodiment, the items in the current scene image can be separated by the K-Means algorithm. The K-Means algorithm is a clustering algorithm based on distance similarity, and samples in the form are divided into the same category by comparing the similarity between the samples. Firstly, extracting color features of a current scene image, taking a two-dimensional code scanning device as an example, and determining the two-dimensional code scanning device as a feature contained in the current scene image through a K-Means algorithm. The feature may be a two-dimensional code scanning device, infrared, a salesperson, or the like.
If the current scene image is a two-dimensional code scanning device, the feature information may be feature images or feature characters, such as an outline of the two-dimensional code scanning device, logo characters of the two-dimensional code scanning device, and the like. Taking the image containing the two-dimensional code scanning device as an example, a group of feature data is extracted by comprehensively extracting features such as shape features, material features, color features and the like of the two-dimensional code scanning device, and the group of feature data is feature information.
In other embodiments, the feature information may be at least one of color feature information, texture feature information, shape feature information, or local feature point information of the current scene image. The method comprises the steps of obtaining a saliency map of an original image by utilizing a saliency detection algorithm on a current scene image, wherein a black part of the saliency map is a background, a non-black part of the saliency map is a target object, and converting the target part of the saliency map into a color of a position corresponding to the original image to obtain a segmented image.
S604: and determining the current payment scene according to the characteristic information.
Specifically, the feature information in the current scene image may be matched with the feature information of the preset payment scene. For example, when the extracted feature information in the current scene image is a logo character of the two-dimensional code scanning device, the logo character of the two-dimensional code scanning device can be matched with a keyword of a preset payment scene. And if the at least one piece of characteristic information in the current scene image is successfully matched with the at least one piece of characteristic information in the preset payment scene, judging that the current payment scene information is successfully matched with the preset payment scene information.
And when the current payment scene is the preset payment scene, the preset decryption condition is met.
In this way, the embodiment can accurately judge whether the current payment scene is matched with the preset payment scene, when the current payment scene is the preset payment scene, the decryption instruction is responded, the display auxiliary picture is cancelled, the two-dimensional code picture is displayed, and then the payee only needs to sweep the payment two-dimensional code displayed on the mobile terminal by the payer, so that payment can be realized, the safety of mobile payment can be improved, and the payment experience of a user is improved.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an embodiment of a mobile terminal according to the present application. The present application provides a mobile terminal 70, the mobile terminal 70 includes a processor 71, a memory 73 and a display 72, the processor 71 is coupled to the memory 73 and the display 72.
The display screen 72 is used for displaying a two-dimensional code picture for payment when the mobile terminal 70 starts payment, and when a preset encryption condition is met, the display screen 72 is used for displaying an auxiliary picture on the two-dimensional code picture, wherein the auxiliary picture is used for shielding the two-dimensional code picture, and when the preset encryption condition is met, the processor 71 is used for canceling the display of the auxiliary picture so that the display screen 72 displays the two-dimensional code picture.
Specifically, the mobile terminal 70 referred to in this application according to the embodiment of the present application may be a mobile terminal 70 capable of running a payment application, such as a mobile phone, a tablet computer, a palmtop computer, a notebook computer, a desktop computer, a vehicle-mounted device, and a navigation device, and is not limited herein.
The processor 71 is configured to overlay an auxiliary picture on the two-dimensional code picture, where the auxiliary picture is overlaid on the two-dimensional code picture with a predetermined transparency.
The processor 71 is configured to pre-define a secure payment level and payment information corresponding to each secure payment level, where the payment information includes at least one of a payment amount and a payment method, and set a predetermined transparency corresponding to each secure payment level.
The processor 71 is configured to perform picture blurring processing on the two-dimensional code picture to obtain an auxiliary picture, and display the auxiliary picture.
The processor 71 is configured to input preset fingerprint information into the mobile terminal 70, associate the preset fingerprint information with the encryption instruction, acquire first fingerprint information input by the user, determine whether the first fingerprint information is matched with the preset fingerprint information, and if the first fingerprint information is matched with the preset fingerprint information successfully, determine that the encryption instruction is input by the user and meet a preset encryption condition.
