Information transmission method and terminal
An information transmission and terminal technology, applied in transmission systems, electrical components, etc., can solve the problems of virus bringing into the intranet, file insertion, virus entering the intranet, etc., to avoid potential security risks and improve security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0061] Please refer to figure 1 and image 3 , an information transmission method, comprising the steps of:
[0062] S1. Obtain a file to be transferred through an external network device, add a preset keyword to the file to be transferred, and display the file to be transferred to which the preset keyword has been added.
[0063] Wherein, said obtaining the file to be transferred through the external network device, and adding preset keywords to the file to be transferred includes:
[0064] Obtaining the file to be transferred and the review request of the file to be transferred through the external network device;
[0065] According to the review request of the file to be transmitted, a preset keyword for review is added to the file to be transmitted.
[0066] Specifically, in this embodiment, after the mobile terminal clicks the "Please review" button, the file to be transmitted is sent to the external network device, and the external network device obtains the file to b...
Embodiment 2
[0080] Please refer to image 3 , the difference between this embodiment and the first embodiment is that it further defines how to identify and filter the information of the shooting file:
[0081] Specifically, the identifying and filtering the preset illegal characters in the shooting file on the intranet includes:
[0082] Identifying the shooting file in the intranet, judging whether the shooting file contains the preset keyword, if so, judging whether the shooting file contains the preset dangerous keyword, and if so, deleting the shooting file , otherwise filter the preset illegal characters in the shooting file;
[0083] If the preset keyword is not included, the shooting file is saved.
[0084] In this embodiment, if the shooting file contains the keyword "need to be converted to text", it is judged whether the shooting file contains preset dangerous keywords, such as "http: / / www" and ".exe". The preset dangerous keywords directly delete the shooting file, otherwis...
Embodiment 3
[0087] Please refer to figure 2 , an information transmission terminal, including a memory, a processor, and a computer program stored in the memory and operable on the processor, and the processor implements the information in Embodiment 1 or Embodiment 2 when executing the computer program The individual steps of the transfer method.
[0088] To sum up, in the information transmission method and terminal provided by the present invention, after the external network device obtains the file to be transmitted, it adds the preset audit keyword and the preset identification and filtering keyword to the file to be transmitted, and then adds the added The files to be transferred with keywords are displayed on the external network device; the display content of the external network device is captured by the internal network camera, and the captured files are stored and identified for non-electronic invoice captured files, and the captured files with dangerous keywords are directly ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


