CN111246015B - Equipment loss prevention method with alive code system - Google Patents

Equipment loss prevention method with alive code system Download PDF

Info

Publication number
CN111246015B
CN111246015B CN202010044023.8A CN202010044023A CN111246015B CN 111246015 B CN111246015 B CN 111246015B CN 202010044023 A CN202010044023 A CN 202010044023A CN 111246015 B CN111246015 B CN 111246015B
Authority
CN
China
Prior art keywords
code
identification code
unique identification
scanning
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010044023.8A
Other languages
Chinese (zh)
Other versions
CN111246015A (en
Inventor
叶晓阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010044023.8A priority Critical patent/CN111246015B/en
Publication of CN111246015A publication Critical patent/CN111246015A/en
Application granted granted Critical
Publication of CN111246015B publication Critical patent/CN111246015B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to the field of equipment anti-loss methods, and provides an equipment anti-loss method with a live code system, which comprises the following steps: s1, scanning the unique identification code on the equipment through the application software with the code scanning function; s2, acquiring the link by scanning the unique identification code, collecting the ID and the corresponding information of the owner and storing the ID and the corresponding information into the cloud server to finish the binding of the data ID and the owner identity; s3, when the device is not lost, the identity of the code scanner is judged by scanning the unique identification code; if the code is the master code scanning, directly entering a master management end interface; if the client code is scanned, entering a client interface; when the device is lost, the owner scans the unique identification code to obtain the account ID and location information of the picker S4. The invention not only realizes the anti-lost management based on the identity recognition, but also realizes the live code management system based on the background owner-side code change, not only can realize the anti-lost of articles, but also can realize the multi-purpose of one code, and provides great convenience for users of the invention.

Description

Equipment loss prevention method with alive code system
Technical Field
The invention relates to the technical field of equipment anti-loss methods, in particular to an equipment anti-loss method with a live code system.
Background
In daily life, personal articles are lost, the old people get lost when going out, the disabled people get lost, infants and children get lost, pets get lost and the like. At present, a smart phone is a necessary communication tool for Chinese people, and code scanning through the smart phone is one of the most common application scenarios. At present, a plurality of anti-lost products and anti-lost two-dimensional code applications are sold in the market. Many live code two-dimensional code applications based on manual code change are also available in the market.
At present, the two-dimensional code systems with the anti-lost function or the live code function in the existing market do not have the functions of identifying the identity of a master and automatically changing codes.
Disclosure of Invention
The invention provides an anti-lost method for equipment with a live code system, which can effectively solve the problems.
The invention is realized by the following steps:
an anti-lost method for equipment with a live code system comprises the following steps:
s1, scanning the unique identification code on the equipment through the application software with the code scanning function;
s2, acquiring the link by scanning the unique identification code, collecting the ID and the corresponding information of the owner and storing the ID and the corresponding information into the cloud server to finish the binding of the data ID and the owner identity;
s3, when the device is not lost, the identity of the code scanner is judged by scanning the unique identification code; if the code is the master code scanning, directly entering a master management end interface; if the client code is scanned, entering a client interface;
when the device is lost, the owner scans the unique identification code to obtain the account ID and location information of the picker S4.
As a further improvement, the unique identifier in step S1 is a two-dimensional code, the link in step S2 includes a cloud server domain name, a software account ID, and an identifier number, and the unique identifier is obtained by encrypting the software account ID by AES.
As a further improvement, the encryption process of the unique identification code is as follows: and calling an AES algorithm library through the cloud server, and generating the unique identification code by adopting an arrangement mode of a three-bit batch serial number, a four-bit random number and a three-bit serial number.
As a further improvement, the specific way to determine whether the code scanning user ID is bound to the device is as follows:
k1, scanning the unique identification code of the equipment by the code scanner, decoding and retrieving by the cloud server, and identifying whether the user ID is activated and bound; if yes, go to step K3; otherwise, go to step K2;
k2, the cloud server binds the user information with the device identification code, and the user becomes the only owner with the device identification code;
and K3, the cloud server decrypts the uploaded unique identification code information to obtain a plaintext version of the unique identification code, wherein the plaintext version comprises the software account ID and the identification code number.
As a further improvement, the step S4 specifically includes: after the picker scans the device identification code, the software interface of the picker pops up two options:
d1, dialing the device owner's phone;
d2, leaving the contact address to the device owner.
The invention has the beneficial effects that: the invention relates to the functions of identity binding of a unique identification code, identity identification of a code scanner of the unique identification code, acquisition of information of a picker, contact way editing, control of a live code system, automatic switching of an anti-lost system and the live code system and the like, realizes anti-lost management based on identity identification, realizes a live code management system based on code change of a background owner, can realize article anti-lost and one code with multiple functions, and provides great convenience for users of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic step diagram of an anti-lost method according to an embodiment of the present invention.
FIG. 2 is a logic diagram for determining the identity of a code scanner according to an embodiment of the present invention.
Fig. 3 is an information logic block diagram of the loss prevention method according to the embodiment of the present invention.
Fig. 4 is a logic block diagram of a live code system according to an embodiment of the present invention.
Fig. 5 is a logic block diagram of automatic switching between the anti-lost system and the live code system according to the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
In the description of the present invention, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implying any number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
Referring to fig. 1 to 5, a method for preventing a device from being lost, which has a live code system, includes the following steps: s1, scanning the unique identification code on the equipment through the application software with the code scanning function; s2, acquiring the link by scanning the unique identification code, collecting the ID and the corresponding information of the owner and storing the ID and the corresponding information into the cloud server to finish the binding of the data ID and the owner identity; s3, when the device is not lost, the identity of the code scanner is judged by scanning the unique identification code; if the code is the master code scanning, directly entering a master management end interface; if the client code is scanned, entering a client interface; when the device is lost, the owner scans the unique identification code to obtain the account ID and location information of the picker S4.
As a further improvement, the unique identifier in step S1 is a two-dimensional code, the link in step S2 includes a cloud server domain name, a software account ID, and an identifier number, and the unique identifier is obtained by encrypting the software account ID by AES.