The display screen 72 is configured to continuously display the auxiliary picture on the two-dimensional code picture when it is detected that the user continuously inputs the first fingerprint information, and the processor 71 is configured to cancel displaying the auxiliary picture when it is detected that the user stops inputting the first fingerprint information and a preset decryption condition is met.
The processor 71 is configured to preset a preset duration, perform timing when the two-dimensional code picture is displayed on the display screen 72, and meet a preset encryption condition when the timing time reaches the preset duration, where the preset duration is less than 1 minute.
The processor 71 is configured to input preset gesture information into the mobile terminal 70, associate the preset gesture information with a decryption instruction, capture a user gesture, and determine whether the user gesture matches the preset gesture information, and if the matching is successful, the processor 71 is configured to determine that the user inputs the decryption instruction, so that a preset decryption condition is met. The preset gesture is at least one of clicking the auxiliary picture, sliding the auxiliary picture, long-pressing the auxiliary picture, turning over the auxiliary picture, clicking the decryption button or sliding the screen.
The mobile terminal 70 includes a camera 74, the camera 74 is coupled to the processor 71, the camera 74 of the mobile terminal 70 is started, the camera 74 is used for acquiring a current scene image where the mobile terminal 70 is located, the processor 71 is used for separating the current scene image through an image segmentation algorithm, and the processor 71 is further used for extracting feature information in the current scene image and determining a current payment scene according to the feature information. And when the current payment scene is the preset payment scene, the preset decryption condition is met.
Different from the situation in the prior art, the mobile terminal 70 of this embodiment displays the auxiliary picture on the two-dimensional code picture for payment when meeting the preset encryption condition, so as to implement encryption processing on the two-dimensional code picture, and can cancel the display of the auxiliary picture when meeting the preset decryption condition, so as to display the two-dimensional code picture, and then the payee only needs to scan the payment two-dimensional code displayed on the mobile terminal 70 by the payer, and can implement payment, in the process, the user can encrypt the two-dimensional code picture, so as to avoid scanning the payment two-dimensional code by lawless persons and stealing money in the period of waiting for the payee to scan the payment two-dimensional code, thereby improving the security of mobile payment, and improving the payment experience of the user. Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of the device with a storage function according to the present application. The present application provides a device 10 having a storage function, the device 10 storing program data 11, the program data 11 being executable to implement the two-dimensional code encryption method as described above.
The device 10 having a storage function may be used for the mobile terminal 70 described above, or may be used for a server.
The computer program 11 stored in the apparatus 10 with storage function of this embodiment is similar to the computer program stored in the memory 73 in the above-mentioned embodiment of the mobile terminal 70, and the method steps implemented when being executed by the processor 71 are similar, and are not described herein again.
The technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in the form of a software product, the program data 11 is stored in a device 10 with a storage function, and the device 10 with a storage function includes several instructions to enable a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. The foregoing device 10 with storage function includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes.
The above description is only an embodiment of the present embodiment, and not intended to limit the scope of the present embodiment, and all modifications made by the equivalent structures or equivalent processes in the descriptions and the drawings of the present embodiment, or directly or indirectly applied to other related technical fields, are included in the scope of the present embodiment.
Claims (10)
1. A two-dimensional code encryption method is characterized by comprising the following steps:
when the mobile terminal starts payment, displaying a two-dimensional code picture for payment;
displaying an auxiliary picture on the two-dimensional code picture when a preset encryption condition is met, wherein the auxiliary picture is used for shielding the two-dimensional code picture;
and when the preset decryption condition is met, the auxiliary picture is cancelled to be displayed so as to display the two-dimensional code picture.
2. The method according to claim 1, wherein the step of displaying the auxiliary picture on the two-dimensional code picture comprises:
overlaying the auxiliary picture on the two-dimensional code picture;
wherein the auxiliary picture is covered on the two-dimensional code picture with a preset transparency.
3. The method of claim 2, wherein the step of overlaying the auxiliary picture on the two-dimensional code picture is preceded by the method further comprising:
predefining a security payment level and payment information corresponding to each security payment level, wherein the payment information comprises at least one of payment amount and payment mode;
setting the predetermined transparency corresponding to each of the secure payment levels.
4. The method according to claim 1, wherein the step of displaying the auxiliary picture on the two-dimensional code picture comprises:
and carrying out picture fuzzy processing on the two-dimension code picture to obtain the auxiliary picture, and displaying the auxiliary picture.
5. The method according to claim 1, wherein before the step of displaying the auxiliary picture on the two-dimensional code picture, the method further comprises:
inputting preset fingerprint information into the mobile terminal, and associating the preset fingerprint information with an encryption instruction;
acquiring first fingerprint information input by a user, and judging whether the first fingerprint information is matched with the preset fingerprint information;
if the matching is successful, determining that the encryption instruction is input by the user and meets the preset encryption condition;
when the user is detected to continuously input the first fingerprint information, continuously displaying an auxiliary picture on the two-dimensional code picture;
and when the condition that the user stops inputting the first fingerprint information is detected, the preset decryption condition is met, and the auxiliary picture is cancelled to be displayed.
6. The method according to claim 1, wherein before the step of displaying the auxiliary picture on the two-dimensional code picture, the method further comprises:
presetting the preset time length;
timing is started when the two-dimension code picture is displayed;
when the timing time reaches the preset time length, the preset encryption condition is met;
wherein the preset time is less than 1 minute.
7. The method of claim 1, wherein prior to the step of canceling the display of the auxiliary picture, the method further comprises:
inputting preset gesture information into the mobile terminal, and associating the preset gesture information with a decryption instruction;
capturing a user gesture, and judging whether the user gesture is matched with the preset gesture information;
if the matching is successful, determining that the decryption instruction is input by the user and meets the preset decryption condition;
the preset gesture is at least one of clicking the auxiliary picture, sliding the auxiliary picture, long-pressing the auxiliary picture, turning over the auxiliary picture, clicking a decryption button or sliding a screen.
8. The method of claim 1, wherein prior to the step of canceling the display of the auxiliary picture, the method further comprises:
starting a camera of the mobile terminal;
acquiring a current scene image of the mobile terminal through the camera;
extracting feature information in the current scene image;
determining a current payment scene according to the characteristic information;
and when the current payment scene is a preset payment scene, the preset decryption condition is met.
9. A mobile terminal, comprising a processor, a memory, and a display screen, the processor coupled to the memory and the display screen;
the display screen is used for displaying a two-dimensional code picture for payment when the mobile terminal starts payment; the processor is used for enabling the display screen to display an auxiliary picture on the two-dimensional code picture when a preset encryption condition is met, wherein the auxiliary picture is used for encrypting the two-dimensional code picture; the processor is further configured to cancel displaying the auxiliary picture when a preset decryption condition is met, so that the display screen displays the two-dimensional code picture;
the memory is used for storing the two-dimensional code picture and the auxiliary picture.
10. An apparatus having a storage function, characterized in that the apparatus stores program data executable to implement the two-dimensional code encryption method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811401678.5A CN111210220A (en) | 2018-11-22 | 2018-11-22 | Two-dimensional code encryption method, mobile terminal and device with storage function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811401678.5A CN111210220A (en) | 2018-11-22 | 2018-11-22 | Two-dimensional code encryption method, mobile terminal and device with storage function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111210220A true CN111210220A (en) | 2020-05-29 |
Family
ID=70789510
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811401678.5A Withdrawn CN111210220A (en) | 2018-11-22 | 2018-11-22 | Two-dimensional code encryption method, mobile terminal and device with storage function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111210220A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116151297A (en) * | 2023-04-19 | 2023-05-23 | 安徽瑞邦数科科技服务有限公司 | Dynamic two-dimensional code system and device based on time transformation mechanism |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103973891A (en) * | 2014-05-09 | 2014-08-06 | 平安付智能技术有限公司 | Data security processing method for software interface |
CN105653963A (en) * | 2014-11-20 | 2016-06-08 | 阿里巴巴集团控股有限公司 | Information display method and device |
CN105894280A (en) * | 2016-03-29 | 2016-08-24 | 努比亚技术有限公司 | Mobile terminal and method capable of hiding payment code |
WO2017118317A1 (en) * | 2016-01-06 | 2017-07-13 | 阿里巴巴集团控股有限公司 | Information image display method, a barcode payment method, and device |
CN106991311A (en) * | 2017-03-30 | 2017-07-28 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
CN107644333A (en) * | 2016-07-22 | 2018-01-30 | 展讯通信(上海)有限公司 | Barcode scanning method of payment, device and payment terminal |
-
2018
- 2018-11-22 CN CN201811401678.5A patent/CN111210220A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103973891A (en) * | 2014-05-09 | 2014-08-06 | 平安付智能技术有限公司 | Data security processing method for software interface |
CN105653963A (en) * | 2014-11-20 | 2016-06-08 | 阿里巴巴集团控股有限公司 | Information display method and device |
WO2017118317A1 (en) * | 2016-01-06 | 2017-07-13 | 阿里巴巴集团控股有限公司 | Information image display method, a barcode payment method, and device |
CN105894280A (en) * | 2016-03-29 | 2016-08-24 | 努比亚技术有限公司 | Mobile terminal and method capable of hiding payment code |
CN107644333A (en) * | 2016-07-22 | 2018-01-30 | 展讯通信(上海)有限公司 | Barcode scanning method of payment, device and payment terminal |
CN106991311A (en) * | 2017-03-30 | 2017-07-28 | 维沃移动通信有限公司 | A kind of information processing method and mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116151297A (en) * | 2023-04-19 | 2023-05-23 | 安徽瑞邦数科科技服务有限公司 | Dynamic two-dimensional code system and device based on time transformation mechanism |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10817705B2 (en) | Method, apparatus, and system for resource transfer | |
US20170124386A1 (en) | Method, device and computer-readable medium for region recognition | |
US20190220609A1 (en) | Digital touch screen device and method of using the same | |
US8649575B2 (en) | Method and apparatus of a gesture based biometric system | |
US9412017B1 (en) | Methods systems and computer program products for motion initiated document capture | |
US20170124719A1 (en) | Method, device and computer-readable medium for region recognition | |
US10742844B2 (en) | Hiding sensitive data | |
US10095949B2 (en) | Method, apparatus, and computer-readable storage medium for area identification | |
US10007841B2 (en) | Human face recognition method, apparatus and terminal | |
CN102129554B (en) | Method for controlling password input based on eye-gaze tracking | |
CN112804445B (en) | Display method and device and electronic equipment | |
US20100226530A1 (en) | System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities | |
US20120320181A1 (en) | Apparatus and method for security using authentication of face | |
CN105117122A (en) | Terminal screenshot method and terminal | |
CN113486377A (en) | Image encryption method and device, electronic equipment and readable storage medium | |
CN110619239A (en) | Application interface processing method and device, storage medium and terminal | |
EP3454191B1 (en) | Electronic device including display and method of providing private information | |
US20170249450A1 (en) | Device and Method for Authenticating a User | |
CN113552989A (en) | Screen recording method, device and electronic device | |
WO2022268023A1 (en) | Fingerprint recognition method and apparatus, and electronic device and readable storage medium | |
CN113128244A (en) | Scanning method and device and electronic equipment | |
CN111210220A (en) | Two-dimensional code encryption method, mobile terminal and device with storage function | |
US11880822B2 (en) | System and method for activating a physical token in augmented reality | |
CN114463013A (en) | Face payment method and device, electronic equipment and storage medium | |
CN113282364A (en) | Display method, display device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200529 |
|
WW01 | Invention patent application withdrawn after publication |