WO2022262377A1 - Procédé et appareil d'affichage, dispositif, support de stockage lisible par ordinateur et programme d'ordinateur - Google Patents

Procédé et appareil d'affichage, dispositif, support de stockage lisible par ordinateur et programme d'ordinateur Download PDF

Info

Publication number
WO2022262377A1
WO2022262377A1 PCT/CN2022/085505 CN2022085505W WO2022262377A1 WO 2022262377 A1 WO2022262377 A1 WO 2022262377A1 CN 2022085505 W CN2022085505 W CN 2022085505W WO 2022262377 A1 WO2022262377 A1 WO 2022262377A1
Authority
WO
WIPO (PCT)
Prior art keywords
bound
identity
information code
code
display
Prior art date
Application number
PCT/CN2022/085505
Other languages
English (en)
Chinese (zh)
Inventor
田真
李斌
欧华富
王鼎禄
Original Assignee
上海商汤智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海商汤智能科技有限公司 filed Critical 上海商汤智能科技有限公司
Publication of WO2022262377A1 publication Critical patent/WO2022262377A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0641Shopping interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products

Definitions

  • the present disclosure relates to terminal technologies, and in particular to a display method, device, equipment, computer readable storage medium and computer program.
  • Embodiments of the present disclosure provide a display method, device, device, computer-readable storage medium, and computer program, which can improve the security of active content with specific permissions in a target application program.
  • An embodiment of the present disclosure provides a display method, including: acquiring a first identity bound to a target application by scanning an information code of a target item; detecting whether the first identity is bound to an information code of the target item; When it is detected that the first identity has been bound to the information code of the target item, display the activity content with specific authority in the target application program.
  • the above method further includes, when it is detected that the first identity is not bound to the information code of the target item and a binding operation is detected, binding the first identity with the information code.
  • the information code corresponds to encoded information
  • the detecting whether the first identity is bound to the information code of the target item includes: acquiring the encoded information obtained by scanning the information code; Detecting whether the first identity is bound to the coded information.
  • binding the first identity with the information code includes: in the case of detecting the binding operation, determining The number of second identities bound to the code; if the number of the second identities is less than the preset number, bind the first identities to the information code.
  • the above method further includes: after detecting that the first identity is not bound to the information code of the target item, and after the augmented reality effect is played, displaying a prompt message to be bound.
  • the above method further includes: when the first identity has been bound to the information code of the target item and an unbinding operation is detected, releasing the binding between the first identity and the information code .
  • releasing the binding between the first identity and the information code includes: displaying the unbinding ID when the unbinding operation is detected Prompt information: when an unbinding confirmation operation is detected, the binding between the first identity identifier and the information code is released, and a successful unbinding prompt message for prompting successful unbinding is displayed.
  • the target application program before acquiring the first identity bound to the target application by scanning the information code of the target item, it further includes: when an opening operation for the target application is received, starting the The target application program displays a preset page of the target application program, and obtains the service request operation of the activity with the specific permission acting on the preset page; or obtains the first action corresponding to the activity with the specific permission.
  • the above method further includes: displaying the content of the activity with general authority in the target application program in the case of receiving a service request operation acting on the activity with general authority on the preset page.
  • the above method further includes: generating a second network link according to the activity content and sharing the second network link after the display of the activity content with specific authority ends and a sharing operation is detected.
  • An embodiment of the present disclosure provides a display device, including: an acquisition part configured to acquire a first identity bound to a target application by scanning an information code of the target item; a detection part configured to detect the first identity An information code that identifies whether to bind the target item; the display part is configured to display that the target application program has a specific Active content of permissions.
  • An embodiment of the present disclosure provides an electronic device, including: a display screen; a memory configured to store an executable computer program; a processor configured to execute the executable computer program stored in the memory in combination with the display screen Implement the display method described above.
  • An embodiment of the present disclosure provides a computer-readable storage medium, on which is stored a computer program configured to cause a processor to implement the above display method when executed.
  • An embodiment of the present disclosure provides a computer program, including computer readable codes.
  • a processor in the electronic device implements the above display method when executed.
  • FIG. 1 is a schematic diagram of an optional architecture of a display system provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure
  • FIG. 3 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure.
  • FIG. 4 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure.
  • FIG. 5 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure.
  • FIG. 6 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure.
  • FIG. 7 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure.
  • Fig. 8 is a schematic diagram of a display effect of an exemplary anti-counterfeiting binding page and a prompt window provided by an embodiment of the present disclosure
  • FIG. 9 is a schematic diagram of a display effect of an exemplary binding prompt page provided by an embodiment of the present disclosure.
  • FIG. 10 is an optional schematic flowchart of a display method provided by an embodiment of the present disclosure.
  • FIG. 11 is an optional schematic flowchart of a display method provided by an embodiment of the present disclosure.
  • Fig. 12 is a schematic diagram of a display effect of an exemplary code scanning prompt page and a code scanning page provided by an embodiment of the present disclosure
  • FIG. 13 is a schematic structural diagram of a display device provided by an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram of an electronic device provided by an embodiment of the present disclosure.
  • Mini Program also known as Web Program (Web Program)
  • Web Program is a front-end-oriented language (such as JavaScript) developed and implemented in Hyper Text Markup Language (HTML, Hyper Text Markup Language) pages
  • the program of the service is downloaded by the client (such as a browser or any client with an embedded browser core) via the network (such as the Internet), and interpreted and executed in the browser environment of the client, saving installation in the client A step of.
  • client such as a browser or any client with an embedded browser core
  • the network such as the Internet
  • interpreted and executed in the browser environment of the client saving installation in the client A step of.
  • a small program for realizing singing service can be downloaded and run in the social network client.
  • Augmented Reality Augmented Reality
  • AR Augmented Reality
  • AR augmented reality technology is a relatively new technical content that promotes the integration of real world information and virtual world information content, which will Physical information, which is difficult to experience in the real world, is simulated and processed on the basis of computer and other science and technology, superimposed to effectively apply virtual information content in the real world, and in this process can be Perceived by human senses, so as to achieve a sensory experience beyond reality. After overlapping between the real environment and virtual objects, they can exist simultaneously in the same picture and space.
  • Union Identity document if the developer has multiple mobile applications, website applications and public accounts (including applets), the uniqueness of users can be distinguished by unionID, because as long as the same application is open
  • the user's unionID is unique for mobile applications, website applications and public accounts (including mini programs) under the platform account. In other words, for the same user, the unionID is the same for different applications under the same application open platform.
  • One item, one code is not a simple code scanning promotional tool, but a cloud-based platform that connects consumers, brand merchants, and circulation, so as to provide comprehensive solutions for digital marketing, anti-counterfeiting traceability, warehousing and logistics, etc.
  • An enterprise-level software as a service (Software as a Service, SaaS) technology is an effective technology for the digital transformation of enterprise marketing.
  • Brand merchants use the "one item, one code” technology to assign a smart "QR code” with a digital identity to each product.
  • code scanners for example, consumers, shopping guides, distributors, etc.
  • brand owners have also completed data collection.
  • the user scans the code, "one item, one code” will automatically establish the personal account of the code reader based on the third-party tools and brand merchants used when scanning the code, and help the brand to count the original data of the code reader (for example, gender) , age, etc.), behavioral data (for example, what did you do? What activities did you participate in?), transaction data (for example, what did you buy? when did you buy it?
  • An embodiment of the present disclosure provides a display method, which can improve the security of active content with specific permissions in a target application program.
  • the display method provided by the embodiments of the present disclosure is applied to electronic equipment.
  • the electronic device provided by the embodiment of the present disclosure can be implemented as augmented reality (Augmented Reality, AR) glasses, a notebook computer, a tablet computer, a desktop computer, a set-top box, a mobile device (for example, various types of user terminals (hereinafter referred to as terminals) such as mobile phones, portable music players, smart watches, personal digital assistants, dedicated information devices, and portable game devices).
  • augmented reality Augmented Reality
  • AR Augmented Reality
  • notebook computer a tablet computer
  • desktop computer a set-top box
  • a mobile device for example, various types of user terminals (hereinafter referred to as terminals) such as mobile phones, portable music players, smart watches, personal digital assistants, dedicated information devices, and portable game devices).
  • terminals various types of user terminals (hereinafter referred to as terminals) such as mobile phones, portable music players, smart watches, personal digital assistants, dedicated information devices, and portable game devices).
  • FIG. 1 is a schematic diagram of an optional architecture of a display system provided by an embodiment of the present disclosure.
  • a terminal (electronic device) 400 (an example shows a terminal 400 -1 and the terminal 400-2) are connected to the server 200 through the network 300, the network 300 may be a wide area network or a local area network, or a combination of both.
  • the terminal 400 is used to scan the information code of the target item to obtain the first identity bound to the target application; and send the acquired first identity to the server 200; the server 200 is used to detect whether the first identity is consistent with the target item bind the information code of the target item, and return the detection result to the terminal 400; the terminal 400 is configured to, in the case of detecting that the first identity has been bound to the information code of the target item, on the graphical interface 401 (the graphical interface 401 is shown as an example) -1 and graphical interface 401-2) display the active content with specific permissions in the target application.
  • the server 200 can be an independent physical server, or a server cluster or a distributed system composed of multiple physical servers, and can also provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, Cloud servers for basic cloud computing services such as network services, cloud communications, middleware services, domain name services, security services, CDN, and big data and artificial intelligence platforms.
  • the terminal and the server may be connected directly or indirectly through wired or wireless communication, which is not limited in this embodiment of the present disclosure.
  • the terminal 400 may not use the server 200 to detect whether the first identity is bound to the information code of the target item.
  • FIG. 2 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure, which will be described in conjunction with the steps shown in FIG. 2 .
  • a target application program is preset, and the target application program has content related to the target item, and the content related to the target item can be obtained after entering the target application program.
  • Each target item is provided with an information code (for example, a two-dimensional code, a bar code, etc.), and different target items have different information codes.
  • the target item may be an item for sale or display. For example, it may be an item related to culture, which is not limited in this embodiment of the present disclosure.
  • the target item can be a limited product related to culture, for example, a paper calendar or an electronic calendar, etc.; each calendar is provided with an information code, and the information codes on different calendars are different; the target application program can be A small program or third-party application associated with the calendar, and the content related to the calendar is displayed in the small program or third-party application.
  • the first identity may be an identity in the user's third-party tool.
  • the first identity may be unionID.
  • Using the identity mark in the third-party tool can facilitate the management of the first identity mark by the terminal.
  • the terminal can scan the information code of any target item, and if the scanned information code is successfully identified, obtain the first user ID of the terminal corresponding to the target application bound. An identity mark, to determine whether the first identity mark has been bound with the information code on any target item.
  • the terminal can display a code scanning prompt page containing the scanning entry, and when receiving a trigger operation from the user to trigger the scanning entry, the terminal scans the information code through its own image acquisition device (for example, a camera). Scanning and identifying, and in the case of successfully identifying the scanned information code, obtaining the first identity bound to the target application.
  • its own image acquisition device for example, a camera
  • a code scanning prompt message is also displayed on the code scanning prompt page to prompt the user to bind by scanning the code.
  • the prompt message of scanning the code may be "You have not bound xxxx, please scan the anti-counterfeiting QR code of xxxxx to bind".
  • entry may refer to a virtual button that can be triggered such as a link or a control
  • scan entry may refer to scanning a link or scanning a control
  • the terminal when the terminal acquires the first identity bound to the target application program, the terminal may detect whether the first identity has been bound with the information code of any target item. For example, when the terminal obtains the first identity by scanning the information code of the target item A, the terminal can first detect whether the first identity is bound to the information code of the target item A, and after detecting the first identity If it is not bound to the information code of the target item A, check whether the first identity is bound to the information code of other target items from the bound record table stored by itself, so as to detect whether the first identity The information code of the bound target item.
  • the terminal when the terminal detects that the first identity has been bound to the information code of any target item, the terminal can show the user corresponding to the first identity the information of the target application with specific permissions. Activities.
  • the terminal can jump to the activity content page, and display the activity content with specific permissions in the target application program to the user corresponding to the first identity through the content displayed on the activity content page.
  • the first identity of the user bound to the target application is obtained by scanning the information code of the target item, and further by detecting the Whether the first identity is bound to the information code of the target item to verify whether the user has access to the activity content with specific permissions, and when it is detected that the first identity has been bound to the information code of the target item, the target application is displayed Active content with specific permissions in the target application, so that only users with specific permissions can browse the active content with specific permissions in the target application, improving the security of the active content with specific permissions in the target application.
  • the target item is a limited product that needs to be purchased
  • only users who own the limited product and bind the information code on the limited product can obtain it in the target application
  • the active content with a specific permission but the user who is not bound to the limited product cannot obtain the active content with the specific permission in the target application, thereby maintaining the rights and interests of the user who purchases the limited product.
  • FIG. 3 is an optional schematic flow chart of a display method provided by an embodiment of the present disclosure, which will be described in conjunction with the steps shown in FIG. 3 .
  • each information code corresponds to an encoded information code
  • different information codes correspond to different codes.
  • the terminal scans the information code, it can recognize the code corresponding to the information code, and when the first identity is obtained and the code corresponding to the scanned information code is recognized, it can detect whether the first identity is Binding with the identified code, and when it is detected that the first identity is not bound to the identified code, from the bound record table stored by itself, look up whether the first identity is related to other targets
  • the code binding corresponding to the information code of the item in order to complete the detection of whether the first identity is bound to the information code.
  • the method further includes S104; S102 in FIG. 2 will be taken as an example and described in conjunction with the steps shown in FIG. 4 .
  • the terminal when the terminal detects that the first identity is not bound to any information code of the target item, and also detects the user's binding operation, it can combine the first identity with the scanned Information code binding.
  • the terminal when it detects that the first identity is not bound to any information code, it can jump to a page (hereinafter referred to as the anti-counterfeiting page), and display the binding entry on the anti-counterfeiting page.
  • the first identity is bound to the scanned information code according to the binding operation.
  • FIG. 4 is an optional flowchart of a display method provided by an embodiment of the present disclosure , which will be described in conjunction with the steps shown in FIG. 5 .
  • the number of identities that can be bound to each information code is a preset fixed value, and the terminal first determines that the scanned information code has been bound when receiving the user's binding operation.
  • each code can be bound with a preset number of identities. Since each information code corresponds to a code, the terminal can determine the number of identities bound to the code corresponding to the information code. Determine the number of second identities that have been bound to the information code corresponding to the code; for example, when the user needs to bind the information code A to the first identity, the terminal can identify the information code A to obtain Scan the code information code1 to determine the number of identities that have been bound to code1, and use the number of identities that have been bound to code1 as the number of second identities that have been bound to information code A.
  • the preset number may be 1 or 2, which is not limited in the embodiment of the present disclosure.
  • the maximum number of identities that can be bound is preset for each information code, and before binding an information code to an identity, first determine the bound identities of the information code. Whether the number of identities is greater than or equal to the preset number, so that the number of identities bound to the information code can be reasonably and effectively controlled, so that the security of active content with specific permissions in the target application can be further improved .
  • the terminal after the terminal acquires the first identity bound to the target application, it can jump to the anti-counterfeiting page, and when it detects that the first identity is not bound to the information code of the target item, The binding entry is displayed on the anti-counterfeiting page, and in the case of receiving the user's binding operation on the binding entry, the number of the second identifications bound to the scanned information code is determined.
  • the terminal not only displays the binding entry on the anti-counterfeiting page, but also displays prompt information to be bound on the anti-counterfeiting page, so as to prompt the user to perform the binding.
  • the prompt message to be bound may be "You have not bound xx yet, do you want to bind?".
  • the terminal when the terminal determines that the number of second identities bound to the scanned information code is greater than or equal to the preset number, the terminal does not bind the first identity to the information code , and can directly jump to the binding prompt page, and display a binding failure prompt message on the binding prompt page to prompt the user that the information code cannot be bound currently.
  • the binding failure prompt information may be text prompt information, for example, it may be "currently bound to the maximum number of users, please contact the bound users to cancel the binding ⁇ ".
  • the binding failure prompt information may include a retry entry in addition to the text prompt information; when the terminal receives a trigger operation for triggering the retry entry, the terminal may re-determine Find out the number of second identities that have been bound to the scanned information code, and judge whether the number of re-determined second identities is less than the preset number.
  • a binding failure prompt message is displayed, which increases the flexibility of the interaction between the terminal and the user; And, at the user level, the user experience is improved.
  • the method further includes S201:
  • the terminal after the terminal acquires the first identity bound to the target application program, it can also display the AR special effect related to the target item.
  • the terminal can jump to the anti-counterfeiting page, and display AR special effects related to the target item on the anti-counterfeiting page.
  • the AR special effect may be displayed in the form of an AR dynamic image, or may be displayed in the form of an AR video, which is not limited in this embodiment of the present disclosure.
  • the anti-counterfeiting page includes a playback window, and the terminal can display AR special effects through the playback window.
  • S201 may be performed before S102-S103, or may be performed after S102 and before S103, which is not limited in this embodiment of the present disclosure.
  • the terminal after the terminal obtains the first identity, it also displays the AR special effect related to the target item.
  • the AR special effect By displaying the AR special effect, the user can be shown part of the content related to the target item in advance, thereby improving the relationship between the terminal and the user. Flexibility when interacting.
  • the method further includes S202:
  • the terminal when the terminal detects that the first identity is not bound to any information code, and detects that the displayed AR special effect is played, the terminal can display a binding prompt message to prompt the user to bind any information code. An information code is bound.
  • the terminal when the terminal detects that the first identity is not bound to any information code, and detects that the AR special effect displayed on the anti-counterfeiting page ends, the terminal may display binding prompt information on the anti-counterfeiting page.
  • the prompt information to be bound may be text prompt information; for example, the text prompt information may be "You have not bound xx yet, do you want to bind?".
  • the terminal may display the binding entry after the text prompt information is displayed, so as to bind the first identity with the scanned information code when receiving a trigger operation for triggering the binding entry; or , when the trigger operation for triggering the binding entry is received, determine the number of second identities bound to the scanned information code, and if the number of second identities is less than the preset number , binding the first identity with the scanned information code.
  • the prompt information to be bound may include text prompt information and a binding entry
  • the terminal may detect that the first identity is not bound to any information code and detect the AR special effect displayed on the anti-counterfeiting page In the case of completion, the binding prompt information and the binding entry will be displayed on the anti-counterfeiting page at the same time.
  • the method further includes S203:
  • the AR special effect, the binding entry and the prompt information to be bound can be displayed through the anti-counterfeiting page. In this way, the AR special effect, the binding entry and the binding prompt information can be displayed on the anti-counterfeiting page at the same time, so as to improve the display efficiency.
  • the method further includes S301:
  • the terminal when the terminal detects that the first identity has been bound to the information code of the target item, and detects that the user unbinds the first identity from the information code, the terminal unbinds the first identity.
  • the binding relationship between the identity mark and the information code of the bound target item, and after the binding relationship is released, the state of the first identity mark is not bound to any information code of the target item.
  • the terminal when the terminal detects that the first identity identifier has been bound to the information code of the target item, it jumps to the anti-counterfeiting page, and displays the unbinding entry and the bound prompt information on the anti-counterfeiting page.
  • the prompt information is used to prompt the user that the first identity has been bound with the information code, and the user can check the activity content related to the target item.
  • the bound prompt information may be "You have activated xxx, go and check the AR gift that xx sent you".
  • the unbinding entry may be displayed after the bound prompt information is displayed, or may be displayed simultaneously with the bound prompt information, which is not limited in this embodiment of the present disclosure.
  • the terminal when it detects that the first identity identifier has been bound to the information code of the target item, it may display an AR special effect related to the target item on the anti-counterfeiting page.
  • the AR special effect displayed on the anti-counterfeiting page can be the same as when it is detected that the first identity is not bound to the information code of the target item.
  • the AR special effects displayed on the anti-counterfeiting page may be the same or different, which is not limited in this embodiment of the present disclosure.
  • the above S301 can be implemented through S3011-S3012:
  • the terminal when it detects the user's unbinding operation, it can display unbinding prompt information to remind the user that the content related to the target item cannot be viewed after unbinding;
  • an unbinding confirmation operation for the first identity identifier and the information code the binding relationship between the first identity identifier and the information code is released, and a prompt message of successful unbinding is displayed to prompt the user that the unbinding is successful.
  • the unbinding prompt information may be "you cannot continue to view xxx content after unbinding, please re-bind if you need to continue viewing"; the unbinding successful prompt information may be "unbinding successful”.
  • the terminal when it detects the user's unbinding operation, it can jump to the unbinding prompt page, and display the unbinding prompt information and the unbinding confirmation entry through the unbinding prompt page, and detect the In the case of the trigger operation of the unbinding confirmation entry, the binding between the first identity identifier and the information code is released, and a prompt message of successful unbinding is displayed.
  • the binding operation, unbinding operation, unbinding confirmation operation, control operation, trigger operation, opening operation, access operation and sharing operation involved may be user touch operations or Other operations such as key operation by the user are not limited in this disclosure.
  • S401-S403 may also be included:
  • the terminal when the terminal receives the user operation for starting the target application, the terminal starts the target application, displays the preset page in the target application, and can obtain the user's information about the preset page.
  • a service request action for an activity with specific permissions when the terminal receives the user operation for starting the target application, the terminal starts the target application, displays the preset page in the target application, and can obtain the user's information about the preset page.
  • the preset page may be the home page.
  • the terminal when the terminal receives a user operation for starting the target application, the terminal opens the target application and directly displays the home page of the target application, so that the user Browse through the content displayed on the home page.
  • the opening operation may be other operations such as the user's touch operation on the icon of the target application program, clicking on a network link corresponding to the target application program, which is not limited in the embodiment of the present disclosure.
  • the opening operation may be an operation in which the user clicks on the web link of the applet, an operation in which the user pulls down to enter the applet, or an operation in which the user searches to enter the applet. operation etc.
  • the terminal acquires the service request operation of the user's action on the preset page with specific permissions, and the user's first identity has been bound with the information code of the target item, or has not been bound with
  • the terminal will jump to the code scanning prompt page to detect whether the user's code scanning operation has been received through the code scanning prompt page, and if the scanning code operation is detected, scan The information code of the target item.
  • the terminal operates after receiving a service request that the user acts on a preset page with specific permissions, and the user's first identity has been bound with the information code of the target item, or the user's first If an identity is not bound to any information code of the target item, the terminal will jump to the code scanning prompt page, and display the code scanning entry through the code scanning prompt page, and detect whether the user has been received through the code scanning entry.
  • code scanning operation and when the code scanning operation for the scanning code entry is detected, obtain the first identity that is bound to the target application by scanning the information code of the target item, so as to detect whether the first identity The information code of the bound target item.
  • the terminal operates after receiving a service request for an activity with general permissions that the user acts on a preset page, and the user's first identity is not bound to the information code of the target item, or the user If the first identity of the target item has been bound with the information code of the target item, the terminal will jump to the activity display page corresponding to the activity with general authority, so as to display the activity with general authority in the target application through the activity display page.
  • the active content with universal authority may be the active content that all users who have been bound with an information code or have not bound any information code have access authority.
  • the logical sequence between the above-mentioned service request operation for obtaining the activity with specific authority acting on the preset page in S403 and above-mentioned S401 is an exemplary illustration, and the above-mentioned obtaining in S403 and above-mentioned S401 acts on the activity with specific authority on the preset page Permissions for active service request operations can also be performed concurrently.
  • the diversity of displayed content can be increased, and the security of active content with specific permissions in the target application program can be improved.
  • S10-S20 may also be executed:
  • start the target application In the case of receiving the start operation for the target application, start the target application, display a preset page of the target application, and obtain an active service request operation with specific permissions acting on the preset page.
  • the terminal operates after receiving the service request of the user acting on the activity with specific authority on the preset page, and when the user's first identity is not bound with the information code of the target item , the terminal will jump to the code scanning prompt page to detect whether the user’s code scanning operation has been received through the code scanning prompt page, and scan the information code of the target item if the code scanning operation is detected.
  • the terminal when the terminal receives a service request operation of the user acting on a preset page with a specific authority, and the user's first identity has been bound with the information code of the target item, the terminal will Jump directly to the event display page corresponding to the event with specific permissions.
  • a code scanning prompt message is also displayed on the code scanning prompt page to prompt the user to bind by scanning the code.
  • the prompt message of scanning the code may be "You have not bound xxxx, please scan the anti-counterfeiting QR code of xxxxx to bind".
  • a list of multiple activities is displayed on the preset page, wherein the list includes activities with general authority and activities with specific authority, and each activity corresponds to an activity entry.
  • the terminal detects a trigger operation on an activity entry corresponding to an activity with a specific authority, it determines that a control operation of the activity with the specific authority by the user acting on the preset page is received.
  • the specific authority may be the authority of the user to participate in the activity bound with the information code of any target item, or the authority of the user to browse the content of the activity bound with the information code of any target item, or, It may be other permissions, etc., which are not limited in this embodiment of the present disclosure.
  • the method further includes S501-S502; S101 in FIG. 2 will be taken as an example and described in conjunction with the steps shown in FIG. 6 .
  • the terminal after the terminal obtains the user's access operation to the first network link corresponding to the activity with a specific authority, and the user's first identity is not bound to any information code of the target item, or In the case that the user's first identity has been bound to the information code of the target item, the terminal will jump to the code scanning prompt page to detect whether the user's code scanning operation has been received through the code scanning prompt page, and when detected In the case of code scanning operation, scan the information code of the target item.
  • the terminal after the terminal receives the user's access operation on the first network link corresponding to the activity with specific authority, and the terminal detects that the user's first identity is not bound to the information code of the target item Under certain circumstances, the terminal will jump to the code scanning prompt page to detect whether the user's code scanning operation has been received through the code scanning prompt page, and scan the information code of the target item if the code scanning operation is detected.
  • the terminal when the terminal receives the user's access operation on the first network link corresponding to the activity with specific permissions, the terminal will jump to the code scanning prompt page, and display the code scanning prompt page through the code scanning prompt page. Entrance, through the code scanning entrance to detect whether the user's code scanning operation has been received. For example, when user Y1 receives a web link corresponding to an activity with specific permissions in the target application shared by user Y2, after user Y1 opens the web link, the terminal will display a page including the "scan code” control , and detect whether the operation of clicking the "scan code” control by the user Y1 is received.
  • the code scanning prompt page also displays code scanning prompt information to prompt the user to bind by scanning the code.
  • the prompt message of scanning the code may be "You have not bound xxxx, please scan the anti-counterfeiting QR code of xxxxx to bind".
  • the first network link is a network link generated for any activity with a specific authority in the target application program.
  • the terminal detects that the user's first identity has been bound to the information code of any target item, And when the user clicks on the first network link, the user can directly jump to the activity content display page of the activity.
  • the above-mentioned network link corresponding to the target application program is a network link generated for the target application program, and the user's first identity has been bound to the information code of any target item or has not been bound to the information code of any target item. code, and when the user clicks on the network link corresponding to the target application, the user can directly jump to the preset page of the target application, for example, the home page.
  • the terminal when the terminal receives the user's access operation on the first network link corresponding to the activity with specific authority, and the user's first identity has been bound with an information code binding , the terminal will jump directly to the event display page corresponding to the event with specific permissions.
  • the terminal when the terminal receives an access operation for the first network link corresponding to the activity with specific permissions, it jumps to the code scanning prompt page to enable the user to scan the code to bind, and detects that the first network link In the case that an identity identifier has been bound to the information code of the target item, the activity content with specific permissions in the target application is displayed.
  • the method further includes S601:
  • the terminal after the terminal detects that the display of an active content with a specific authority is over, and in the case of detecting the user's sharing operation, it will generate a network connection corresponding to the active content with the specific authority, and send the network connection to the URL or user specified in the sharing operation. For example, when the terminal detects that the display of the active content M with a specific authority has ended, and detects the sharing operation of the user Y2, and the sharing operation indicates that it needs to be shared with the user Y1, the terminal will generate a network corresponding to the active content M. connect and send the network connection to user Y1.
  • the second network link is a network link generated for any activity with a specific authority in the target application program.
  • the first identity of the user has been bound to the information code of any target item, and the user clicks on the second network link.
  • a network link it can directly jump to the activity content display page of the activity.
  • the terminal can jump to the sharing page after detecting that the display of the activity content with specific authority ends, and display the sharing entry on the sharing page. Next, the terminal determines that the user's sharing operation is detected at this time, and then generates a network connection corresponding to the activity content with the specific authority, and sends the network connection to the website or user specified by the sharing operation.
  • the above display method will be exemplarily described below by taking a scenario in which the target item is a calendar as an example, combined with several practical application scenarios.
  • FIG. 7 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure, which will be described in conjunction with the steps shown in FIG. 7 .
  • the terminal obtains the user unionID bound to the applet associated with the calendar by scanning the QR code on the calendar.
  • the terminal detects whether the user unionID is bound to the code corresponding to the two-dimensional code on the calendar.
  • the activity content page of the monthly activity in the applet may include twelve controls of "January”, “February”, ..., "December".
  • the terminal displays the content corresponding to January.
  • the terminal may also display other corresponding content.
  • the menu controls of "monthly”, “activity” and “anti-counterfeiting” are also displayed on the activity content page of the monthly activity in the applet (there may also be no these function controls in practice), wherein the terminal After receiving a click operation on any menu control, the terminal can jump to the corresponding page to display the corresponding content. For example, when the terminal receives a click operation on the "Activity" menu control, The terminal will jump to a page displaying a list of all activities to display all activities in this applet.
  • the terminal When the terminal detects that the user's unionID is not bound to the code corresponding to the QR code on the calendar, it jumps to the anti-counterfeiting binding page, and displays an AR special effect of one item per month on the anti-counterfeiting binding page , the prompt message to be bound and the binding entry.
  • the terminal When the terminal detects the binding operation on the binding entry, it determines the number of user unionIDs bound to the code corresponding to the scanned QR code of the calendar.
  • the terminal After binding the acquired user unionID with the code, the terminal displays a prompt window on the anti-counterfeiting binding page, and displays a binding success prompt message and an experience entry through the prompt window.
  • the anti-counterfeit binding page is shown in Figure 8; where, the prompt message to be bound is "You have not bound the current calendar, do you want to bind", the binding entry is the "OK" control, and the AR special effect is displayed through the window 121 .
  • the terminal when the terminal receives the click operation on the "OK” control, it displays a prompt window, and displays a binding success prompt message "Successful binding, let's experience it" on the prompt window, and Displays the Start Experience control (Entrance to Experience).
  • the terminal receives a trigger operation for the "start experience” control, the terminal jumps to the home page of the applet to display all content.
  • menu controls of "monthly”, “activity” and “anti-counterfeiting” are also displayed on the anti-counterfeiting binding page (in practice, these function controls may not be present), wherein, when the terminal receives any menu control When the control is clicked, the terminal can jump to the corresponding page to display the corresponding content. For example, when the terminal receives a click operation on the "Activity" menu control, the terminal will jump to display all The page of the activity list to display all the activities in this applet.
  • the binding prompt page is shown in Figure 9, where the binding failure text prompt message is "The current calendar has been bound to the maximum number of users, if you want to view the AR effect, please contact the bound user to unbind first",
  • the retry entry is a "retry” control, and the AR special effects are displayed through the window 131 .
  • the menu controls of "monthly”, “activity” and “anti-counterfeiting” are also displayed on the binding prompt page (these functional controls may not be present in practice), wherein, when the terminal receives the When the control is clicked, the terminal can jump to the corresponding page to display the corresponding content. For example, when the terminal receives a click operation on the "Activity" menu control, the terminal will jump to display all The page of the activity list to display all the activities in this applet.
  • FIG. 10 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure, which will be described in conjunction with the steps shown in FIG. 10 .
  • the terminal obtains the user unionID bound to the applet associated with the calendar by scanning the two-dimensional code on the calendar.
  • the terminal detects whether the user unionID is bound to the code corresponding to the two-dimensional code on the calendar.
  • the terminal When the terminal detects an unbinding operation for the unbinding entry, it displays an unbinding prompt window on the anti-counterfeiting default page, and displays unbinding prompt information, unbinding confirmation entry, and cancellation entry through the unbinding prompt window.
  • the binding prompt message is "You have activated the calendar, go and check each AR gift that xx sent you", the unbinding entry is the "unbinding" control, and the AR special effects are displayed through the window.
  • the terminal receives the click operation on the "Unbind” control, it will display the unbind prompt window, and display the unbind prompt message on the unbind prompt window "After unbind, you will not be able to continue to view the AR effect of the calendar. If you want to continue viewing, please rebind", and display the "unbind” control (unbind confirmation entry) and "return” control (cancel entry).
  • menu controls of "monthly”, “activity” and “anti-counterfeiting” are also displayed on the anti-counterfeiting default page (these function controls may not be present in practice), wherein, when the terminal receives the In the case of a click operation, the terminal can jump to the corresponding page to display the corresponding content. For example, when the terminal receives a click operation on the "Activity" menu control, the terminal will jump to display all activities. List page to show all activities in this applet.
  • the terminal when the terminal receives a click operation on the "unbind” control, it redisplays the unbind success prompt window, and displays the unbind success prompt message "unbind successfully" on the unbind success prompt window, and Displays the "OK" control (confirmation entry).
  • the terminal when the terminal receives a click operation on the "OK” control, the terminal can display a code scanning prompt page, and on the scanning code prompt page, a section of AR special effects for one item per month, code scanning prompt information, and code scanning entrance are displayed.
  • the code scanning prompt page is as shown in Figure 12 below.
  • FIG. 11 is a schematic flowchart of an optional display method provided by an embodiment of the present disclosure, which will be described in conjunction with the steps shown in FIG. 11 .
  • the terminal starts the applet when receiving the user's operation of clicking the network link of the applet associated with the calendar, the user's operation of pulling down to enter the applet, or the user's operation of searching and entering the applet, etc., to start the applet. And display the home page of the applet.
  • the terminal When the terminal receives a service request operation for an activity with a specific authority on the home page, it jumps to the code scanning prompt page, and displays a section of AR special effects for one item per month, code scanning, etc. on the code scanning prompt page. Prompt information and scan code entry.
  • the terminal When the terminal receives the code scanning operation for the code scanning entrance, it jumps to the code scanning page to scan and identify the QR code of the calendar, and obtains the information bound to the applet by scanning the QR code of the calendar.
  • User unionID When the terminal receives the code scanning operation for the code scanning entrance, it jumps to the code scanning page to scan and identify the QR code of the calendar, and obtains the information bound to the applet by scanning the QR code of the calendar.
  • the scan code prompt page is shown in Figure 12, where the scan code prompt information is "You have not bound the current calendar, please scan the anti-counterfeit QR code behind the calendar to bind", and the scan code entry is "Go to scan code” control, and the AR special effects are displayed through the window 181.
  • the terminal receives the click operation on the "go to scan code” control, it jumps to the code scanning page to scan and identify the two-dimensional code.
  • menu controls of "Monthly”, “Activity” and “Anti-counterfeiting” are also displayed on the prompt page of scanning the code (there may not be these function controls in practice), wherein, when the terminal receives the When the control is clicked, the terminal can jump to the corresponding page to display the corresponding content. For example, when the terminal receives a click operation on the "Activity" menu control, the terminal will jump to display all The page of the activity list to display all the activities in this applet.
  • the terminal When the terminal detects that the user's unionID is not bound to the code corresponding to the QR code on the calendar, it jumps to the anti-counterfeiting binding page, and displays a section of AR special effect of one item per month on the anti-counterfeiting binding page, The prompt message and binding entry to be bound.
  • the terminal After binding the obtained user unionID with the code, the terminal jumps to a display page of activity content with specific authority, and displays the activity content with specific authority in the applet.
  • the terminal When the terminal receives a service request operation for an activity with general authority on the homepage, it jumps to a display page of activity content with general authority, and displays the activity content with general authority in the applet.
  • the home page displays controls corresponding to multiple activities with general authority
  • the terminal receives a user's click operation on the control corresponding to the activity "One Leaf Knows Autumn” displayed on the home page with general authority
  • the terminal jumps to the activity content display page of "One Leaf Knowing Autumn” to display the activity content of "One Leaf Knowing Autumn", for example, display the activity content of "Activity Experienced” and “Activity Not Experienced” in "One Leaf Knowing Autumn”.
  • FIG. 13 is a schematic structural diagram of the display device provided by an embodiment of the present disclosure; as shown in FIG. 13 , the display device 1 includes: an acquisition part 10 configured to scan the information code of the target item, Acquiring the first identity that is bound to the target application; the detection part 20 is configured to detect whether the first identity is bound to the information code of the target item; the display part 30 is configured to detect the first In the case that an identity has been bound to the information code of the target item, the activity content with specific permissions in the target application is displayed.
  • an acquisition part 10 configured to scan the information code of the target item, Acquiring the first identity that is bound to the target application
  • the detection part 20 is configured to detect whether the first identity is bound to the information code of the target item
  • the display part 30 is configured to detect the first In the case that an identity has been bound to the information code of the target item, the activity content with specific permissions in the target application is displayed.
  • the display device 1 further includes a binding part configured to detect that the first identity identifier is not bound to the information code of the target item and a binding operation is detected , binding the first identity with the information code.
  • the acquiring part 10 is further configured to display an augmented reality effect related to the target item after acquiring the first identity bound to the target application.
  • the detection part 20 is further configured to acquire the coded information obtained by scanning the information code; and detect whether the first identity is bound to the coded information.
  • the binding part is further configured to determine the number of second identities bound to the information code when the binding operation is detected; If the number of the second identity is less than the preset number, bind the first identity with the information code.
  • the display part 30 is further configured to display binding failure prompt information on the binding prompt page when the number of the second identity marks is greater than or equal to a preset number .
  • the display part 30 is further configured to, after detecting that the first identity is not bound to the information code of the target item and after the playing of the augmented reality effect ends, Display the prompt information to be bound.
  • the display device 1 further includes an unbinding part configured to unbind the target item when the first identity has been bound to the information code of the target item and an unbinding operation is detected. Binding between the first identity and the information code.
  • the unbinding part is further configured to, when the unbinding operation is detected, display an unbinding prompt message; The binding between the first identity and the information code is displayed, and an unbinding success prompt message for prompting that the binding is successfully unbound is displayed.
  • the display part 30 is further configured to scan the information code of the target item to acquire the first identity bound to the target application program, before receiving the In the case of the opening operation of the application program, start the target application program and display the preset page of the target application program;
  • the acquisition part 10 is also configured to acquire the specific The service request operation of the activity of the authority; or, it is also configured to obtain the access operation of the first network link corresponding to the activity with a specific authority;
  • the display part 30 is also configured to operate based on the service request or the The above access operation jumps to the code scanning prompt page, and the code scanning prompt page is used to detect the scanning operation that triggers the scanning of the information code of the target item.
  • the display part 30 is further configured to display the Said Active Content with Universal Permissions.
  • the display part 30 is further configured to start the target application program and display the preset set page; the obtaining part 10 is also configured to obtain the service request operation of the activity with specific authority acting on the preset page; the display part 30 is also configured to In the case that the identification is not bound to the information code of the target item, based on the service request operation, jump to the code scanning prompt page, and the code scanning prompt page is used to detect triggers to scan the information code of the target item scan operation.
  • the display device 1 further includes: a sharing part configured to generate a second activity according to the activity content when a sharing operation is detected after the presentation of the activity content with specific authority ends. a second network link, and share the second network link.
  • the target item is a culturally related item.
  • a "part" may be a part of a circuit, a part of a processor, a part of a program or software, etc., of course it may also be a unit, a module or a non-modular one.
  • FIG. 14 is a schematic structural diagram of the electronic device 2 provided by the embodiment of the present disclosure.
  • the memory 202 and the processor 203 are connected through a communication bus 204; the memory 202 is configured to store an executable computer program; the processor 203 is configured to execute the executable computer program stored in the memory 202, combined with the display screen 201, Implement the method provided by the embodiment of the present disclosure, for example, the display method provided by the embodiment of the present disclosure.
  • the embodiment of the present disclosure provides a computer-readable storage medium, on which is stored a computer program configured to cause the processor 203 to implement the method provided in the embodiment of the present disclosure, for example, the display method provided in the embodiment of the present disclosure.
  • An embodiment of the present disclosure provides a computer program, including computer readable codes.
  • a processor in the electronic device implements the above display method when executed.
  • a computer readable storage medium can be a tangible device that can hold and store instructions for use by an instruction execution device, and can be a volatile storage medium or a nonvolatile storage medium.
  • a computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • flash memory static random access memory
  • SRAM static random access memory
  • CD-ROM compact disc read only memory
  • DVD digital versatile disc
  • memory stick floppy disk
  • mechanically encoded device such as a printer with instructions stored thereon
  • a hole card or a raised structure in a groove and any suitable combination of the above.
  • computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.
  • executable instructions may take the form of programs, software, software modules, scripts, or code written in any form of programming language (including compiled or interpreted languages, or declarative or procedural languages) , and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other part suitable for use in a computing environment.
  • executable instructions may, but do not necessarily correspond to files in a file system, may be stored as part of a file that holds other programs or data, for example, in a Hyper Text Markup Language (HTML) document in one or more scripts, in a single file dedicated to the program in question, or in multiple cooperating files (for example, files that store one or more modules, subroutines, or sections of code).
  • HTML Hyper Text Markup Language
  • executable instructions may be deployed to be executed on one computing device, or on multiple computing devices located at one site, or alternatively, on multiple computing devices distributed across multiple sites and interconnected by a communication network. to execute.
  • the user when the user browses the activity content with specific permissions in the target application program, by scanning the information code of the target item, the first identity of the user bound to the target application program can be obtained , further verifying whether the user has access to the activity content with a specific authority by detecting whether the first identity is bound to the information code of the target item, and if it is detected that the first identity has been bound to the information code of the target item, Display the active content with specific permissions in the target application, so that users with specific permissions can browse the active content with specific permissions in the target application, improving the security of active content with specific permissions in the target application sex.
  • the target item is a limited product that needs to be purchased
  • only users who own the limited product and bind the information code on the limited product can obtain it in the target application
  • the active content with a specific permission but the user who is not bound to the limited product cannot obtain the active content with the specific permission in the target application, thereby maintaining the rights and interests of the user who purchases the limited product.
  • the embodiment of the present disclosure discloses a display method, device, equipment, computer readable storage medium and computer program.
  • the method includes: obtaining the first identity identifier bound to the target application program by scanning the information code of the target item; detecting whether the first identity identifier is bound to the information code of the target item; detecting that the first identity identifier has been bound to the target item
  • display the active content with specific permissions in the target application In the case of the information code, display the active content with specific permissions in the target application.

Abstract

Les modes de réalisation de la présente divulgation concernent un procédé et un appareil d'affichage, un dispositif, un support de stockage lisible par ordinateur et un programme d'ordinateur. Le procédé comprend : au moyen du balayage d'un code d'information d'un article cible, l'acquisition d'un premier identifiant d'identité lié à un programme d'application cible ; le fait de détecter si le premier identifiant d'identité est lié au code d'information de l'article cible ; et lorsqu'il est détecté que le premier identifiant d'identité a été lié au code d'information de l'article cible, l'affichage, dans le programme d'application cible, d'un contenu d'activité pour lequel des permissions spécifiques sont accordées.
PCT/CN2022/085505 2021-06-15 2022-04-07 Procédé et appareil d'affichage, dispositif, support de stockage lisible par ordinateur et programme d'ordinateur WO2022262377A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110662824.5A CN113283969B (zh) 2021-06-15 2021-06-15 显示方法、装置、设备及计算机可读存储介质
CN202110662824.5 2021-06-15

Publications (1)

Publication Number Publication Date
WO2022262377A1 true WO2022262377A1 (fr) 2022-12-22

Family

ID=77284572

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/085505 WO2022262377A1 (fr) 2021-06-15 2022-04-07 Procédé et appareil d'affichage, dispositif, support de stockage lisible par ordinateur et programme d'ordinateur

Country Status (3)

Country Link
CN (1) CN113283969B (fr)
TW (1) TW202301156A (fr)
WO (1) WO2022262377A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116721488A (zh) * 2023-08-11 2023-09-08 福建理工大学 识别物品的方法、物品识别系统及物品识别平台

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113283969B (zh) * 2021-06-15 2023-11-07 北京市商汤科技开发有限公司 显示方法、装置、设备及计算机可读存储介质

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030009393A1 (en) * 2001-07-05 2003-01-09 Jeffrey Norris Systems and methods for providing purchase transaction incentives
CN105447727A (zh) * 2015-12-21 2016-03-30 阿里巴巴集团控股有限公司 应用推广方法及装置
CN106570089A (zh) * 2016-10-20 2017-04-19 北京安讯奔科技有限责任公司 扩充信息的提供方法及装置
CN108833457A (zh) * 2018-04-02 2018-11-16 阿里巴巴集团控股有限公司 一种人群定向的信息交互方法和装置
CN110322269A (zh) * 2019-05-09 2019-10-11 成都天钥科技有限公司 一种互联网营销方法
CN111061984A (zh) * 2019-12-23 2020-04-24 康美包(苏州)有限公司 一种信息推送、信息关联方法、设备及计算机存储介质
CN112699976A (zh) * 2020-12-29 2021-04-23 玖月音乐科技(北京)有限公司 一种双排键教材识别方法及系统
CN113283969A (zh) * 2021-06-15 2021-08-20 北京市商汤科技开发有限公司 显示方法、装置、设备及计算机可读存储介质
CN113722619A (zh) * 2021-08-20 2021-11-30 北京市商汤科技开发有限公司 内容显示方法、装置、设备及计算机可读存储介质
CN114049467A (zh) * 2021-10-29 2022-02-15 北京市商汤科技开发有限公司 显示方法、装置、设备、存储介质及程序产品

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130175335A1 (en) * 2011-07-06 2013-07-11 Core Temp, LLC Use of barcode for product instruction
CN103945268B (zh) * 2014-03-17 2017-10-27 深圳创维-Rgb电子有限公司 一种基于多帐号与多目标设备的控制处理方法及系统
CN107566462A (zh) * 2017-08-18 2018-01-09 四川视觉幻境科技有限公司 一种智能饮品音频播放方法、装置及系统
CN107657294B (zh) * 2017-09-22 2021-01-01 武汉理工数字传播工程有限公司 一种提高出版物上二维码安全性的方法及系统
CN108363489A (zh) * 2018-02-13 2018-08-03 五车科技(北京)有限公司 基于纸质图书封面的数据交互处理方法及装置
CN111401096A (zh) * 2020-03-12 2020-07-10 深圳创维-Rgb电子有限公司 一种产品信息的获取方法、终端、存储介质
CN112508607A (zh) * 2020-12-02 2021-03-16 上海中商网络股份有限公司 数据推送方法、装置、计算机设备以及可读存储介质

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030009393A1 (en) * 2001-07-05 2003-01-09 Jeffrey Norris Systems and methods for providing purchase transaction incentives
CN105447727A (zh) * 2015-12-21 2016-03-30 阿里巴巴集团控股有限公司 应用推广方法及装置
CN106570089A (zh) * 2016-10-20 2017-04-19 北京安讯奔科技有限责任公司 扩充信息的提供方法及装置
CN108833457A (zh) * 2018-04-02 2018-11-16 阿里巴巴集团控股有限公司 一种人群定向的信息交互方法和装置
CN110322269A (zh) * 2019-05-09 2019-10-11 成都天钥科技有限公司 一种互联网营销方法
CN111061984A (zh) * 2019-12-23 2020-04-24 康美包(苏州)有限公司 一种信息推送、信息关联方法、设备及计算机存储介质
CN112699976A (zh) * 2020-12-29 2021-04-23 玖月音乐科技(北京)有限公司 一种双排键教材识别方法及系统
CN113283969A (zh) * 2021-06-15 2021-08-20 北京市商汤科技开发有限公司 显示方法、装置、设备及计算机可读存储介质
CN113722619A (zh) * 2021-08-20 2021-11-30 北京市商汤科技开发有限公司 内容显示方法、装置、设备及计算机可读存储介质
CN114049467A (zh) * 2021-10-29 2022-02-15 北京市商汤科技开发有限公司 显示方法、装置、设备、存储介质及程序产品

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116721488A (zh) * 2023-08-11 2023-09-08 福建理工大学 识别物品的方法、物品识别系统及物品识别平台
CN116721488B (zh) * 2023-08-11 2023-12-19 福建理工大学 识别物品的方法、物品识别系统及物品识别平台

Also Published As

Publication number Publication date
CN113283969A (zh) 2021-08-20
CN113283969B (zh) 2023-11-07
TW202301156A (zh) 2023-01-01

Similar Documents

Publication Publication Date Title
US10404688B2 (en) Method and apparatus for enabling co-browsing of third party websites
US8578036B1 (en) Providing standardized transparency for cookies and other website data using a server side description file
CN109597957B (zh) 第三方应用通信api
WO2022262377A1 (fr) Procédé et appareil d'affichage, dispositif, support de stockage lisible par ordinateur et programme d'ordinateur
CN108780448A (zh) 域内网页编辑
JP6697005B2 (ja) 支払方法、装置及びシステム
US9037980B2 (en) Method of providing assistance to the end-user of a software application
US20130254649A1 (en) Establishing user consent to cookie storage on user terminal equipment
US20070260702A1 (en) Web browser architecture for virtual machine access
US9672532B2 (en) Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download
US20100299205A1 (en) Protected serving of electronic content
US8886819B1 (en) Cross-domain communication in domain-restricted communication environments
CN103078894A (zh) 共享项目帐户选择
CN103067436A (zh) 组选择加入链接
CN102209167A (zh) 复合机以及复合机控制系统
US10616209B2 (en) Preventing inter-application message hijacking
US10063659B2 (en) Monetizing downloadable files based on resolving custodianship thereof to referring publisher and presentation of monetized content in a modal overlay contemporaneously with download
WO2023020619A1 (fr) Procédé et appareil d'affichage de contenu, dispositif, support de stockage lisible par ordinateur, programme informatique et produit-programme informatique
JP4815481B2 (ja) ネットワーク中継機器、ユーザ情報管理システム、およびユーザ情報管理方法
JP2006031522A (ja) コンテンツ中継配信サーバ、コンテンツ中継配信コンピュータプログラム
US9929973B2 (en) Method of and a system for providing access to a file to a web resource
KR101200331B1 (ko) 크로스 도메인 간 전자서명 방법
JP5591577B2 (ja) 履歴書情報提供装置及び方法
KR102027259B1 (ko) 검증url 기반 인증객체의 인증정보 중계 시스템
KR20170050030A (ko) 부가 정보 관리 방법과 이를 수행하기 위한 장치 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22823867

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE