CN108846277B - Reading control method, reading control equipment and computer storage medium - Google Patents

Reading control method, reading control equipment and computer storage medium Download PDF

Info

Publication number
CN108846277B
CN108846277B CN201810579615.2A CN201810579615A CN108846277B CN 108846277 B CN108846277 B CN 108846277B CN 201810579615 A CN201810579615 A CN 201810579615A CN 108846277 B CN108846277 B CN 108846277B
Authority
CN
China
Prior art keywords
controlled
control
character string
dimensional code
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810579615.2A
Other languages
Chinese (zh)
Other versions
CN108846277A (en
Inventor
柯洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhangyue Technology Co Ltd
Original Assignee
Zhangyue Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhangyue Technology Co Ltd filed Critical Zhangyue Technology Co Ltd
Priority to CN201810579615.2A priority Critical patent/CN108846277B/en
Publication of CN108846277A publication Critical patent/CN108846277A/en
Application granted granted Critical
Publication of CN108846277B publication Critical patent/CN108846277B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a reading control method, reading control equipment and a computer storage medium. The method comprises the following steps: the controlled equipment generates a controlled two-dimensional code carrying a controlled end character string, obtains a control end character string obtained by decrypting the controlled end character string by the control equipment through a secret key, and controls the reading state of the controlled equipment according to a reading time threshold set by the control equipment when the control end character string is the same as the controlled end character string. The embodiment of the invention can scan the two-dimension code between the controlled equipment and the control equipment to obtain the control two-dimension code of the control equipment in a network-free environment, thereby realizing the control authorization of the control equipment of parents, and still effectively controlling the reading time of children in the network-free environment.

Description

Reading control method, reading control equipment and computer storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a reading control method, reading control equipment and a computer storage medium.
Background
At present, with the popularization of mobile devices such as mobile phones and the continuous development of electronic reading devices, electronic books are more and more favored by reading users, and users can conveniently read favorite books on the mobile devices or the electronic reading devices.
The mobile device or the electronic reading device can bring great convenience to the reading of the user, but also bring adverse effects, for example, the reading time of a child is poorly controlled, the reading time on the mobile device or the electronic reading device cannot be well controlled, and the eyesight of the child is seriously affected by long-time reading. In a conventional control mode, a parent may connect to a mobile device or an electronic reading device used by a child during reading through a network, and authorize the parent's mobile device or the electronic reading device through the network, so that the parent's mobile device may control the mobile device or the electronic reading device used by the child during reading, thereby controlling the child's reading time. Although the conventional method can control the reading time of the child, under the condition of no network, the mobile device of the parent cannot be authorized by the mobile device or the electronic reading device used when the child reads through the network, so that the parent cannot control the mobile device used when the child reads through the mobile device of the parent, and the defect that the reading time of the child cannot be effectively controlled under the condition of no network is caused.
Disclosure of Invention
In view of the above, the present invention has been made to provide a reading control method, apparatus and computer storage medium that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a reading control method, including: the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data; scanning a code to obtain a control terminal character string in a control two-dimensional code displayed by the control equipment, wherein the control terminal character string is obtained by the control equipment decrypting the controlled two-dimensional code data by using a secret key; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
According to another aspect of the present invention, there is provided a reading control method, including: the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment; decrypting the controlled two-dimensional code data to obtain a character string; taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
According to still another aspect of the present invention, there is provided a controlled apparatus including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus; the memory is configured to store at least one executable instruction that causes the processor to: the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data; scanning a code to obtain a control terminal character string in a control two-dimensional code displayed by the control equipment, wherein the control terminal character string is obtained by the control equipment decrypting the controlled two-dimensional code data by using a secret key; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
According to still another aspect of the present invention, there is provided a control apparatus including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus; the memory is configured to store at least one executable instruction that causes the processor to: the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment; decrypting the controlled two-dimensional code data to obtain a character string; taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
According to yet another aspect of the present invention, there is provided a computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to: the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data; scanning a code to obtain a control terminal character string in a control two-dimensional code displayed by the control equipment, wherein the control terminal character string is obtained by the control equipment decrypting the controlled two-dimensional code data by using a secret key; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
According to yet another aspect of the present invention, there is provided a computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to: the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment; decrypting the controlled two-dimensional code data to obtain a character string; taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
According to the reading control method, the reading control device and the computer storage medium provided by the invention, a reading control mode under a network-free condition is provided, a two-dimensional code carrying a controlled terminal character string can be generated by controlled equipment, the controlled terminal character string obtained by decrypting the controlled terminal character string by using a secret key by the control device is obtained, and then the reading state of the controlled equipment is controlled according to a reading time threshold set by the control device when the control terminal character string is the same as the controlled terminal character string, so that the reading control mode can obtain the control two-dimensional code of the control device by scanning the two-dimensional code between the controlled equipment and the control device under the network-free environment, further realize the control authorization of parent control equipment, and is convenient for effectively controlling the reading time of children under the network-free environment.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic flow chart illustrating a reading control method according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating interaction between a controlled device and a control device in a reading control method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a reading control method according to a second embodiment of the present invention;
fig. 4 is a flowchart illustrating a reading control method according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of a controlled device according to a sixth embodiment of the present invention;
fig. 6 shows a schematic structural diagram of a control device according to a seventh embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Example one
Fig. 1 is a flowchart illustrating a reading control method according to an embodiment of the present invention, where the embodiment of the present invention is applicable to a situation where a user controls a reading time of a mobile device or an electronic reading device in a network-less environment, and the reading control method is executed by a controlled device. As shown in fig. 1, the reading control method may include the steps of:
step 101, the controlled device generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string, so that the control device scans the code to obtain controlled two-dimensional code data.
In the embodiment of the present invention, fig. 2 is a schematic interaction diagram of a controlled device and a control device in a reading control method according to an embodiment of the present invention. Referring to fig. 2, the controlled device 201 may be a mobile device or an electronic reading device, such as an electronic book reader or a mobile phone, used by the user a when reading; the control device 202 may be a mobile device, such as a mobile phone, a tablet computer, etc., used by the user B to control the reading time of the user a. The reading time of the user a may be a continuous reading time of the user a when reading a book on the controlled device 201 such as a mobile device or an electronic reading device. The user a may be a user of the controlled apparatus 201, and the user B may be a user of the control apparatus 202. Regarding the user a and the user B, the determination may be made according to the actual situation, and accordingly, the division of the controlled device 201 and the control device 202 may also be determined according to the actual control situation. Taking the user a as a child and the user B as a parent, the parent may orderly control the reading time of the child on the controlled device 201 through the control device 202.
In the embodiment of the invention, the two-dimensional code is a bar code of black and white alternate graph record data symbol information, wherein a certain specific geometric graph is distributed on a plane (two-dimensional direction) according to a certain rule, and Chinese character, number and picture information can be stored in the two-dimensional code. For example, a series of character string information may be stored in the two-dimensional code of the present embodiment, and the series of character string information stored in the two-dimensional code may be acquired by scanning the two-dimensional code, for example, by scanning the two-dimensional code with a camera. The character string information stored in the two-dimensional code can be encrypted information, and the character string information stored in the two-dimensional code can be acquired after the two-dimensional code is decrypted.
In this step, the controlled device may generate a controlled two-dimensional code carrying the controlled end character string. The controlled two-dimensional code may be a two-dimensional code belonging to a controlled device, and the controlled end character string carried in the controlled two-dimensional code may be a character string subjected to encryption processing, for example, the controlled end character string in the controlled two-dimensional code is encrypted by a key. The control equipment side is endowed with a secret key for decrypting the character string in a pre-authentication process, and the control equipment can decrypt the character string carried in the controlled two-dimensional code through the secret key. The control device can pass the identity verification of the controlled device and further control the reading time of the controlled device only by correctly decrypting the character string and feeding the character string back to the controlled device through controlling the two-dimensional code. In addition, the key for performing identity verification on the control device is consistency verification of the character string, and the process and the result are independent of the content of the character string itself, in practical applications, information (e.g., an IP address, a MAC address, a user account, etc.) related to the controlled device may be used as the character string, a random number may also be randomly generated and used as the character string, or a book ID of a book being or about to start reading on the controlled device may be used as the character string, or a reading duration threshold preset at the controlled device side may also be used as the character string, which is not limited to the specific content in this embodiment.
Referring to fig. 2, when the user B is required to control the reading time of the user a, the controlled device 201 may generate a controlled two-dimensional code carrying an encrypted controlled end character string, and display the generated controlled two-dimensional code carrying the encrypted controlled end character string. After the controlled two-dimensional code is displayed by the controlled device 201 of the user a, the user B can acquire the controlled two-dimensional code displayed on the controlled device 201 by the control device 202. The control device 202 may acquire the controlled two-dimensional code displayed on the controlled device 201 by scanning the two-dimensional code through the camera. It is understood that, in order to ensure the uniqueness and effectiveness of the controlled two-dimensional code generated by the controlled device, the controlled end character string may be a character string randomly generated by the controlled device.
102, scanning the code to obtain a control end character string in the control two-dimensional code displayed by the control device, wherein the control end character string is obtained by the control device decrypting the controlled two-dimensional code data by using a secret key.
In the embodiment of the present invention, referring to fig. 2, after the controlled device 201 generates and displays the controlled two-dimensional code carrying the encrypted controlled end character string, the control device 202 may scan the code to obtain the controlled two-dimensional code displayed by the controlled device, and the control device 202 may further obtain the encrypted controlled end character string stored in the controlled two-dimensional code, and perform decryption processing on the encrypted controlled end character string to obtain the decrypted character string. The control device 202 can correctly decrypt the encrypted controlled end character string in the controlled two-dimensional code only by using the stored local secret key, otherwise, a messy code is obtained, and the control device 202 can obtain the corresponding controlled end character string after decryption. For example, the control device 202 may acquire the controlled two-dimensional code displayed on the controlled device 201 by scanning the two-dimensional code through a camera provided on the control device 202. Optionally, when the control device 202 decrypts the encrypted controlled end character string stored in the controlled two-dimensional code displayed on the controlled device 201, the control device 202 may decrypt the encrypted controlled end character string by using the stored local key to obtain the decrypted controlled end character string. How the control device decrypts the encrypted controlled end character string by using the local key will be described in detail in the following embodiments.
In the embodiment of the present invention, referring to fig. 2, after the control device 202 obtains the decrypted controlled end character string, the obtained decrypted controlled end character string may be used as a control end character string of the control device, and generate a control two-dimensional code carrying the control end character string, and then display the control two-dimensional code carrying the control end character string. In this step, referring to fig. 2, the controlled device 201 can scan a code to obtain a control terminal character string in the control two-dimensional code displayed on the control device 202. Specifically, after the control device 202 displays the control two-dimensional code carrying the control end character string, the controlled device 201 may scan the control two-dimensional code displayed by the control device 202 through the camera, analyze the scanned control two-dimensional code, and obtain the control end character string carried by the control two-dimensional code from the control two-dimensional code. The control end character string carried in the control two-dimensional code may be a character string obtained by the control device 202 decrypting the encrypted controlled end character string carried in the controlled two-dimensional code displayed by the controlled device 201 by using a key, and the control end character string carried in the control two-dimensional code may be encrypted or not.
Further, when the control device is not pre-authorized, it does not carry a pre-assigned key for string decryption, in which case the control device in this step can directly add the undecrypted string obtained from the controlled two-dimensional code to the controlled two-dimensional code.
And 103, if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
As described above, the control device can correctly restore the character string in the controlled two-dimensional code only if it possesses the correct decryption key, and when it uses other unauthorized keys to decrypt or does not decrypt the character string, the obtained character string content is different from the character string generated by the controlled device, and the controlled device determines whether the control device possesses the authorized decryption key by the means of the consistency check, and further determines whether the control device possesses the legal authorization to control the controlled device.
Specifically, the controlled device compares the character string generated in step 101 with the character string obtained by scanning and controlling the two-dimensional code, and determines whether the character string and the character string are the same. Referring to fig. 2, after the controlled device 201 acquires the control terminal character string carried in the control two-dimensional code displayed by the control device 202, the controlled device 201 has determined that the controlled terminal character string in the controlled two-dimensional code generated by the controlled device 201 itself and the control terminal character string in the control two-dimensional code generated by the control device 202 are obtained. At this time, the controlled apparatus 201 can determine whether the control apparatus 202 has the control authority to control the controlled apparatus 201 from the obtained control-side character string and controlled-side character string. Here, the control authority may be understood as the control device 202 having a qualification for not controlling the controlled device. The reading state of the user a on the controlled device 201 can be controlled only when it is determined that the control device 202 has the control right to control the controlled device 201; when it is determined that the control device 202 does not have the control authority to control the controlled device 201, the reading state of the user a on the controlled device 201 cannot be controlled.
Optionally, if the control end character string is the same as the controlled end character string, which indicates that the control device 202 has the control authority, the reading state of the controlled device 201 is controlled according to the reading duration threshold set by the control device 202. For example, the reading duration threshold may be set to two hours. Optionally, the reading duration may be a duration of reading continuously and uninterruptedly. If the control end character string is different from the controlled end character string, which indicates that the control device 202 does not have the control authority, the reading state of the controlled device 201 is not allowed to be controlled. Optionally, in order to realize the orderly control of the reading time, when the control device sets the reading time threshold, the reading time threshold may be set as a plurality of sub-reading time thresholds by the control device, so that the user is prompted to have a short rest when the reading time of the user reaches each sub-reading time threshold, and then the reading corresponding to the next sub-reading time threshold is performed.
According to the reading control method, the two-dimensional code carrying the controlled terminal character string can be generated through the controlled equipment, the control terminal character string obtained by decrypting the controlled terminal character string through the control equipment by using the secret key is obtained, and then the reading state of the controlled equipment is controlled according to the reading duration threshold set by the control equipment when the control terminal character string is the same as the controlled terminal character string.
On the basis of the above scheme, before controlling the reading state of the controlled device according to the reading duration threshold set by the control device, the method may further include:
acquiring a reading time threshold value stored in the controlled equipment by the control equipment in advance; or, acquiring a reading time threshold carried in the control two-dimensional code displayed by the control equipment.
In the embodiment of the present invention, referring to fig. 2, the reading duration threshold may be preset in the controlled device, or may be set in the control device, and the two-dimensional code is controlled to carry the corresponding reading duration threshold preset in the control device. For the first setting mode of the reading duration threshold, the user B may set a preset reading duration threshold on the controlled device 201 of the user a, and if it is determined that the control end character string is the same as the controlled end character string, directly obtain the reading duration threshold preset in the controlled device 201, and then control the reading state of the controlled device according to the reading duration threshold set by the control device; if the control terminal character string is different from the controlled terminal character string, it is not necessary to obtain the reading time threshold preset in the controlled device 201, and it is also not necessary to control the reading state of the controlled device according to the preset reading time threshold. For the second setting manner of the reading duration threshold, the user B may set a preset reading duration threshold in the control device 202, and when the control device 202 generates and displays the control two-dimensional code, the preset reading duration threshold set in the control device 202 may be directly added to the control two-dimensional code (which needs to be distinguished from the carried character string and identified by using a specific field). When the controlled device 201 scans the code to obtain the control terminal character string in the control two-dimensional code displayed by the control device, the preset reading time threshold added in the control two-dimensional code can be obtained at the same time. And if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to a preset reading time threshold added in the control two-dimensional code.
Example two
Fig. 3 is a flowchart illustrating a reading control method according to a second embodiment of the present invention. The present embodiment further preferably controls the reading state of the controlled device according to the reading duration threshold set by the control device on the basis of the above-described embodiment. As shown in fig. 3, the reading control method may include the steps of:
step 301, the controlled device generates and displays a controlled two-dimensional code carrying the encrypted controlled end character string, so that the control device scans the code to obtain controlled two-dimensional code data.
Step 302, scanning the code to obtain a control terminal character string in the control two-dimensional code displayed by the control device, wherein the control terminal character string is obtained by the control device decrypting the controlled two-dimensional code data by using a secret key.
And 303, if the control terminal character string is the same as the controlled terminal character string, judging whether the current reading time of the controlled equipment is equal to or greater than the reading time threshold value.
In this embodiment of the present invention, referring to fig. 2, after the controlled device 201 acquires the control end character string carried in the control two-dimensional code displayed by the control device 202, the controlled device 201 has already obtained the controlled end character string in the controlled two-dimensional code generated by the controlled device 201 itself and the control end character string in the control two-dimensional code generated by the control device 202. At this time, the controlled apparatus 201 can determine whether the control apparatus 202 has the control authority to control the controlled apparatus 201 from the obtained control-side character string and controlled-side character string. Optionally, if the control end character string is the same as the controlled end character string, it indicates that the control device 202 has the control authority, at this time, the current reading time length of the controlled device may be detected according to the preset time period, and it is determined whether the current reading time length of the controlled device is equal to or greater than the reading time length threshold according to the current reading time length. Specifically, if the control end character string is the same as the controlled end character string, reading may be started on the controlled device 201, and meanwhile, the current reading time on the controlled device 201 is detected according to the preset time, and is used as the current reading time length, and whether the current reading time length of the controlled device is equal to or greater than the reading time length threshold is determined. The preset time period may be set according to actual conditions, for example, the detection is performed every 1 minute. If the control end character string is different from the controlled end character string, it indicates that the control device 202 does not have the control authority, and does not perform any operation.
And step 304, if the current reading time of the controlled device is equal to or greater than the reading time threshold, controlling the controlled device to be switched to the reading forbidding state.
In the embodiment of the invention, after the current reading time length of the controlled device is detected, whether the current reading time length is greater than or equal to a preset reading time length threshold value or not can be judged. And if the current reading time of the controlled equipment is equal to or greater than the reading time threshold, controlling the controlled equipment to be switched to the reading forbidding state. And if the current reading time of the controlled equipment is less than the reading time threshold, not changing the reading state of the controlled equipment.
The reading control method of the embodiment of the invention generates the two-dimensional code carrying the controlled terminal character string by the controlled device, obtains the control terminal character string obtained by decrypting the controlled terminal character string by the control device by using the key, judges whether the current reading time of the controlled device is equal to or greater than the reading time threshold value when the control terminal character string is the same as the controlled terminal character string, and controls the controlled device to be converted into the reading forbidding state if the current reading time of the controlled device is equal to or greater than the reading time threshold value. By using the method, the effect of effectively controlling the reading time of the child under the condition of no network environment is realized on the basis of controlling and authorizing the parent mobile equipment under the condition of no network environment.
On the basis of the above scheme, controlling the controlled device to transition to the reading prohibition state may include:
generating a covering layer above the current reading page; or, the operation of the user on the page turning control in the current reading interface is shielded.
Specifically, the control of the controlled device to switch to the reading prohibition state can be realized in various ways, and this embodiment provides two options: in the first mode, a covering layer is generated above the current reading page. Specifically, a covering layer is generated above the current reading interface of the controlled device, so that the current reading interface is directly covered by the covering layer, and the effect of prohibiting reading is achieved. Optionally, an unlocking control or a returning control may be set on the covering layer, and only the starting control may be triggered without setting the returning control. Optionally, a reminding message for reminding the user to reasonably read and protect eyesight may be displayed on the covering layer. Optionally, the covering layer may directly use the background of the current reading interface, so that the background of the current reading interface is displayed to the user, and the setting mode is simpler, faster and faster than the generation of a new covering layer. And in the second mode, the operation of the user on the page turning control in the current reading interface is shielded. Specifically, when it is determined that the current reading time of the controlled device is equal to or greater than the reading time threshold, the control of the current reading interface of the controlled device is refreshed, so that the controls such as the upper page turning, the lower page turning and the like on the current reading interface are set to be unavailable, and the reading forbidding function is realized.
On the basis of the scheme, after the covering layer is generated above the current reading page, a return control can be set on the covering layer or not, a series of operations can be correspondingly performed on the return control covering the layer, and the following elaboration is performed on the return control setting in the covering layer and the return control not setting in the covering layer.
Optionally, after the step of generating the covering layer above the current reading page, the method may further include: and if the situation that the user triggers a return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state.
Specifically, after the covering layer is generated above the current reading page, a return control may be set on the covering layer generated on the current reading interface, and a user may perform a trigger operation on the return control set on the covering layer on the current reading interface of the controlled device, such as clicking the return control. If the situation that the user triggers the return control in the covering layer is detected, the covering layer and the current reading book can be directly closed, and meanwhile, the current reading book is controlled to be in a reading forbidding state. At this time, controlling the current reading book to be in the reading prohibition state may include two ways: in the first mode, when the user triggers the icon of the currently read book on the controlled device again, the current reading time length for reading the book on the controlled device is judged to be greater than or equal to the preset reading threshold value, and the controlled device is in an overtime state, so that the operation of triggering the icon of the currently read book by the user is not responded. In a second mode, after the covering layer and the currently read book are directly closed, for example, after the currently read book is exited and returns to the bookshelf, the page is refreshed, and the icon of the currently read book is set as unavailable. If the user is not detected to trigger the return control in the covering layer within the preset time, the covering layer and the current reading book are also directly closed, and the current reading book is controlled to be in a reading forbidding state.
Optionally, after the step of generating the covering layer above the current reading page, the method may further include: and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state.
Specifically, a return control may not be set in the covering layer generated on the current reading interface, or may be set, and in both cases, the user may return to the desktop of the controlled device through the start key. And when the user is detected to trigger the start key, exiting the reading application of the controlled equipment and controlling the reading application to be in the use prohibition state. For example, the controlled device is a smart phone, a Home key is arranged on the smart phone, and when the fact that the user triggers the Home key is detected, the controlled device exits from a reading application of the smart phone and controls the reading application to be in a use prohibition state. The reading application can be any piece of reading software installed on the controlled device, such as palm reading. Optionally, the background is no longer running when the reading application is closed. Optionally, when the user triggers the reading application in the controlled device again, it may be determined that the reading application is in an unavailable state after time out, and the covering layer is displayed. For example, when a user clicks a reading application APP icon on a desktop of the controlled device, the reading application APP starts and plays an advertisement, the reading application APP can be judged to be in an unavailable state overtime in the process of playing the advertisement, and after the advertisement is played, a generated covering layer is displayed.
In addition, the first embodiment: if the situation that the user triggers a return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state; the second method comprises the following steps: and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state, wherein the first mode and the second mode can be used independently or in combination, and can be specifically set according to actual conditions.
On the basis of the scheme, an unlocking control can be set in the covering layer generated above the current reading page, if the user wants to continue reading, the unlocking control in the covering layer can be triggered, corresponding operation is carried out after the unlocking control is triggered, and then reading is continued. For this reason, a new step may be added after the step of generating the covering layer above the current reading page to realize the reading continuation. Optionally, the present embodiment provides two options, and the two options are described.
The first alternative is: after the step of generating the covering layer above the current reading page, the method may further include:
if the fact that a user triggers an unlocking control in the covering layer is detected, code scanning operation is executed;
and if the new control end character string obtained according to the scanned two-dimensional code is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state.
Specifically, referring to fig. 2, the control two-dimensional code of the control device 202 in step 302 may be stored in the control device 202, and the control two-dimensional code may carry a corresponding control terminal character string. If it is detected that the user triggers the unlocking control in the covering layer, the controlled device 201 may scan the control two-dimensional code stored in the control device 202 again, and obtain a new control end character string from the control two-dimensional code. After the controlled device 201 scans the two-dimensional code again to obtain a new control end character string, it may be determined whether the new control end character string obtained by scanning the control two-dimensional code again is the same as the controlled end character string of the controlled device 201. And if the new control end character string obtained by scanning the two-dimensional code again is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state. And if the new control end character string obtained by scanning the two-dimensional code again is different from the controlled end character string, still keeping the covering layer generated above the current reading page and keeping the covering layer in an unreadable state. The new control end character string is obtained by scanning the control two-dimensional code of the control device 202 for the second time by the controlled device 201, and the control end character string in the step 302 is obtained by scanning for the first time.
The second alternative is: after the step of generating the covering layer above the current reading page, the method may further include:
if the situation that a user triggers an unlocking control in the covering layer is detected, generating a new controlled two-dimensional code carrying an encrypted new controlled terminal character string so that the control equipment scans the code to obtain new controlled two-dimensional code data;
scanning a code to obtain a new control terminal character string in a new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using a secret key;
and if the new control end character string is the same as the new controlled end character string, canceling the covering layer or controlling the controlled equipment to start a new round of reading state control.
Specifically, referring to fig. 2, the first step is: if it is detected that the user triggers the unlocking control in the covering layer, the controlled device 201 generates a new controlled two-dimensional code carrying the encrypted new controlled end character string again, so that the control device scans the code to obtain new controlled two-dimensional code data. The second step is: and scanning the code to obtain a new control terminal character string in the new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using the secret key. It should be understood that these two steps are the same as the processes of step 101 and step 102, except that step 101 and step 102 are performed for the first time, and are performed again in the first step and the second step, and the new control terminal character string and the new controlled terminal character string, the new controlled two-dimensional code, and the new control two-dimensional code are generated by performing the operations of step 101 and step 102 again.
It should be noted that the first alternative and the second alternative may be used alone or in combination in any manner. In addition, the first mode and the second mode can be added as a circular execution step for circular execution after the step of generating the covering layer above the current reading page.
EXAMPLE III
Fig. 4 is a flowchart illustrating a reading control method according to a third embodiment of the present invention, where the third embodiment of the present invention is applicable to a situation where the reading time of a user on a mobile device or an electronic reading device is controlled in a network-less environment, and the reading control method is executed by a control device. As shown in fig. 4, the reading control method may include the steps of:
step 401, the control device scans the controlled two-dimensional code displayed by the controlled device, wherein the controlled two-dimensional code carries the controlled terminal character string encrypted by the controlled device.
In the embodiment of the present invention, the reading control method executed by the control device in the embodiment and the reading control method executed by the controlled device in the first and second embodiments can implement the interaction process between the controlled device and the control device. Referring to fig. 2, the controlled device 201 may generate and display a controlled two-dimensional code carrying an encrypted controlled end character string, and the control device 202 may scan the controlled two-dimensional code displayed by the controlled device 201. Alternatively, the control device 202 may scan the controlled two-dimensional code displayed by the controlled device 201 by using a camera provided on the control device 202. For other explanation in this embodiment, reference may be made to the explanation of the reading control method at the controlled device side interacting with the control device in the above embodiment.
And 402, decrypting the controlled two-dimensional code data to obtain a character string.
In the embodiment of the present invention, referring to fig. 2, a key for decrypting the controlled two-dimensional code may be stored in advance in the control device 202, and after the control device 202 acquires the controlled two-dimensional code displayed by the controlled device 201, the controlled end character string encrypted by the control device 201 may be acquired from the controlled two-dimensional code, and then the encrypted controlled end character string is decrypted according to the pre-stored key, so as to obtain the decrypted controlled end character string.
Step 403, taking the obtained character string as a control end character string, carrying the control end character string in the control two-dimensional code, and displaying the control two-dimensional code, so that the controlled device executes the following operations: scanning the code to control the two-dimensional code to obtain a control terminal character string; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
In the embodiment of the present invention, referring to fig. 2, after the control device 202 decrypts the controlled two-dimensional code displayed by the controlled device 201 to obtain the decrypted character string, the obtained character string may be used as the control end character string corresponding to the control device 202. The control device 202 may generate and display a control two-dimensional code carrying the control end character string according to the control end character string. After the control device 202 displays the control two-dimensional code, the controlled device 201 may perform the following operations: scanning the code to control the two-dimensional code to obtain a control terminal character string; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment. The specific control method can be seen in the reading control method of the controlled device.
In the reading control method of the embodiment of the invention, the control device scans the controlled two-dimensional code displayed by the controlled device, the controlled two-dimensional code carries the controlled terminal character string encrypted by the controlled device, the controlled two-dimensional code data is decrypted to obtain the character string, the obtained character string is taken as the control terminal character string and carried in the control two-dimensional code, and the control two-dimensional code is displayed, so that the controlled device executes the following operations: scanning the code to control the two-dimensional code to obtain a control terminal character string; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment. The reading control method provided by the embodiment of the invention can acquire the control two-dimensional code of the control equipment between the controlled equipment and the control equipment in a two-dimensional code scanning mode in a network-free environment, so that the control authorization of the parent mobile equipment is realized, and the reading time of children can be effectively controlled in the subsequent network-free environment.
On the basis of the above scheme of the present invention, decrypting the controlled two-dimensional code data to obtain the character string may include:
and decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance.
Specifically, one control device may control a plurality of controlled devices, and for this purpose, the control device may obtain, from the reading server, the keys of the controlled devices associated with the control device in advance, and store the obtained keys of the controlled devices associated with the control device. When the controlled two-dimensional code displayed by the controlled device needs to be decrypted, the controlled two-dimensional code data of the controlled device can be decrypted through the pre-stored keys of the controlled devices associated with the control device.
In an alternative mode, the decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, may include:
screening the key of each controlled device associated with the control device according to the controlled device identifier carried in the controlled two-dimensional code;
and decrypting the controlled two-dimensional code data by adopting the screened key.
Specifically, referring to fig. 2, the controlled two-dimensional code displayed by the controlled device 201 may not only carry the controlled end character string, but also carry the identification information of the controlled device 201. The identification information of the controlled device 201 may be identity information or account information for identifying the controlled device. For example, taking the controlled device 201 as a smart phone as an example, the identification information of the controlled device 201 may be identity information of the controlled device, where the identity information of the controlled device 201 may include a MAC address, a device identification code, and a device ID of the smart phone; the identification information of the controlled device 201 may also be account information obtained by registering a reading application installed on the smartphone, where the account information may include information such as a name and a mailbox. Wherein, the identification information of the controlled device 201 carried in the controlled two-dimensional code may not be encrypted.
Specifically, when the reading server distributes the key of each controlled device, the reading server may further give identification information corresponding to each controlled device, and the control device may associate the key of each controlled device associated with the control device with the identification information corresponding to each controlled device, and store an association relationship between the key of each controlled device and each identification information. Referring to fig. 2, the controlled two-dimensional code displayed by the controlled device 201 may carry an encrypted controlled end character string and unencrypted controlled device identification information, and after the control device 202 acquires the controlled two-dimensional code of the controlled device 201, the keys of the controlled devices associated with the control device may be screened according to the controlled device identification information carried in the controlled two-dimensional code, so as to determine the key of the controlled device 201. After determining the key of the controlled device 201, the control device 202 may perform decryption processing on the encrypted controlled end character string carried in the controlled two-dimensional code by using the key of the controlled device 201 determined by screening.
In another alternative, the decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, may include:
decrypting the controlled two-dimensional code data according to the secret key of each controlled device to obtain a plurality of character strings;
correspondingly, taking the obtained character string as a control end character string at this time, and carrying the character string in the control two-dimensional code, may include:
and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code control two-dimensional code to obtain a plurality of control terminal character strings; and if any control section character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
Specifically, the control device may obtain, from the reading server, the key of each controlled device with which the control device is associated in advance, and store the obtained key of each controlled device with which the control device is associated. In this embodiment, the control device only needs to store the key of each controlled device associated with the control device, but does not need to store the identification information of each controlled device associated with the control device, and further does not need to store the association relationship between the identification of each controlled device associated with the control device and the key; correspondingly, the controlled two-dimensional code displayed by the controlled device does not carry the identification information of the controlled device at this time.
Referring to fig. 2, when the control device 202 needs to decrypt the controlled two-dimensional code in the controlled device 201, the control device 202 may decrypt the controlled two-dimensional code displayed by the controlled device 201 using the pre-stored keys of the controlled devices associated with the control device, respectively, so as to obtain a plurality of character strings. It is understood that, since the controlled device 201 has the corresponding unique key, when the controlled two-dimensional code displayed by the controlled device 201 is decrypted by using the key of each controlled device, the keys of the controlled devices other than the controlled device 201 may cause a decryption failure. For the character string which is decrypted successfully, the control equipment can obtain the decrypted controlled end character string from the controlled two-dimensional code; for the character string with the decryption failure, the control equipment can only obtain a series of messy codes instead of the controlled end character string carried in the controlled two-dimensional code.
Specifically, after the plurality of character strings are obtained through decryption according to the embodiment, since the control device cannot determine whether the plurality of character strings obtained through decryption are correct controlled-end character strings at this time, in other words, it cannot be determined which character strings are character strings whose decryption is successful and which character strings are character strings whose decryption is failed. For this reason, the control device may add and display all of the obtained plurality of character strings to the control two-dimensional code. Optionally, taking the obtained character string as a control end character string, and carrying the control end character string in a control two-dimensional code, which may include: and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code control two-dimensional code to obtain a plurality of control terminal character strings; and if any control section character string in the plurality of control end character strings carried in the code scanning control two-dimensional code is detected to be the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
Example four
A fourth embodiment of the present invention provides a non-volatile computer storage medium, where the computer storage medium stores at least one executable instruction, and the computer executable instruction may execute the reading control method in any of the above method embodiments.
The executable instructions may be specifically configured to cause the processor to:
the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data;
scanning a code to obtain a control terminal character string in a control two-dimensional code displayed by the control equipment, wherein the control terminal character string is obtained by the control equipment decrypting the controlled two-dimensional code data by using a secret key;
and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
In an alternative, the executable instructions further cause the processor to:
acquiring a reading time threshold value stored in the controlled equipment by the control equipment in advance; alternatively, the first and second electrodes may be,
and acquiring a reading time threshold carried in the control two-dimensional code displayed by the control equipment.
In an alternative, the executable instructions further cause the processor to:
controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment, comprising the following steps:
and if the current reading time of the controlled equipment is equal to or greater than the reading time threshold, controlling the controlled equipment to be switched to a reading forbidding state.
In an alternative, the executable instructions further cause the processor to:
controlling the controlled device to transition to a reading disabled state, comprising:
generating a covering layer above the current reading page; or, the operation of the user on the page turning control in the current reading interface is shielded.
In an alternative, the executable instructions further cause the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the fact that the user triggers the unlocking control in the covering layer is detected, code scanning operation is executed;
and if the new control end character string obtained according to the scanned two-dimensional code is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state.
In an alternative, the executable instructions further cause the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the unlocking control in the covering layer is detected, generating a new controlled two-dimensional code carrying an encrypted new controlled terminal character string, so that the control equipment scans the code to obtain new controlled two-dimensional code data;
scanning a code to obtain a new control terminal character string in a new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using a secret key;
and if the new control end character string is the same as the new controlled end character string, canceling the covering layer or controlling the controlled equipment to start a new round of reading state control.
In an alternative, the executable instructions further cause the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state; alternatively, the first and second electrodes may be,
and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state.
EXAMPLE five
An embodiment five of the present invention provides another non-volatile computer storage medium, where the computer storage medium stores at least one executable instruction, and the computer executable instruction may execute the reading control method in any of the above method embodiments.
The executable instructions may be specifically configured to cause the processor to:
the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment;
decrypting the controlled two-dimensional code data to obtain a character string;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
In an alternative, the executable instructions further cause the processor to:
the controlled two-dimensional code data are decrypted to obtain a character string, and the method comprises the following steps:
and decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance.
In an alternative, the executable instructions further cause the processor to:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
screening the key of each controlled device associated with the control device according to the controlled device identifier carried in the controlled two-dimensional code;
and decrypting the controlled two-dimensional code data by adopting the screened key.
In an alternative, the executable instructions further cause the processor to:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
decrypting the controlled two-dimensional code data according to the secret key of each controlled device to obtain a plurality of character strings;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code, and comprising the following steps:
and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code and acquiring a plurality of control terminal character strings by the control two-dimensional code; and if any control section character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
EXAMPLE six
Fig. 5 is a schematic structural diagram of a controlled device according to a sixth embodiment of the present invention, where the specific embodiment of the present invention does not limit the specific implementation of the controlled device.
As shown in fig. 5, the controlled device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein:
the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508.
A communication interface 504 for communicating with network elements of other devices, such as clients or other servers.
The processor 502 is configured to execute the program 510, and may specifically execute the relevant steps in the reading control method embodiment described above.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the invention. The one or more processors included in the controlled device may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 510 may specifically be used to cause the processor 502 to perform the following operations:
the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data;
scanning a code to obtain a control terminal character string in a control two-dimensional code displayed by the control equipment, wherein the control terminal character string is obtained by the control equipment decrypting the controlled two-dimensional code data by using a secret key;
and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
In an optional manner, the program 510 may be specifically configured to cause the processor 502 to perform the following operations:
acquiring a reading time threshold value stored in the controlled equipment by the control equipment in advance; alternatively, the first and second electrodes may be,
and acquiring a reading time threshold carried in the control two-dimensional code displayed by the control equipment.
In an optional manner, the program 510 may be specifically configured to cause the processor 502 to perform the following operations:
controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment, comprising the following steps:
and if the current reading time of the controlled equipment is equal to or greater than the reading time threshold, controlling the controlled equipment to be switched to a reading forbidding state.
In an optional manner, the program 510 may be specifically configured to cause the processor 502 to perform the following operations:
controlling the controlled device to transition to a reading disabled state, comprising:
generating a covering layer above the current reading page; or, the operation of the user on the page turning control in the current reading interface is shielded.
In an optional manner, the program 510 may be specifically configured to cause the processor 502 to perform the following operations:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the fact that the user triggers the unlocking control in the covering layer is detected, code scanning operation is executed;
and if the new control end character string obtained according to the scanned two-dimensional code is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state.
In an optional manner, the program 510 may be specifically configured to cause the processor 502 to perform the following operations:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the unlocking control in the covering layer is detected, generating a new controlled two-dimensional code carrying an encrypted new controlled terminal character string, so that the control equipment scans the code to obtain new controlled two-dimensional code data;
scanning a code to obtain a new control terminal character string in a new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using a secret key;
and if the new control end character string is the same as the new controlled end character string, canceling the covering layer or controlling the controlled equipment to start a new round of reading state control.
In an optional manner, the program 510 may be specifically configured to cause the processor 502 to perform the following operations:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state; alternatively, the first and second electrodes may be,
and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state.
EXAMPLE seven
Fig. 6 is a schematic structural diagram of a control device according to a seventh embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the control device.
As shown in fig. 6, the control apparatus may include: a processor (processor)602, a communication Interface 604, a memory 606, and a communication bus 608.
Wherein:
the processor 602, communication interface 604, and memory 606 communicate with one another via a communication bus 608.
A communication interface 604 for communicating with network elements of other devices, such as clients or other servers.
The processor 602 is configured to execute the program 610, and may specifically execute the relevant steps in the reading control method embodiment described above.
In particular, program 610 may include program code comprising computer operating instructions.
The processor 602 may be a central processing unit CPU or an application specific Integrated circuit asic or one or more Integrated circuits configured to implement embodiments of the present invention. The control device comprises one or more processors, which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 606 for storing a program 610. Memory 606 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 610 may specifically be configured to cause the processor 602 to perform the following operations:
the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment;
decrypting the controlled two-dimensional code data to obtain a character string;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; and if the control end character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
In an optional manner, the program 610 may be specifically further configured to cause the processor 602 to perform the following operations:
the controlled two-dimensional code data are decrypted to obtain a character string, and the method comprises the following steps:
and decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance.
In an optional manner, the program 610 may be specifically further configured to cause the processor 602 to perform the following operations:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
screening the key of each controlled device associated with the control device according to the controlled device identifier carried in the controlled two-dimensional code;
and decrypting the controlled two-dimensional code data by adopting the screened key.
In an optional manner, the program 610 may be specifically further configured to cause the processor 602 to perform the following operations:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
decrypting the controlled two-dimensional code data according to the secret key of each controlled device to obtain a plurality of character strings;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code, and comprising the following steps:
and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code and acquiring a plurality of control terminal character strings by the control two-dimensional code; and if any control section character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (27)

1. A reading control method performed by a controlled device, the method comprising:
the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data; the control device stores a key which is given in a previous authentication process and is used for decrypting controlled two-dimensional code data of a controlled device associated with the control device;
scanning a code to obtain a control end character string in a control two-dimensional code displayed by the control equipment, wherein the controlled two-dimensional code and the control two-dimensional code are used for authentication between the controlled equipment and the control equipment under a network-free condition, and the control end character string is obtained by decrypting an encrypted controlled end character string in the controlled two-dimensional code data by the control equipment by using a secret key; if the control device is not pre-authorized and does not carry a pre-distributed key for decrypting the character string, the character string at the control end is obtained from the controlled two-dimensional code and is not decrypted or is a messy code;
and if the control equipment is determined to have the control authority according to the fact that the control end character string is the same as the controlled end character string, acquiring a reading time threshold value carried in a control two-dimensional code displayed by the control equipment, and controlling the reading state of the controlled equipment according to the reading time threshold value set by the control equipment.
2. The method of claim 1, wherein controlling the reading state of the controlled device according to the reading duration threshold set by the control device comprises:
and if the current reading time of the controlled equipment is equal to or greater than the reading time threshold, controlling the controlled equipment to be switched to a reading forbidding state.
3. The method of claim 2, wherein controlling the controlled device to transition to the no reading state comprises:
generating a covering layer above the current reading page; alternatively, the first and second electrodes may be,
and shielding the operation of the user on the page turning control in the current reading interface.
4. The method of claim 3, wherein after generating the cover layer over the current reading page, further comprising:
if the fact that the user triggers the unlocking control in the covering layer is detected, code scanning operation is executed;
and if the new control end character string obtained according to the scanned two-dimensional code is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state.
5. The method of claim 3, wherein after generating the cover layer over the current reading page, further comprising:
if the situation that the user triggers the unlocking control in the covering layer is detected, generating a new controlled two-dimensional code carrying an encrypted new controlled terminal character string, so that the control equipment scans the code to obtain new controlled two-dimensional code data;
scanning a code to obtain a new control terminal character string in a new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using a secret key;
and if the new control end character string is the same as the new controlled end character string, canceling the covering layer or controlling the controlled equipment to start a new round of reading state control.
6. The method of claim 3, wherein after generating the cover layer over the current reading page, further comprising:
if the situation that the user triggers the return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state; alternatively, the first and second electrodes may be,
and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state.
7. A reading control method performed by a control device, the method comprising:
the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment;
decrypting the encrypted controlled terminal character string in the controlled two-dimensional code data according to a key of the controlled device associated with the control device, which is obtained from the reading server in advance, to obtain a character string; the secret key is given to the control device in a pre-authentication process and is used for decrypting controlled two-dimensional code data of a controlled device associated with the control device;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; if the control equipment is determined to have the control authority according to the fact that the control end character string is the same as the controlled end character string, a reading time threshold value carried in a control two-dimensional code displayed by the control equipment is obtained, and the reading state of the controlled equipment is controlled according to the reading time threshold value set by the control equipment; the controlled two-dimensional code and the control two-dimensional code are used for authentication between the controlled equipment and the control equipment under the condition of no network; if the control device is not pre-authorized and does not carry a pre-allocated key for decrypting the character string, the character string at the control end is a character string which is obtained from the controlled two-dimensional code and is not decrypted or is a messy code.
8. The method of claim 7, wherein decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device obtained from the reading server in advance comprises:
screening the key of each controlled device associated with the control device according to the controlled device identifier carried in the controlled two-dimensional code;
and decrypting the controlled two-dimensional code data by adopting the screened key.
9. The method of claim 7, wherein decrypting the controlled two-dimensional code data according to the key of each controlled device associated with the control device obtained from the reading server in advance comprises:
decrypting the controlled two-dimensional code data according to the secret key of each controlled device to obtain a plurality of character strings;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code, and comprising the following steps:
and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code and acquiring a plurality of control terminal character strings by the control two-dimensional code; and if any control section character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
10. A controlled device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to:
the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data; the control device stores a key which is given in a previous authentication process and is used for decrypting controlled two-dimensional code data of a controlled device associated with the control device;
scanning a code to obtain a control end character string in a control two-dimensional code displayed by the control equipment, wherein the controlled two-dimensional code and the control two-dimensional code are used for authentication between the controlled equipment and the control equipment under a network-free condition, and the control end character string is obtained by decrypting an encrypted controlled end character string in the controlled two-dimensional code data by the control equipment by using a secret key; if the control device is not pre-authorized and does not carry a pre-distributed key for decrypting the character string, the character string at the control end is obtained from the controlled two-dimensional code and is not decrypted or is a messy code;
and if the control equipment is determined to have the control authority according to the fact that the control end character string is the same as the controlled end character string, acquiring a reading time threshold value carried in a control two-dimensional code displayed by the control equipment, and controlling the reading state of the controlled equipment according to the reading time threshold value set by the control equipment.
11. The controlled device of claim 10, the executable instructions further causing the processor to:
controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment, comprising the following steps:
and if the current reading time of the controlled equipment is equal to or greater than the reading time threshold, controlling the controlled equipment to be switched to a reading forbidding state.
12. The controlled device of claim 11, the executable instructions further causing the processor to:
controlling the controlled device to transition to a reading disabled state, comprising:
generating a covering layer above the current reading page; alternatively, the first and second electrodes may be,
and shielding the operation of the user on the page turning control in the current reading interface.
13. The controlled device of claim 12, the executable instructions further causing the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the fact that the user triggers the unlocking control in the covering layer is detected, code scanning operation is executed;
and if the new control end character string obtained according to the scanned two-dimensional code is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state.
14. The controlled device of claim 12, the executable instructions further causing the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the unlocking control in the covering layer is detected, generating a new controlled two-dimensional code carrying an encrypted new controlled terminal character string, so that the control equipment scans the code to obtain new controlled two-dimensional code data;
scanning a code to obtain a new control terminal character string in a new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using a secret key;
and if the new control end character string is the same as the new controlled end character string, canceling the covering layer or controlling the controlled equipment to start a new round of reading state control.
15. The controlled device of claim 12, the executable instructions further causing the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state; alternatively, the first and second electrodes may be,
and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state.
16. A control device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is configured to store at least one executable instruction that causes the processor to:
the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment;
decrypting the encrypted controlled terminal character string in the controlled two-dimensional code data according to a key of the controlled device associated with the control device, which is obtained from the reading server in advance, to obtain a character string; the secret key is given to the control device in a pre-authentication process and is used for decrypting controlled two-dimensional code data of a controlled device associated with the control device;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; if the control equipment is determined to have the control authority according to the fact that the control end character string is the same as the controlled end character string, a reading time threshold value carried in a control two-dimensional code displayed by the control equipment is obtained, and the reading state of the controlled equipment is controlled according to the reading time threshold value set by the control equipment; the controlled two-dimensional code and the control two-dimensional code are used for authentication between the controlled equipment and the control equipment under the condition of no network; if the control device is not pre-authorized and does not carry a pre-allocated key for decrypting the character string, the character string at the control end is a character string which is obtained from the controlled two-dimensional code and is not decrypted or is a messy code.
17. The control device of claim 16, the executable instructions further causing the processor to:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
screening the key of each controlled device associated with the control device according to the controlled device identifier carried in the controlled two-dimensional code;
and decrypting the controlled two-dimensional code data by adopting the screened key.
18. The control device of claim 16, the executable instructions further causing the processor to:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
decrypting the controlled two-dimensional code data according to the secret key of each controlled device to obtain a plurality of character strings;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code, and comprising the following steps:
and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code and acquiring a plurality of control terminal character strings by the control two-dimensional code; and if any control section character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
19. A computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to:
the controlled equipment generates and displays a controlled two-dimensional code carrying an encrypted controlled end character string so that the control equipment scans the code to acquire controlled two-dimensional code data; the control device stores a key which is given in a previous authentication process and is used for decrypting controlled two-dimensional code data of a controlled device associated with the control device;
scanning a code to obtain a control end character string in a control two-dimensional code displayed by the control equipment, wherein the controlled two-dimensional code and the control two-dimensional code are used for authentication between the controlled equipment and the control equipment under a network-free condition, and the control end character string is obtained by decrypting an encrypted controlled end character string in the controlled two-dimensional code data by the control equipment by using a secret key; if the control device is not pre-authorized and does not carry a pre-distributed key for decrypting the character string, the character string at the control end is obtained from the controlled two-dimensional code and is not decrypted or is a messy code;
and if the control equipment is determined to have the control authority according to the fact that the control end character string is the same as the controlled end character string, acquiring a reading time threshold value carried in a control two-dimensional code displayed by the control equipment, and controlling the reading state of the controlled equipment according to the reading time threshold value set by the control equipment.
20. The computer storage medium of claim 19, the executable instructions further causing the processor to:
controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment, comprising the following steps:
and if the current reading time of the controlled equipment is equal to or greater than the reading time threshold, controlling the controlled equipment to be switched to a reading forbidding state.
21. The computer storage medium of claim 20, the executable instructions further causing the processor to:
controlling the controlled device to transition to a reading disabled state, comprising:
generating a covering layer above the current reading page; alternatively, the first and second electrodes may be,
and shielding the operation of the user on the page turning control in the current reading interface.
22. The computer storage medium of claim 21, the executable instructions further causing the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the fact that the user triggers the unlocking control in the covering layer is detected, code scanning operation is executed;
and if the new control end character string obtained according to the scanned two-dimensional code is the same as the controlled end character string, canceling the covering layer and removing the reading forbidding state.
23. The computer storage medium of claim 21, the executable instructions further causing the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the unlocking control in the covering layer is detected, generating a new controlled two-dimensional code carrying an encrypted new controlled terminal character string, so that the control equipment scans the code to obtain new controlled two-dimensional code data;
scanning a code to obtain a new control terminal character string in a new control two-dimensional code displayed by the control equipment, wherein the new control terminal character string is obtained by the control equipment decrypting the new controlled two-dimensional code data by using a secret key;
and if the new control end character string is the same as the new controlled end character string, canceling the covering layer or controlling the controlled equipment to start a new round of reading state control.
24. The computer storage medium of claim 21, the executable instructions further causing the processor to:
after the covering layer is generated above the current reading page, the method further comprises the following steps:
if the situation that the user triggers the return control in the covering layer is detected, closing the covering layer and the current reading book and controlling the current reading book to be in a reading forbidding state; alternatively, the first and second electrodes may be,
and if the user is detected to trigger the start key, quitting the reading application of the controlled equipment and controlling the reading application to be in a use prohibition state.
25. A computer storage medium having at least one executable instruction stored therein, the executable instruction causing a processor to:
the control equipment scans a controlled two-dimensional code displayed by controlled equipment, wherein the controlled two-dimensional code carries a controlled terminal character string encrypted by the controlled equipment;
decrypting the encrypted controlled terminal character string in the controlled two-dimensional code data according to a key of the controlled device associated with the control device, which is obtained from the reading server in advance, to obtain a character string; the secret key is given to the control device in a pre-authentication process and is used for decrypting controlled two-dimensional code data of a controlled device associated with the control device;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code and displaying the control two-dimensional code so that the controlled equipment executes the following operations: scanning the code and acquiring the control end character string by the control two-dimensional code; if the control equipment is determined to have the control authority according to the fact that the control end character string is the same as the controlled end character string, a reading time threshold value carried in a control two-dimensional code displayed by the control equipment is obtained, and the reading state of the controlled equipment is controlled according to the reading time threshold value set by the control equipment; the controlled two-dimensional code and the control two-dimensional code are used for authentication between the controlled equipment and the control equipment under the condition of no network; if the control device is not pre-authorized and does not carry a pre-allocated key for decrypting the character string, the character string at the control end is a character string which is obtained from the controlled two-dimensional code and is not decrypted or is a messy code.
26. The computer storage medium of claim 25, the executable instructions further causing the processor to:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
screening the key of each controlled device associated with the control device according to the controlled device identifier carried in the controlled two-dimensional code;
and decrypting the controlled two-dimensional code data by adopting the screened key.
27. The computer storage medium of claim 25, the executable instructions further causing the processor to:
the controlled two-dimensional code data is decrypted according to the key of each controlled device associated with the control device, which is obtained from the reading server in advance, and the method comprises the following steps:
decrypting the controlled two-dimensional code data according to the secret key of each controlled device to obtain a plurality of character strings;
taking the obtained character string as a control end character string, carrying the character string in a control two-dimensional code, and comprising the following steps:
and taking a plurality of character strings as control end character strings to be carried in the control two-dimensional code, so that the controlled equipment executes the following operations: scanning the code and acquiring a plurality of control terminal character strings by the control two-dimensional code; and if any control section character string is the same as the controlled end character string, controlling the reading state of the controlled equipment according to the reading time threshold set by the control equipment.
CN201810579615.2A 2018-06-05 2018-06-05 Reading control method, reading control equipment and computer storage medium Active CN108846277B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810579615.2A CN108846277B (en) 2018-06-05 2018-06-05 Reading control method, reading control equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810579615.2A CN108846277B (en) 2018-06-05 2018-06-05 Reading control method, reading control equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN108846277A CN108846277A (en) 2018-11-20
CN108846277B true CN108846277B (en) 2020-02-04

Family

ID=64211345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810579615.2A Active CN108846277B (en) 2018-06-05 2018-06-05 Reading control method, reading control equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN108846277B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109886009A (en) * 2019-01-03 2019-06-14 广东智媒云图科技股份有限公司 A kind of more equipment linkage unlocking methods, electronic equipment and storage medium
CN111563202B (en) * 2020-04-30 2023-12-08 百度在线网络技术(北京)有限公司 Resource data processing method, device, electronic equipment and medium
CN111783065A (en) * 2020-06-30 2020-10-16 上海闻泰电子科技有限公司 Authorization method and device based on two-dimension code, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063809A (en) * 2010-12-29 2011-05-18 鸿富锦精密工业(深圳)有限公司 Electronic reading device and control method thereof
CN102611753A (en) * 2012-03-21 2012-07-25 张雷 System and method for controlling controlled equipment through mobile terminal based on cloud platform
CN104239777A (en) * 2014-08-29 2014-12-24 深信服网络科技(深圳)有限公司 Method and system for releasing control of controlled equipment
CN104966015A (en) * 2015-07-30 2015-10-07 成都中科创达软件有限公司 Control method and system between intelligent equipment
CN106155318A (en) * 2016-06-28 2016-11-23 广东欧珀移动通信有限公司 Sight protectio method, device and the mobile terminal of mobile terminal
CN106373345A (en) * 2016-11-09 2017-02-01 谢龙龙 Book assistive reading device and system
CN106598413A (en) * 2016-12-19 2017-04-26 北京小米移动软件有限公司 Reading tool monitoring method and apparatus
CN107657033A (en) * 2017-09-28 2018-02-02 泰康保险集团股份有限公司 Reading behavior monitoring method and device, storage medium and electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063809A (en) * 2010-12-29 2011-05-18 鸿富锦精密工业(深圳)有限公司 Electronic reading device and control method thereof
CN102611753A (en) * 2012-03-21 2012-07-25 张雷 System and method for controlling controlled equipment through mobile terminal based on cloud platform
CN104239777A (en) * 2014-08-29 2014-12-24 深信服网络科技(深圳)有限公司 Method and system for releasing control of controlled equipment
CN104966015A (en) * 2015-07-30 2015-10-07 成都中科创达软件有限公司 Control method and system between intelligent equipment
CN106155318A (en) * 2016-06-28 2016-11-23 广东欧珀移动通信有限公司 Sight protectio method, device and the mobile terminal of mobile terminal
CN106373345A (en) * 2016-11-09 2017-02-01 谢龙龙 Book assistive reading device and system
CN106598413A (en) * 2016-12-19 2017-04-26 北京小米移动软件有限公司 Reading tool monitoring method and apparatus
CN107657033A (en) * 2017-09-28 2018-02-02 泰康保险集团股份有限公司 Reading behavior monitoring method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN108846277A (en) 2018-11-20

Similar Documents

Publication Publication Date Title
US11017111B2 (en) Messaging systems and methods
JP6936340B2 (en) Identity verification
CN110463161B (en) Password state machine for accessing protected resources
US10097360B2 (en) Automated test to tell computers and humans apart
JP5330567B2 (en) Computer-implemented authentication interface system
EP0810506B1 (en) Method and system for secure identification between two terminals
CN108846277B (en) Reading control method, reading control equipment and computer storage medium
JP2010067096A (en) Authentication device, authentication method, information processing program, and recording medium
US9479678B1 (en) Method and device for image processing, and storage medium
CN109075972B (en) System and method for password anti-theft authentication and encryption
CN109617703B (en) Key management method and device, electronic equipment and storage medium
WO2016133616A1 (en) Mutual authentication with integrated user muscle memory
CN110598421B (en) Two-dimensional code encryption method and device and two-dimensional code decryption method and device
RU2724656C1 (en) Methods and equipment for authenticating identification data
JP2011192154A (en) Usb storage device
Kenneth et al. Web application authentication using visual cryptography and cued clicked point recall-based graphical password
US9015476B1 (en) Cryptographic device operable in a challenge-response mode
JP2007065789A (en) Authentication system and method
WO2016050891A1 (en) User authentication information
CN116910720A (en) Verification method and device
Sherfield et al. Thematic Graphical User Authentication: Graphical User Authentication Using Themed Images on Mobile Devices
Singh et al. Survey on security and usability of knowledge based authentication mechanism
CN110619205A (en) Machine feature code processing method and device
JP2000330941A (en) Password managing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant