CN109086845B - Equipment loss prevention method based on two-dimensional code - Google Patents

Equipment loss prevention method based on two-dimensional code Download PDF

Info

Publication number
CN109086845B
CN109086845B CN201810852996.7A CN201810852996A CN109086845B CN 109086845 B CN109086845 B CN 109086845B CN 201810852996 A CN201810852996 A CN 201810852996A CN 109086845 B CN109086845 B CN 109086845B
Authority
CN
China
Prior art keywords
equipment
information
server
user
identification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810852996.7A
Other languages
Chinese (zh)
Other versions
CN109086845A (en
Inventor
周亚洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Chuangyi Wisdom Technology Co ltd
Original Assignee
Sichuan Chuangyi Wisdom Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Chuangyi Wisdom Technology Co ltd filed Critical Sichuan Chuangyi Wisdom Technology Co ltd
Priority to CN201810852996.7A priority Critical patent/CN109086845B/en
Publication of CN109086845A publication Critical patent/CN109086845A/en
Application granted granted Critical
Publication of CN109086845B publication Critical patent/CN109086845B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device

Abstract

The invention discloses a device anti-loss method based on two-dimension codes, which comprises the following steps: s1, scanning the unique identification code on the equipment by installing the application software for preventing the equipment from being lost; s2, obtaining the link by scanning the unique identification code, and judging whether the binding between the user and the equipment is finished by the server; and S3, when the equipment is lost, obtaining the equipment information link by scanning the unique identification code of the equipment, and displaying the equipment attribute information. The equipment loss prevention method based on the two-dimensional code provides a new equipment loss prevention mode, the contact between an equipment owner and an object picker is established, the equipment owner can input the information of the owner through the two-dimensional code on the scanning equipment, and other people can quickly see the information of the equipment owner by scanning the two-dimensional code through any tool capable of scanning the two-dimensional code, so that the temporarily lost article can be quickly found back.

Description

Equipment loss prevention method based on two-dimensional code
Technical Field
The invention belongs to the technical field of equipment loss prevention, and particularly relates to an equipment loss prevention method based on a two-dimensional code.
Background
The two-dimensional code is a technology for recording data information by means of the corresponding relation between a binary system and a specific geometric figure, can store website addresses, business cards, text information and the like, can automatically read the information in a photoelectric scanning device by a figure input device, is equivalent to a key for reading the information, and has the characteristics of large information capacity, strong fault-tolerant capability, high confidentiality, low cost, easiness in manufacturing and the like, so that the two-dimensional code is widely and quickly applied to aspects of commodity anti-counterfeiting/tracing, information transmission, website linking, data downloading, commodity transaction, positioning/navigation, electronic certificates and the like.
The existing bank cards, identity cards, bus cards, campus cards, wallets and other things which need to be carried with people are easy to lose, once the things are lost, the things are difficult to retrieve, even if the picked people want to return the owner, the things do not have owner information, and therefore the people are difficult to return the owner. How to establish direct contact between a user and an article by indirectly storing information of an article owner on the article so that a picker can quickly find a loser through the information is a problem worthy of further research and discussion.
Disclosure of Invention
Aiming at the defects in the prior art, the equipment identification method based on the two-dimensional code solves the problems that in the prior art, the contact between an article and an owner of the article is not established, and the article is not easy to find back after being lost.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a device loss prevention method based on two-dimensional codes comprises the following steps:
s1, scanning the unique identification code on the equipment by installing the application software for preventing the equipment from being lost;
s2, obtaining the link by scanning the unique identification code, and completing the binding of the user and the equipment through the control of the server;
and S3, when the equipment is lost, obtaining the equipment information link by scanning the unique identification code of the equipment, and displaying the equipment attribute information.
Further, the unique identification code in the step S1 is a two-dimensional code;
the link information obtained by scanning the two-dimensional code comprises a website and an equipment identification code;
the device identification code is obtained by encrypting the device ID number by adopting 3DESC or AES.
Further, the encryption process of the device identification code is as follows:
when the server encrypts the equipment identification code, an AES algorithm library in the server is called, a private key and an equipment ID are input, and then an encrypted field corresponding to the equipment ID is output by the algorithm library.
Further, the manner of determining whether to complete the binding between the user and the device by the server in step S2 is specifically:
a1, scanning the two-dimensional code on the loss prevention device through application software, acquiring complete link information of the two-dimensional code, and sending request information for modifying the owner information of the device to a server through the application software;
the request information comprises an equipment identification code, a request modification flag bit and a user ID number of application software;
a2, judging whether the user ID number is in the user ID list by the server,
if yes, go to step A3;
if not, go to step A9;
a3, decrypting the user identification code through the server to obtain the equipment identification code plaintext version;
wherein, the plaintext version of the equipment identification code is the equipment ID number;
a4, searching whether the device ID number is bound in the user binding list by the server;
if yes, go to step A5;
if not, go to step A6;
a5, judging whether the device is bound by the user who sends the binding request information through the server;
if yes, go to step A7;
if not, go to step A8;
a6, generating a new device information link through the server, returning the new device information link to the application software for the user to check, allowing the user to fill in information, and ending the device binding;
a7, inquiring the initial device information link of the user through the server, sending the initial device information link to the application software, allowing the user to modify the information, and ending the device binding;
a8, returning the failure information of the bound device to the application software through the server for the user to check and finish the device binding;
and A9, returning the open page link of the application software to the application software through the server for the user to view, and ending the device binding.
Further, the step S3 is specifically:
when the equipment is lost, the equipment information link is obtained by scanning the unique identification code of the equipment, an equipment attribute information checking request is sent to the server through a page displayed by the equipment information link, and the equipment attribute information is returned to the page by the server for the object picker to check;
the device attribute information includes phone information and identity information filled in by the device owner.
The invention has the beneficial effects that: the equipment loss prevention method based on the two-dimensional code provides a new equipment loss prevention mode, the contact between an equipment owner and an object picker is established, the equipment owner can input the information of the owner through the two-dimensional code on the scanning equipment, and other people can quickly see the information of the equipment owner by scanning the two-dimensional code through any tool capable of scanning the two-dimensional code, so that the temporarily lost article can be quickly found back.
Drawings
Fig. 1 is a flowchart of an implementation of a device loss prevention method based on a two-dimensional code in an embodiment of the present invention.
Fig. 2 is a flowchart illustrating an implementation of a method for determining whether to complete the binding between the user and the device by the server according to the embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
As shown in fig. 1, a device anti-loss method based on two-dimensional code includes the following steps:
s1, scanning the unique identification code on the equipment by installing the application software for preventing the equipment from being lost;
the unique identification code in the step S1 is a two-dimensional code;
the link information obtained by scanning the two-dimensional code comprises a website and an equipment identification code; different device ID numbers correspond to different user identification codes;
the equipment identification code is obtained by encrypting an equipment ID number by adopting 3DESC or AES;
for example, http:// m.sandiubao.com/s/4kQoHGgBNurYoQ88RNpmFg ", where the first half" http:// m.sandiubao.com/s/"is a generic web site, and the second half" 4kQoHGgBNurYoQ88 pmRNFg "is a device identification code; website + equipment identification code, which forms a complete equipment information link;
when the equipment ID is encrypted, the server is provided with a private key and an AES algorithm library, when the private key and the AES algorithm library are encrypted, the AES algorithm library is called, the private key and the equipment ID are input, and then the encrypted field corresponding to the equipment ID is output by the algorithm library.
S2, obtaining the link by scanning the unique identification code, and completing the binding of the user and the equipment through the control of the server;
the specific way for the server to determine whether to complete the binding between the user and the device in step S2 is as follows:
a1, scanning the two-dimensional code on the loss prevention device through application software, acquiring complete link information of the two-dimensional code, and sending request information for modifying the owner information of the device to a server through the application software;
the request information comprises an equipment identification code, a request modification flag bit and a user ID number of application software;
a2, judging whether the user ID number is in the user ID list by the server,
if yes, go to step A3;
if not, go to step A9;
a3, decrypting the user identification code through the server, obtaining the plaintext version of the device identification code,
wherein, the plaintext version of the equipment identification code is the equipment ID number;
a4, searching whether the device ID number is bound in the user binding list by the server;
if yes, go to step A5;
if not, go to step A6;
a5, judging whether the device is bound by the user who sends the binding request information through the server;
if yes, go to step A7;
if not, go to step A8;
a6, generating a new device information link through the server, returning the new device information link to the application software for the user to check, allowing the user to fill in information, and ending the device binding;
a7, inquiring the initial device information link of the user through the server, sending the initial device information link to the application software, allowing the user to modify the information, and ending the device binding;
a8, returning the failure information of the bound device to the application software through the server for the user to check and finish the device binding;
and A9, returning the open page link of the application software to the application software through the server for the user to view, and ending the device binding.
In the two-dimensional code for inputting the user information, after the two-dimensional code on the equipment is scanned, the connection of the website and the user identification code can still be read, the application software requests the server for the connection, the server inquires that the link is not available (because the link is not input with the information and the user information link is not generated), and the user can jump to other existing pages of the website for viewing.
And S3, when the equipment is lost, obtaining the equipment information link by scanning the unique identification code of the equipment, and displaying the equipment attribute information.
The step S3 is specifically:
when the equipment is lost, the equipment information link is obtained by scanning the unique identification code of the equipment, an equipment attribute information checking request is sent to the server through a page displayed by the equipment information link, and the equipment attribute information is returned to the page by the server for the object picker to check;
the device attribute information includes phone information and identity information filled by the owner of the device.
When the server generates various links: in a default state, the server is not connected with equipment identification codes, when a pickup picks up equipment which is not registered, the server cannot open a link containing the equipment identification codes after scanning, the server jumps to an open page, only after the information is bound and input successfully, the server automatically generates a link containing the equipment identification codes, and the page pointed by the link shows the information of the equipment owner input by a user.
In one embodiment of the invention, the loss prevention device is a loss prevention device printed with a unique two-dimensional code, the loss prevention device can be hung on the neck of a pet as the identification of a family pet, a pet owner registers and logs in through corresponding mobile phone loss prevention software, the two-dimensional code on the loss prevention device is scanned, a binding request is sent to a server, and the information of individuals and pets is perfected; when the pet accidentally walks away, the passerby can acquire the information of the owner of the pet by scanning the two-dimensional code on the anti-lost device on the body of the pet, and timely contact the owner of the pet, so that the pet can quickly return to the owner. Similarly, the device can also be a bracelet worn by the old, and the family stores the basic information of the old and the self in the bracelet, so that when the old walks away, passers-by can quickly contact the family.
The invention has the beneficial effects that: the equipment anti-loss method based on the two-dimensional code provides a new equipment anti-loss mode, the contact between an equipment owner and an object picker is established, the equipment owner can input the information of the owner through the two-dimensional code on the scanning equipment, and other people can scan the two-dimensional code through any tool capable of scanning the two-dimensional code, so that the information of the equipment owner can be quickly seen, and the temporarily lost article can be quickly found back.

Claims (4)

1. A device loss prevention method based on two-dimensional codes is characterized by comprising the following steps:
s1, scanning the unique identification code on the equipment by installing the application software for preventing the equipment from being lost;
s2, obtaining the link by scanning the unique identification code, and completing the binding of the user and the equipment through the control of the server;
s3, when the equipment is lost, obtaining equipment information link through the unique identification code of the scanning equipment, and displaying equipment attribute information;
the specific way for the server to determine whether to complete the binding between the user and the device in step S2 is as follows:
a1, scanning the two-dimensional code on the loss prevention device through application software, acquiring complete link information of the two-dimensional code, and sending request information for modifying the owner information of the device to a server through the application software;
the request information comprises an equipment identification code, a request modification flag bit and a user ID number of application software;
a2, judging whether the user ID number is in the user ID list by the server,
if yes, go to step A3;
if not, go to step A9;
a3, decrypting the user identification code through the server to obtain the equipment identification code plaintext version;
wherein, the plaintext version of the equipment identification code is the equipment ID number;
a4, searching whether the device ID number is bound in the user binding list by the server;
if yes, go to step A5;
if not, go to step A6;
a5, judging whether the device is bound by the user who sends the binding request information through the server;
if yes, go to step A7;
if not, go to step A8;
a6, generating a new device information link through the server, returning the new device information link to the application software for the user to check, allowing the user to fill in information, and ending the device binding;
a7, inquiring the initial device information link of the user through the server, sending the initial device information link to the application software, allowing the user to modify the information, and ending the device binding;
a8, returning the failure information of the bound device to the application software through the server for the user to check and finish the device binding;
and A9, returning the open page link of the application software to the application software through the server for the user to view, and ending the device binding.
2. The device loss prevention method based on two-dimensional code as claimed in claim 1, wherein the unique identification code in step S1 is a two-dimensional code;
the link information obtained by scanning the two-dimensional code comprises a website and an equipment identification code;
the device identification code is obtained by encrypting the device ID number by adopting 3DESC or AES.
3. The device loss prevention method based on the two-dimensional code of claim 2, wherein the encryption process of the device identification code is as follows:
when the server encrypts the equipment identification code, an AES algorithm library in the server is called, a private key and an equipment ID are input, and then an encrypted field corresponding to the equipment ID is output by the algorithm library.
4. The device loss prevention method based on two-dimensional code according to claim 1, wherein the step S3 specifically includes:
when the equipment is lost, the equipment information link is obtained by scanning the unique identification code of the equipment, an equipment attribute information checking request is sent to the server through a page displayed by the equipment information link, and the equipment attribute information is returned to the page by the server for the object picker to check;
the device attribute information includes phone information and identity information filled in by the device owner.
CN201810852996.7A 2018-07-30 2018-07-30 Equipment loss prevention method based on two-dimensional code Active CN109086845B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810852996.7A CN109086845B (en) 2018-07-30 2018-07-30 Equipment loss prevention method based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810852996.7A CN109086845B (en) 2018-07-30 2018-07-30 Equipment loss prevention method based on two-dimensional code

Publications (2)

Publication Number Publication Date
CN109086845A CN109086845A (en) 2018-12-25
CN109086845B true CN109086845B (en) 2021-08-31

Family

ID=64833463

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810852996.7A Active CN109086845B (en) 2018-07-30 2018-07-30 Equipment loss prevention method based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN109086845B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110060394B (en) * 2019-03-30 2021-09-03 孟琦 Thing networking district wisdom access control system
CN111125568A (en) * 2019-12-24 2020-05-08 重庆大峰科技有限公司 Lost article searching method based on two-dimensional code scanning
CN111246015B (en) * 2020-01-15 2022-02-22 叶晓阳 Equipment loss prevention method with alive code system
CN113784295B (en) * 2021-11-09 2022-04-15 深圳市伦茨科技有限公司 Anti-lost method and system for portable article

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007129581A1 (en) * 2006-05-02 2007-11-15 Bitwallet, Inc. Paying system, paying terminal device, and paying method
CN103839090A (en) * 2012-11-26 2014-06-04 张龙斌 Two-dimensional code label management method and system
CN105574560A (en) * 2014-11-04 2016-05-11 张冠华 Cloud anti-lost system of two-dimensional code key ring
CN105721610A (en) * 2016-04-15 2016-06-29 立德高科(北京)数码科技有限责任公司 Method and system for seeking person under guardianship based on two-dimension code
CN106066880A (en) * 2016-05-31 2016-11-02 梁晨 One is looked for something anti-lost method and system
CN106355217A (en) * 2016-08-15 2017-01-25 立德高科(昆山)数码科技有限责任公司 Two-dimensional code based guardianship information checking and alarming method
CN207637170U (en) * 2017-07-24 2018-07-20 汪文可 The anti-lost cloud service system of Quick Response Code

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007129581A1 (en) * 2006-05-02 2007-11-15 Bitwallet, Inc. Paying system, paying terminal device, and paying method
CN103839090A (en) * 2012-11-26 2014-06-04 张龙斌 Two-dimensional code label management method and system
CN105574560A (en) * 2014-11-04 2016-05-11 张冠华 Cloud anti-lost system of two-dimensional code key ring
CN105721610A (en) * 2016-04-15 2016-06-29 立德高科(北京)数码科技有限责任公司 Method and system for seeking person under guardianship based on two-dimension code
CN106066880A (en) * 2016-05-31 2016-11-02 梁晨 One is looked for something anti-lost method and system
CN106355217A (en) * 2016-08-15 2017-01-25 立德高科(昆山)数码科技有限责任公司 Two-dimensional code based guardianship information checking and alarming method
CN207637170U (en) * 2017-07-24 2018-07-20 汪文可 The anti-lost cloud service system of Quick Response Code

Also Published As

Publication number Publication date
CN109086845A (en) 2018-12-25

Similar Documents

Publication Publication Date Title
CN109086845B (en) Equipment loss prevention method based on two-dimensional code
US10348726B2 (en) Online identity verification platform and process
CN100562902C (en) Be used for the method and system that safety management is stored in the data on the electronic tag
US7953974B2 (en) Authentication method, authentication system, and tag device thereof, data reference client, authentication server, and data server
US11550957B2 (en) Securing user-entered text in-transit
US20090210945A1 (en) Personal Information/Confidential Information Managing System And Personal Information/Confidential Information Managing Method
CN104699559A (en) Distributed data backup method and system
CN104598800A (en) Authentication method and authentication system for identity information of grain depot and terminal equipment
CN103400083A (en) Method, device and system for protecting electronic evidence
CN111259079A (en) Block chain-based limited personal data sharing and trading method
CN111770072A (en) Method and device for accessing function page through single sign-on
CN109635887A (en) Retrieving lost article method, apparatus and system
CN111680013A (en) Data sharing method based on block chain, electronic equipment and device
KR20040104854A (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
CN110266641B (en) Information reading method, system, device and computer readable storage medium
CN105279463A (en) Card swiping and reading method, mobile terminal, and card reader
JP2005242530A (en) History recording system, history recording method, history recording program and terminal for receipt transferer
CN115186301A (en) Information processing method, information processing device, computer equipment and computer readable storage medium
CN110032890B (en) Safety network device and safety access method
CN111221803B (en) Feature library management method and coprocessor
CN110457954B (en) Contract management device and method
CN110941745A (en) Electronic contract management method and device, storage medium and electronic equipment
KR100656356B1 (en) System for hiding rfid tag id and method thereof
EP2876611B1 (en) Method for secure transmission of an image of an electronic identity document to a terminal
US20240062190A1 (en) Generating and maintaining digital tokens on a blockchain using physical device identifiers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant