An information processing method and electronic device

An information processing method and technology of electronic equipment, applied in the electronic field, can solve problems such as inability to effectively prevent illegal operations, and achieve the effect of improving user resource security and improving user experience

Active Publication Date: 2021-02-19
LENOVO (BEIJING) LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides an information processing method and electronic equipment, which are used to solve the technical problem in the prior art that illegal operations on user resources cannot be effectively prevented, and achieve the technical effect of improving the security of user resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method and electronic device
  • An information processing method and electronic device
  • An information processing method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] Please refer to figure 1 , the embodiment of the present application provides an information processing method, including:

[0055] S10: Obtain an access operation for the first resource in the first electronic device;

[0056] S20: When the access operation is included in the set of normal access operations, respond to the access operation;

[0057] S30: When the access operation is not included in the set of normal access operations, send a notification message to the second electronic device corresponding to the first user, so that the first user can confirm whether the access operation is Normal operation, wherein the first user is the user to which the first resource belongs;

[0058] S40: Receive feedback information sent by the second electronic device based on the notification information, and perform corresponding processing on the access operation based on the feedback information.

[0059] In a specific implementation process, the first electronic device m...

Embodiment 2

[0087] Based on the same inventive concept as Embodiment 1 of this application, please refer to figure 2 , Embodiment 2 of the present application provides an electronic device, including:

[0088] Processor 21, configured to obtain an access operation for the first resource in the electronic device, and to respond to the access operation when the access operation is included in a set of normal access operations, and to respond to the access operation when the access operation When not included in the set of normal access operations, generate a notification message;

[0089] A transmitter 22, connected to the processor 21, configured to send the notification information to the first electronic device corresponding to the first user, so that the first user can confirm whether the access operation is a normal operation, wherein , the first user is the user to which the first resource belongs;

[0090] A receiver 23, connected to the processor 21, configured to receive the fee...

Embodiment 3

[0106] Based on the same inventive concept as the first embodiment of the present application, the third embodiment of the present application provides an electronic device, please refer to image 3 ,include:

[0107] An obtaining unit 31, configured to obtain an access operation for the first resource in the electronic device;

[0108] A response unit 32, configured to respond to the access operation when the access operation is included in the set of normal access operations;

[0109] A sending unit 33, configured to send a notification message to a first electronic device corresponding to the first user when the access operation is not included in the set of normal access operations, so that the first user confirms the Whether the access operation is a normal operation, wherein the first user is the user who belongs to the first resource;

[0110] The receiving unit 34 is configured to receive feedback information sent by the first electronic device based on the notificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an information processing method and an electronic device. The method includes: obtaining an access operation for a first resource in the first electronic device; when the access operation is included in a set of normal access operations, responding to the Access operation; when the access operation is not included in the set of normal access operations, send a notification message to the second electronic device corresponding to the first user, so that the first user can confirm whether the access operation It is a normal operation, wherein the first user is the user who belongs to the first resource; receiving feedback information sent by the second electronic device based on the notification information, and performing the access operation based on the feedback information Corresponding processing. The present invention provides the above method, which is used to solve the technical problem in the prior art that illegal operations on user resources cannot be effectively prevented, and achieves the technical effect of improving the security of user resources.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an information processing method and electronic equipment. Background technique [0002] With the continuous development of science and technology, cloud computing, as a new type of computing mode, has gradually entered people's lives. Cloud computing can provide users with automated means to access various resources through the network. Due to the insecure nature of the network itself, it will Virtual resources that lead to cloud computing may be used illegally. In the prior art, password protection is applied to the protection of virtual resources, and virtual resources can only be used after passing password verification. However, there is a risk of password leakage when password verification is used. Illegal operation of resources. [0003] In the process of implementing the technical solutions in the embodiments of the present application, the inventors of the present ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/62
Inventor 杨杰
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products