As a further improvement, the encryption process of the unique identification code is as follows: and calling an AES algorithm library through the cloud server, and generating the unique identification code by adopting an arrangement mode of a three-bit batch serial number, a four-bit random number and a three-bit serial number.
As a further improvement, the specific way to determine whether the code scanning user ID is bound to the device is as follows: k1, scanning the unique identification code of the equipment by the code scanner, decoding and retrieving by the cloud server, and identifying whether the user ID is activated and bound; if yes, go to step K3; otherwise, go to step K2; k2, the cloud server binds the user information with the device identification code, and the user becomes the only owner with the device identification code; and K3, the cloud server decrypts the uploaded unique identification code information to obtain a plaintext version of the unique identification code, wherein the plaintext version comprises the software account ID and the identification code number.
As a further improvement, the step S4 specifically includes: after the picker scans the device identification code, the software interface of the picker pops up two options: d1, dialing the device owner's phone; d2, leaving the contact address to the device owner.
Referring to fig. 2 to 5, taking the WeChat mobile phone end as an example, a data processing method of an apparatus anti-lost method with a live code system includes the following steps:
c1, initializing identity recognition, firstly generating a data ID and an entrance link with ID information by the software system, wherein the ID and corresponding information of a host of the link are empty, collecting the ID and corresponding information of the host after micro-information code scanning, and storing the ID and corresponding information into a database of the cloud server to achieve the binding of the data ID and the identity of the host;
c2, scanning the unique identification code through the WeChat, judging the logic of the identification, and entering a master-end management interface if the bound unique identification code is the WeChat scanning code of the master identity; otherwise, if the WeChat code of the non-master identity exists, entering a client side interface;
c3, judging logic of the anti-lost and active code system, and an anti-lost code function and an active code function are implanted into the system together, wherein the anti-lost code function is a default function; the live code function is a non-default function, and manual operation conversion is required to be carried out by a master end;
c4, referring to fig. 5, the logic for judging the automatic conversion between the anti-lost and the live code system, if it is the WeChat code of the host, the host can directly enter the host management interface, the host can freely activate the various functions of the live code system, the system starts to count down automatically after each click, and the default anti-lost function is automatically activated after the count down is finished. If the code is a WeChat code scanning code of the non-owner identity, automatically entering a preset guest side interface, and presetting a link interface of a live code system before the countdown is finished; and after the countdown is finished, a default anti-lost interface is entered.
The identity recognition method of the unique identification code takes a WeChat mobile phone end as an example, and comprises the following steps:
E1. firstly, the developer ID (AppID) and AppSecret of the public number generated by a WeChat public number platform are used as unique identification codes;
E2. associating and binding the public numbers through a cloud server platform to generate unique identification numbers (IDs) of the public numbers;
E3. according to the AES encryption algorithm, a unique code with a public ID and its own unique string is generated for each point code. Each market point code number is a unique identification code which cannot be repeated, three-bit batch serial number, four-bit random letters and three-bit serial number are defined for each market point code for convenient management, and the serial number of the 10-bit combination of the numbers and the letters is used as the unique identification code, so that certain readability is achieved on the basis of ensuring the encryption effect.
E4. The website of each city point code is a string of unique numbers with information such as a cloud server domain name, a public number ID, a city point code number and the like, a short website with a unique identifier is generated through encryption of the cloud server, and the short website is the URL of the city point two-dimensional code. And attaching the information such as the market point two-dimensional code, the market point code number and the like to equipment by printing or carving and other technological means to form the equipment with the market point two-dimensional code. The code is identified in a linked list of the cloud server database as an inactive binding.
E5. If a user scans a market point two-dimensional code on the equipment through the WeChat (each WeChat has a unique identification ID), the complete information of the two-dimensional code is uploaded to a cloud server through the WeChat for decoding and searching, and whether the activation binding is performed or not is identified;
if yes, the step E7 is executed, otherwise, the step E6 is executed;
E6. and when the unbound market codes are scanned, popping up a binding interface, requiring a user to fill in related information, submitting the binding to obtain the only owner occupying the codes, marking the codes on a cloud server database as being bound and activated, and recording the WeChat ID and the related binding information of the owner.
E7. When a user scans two-dimensional code information on the market point code equipment by using the WeChat, the complete information of the two-dimensional code is uploaded to the cloud server through the WeChat for identification and decryption, and a plaintext version of the identification code is obtained, wherein the plaintext version comprises a public number ID, a market point code number and a bound WeChat ID.
E8, judging whether the WeChat ID is the WeChat ID of the owner by comparing the WeChat IDs; if yes, the server pushes an application interface of the host side; if not, the server pushes an application interface of the picker end;
e9, screening and pushing the code pre-binding information stored on the server to an application interface by comparing the market code numbers;
e10, screening and pushing the public number information stored on the server to an application interface by comparing the public number IDs.
And after the unique identification code is successfully bound, the live code system is controlled by the master. For example, when a guest scans the unique identification code first, the system judges that the code scanner is a non-owner side, the link of the anti-loss interface is automatically opened by the WeChat of the guest, and the WeChat of the guest enters the anti-loss interface. When the owner scans the unique identification code first, the system judges that the code scanner is the owner side, the WeChat of the owner automatically opens the link of the live code system, the WeChat of the owner enters a control interface of the live code system, the owner can randomly operate and select the target link, at the moment, when the guest scans the unique identification code again, the system judges that the code scanner is the non-owner side, the WeChat of the guest automatically opens the target link, and the WeChat of the guest enters an interface led out by the target link. Based on the function of the anti-lost live code system, the safety of the live code system can be ensured, and the system can be applied to aspects such as product display, company declaration, communication and the like in a diversified manner, so that the function of one code with multiple purposes is realized.
Referring to fig. 3, when a device with a unique identification code is lost, a picker (a non-unique identification code binder) scans the unique identification code with a mobile phone, and the mobile phone interface of the picker pops up two options: d1, dialing the device owner's phone; d2, leaving the contact address to the device owner. At this time, the WeChat ID, the GPS position and the timestamp of the picker can be automatically obtained and uploaded to the cloud database, and the WeChat public number template pushes the information to the host interface, namely, the host of the unique identification code can know the last scanning time and place of the unique identification code and the WeChat ID of the code scanner at the first time. It should be noted that the owner's phone in the option D1 is a privacy protection number, which plays a role in protecting the privacy of the owner.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. An anti-lost method for equipment with a live code system is characterized by comprising the following steps:
s1, scanning the unique identification code on the equipment through the application software with the code scanning function;
s2, acquiring the link by scanning the unique identification code, collecting the ID and the corresponding information of the owner and storing the ID and the corresponding information into the cloud server to finish the binding of the data ID and the owner identity;
s3, when the device is not lost, the identity of the code scanner is judged by scanning the unique identification code; if the code is the master code scanning, directly entering a master management end interface; if the client scans the code, the client-side interface is accessed, when the host scans the code and accesses the host management-side interface, the host can freely activate and set the live code system, the system starts automatic countdown after each click, and automatically activates the default anti-loss function after the countdown is finished, so that the client automatically accesses the preset client-side interface and starts automatic countdown when scanning the code, a link interface of the live code system is preset before the countdown is finished, and the default anti-loss interface is accessed after the countdown is finished;
and S4, when the device is lost, the owner scans the unique identification code by the picker to acquire the account ID, the position information and the time stamp of the picker, and the account ID, the position information and the time stamp of the picker are also stored in the cloud database.
2. The device anti-lost method of claim 1, wherein the unique identifier in step S1 is a two-dimensional code, the link in step S2 includes a cloud server domain name, a software account ID and an identifier number, and the unique identifier is obtained by encrypting the software account ID by AES.
3. The device anti-lost method with the alive code system as recited in claim 2, wherein the encryption process of the unique identification code is as follows: and calling an AES algorithm library through the cloud server, and generating the unique identification code by adopting an arrangement mode of a three-bit batch serial number, a four-bit random number and a three-bit serial number.
4. The device anti-lost method with a live code system according to claim 1, wherein the specific way of determining whether the code scanning user ID is bound to the device is:
k1, scanning the unique identification code of the equipment by the code scanner, decoding and retrieving by the cloud server, and identifying whether the user ID is activated and bound; if yes, go to step K3; otherwise, go to step K2;
k2, the cloud server binds the user information with the device identification code, and the user becomes the only owner with the device identification code;
and K3, the cloud server decrypts the uploaded unique identification code information to obtain a plaintext version of the unique identification code, wherein the plaintext version comprises the software account ID and the identification code number.
5. The method of claim 1, wherein the step S4 specifically comprises: after the picker scans the device identification code, the software interface of the picker pops up two options:
d1, dialing the device owner's phone;
d2, leaving the contact address to the device owner.
CN202010044023.8A 2020-01-15 2020-01-15 Equipment loss prevention method with alive code system Active CN111246015B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010044023.8A CN111246015B (en) 2020-01-15 2020-01-15 Equipment loss prevention method with alive code system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010044023.8A CN111246015B (en) 2020-01-15 2020-01-15 Equipment loss prevention method with alive code system

Publications (2)

Publication Number Publication Date
CN111246015A CN111246015A (en) 2020-06-05
CN111246015B true CN111246015B (en) 2022-02-22

Family

ID=70874691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010044023.8A Active CN111246015B (en) 2020-01-15 2020-01-15 Equipment loss prevention method with alive code system

Country Status (1)

Country Link
CN (1) CN111246015B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112765584B (en) * 2020-12-31 2023-02-10 厦门城市在线科技有限公司 Two-dimensional code terminal verification and cancellation management method, device and equipment
CN113128643B (en) * 2021-05-13 2022-07-12 厦门城市在线科技有限公司 Entity two-dimensional code identification method
CN113361294A (en) * 2021-06-07 2021-09-07 福建链物科技有限公司 NFC anti-lost tag based on Internet of things technology and application method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683468A (en) * 2015-03-06 2015-06-03 冯彦 Lost article finding method, device and system
CN105574560A (en) * 2014-11-04 2016-05-11 张冠华 Cloud anti-lost system of two-dimensional code key ring
CN207993215U (en) * 2018-04-12 2018-10-19 四川创一智慧科技有限公司 A kind of anti-theft device with Quick Response Code
CN108694424A (en) * 2018-05-11 2018-10-23 北京理工大学珠海学院 A kind of intelligence, which is looked for something, returns object method, system and device device
CN109086845A (en) * 2018-07-30 2018-12-25 四川创智慧科技有限公司 A kind of equipment anti-loss method based on two dimensional code

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120181332A1 (en) * 2011-01-18 2012-07-19 Blake Martin Langley System and method for locating a lost child's parent/guardian
US20120271712A1 (en) * 2011-03-25 2012-10-25 Edward Katzin In-person one-tap purchasing apparatuses, methods and systems
CN204557531U (en) * 2015-04-08 2015-08-12 天津创思佳网务科技发展有限公司 The anti-lost intelligent board system of a kind of old man children
CN108449184A (en) * 2018-03-22 2018-08-24 顾家豪 A kind of dynamic two-dimension code generates and identifying system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574560A (en) * 2014-11-04 2016-05-11 张冠华 Cloud anti-lost system of two-dimensional code key ring
CN104683468A (en) * 2015-03-06 2015-06-03 冯彦 Lost article finding method, device and system
CN207993215U (en) * 2018-04-12 2018-10-19 四川创一智慧科技有限公司 A kind of anti-theft device with Quick Response Code
CN108694424A (en) * 2018-05-11 2018-10-23 北京理工大学珠海学院 A kind of intelligence, which is looked for something, returns object method, system and device device
CN109086845A (en) * 2018-07-30 2018-12-25 四川创智慧科技有限公司 A kind of equipment anti-loss method based on two dimensional code

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《【防丢神器】让失物有物归原主的机会,让好人有拾金不昧的机会!》;市点营销部;《市点公众号》;20190521;全文 *

Also Published As

Publication number Publication date
CN111246015A (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN111246015B (en) Equipment loss prevention method with alive code system
CN100562902C (en) Be used for the method and system that safety management is stored in the data on the electronic tag
KR101496646B1 (en) method of entrance control through instant QR code
US20050103838A1 (en) Method and apparatus for electronically exchanging and storing an image of a business card along with associated card information
KR101507594B1 (en) Security entrance system using Identification means and Operating Method thereof
CN108107743B (en) Distribution method and device of control authority, storage medium and processor
US7474428B2 (en) Multifunction device system using tags containing output information
JP5685877B2 (en) Server device, ticket information display program, electronic ticket providing method, etc.
CN103632102A (en) Certificate processing method and terminal
CN109086845B (en) Equipment loss prevention method based on two-dimensional code
KR101208081B1 (en) Personal privacy protection method in service based on electronic tag
GB2491220A (en) Displaying and selectively retrieving information encoded in a data matrix
CN109635887A (en) Retrieving lost article method, apparatus and system
WO2008145199A1 (en) Method for the duplication of electronic-code keys
CN113378185A (en) Data access and storage method, data access and storage device and data access and storage system
CN110458983B (en) Article picking method, device and computer readable storage medium
EP3314533A1 (en) Link association
KR102415267B1 (en) Biometric authentication systems and associated methods based on unique non-falsifiable codes of vein nets and tree structures
EP3375751A1 (en) System and method for duplicating lock-opening elements
KR102289150B1 (en) Name Card Delivery System With Enhanced Personal Information Security
CN108492214B (en) Mobile terminal, server, management system and self-service check-in system
CN112488028A (en) Face recognition method without face collection and identity recognition module
CN102211220B (en) Key cutting method based on biometrics identification
TWI463414B (en) Radio-frequency identification reader
JP2006072783A (en) Data entry system and data entry method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant