Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for obtaining designated information

A technology for specifying information and obtaining methods, applied in the field of information security, can solve problems such as information leakage, information security cannot be guaranteed, and achieve the effects of expanding applications, improving fun, and enhancing interactive experience

Inactive Publication Date: 2012-02-22
SHANGHAI HEHE INFORMATION TECH DEV
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a method and system for obtaining designated information, which is used to solve the problem of information leakage in the prior art that information security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for obtaining designated information
  • Method and system for obtaining designated information
  • Method and system for obtaining designated information

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0047] Registered user A saves a piece of multimedia information on the server of website W, specifies that registered user B has the right to obtain, and sets verification information such as a password required for obtaining said multimedia information; registered user B logs in to website W, The website server prompts the registered user B to have a piece of multimedia information transmitted from the registered user A, and requires to submit the correct password; the registered user B can successfully obtain the multimedia information from the website server only after submitting the correct password. The multimedia information includes text, image, sound, video, any combination of them, or other various multimedia information.

[0048] In this embodiment, the password refers to a character string consisting of one or more characters. The password can be a certain string of characters that only registered user A and registered user B know, or it can be the answer to a cert...

no. 2 example

[0050] For a piece of text (which can be a word, a phrase, a sentence, or multiple sentences), registered user A adds annotations or comments to this text, and saves the annotations or instructions on the server of website W Designated registered user B can see that what registered user B sees in normal paper documents or electronic documents is this text itself, and when registered user B logs in to website W and enters this text (at this time, this When a paragraph of text is used as verification information), you can see the comments or comments made by registered user A. The annotation or instruction includes text, image, sound, video, any combination thereof, or other various multimedia information.

no. 3 example

[0052]For a piece of text (it can be a word, a phrase, a sentence, or multiple sentences), both registered user A and registered user B have added annotations or comments for this piece of text, and saved the annotations or comments in the The designated registered user C on the server of website W can see that what user C sees in normal paper documents or electronic documents is this text itself, and when registered user C logs in to website W and enters this text ( At this time, when this text is used as verification information), you can see the comments or comments made by registered user A and registered user B at the same time. The annotation or instruction includes text, image, sound, video, any combination thereof, or other various multimedia information. Moreover, although registered user C inputs the same text, the annotations or instructions he sees are from registered user A and registered user B respectively.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for obtaining designated information. The obtaining method comprises the following steps that: when a web server searches that designated information that is designated by an information source registered user to an information sink registered user is stored, the information sink registered user is required to provide verification information; the verification information is correlated with the information sink registered user and / or the designated information; the web server receives the verification information that is submitted by the information sink registered user, wherein the verification information includes a character string that is formed by one or a plurality of characters; the web server verifies the correctness of the verification information submitted by the information sink registered user; and when the web server verifies that the verification information is correct, the stored designated information is provided for the information sink registered user. Compared with the prior art, the technology provided in the invention enables verification information to be additionally added and security of the information to be enhanced; meanwhile, interest of information transmission can be improved by guessing the verification information and contents of the transmitted verification information can also be expanded.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for obtaining specified information through a network. Background technique [0002] At present, the network technology is very mature. The Internet and the mobile Internet mainly for mobile devices such as mobile phones have entered people's daily life. and other activities. For example, various social networking sites are widely used in people's daily life, such as domestic QQ, Renren, Kaixin, and foreign Facebook, Twitter, MSN, etc. A social networking site is an Internet application service designed to help people build a social network. It mainly provides functions such as writing blogs, posting photos, designing personal space, listening to music, and playing games. It virtualizes people's daily life in reality in the network environment. Behavior, to meet the needs of users to express themselves, communicate and share conveniently and qui...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L9/321
Inventor 镇立新龙腾罗希平陈青山曹璐
Owner SHANGHAI HEHE INFORMATION TECH DEV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More