CN111737664A - Re-authorization use control method and device of borrowing equipment - Google Patents

Re-authorization use control method and device of borrowing equipment Download PDF

Info

Publication number
CN111737664A
CN111737664A CN202010429346.9A CN202010429346A CN111737664A CN 111737664 A CN111737664 A CN 111737664A CN 202010429346 A CN202010429346 A CN 202010429346A CN 111737664 A CN111737664 A CN 111737664A
Authority
CN
China
Prior art keywords
borrowing
authorization
equipment
borrower
background server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010429346.9A
Other languages
Chinese (zh)
Inventor
李军棉
周胡顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Geli Network Technology Co ltd
Original Assignee
Guangzhou Geli Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Geli Network Technology Co ltd filed Critical Guangzhou Geli Network Technology Co ltd
Priority to CN202010429346.9A priority Critical patent/CN111737664A/en
Publication of CN111737664A publication Critical patent/CN111737664A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Abstract

The invention discloses a method and a device for controlling the re-authorization use of borrowing equipment, wherein the method comprises the following steps: when a re-authorization request aiming at the borrowing equipment is received, the background server judges whether the re-authorization request is legal or not, and the re-authorization request is used for requesting the background server to re-authorize the borrowing equipment; and if the information is legal, generating authorization authentication information of the borrowing equipment, and sending the authorization authentication information to the user terminal of the borrower so that the borrower can carry out authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information. Therefore, by the implementation of the method and the device, the re-authorization authentication information of the borrowing equipment is generated when the request for re-requesting the authorization of using the borrowing equipment is received and the request is judged to be legal, the re-authorization processing can be performed on the borrowing equipment when the borrowing equipment is powered off in an emergency, so that a user can continue to use the borrowing equipment, the experience of the user is improved, and the use viscosity and the popularization of the borrowing equipment are improved.

Description

Re-authorization use control method and device of borrowing equipment
Technical Field
The invention relates to the technical field of internet, in particular to a method and a device for controlling the re-authorization use of borrowing equipment.
Background
In recent years, with the pace of life and work of people becoming faster, people put more mind on work and study, so that people have to use some devices, for example, to meet the needs of life, although the needs of some devices are not frequent: an induction cooker. And with the advent of the "sharing concept", there are various devices available on the market for people to share borrowing, and people can meet life needs by borrowing needed devices, for example: the cooking requirement is met by using the induction cooker.
However, in practice, people often encounter some emergencies in using the borrowing device, such as: and sudden power failure and the like, and when the borrowing equipment encounters an emergency, the borrowing equipment can immediately enter a disabled state, so that people cannot continue to use the borrowed equipment, the experience of using the borrowing equipment by people is influenced, and the viscosity and popularization of the borrowing equipment are not facilitated. Therefore, it is important to provide a technical solution for controlling the borrowing device to continue to operate without delaying the user's use of the borrowing device when the borrowing device enters the disabled state in case of an emergency.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and an apparatus for controlling re-authorization of a borrowing device, which can perform re-authorization processing on the borrowing device when the borrowing device is powered off in an emergency, so that a user can continue to use the borrowing device.
In order to solve the above technical problem, a first aspect of the embodiments of the present invention discloses a method for controlling re-authorization of a borrowing device, where the method is applied in a background server, and the method includes:
when a re-authorization request triggered by a borrower for the borrowing device is received, the background server judges whether the re-authorization request is legal or not, wherein the re-authorization request is used for requesting the background server to re-authorize the borrower to use the borrowing device;
and when the re-authorization request is judged to be legal, the background server generates authorization authentication information of the borrowing equipment and sends the authorization authentication information to a user terminal of a certain borrower, so that the certain borrower performs authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
when a re-authorization request triggered by a borrower for the borrowing equipment is received, the background server acquires the on-off state of a target function of the borrowing equipment;
and the background server judges whether the switch state is used for indicating that the target function is in a closed state, and triggers and executes the operation of judging whether the re-authorization request is legal or not when the judgment result is yes.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the determining, by the backend server, whether the re-authorization request is legal includes:
the background server acquires a target parameter for triggering the borrowing device to close the target function for the last time in the borrowing process, judges whether the target parameter is an abnormal trigger parameter, and determines that the re-authorization request is legal when the target parameter is judged to be the abnormal trigger parameter, wherein the target parameter comprises a power-off trigger parameter or an instruction trigger parameter.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the determining, by the background server, whether the target parameter is an abnormal trigger parameter includes:
when the target parameter is the power-off triggering parameter, the background server acquires an electric signal of the borrowing device during the last power-off in the borrowing process, judges whether the electric signal is within a preset electric signal range corresponding to the normal power-off of the borrowing device, and determines that the target parameter is an abnormal triggering parameter when the judgment result is negative.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the determining, by the background server, whether the target parameter is an abnormal trigger parameter includes:
the background server obtains equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process, judges whether the target function is in a working state or not according to the equipment parameters, and determines that the target parameters are abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or the internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, after determining that the re-authorization request is legal and before the background server generates the authorization authentication information of the borrowing device, the method further includes:
the background server determines first target information, wherein the first target information comprises at least one of a first identifier uniquely corresponding to the borrowing equipment, a target time and a second identifier uniquely corresponding to a certain borrower;
wherein the generating, by the background server, the authorization and authentication information of the borrowing device includes:
the background server inputs the first target information into a pre-established authorization authentication generation model for analysis, and obtains an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
the first identifier includes at least one of an equipment identifier of the borrowing equipment, an equipment model of the borrowing equipment, and a current geographic location identifier of the borrowing equipment, the target time includes a time when the first target information is determined and/or a time when the re-authorization request is received, and the second identifier includes at least one of a terminal identifier of a user terminal of the borrower, an account identifier of the borrower, and an attribute identifier of the borrower.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
when the re-authorization request is judged to be legal, the background server generates an effective borrowing identifier of the borrowing equipment according to the obtained second target information, and sends the effective borrowing identifier to the user terminal of the borrower, wherein the effective borrowing identifier comprises the time length and/or the power-on times of the borrowing equipment which can be used by the borrower after the authorization authentication of the borrowing equipment passes;
wherein the second target information includes the borrowing type of the borrower and/or information corresponding to the borrowing device.
As an optional implementation manner, in the first aspect of this embodiment of the present invention, the method further includes:
when a legal use request for the borrowing equipment is detected, the background server determines the current environment of the borrowing equipment and judges whether the environment is matched with the predetermined power-on environment of the borrowing equipment;
and when the environment is judged to be matched with the power-on environment of the borrowing equipment, the background server controls the borrowing equipment to start according to the legal use request.
The second aspect of the embodiment of the invention discloses a method and a device for controlling re-authorization use of borrowing equipment, wherein the device is applied to a background server and comprises a judging module, a generating module and a communication module, wherein:
the judging module is configured to judge whether a re-authorization request triggered by a borrower for the borrowing device is legal or not when the re-authorization request is received, where the re-authorization request is used to request the background server to re-authorize the borrower to use the borrowing device;
the generating module is configured to generate authorization and authentication information of the borrowing device when the judging module judges that the re-authorization request is legal;
the communication module is configured to send the authorization and authentication information to the user terminal of the borrower, so that the borrower performs authorization and authentication with the borrowing device through the user terminal according to the authorization and authentication information.
As an optional implementation manner, in a second aspect of the embodiment of the present invention, the apparatus further includes an acquisition module, where:
the acquisition module is used for acquiring the on-off state of a target function of the borrowing equipment when a re-authorization request triggered by a borrower for the borrowing equipment is received;
the judging module is further configured to judge whether the switch state is used for indicating that the target function is in a closed state, and when the judging result is yes, trigger execution of the operation of judging whether the re-authorization request is legal.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the manner of determining, by the determining module, whether the re-authorization request is legal is specifically:
and acquiring a target parameter for triggering the borrowing equipment to close the target function for the last time in the borrowing process, judging whether the target parameter is an abnormal triggering parameter, and determining that the re-authorization request is legal when the target parameter is judged to be the abnormal triggering parameter, wherein the target parameter comprises a power-off triggering parameter or an instruction triggering parameter.
As an optional implementation manner, in a second aspect of the embodiment of the present invention, the manner of determining, by the determining module, whether the target parameter is an abnormal triggering parameter specifically is:
when the target parameter is the power-off triggering parameter, acquiring an electric signal of the borrowing equipment during the last power-off in the borrowing process, judging whether the electric signal is in a preset electric signal range corresponding to the normal power-off of the borrowing equipment, and when the judgment result is negative, determining that the target parameter is an abnormal triggering parameter.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the manner that the determining module determines whether the target parameter is an abnormal triggering parameter specifically is:
obtaining equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process of the borrowing equipment, judging whether the target function is in a working state or not according to the equipment parameters, and determining the target parameters as abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or the internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the apparatus further includes a first determining module, where:
the first determining module is configured to determine first target information after the determining module determines that the re-authorization request is legal and before the generating module generates the authorization authentication information of the borrowing device, where the first target information includes at least one of a first identifier uniquely corresponding to the borrowing device, a target time, and a second identifier uniquely corresponding to the borrower;
the method for generating the authorization authentication information of the borrowing equipment by the generation module specifically comprises the following steps:
inputting the first target information into a pre-established authorization authentication generation model for analysis, and acquiring an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
the first identifier includes at least one of an equipment identifier of the borrowing equipment, an equipment model of the borrowing equipment, and a current geographic location identifier of the borrowing equipment, the target time includes a time when the first target information is determined and/or a time when the re-authorization request is received, and the second identifier includes at least one of a terminal identifier of a user terminal of the borrower, an account identifier of the borrower, and an attribute identifier of the borrower.
As an optional implementation manner, in a second aspect of the embodiment of the present invention, the generating module is further configured to generate, when the judging module judges that the re-authorization request is legal, a valid borrowing identifier of the borrowing device according to the obtained second target information;
the communication module is further configured to send the valid borrowing identifier to the user terminal of the certain borrower, where the valid borrowing identifier includes a duration and/or a power-on number of times that the certain borrower can use the borrowing device after the authorization authentication of the borrowing device passes;
wherein the second target information includes the borrowing type of the borrower and/or information corresponding to the borrowing device.
As an optional implementation manner, in a second aspect of the embodiment of the present invention, the apparatus further includes a second determining module and a control module, wherein:
the second determining module is configured to determine an environment in which the borrowing device is currently located when a legitimate usage request for the borrowing device is detected;
the judging module is further configured to judge whether the environment matches a predetermined power-on environment of the borrowing device;
the control module is used for controlling the borrowing equipment to start according to the legal use request when the judging module judges that the environment is matched with the power-on environment of the borrowing equipment.
The third aspect of the invention discloses another method and a device for controlling the re-authorization use of borrowing equipment, wherein the device comprises the following steps:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the method for controlling the re-authorization use of the borrowing device disclosed by the first aspect of the present invention.
A fourth aspect of the present invention discloses a computer-storable medium that stores computer instructions for executing the method for controlling re-authorization of use of a borrowing device disclosed in the first aspect of the present invention when the computer instructions are invoked.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the embodiment of the invention provides a method and a device for controlling the re-authorization use of borrowing equipment, wherein the method comprises the following steps: when a re-authorization request triggered by a borrower for borrowing equipment is received, the background server judges whether the re-authorization request is legal or not, and the re-authorization request is used for requesting the background server to re-authorize the borrower to use the borrowing equipment; and when judging that the re-authorization request is legal, the background server generates authorization authentication information of the borrowing equipment and sends the authorization authentication information to a user terminal of a certain borrower so that the certain borrower can carry out authorization recognition with the borrowing equipment through the user terminal according to the authorization authentication information. Therefore, by implementing the embodiment of the invention, the re-authorization authentication information of the borrowing equipment is generated when the request for re-requesting the authorization of using the borrowing equipment is received and the request is judged to be legal, the re-authorization processing can be carried out on the borrowing equipment when the borrowing equipment is powered off in an emergency, so that the user can continue to use the borrowing equipment, the experience of the user is improved, and the use viscosity and the popularization of the borrowing equipment are favorably improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flowchart illustrating a method for controlling re-authorization of a borrowing device according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating another method for controlling re-authorization of a borrowing device according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a re-authorization use control apparatus of a borrowing device according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of another apparatus for controlling unauthorized use of a borrowing device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another apparatus for controlling unauthorized use of a borrowing device according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, apparatus, product, or apparatus that comprises a list of steps or elements is not limited to those listed but may alternatively include other steps or elements not listed or inherent to such process, method, product, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The invention discloses a method and a device for controlling the re-authorization use of borrowing equipment, which can generate re-authorization authentication information of the borrowing equipment when a request for re-requesting the authorization use of the borrowing equipment is received and the request is judged to be legal, and can carry out re-authorization processing on the borrowing equipment when the borrowing equipment is powered off in an emergency, so that a user can continue to use the borrowing equipment, the experience feeling of the user is improved, and the use viscosity and the popularization of the borrowing equipment are favorably improved. The following are detailed below.
Example one
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for controlling unauthorized use of a borrowing device according to an embodiment of the present invention. The method for controlling the re-authorized use of the borrowing device described in fig. 1 can be applied to a background server for managing the borrowing device or a use control platform. As shown in fig. 1, the method of controlling re-authorized use of a borrowing device may include the operations of:
101. when a re-authorization request triggered by a borrower for the borrowing equipment is received, the background server judges whether the re-authorization request is legal or not. If yes, triggering to execute the step 102; and when the judgment result is negative, ending the process.
In embodiments of the present invention, borrowing is also referred to as leasing or sharing. A borrower is a borrower of any borrowing equipment, the borrowing equipment is any borrowing equipment borrowed by a borrower, the borrowing equipment can comprise any borrowing equipment needing to be electrified, such as an intelligent electromagnetic oven, an intelligent electric cooker, an intelligent pressure cooker, an intelligent water boiling kettle, an intelligent barbecue oven, an intelligent microwave oven, an intelligent sweeper, an intelligent electric fan, an intelligent cooking machine, an intelligent lamp, an intelligent garbage can and the like, and the embodiment of the invention is not limited. Furthermore, the borrowing equipment borrowed by a borrower can be independent or a set of equipment, and under the condition that the borrowing equipment is independent, each piece of equipment is provided with a unique identification code; under the condition that the borrowing equipment is a set, each set of borrowing equipment is provided with a unique main identification code, and further, each piece of borrowing equipment included in the set of borrowing equipment is provided with a unique sub-identification code corresponding to the unique main identification code, so that the corresponding sub-identification code can be determined according to the main identification code, the corresponding main identification code can also be determined according to the sub-identification code, and the flexibility of mutual identification among the borrowing equipment in the set of borrowing equipment is improved; the circulation process of the borrowing equipment and related information in the flow process can be identified and monitored according to the identification code corresponding to the borrowing equipment, so that the source tracing information of the borrowing equipment can be conveniently formed for query. The identification code corresponding to the borrowing device can be generated through the following mechanisms:
encrypting the serial number of the borrowing equipment to obtain an encrypted code;
at least one random code of a plurality of random codes (for example, 4 random codes) is embedded into the encrypted code, and a tableware identification code corresponding to the borrowing device is obtained, wherein the plurality of random codes can comprise a position random code, a number random code and a character random code. Therefore, the safe and reliable identification code is obtained by encrypting the identification code of the borrowing equipment.
In the embodiment of the invention, the re-authorization request is used for requesting the background server to re-authorize a borrower to use the borrowing equipment. Further, the re-authorization request can be sent to the background server by a borrower through any one of APP, applet, public number and the like on the user terminal (for example, a mobile phone and the like); when the borrowing device is powered on, the re-authorization request may also be triggered by a borrower on the borrowing device and sent to the background server by the borrowing device, and the embodiment of the present invention is not limited. Still further optionally, the re-authorization request may include information indicative of the borrowing device uniqueness and/or a requested authorized usage duration of the borrowing device. The information indicating the uniqueness of the borrowing device may include at least one of a device identifier of the borrowing device, a device type, and a current geographic location, and embodiments of the present invention are not limited.
In the embodiment of the present invention, a borrower is a direct borrower of the borrowing device, and may also be a user authorized by the direct borrower, for example: parents, etc.
In an optional embodiment, the method for controlling re-authorized use of a borrowing device may further include the operations of:
when a re-authorization request triggered by a borrower for borrowing equipment is received, a background server acquires the on-off state of a target function of the borrowing equipment;
and the background server judges whether the switch state is used for indicating that the target function is in the closing state, and triggers and executes the operation of judging whether the re-authorization request is legal or not when the judgment result is yes.
In this optional embodiment, further optionally, when the switch status is determined to indicate that the target function is in the on state and in the disabled (e.g., locked) state, the operation of determining whether the re-authorization request is legal may be triggered.
In this optional embodiment, it is further optional, and when it is determined that the switch state is used to indicate that the target function is in the on state, the process is ended.
In this optional embodiment, the switch of each function of the borrowing device is provided with an on flag and an off flag, for example: the switch of function is fried to the electromagnetism stove, and when the switch of function of frying was in the on state, the switch sign set up to 1, when the switch of function of frying was in the off-state, the switch sign set up to 0.
Therefore, in the optional embodiment, after the re-authorization request for the borrowing device is received, the on-off state of the target function of the borrowing device is further acquired, and when the on-off state is in the off state, that is, the target function of the borrowing device is in the off state, the subsequent operation of judging whether the re-authorization request is legal is executed, so that the accuracy and reliability of judging whether the re-authorization request is legal can be improved, and the accuracy of generating the authorization authentication information is further improved.
In another optional embodiment, the determining, by the backend server, whether the re-authorization request is legitimate includes:
the background server acquires a target parameter for triggering the borrowing device to close the target function for the last time in the borrowing process, judges whether the target parameter is an abnormal triggering parameter or not, and determines that the re-authorization request is legal when the target parameter is judged to be the abnormal triggering parameter.
In this alternative embodiment, the target parameter includes a power-off trigger parameter or an instruction trigger parameter. The instruction triggering parameters may include touch triggering parameters or parameters sent by the user terminal establishing communication with the borrowing device to the borrowing device. The touch trigger parameter is specifically a parameter generated by the relevant borrower touching the borrowing device.
In this optional embodiment, as an optional implementation manner, the determining, by the backend server, whether the target parameter is an exception triggering parameter may include:
when the target parameter is a power-off triggering parameter, the background server acquires an electric signal of the borrowing device during the last power-off of the borrowing device in the borrowing process, judges whether the electric signal is in a preset electric signal range corresponding to normal power-off of the borrowing device, and determines that the target parameter is an abnormal triggering parameter if the judgment result is negative.
And when the judgment result is yes, determining that the target parameter is not the abnormal triggering parameter.
In this alternative embodiment, the electrical signal may comprise a voltage and/or a current. Wherein, voltage and current have corresponding predetermined electric signal scope respectively, for example: the range of the preset electric signal corresponding to the voltage (the preset voltage range) is 220V-250V, and the range of the preset electric signal corresponding to the current (the preset current range) is 70A-90A.
Therefore, in the optional implementation mode, the electric signal of the borrowing device in the last power failure in the borrowing process is obtained, and the electric signal is compared with the electric signal of the borrowing device in the normal power failure, so that the target parameter of the borrowing device can be judged abnormally.
In this optional embodiment, as another optional implementation manner, the determining, by the backend server, whether the target parameter is an exception triggering parameter may include:
the background server obtains the device parameters of the borrowing device before the last time the target function is closed in the borrowing process, judges whether the target function is in a working state according to the device parameters, and determines the target parameters as abnormal triggering parameters when the target function is in the working state.
In this optional embodiment, the device parameter includes an operating parameter of the borrowing device and/or a temperature inside a cavity of the borrowing device, where the operating parameter of the borrowing device includes a real-time operating parameter and/or an accumulated operating parameter of the borrowing device. The real-time working parameter is specifically a real-time working duration, and the accumulated working parameter is specifically an accumulated working duration.
In this alternative embodiment, the time before the target function is turned off includes the moment when the target function is turned off and the time before the moment.
In this optional embodiment, the background server determines whether the target function is in a working state according to the device parameter, specifically:
the background server judges whether the equipment parameters of the borrowing equipment are matched with the preset parameters of the borrowing equipment, and when the equipment parameters are judged to be not matched with the preset parameters, the target function of the borrowing equipment is determined to be in a working state, and more specifically:
when the device parameter of the borrowing device is the real-time working duration of the borrowing device, the background server judges whether the real-time working duration is greater than or equal to the rated working duration (for example, 20 minutes and the like) corresponding to the target function or the working duration (for example, 15 minutes and the like) preset by a related borrower for the target function, and when the judgment result is negative, the target function of the borrowing device is determined to be in a working state; it should be noted that the judgment method of the accumulated working time length is similar to the judgment method of the real-time working time length, and is not described herein again;
when the equipment parameter of the borrowing equipment is the cavity internal temperature of the borrowing equipment, the background server judges whether the cavity internal temperature of the borrowing equipment is larger than or equal to the rated temperature (for example, 100 ℃) corresponding to the target function or the preset temperature (for example, 80 ℃) of the related borrower for the target function, and when the judgment result is negative, the target function of the borrowing equipment is determined to be in the working state.
In this alternative embodiment, the borrowing device has a corresponding function shutdown identifier, where the function shutdown identifier includes a power-off shutdown identifier (e.g., 1) and/or a non-power-off shutdown identifier (e.g., 0), where the power-off shutdown identifier includes a power-off shutdown identifier (e.g., 10) and/or a non-power-off shutdown identifier (e.g., an identifier corresponding to power-off with poor plug contact, 11), and the non-power-off shutdown identifier may include a touch shutdown identifier (e.g., 00) and/or a non-touch shutdown identifier (e.g., an identifier corresponding to a shutdown instruction sent to the borrowing device by a user terminal that establishes communication with the borrowing device, 01). And each identification has a corresponding output device, for example: light output device. Therefore, when the borrowing equipment is shut down, the reason for shutting down the function can be intuitively caused through each function shutdown identification. For example, when a small light tube corresponding to the non-touch closing identifier 01 emits a flickering light, it indicates that the reason why the current function of the borrowing device is closed is due to an instruction parameter sent by a user terminal that establishes communication with the borrowing device.
Therefore, in the optional implementation manner, the device parameter of the borrowing device is obtained before the target function is closed for the last time in the borrowing process of this time, and the state of the target function of the borrowing device is judged according to the device parameter, so that the abnormality judgment of the target parameter of the borrowing device can be realized.
Therefore, in the optional embodiment, by acquiring and judging whether the target parameter of the last target function closing of the borrowing device in the borrowing process is the abnormal trigger parameter, the legality judgment of the re-authorization request can be realized; by acquiring the real-time working parameters, the accumulated working parameters and the internal temperature of the cavity of the borrowing equipment and comparing the real-time working parameters, the accumulated working parameters and the internal temperature of the cavity with the determined parameters, the accuracy and the reliability of judging whether the target parameters are abnormal triggering parameters can be improved, a judging mode of judging whether various target parameters are abnormal triggering parameters can be provided, and the intelligent function of the background server is enriched.
In yet another alternative embodiment, after receiving a re-authorization request triggered by a borrower for a borrowing device and before the background server determines whether the re-authorization request is legal, the re-authorization use control method for the borrowing device may include the following operations:
the background server judges whether a borrower is an authorized borrower of the borrowing equipment in the borrowing process, and when the borrower is judged to be the authorized borrower, the operation of judging whether the re-authorization request is legal is triggered to be executed;
in this optional embodiment, as an optional implementation manner, the determining, by the background server, whether a borrower is an authorized borrower of the borrowing device in the borrowing process may include:
when the borrowing request of the borrowing equipment is sent by a certain user terminal, the background server acquires a terminal identifier corresponding to the terminal sending the re-authorization request and judges whether the terminal identifier is matched with the terminal identifier of the certain user terminal; and when the matching is judged, determining that a certain borrower is an authorized borrower of the borrowing equipment in the borrowing process, and storing the terminal identification of a certain user terminal in the background server.
In this optional embodiment, as another optional implementation manner, the determining, by the background server, whether a borrower is an authorized borrower of the borrowing device in the borrowing process may include:
the method comprises the steps that a background server obtains attribute information of a borrower and judges whether the attribute information is matched with certain attribute information in a pre-stored attribute information set or not; and when the matching is judged, determining a certain borrower as an authorized borrower of the borrowing equipment in the borrowing process.
In this optional embodiment, optionally, when it is determined that a borrower is not an authorized borrower, the background server ends the process.
In this alternative embodiment, the attribute information of a borrower may include at least one of a fingerprint parameter, a face parameter, an iris parameter, and a voiceprint parameter of a borrower, which is not limited in this alternative embodiment.
Therefore, after receiving the re-authorization request of the borrowing device, the optional embodiment further judges whether the borrower is an authorized borrower of the borrowing device, if yes, the subsequent operation is continuously executed, and the situation that an illegal borrower uses the borrowing device can be reduced; and through verifying the terminal identification and/or verifying the attribute information of the borrower, the judgment of whether the borrower is an authorized borrower of the borrowing equipment in the borrowing process can be realized.
In yet another alternative embodiment, the method for controlling re-authorized use of a borrowing device may further include the steps of:
when the re-authorization request is judged to be illegal in step 101, the background server sends an illegal request prompt to the user terminal of a borrower, wherein the illegal request prompt is used for prompting that the borrower does not meet the requirement of re-requesting to use the borrowing equipment and needs to re-initiate the borrowing request of the borrowing equipment if the borrower wants to use the borrowing equipment.
It can be seen that, when it is determined that the re-authorization request of the borrowing device is illegal, the alternative embodiment sends a prompt for reinitiating the borrowing request of the borrowing device to the borrower, so that the possibility that the borrower borrows the borrowing device can be improved.
102. The background server generates authorization authentication information of the borrowing device.
In the embodiment of the present invention, the authorization authentication information may be authorization authentication information that has been generated in advance, or may be authorization authentication information that is generated anew. Further, the authorization authentication information is encrypted authorization information. Still further, the authorization authentication information may include a device identification of the authorized borrowing device and/or an authorization authentication information validity duration (e.g., 10 minutes, i.e., the borrower must authorize and authenticate with the borrowing device according to the authorization authentication information within 10 minutes after receiving the authorization authentication information of the borrowing device).
In yet another alternative embodiment, when the authorization authentication information is regenerated authorization authentication information, after the step 101 is performed and before the step 102 is performed, the method for controlling re-authorization use of a borrowing device may include the following operations:
the background server determines first target information, where the first target information includes at least one of a first identifier uniquely corresponding to the borrowing device, a target time, and a second identifier uniquely corresponding to a borrower, and this optional embodiment is not limited;
in this optional embodiment, as an optional implementation manner, the generating, by the backend server, the authorization authentication information of the borrowing device may include:
and the background server inputs the first target information into a pre-established authorization authentication generation model for analysis, and acquires an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment.
In this alternative embodiment, the first identifier includes at least one of an apparatus identifier of the borrowing apparatus, an apparatus model of the borrowing apparatus, and a current geographic location identifier of the borrowing apparatus, the target time includes a time when the first target information is determined and/or a time when the re-authorization request is received, and the second identifier includes at least one of a terminal identifier of a user terminal of a certain borrower, an account identifier of a certain borrower, and an attribute identifier of a certain borrower, which is not limited in this alternative embodiment. Therefore, the more the content of the first target information is, the more personalized the content is, the more the safe and reliable authorization authentication information is generated.
In this alternative embodiment, the authorization authentication generation model is established by:
the method comprises the steps that a background server obtains a sample information set, trains a predetermined authorization authentication generation model through the sample information set to obtain the trained authorization authentication generation model, and stores the authorization authentication generation model, wherein the sample information set comprises a device identifier of a sample borrowing device, a device model of the sample borrowing device, a current geographic position identifier of the sample borrowing device, a sample target time, a terminal identifier of a sample user terminal, a sample account identifier and a sample user attribute identifier.
Therefore, in the optional embodiment, dynamic authorization and authentication information can be acquired by acquiring the first target information and generating the authorization and authentication information according to the first target information; the first target information is input into a pre-established authorization authentication generation model for analysis to obtain authorization authentication information, so that the generation efficiency of the authorization authentication information can be improved; and the first target information with larger content and individuation is determined according to the actual situation, so that the generation safety and reliability of the authorization authentication information can be improved, and the possibility of intercepting and cracking the authorization authentication information is reduced.
103. And the background server sends the authorization authentication information to a user terminal of a certain borrower so that the certain borrower carries out authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
In yet another alternative embodiment, the method of controlling re-authorized use of a borrowing device may include the operations of:
when the re-authorization request is judged to be legal in step 101, the background server generates an effective borrowing identifier of the borrowing device according to the obtained second target information, and sends the effective borrowing identifier to a user terminal of a certain borrower.
In this alternative embodiment, the valid borrowing identification includes the length of time and/or the number of power-ups a borrower is able to use the borrowing device after the borrowing device authorization authentication passes. The second target information includes the borrowing type of a borrower and/or information corresponding to the borrowing device. The borrowing type comprises a family borrowing type or a restaurant borrowing type; the information corresponding to the borrowing equipment comprises the use condition of the borrowing equipment in the borrowing process and/or equipment information of the borrowing equipment.
In this alternative embodiment, it should be noted that the step of generating a valid borrowing identifier may also occur after step 102 or concurrently with step 102, and the embodiment of the present invention is not limited thereto.
In this alternative embodiment, when the step of generating a valid borrowing identifier may also occur after step 102, optionally, the valid borrowing identifier of the borrowing device may be carried in the authorization authentication information, so that the valid borrowing identifier and the authorization authentication information are sent to a user terminal of a borrower together. Therefore, the situation that the valid borrowing identification and the authorization authentication information need to be respectively browsed due to separate sending can be reduced, and the experience of the borrower is not facilitated.
As can be seen, the alternative embodiment further generates the valid borrowing identifier of the borrowing device after judging that the re-authorization request of the borrowing device is legal, so that the borrower can know the renewal condition of the borrowing device, without the need for the user to initiate a re-authorization request more than necessary, and the borrower can conveniently perform corresponding operations according to the renewal condition of the borrowing device, for example: the borrowing request of the borrowing equipment is reinitiated after the borrowing of the borrowing equipment is finished, so that the experience of a borrower is improved, and the borrowing viscosity and the popularization of the borrowing equipment are facilitated; and the effective borrowing identifier is borne on the authorization authentication information and is sent to the user terminal of the borrower together, so that the situation that the effective borrowing identifier and the authorization authentication information need to be respectively browsed due to separate sending can be reduced.
It can be seen that, by implementing the method for controlling the use of the borrowing device re-authorization described in fig. 1, when the request for requesting the use of the borrowing device again is received and when the request is judged to be legal, the re-authorization authentication information of the borrowing device is generated, and when the power of the borrowing device is cut off in an emergency, the re-authorization processing can be performed on the borrowing device, so that the user can continue to use the borrowing device, the experience of the user is improved, and the use viscosity and the popularization of the borrowing device are improved. In addition, the generation efficiency of the authorization authentication information can be improved; the first target information with larger content and individuation is determined according to the actual situation, so that the generation safety and reliability of the authorization authentication information can be improved, and the possibility of intercepting and cracking the authorization authentication information is reduced; the borrower can know the lending condition of the borrowing equipment, the user does not need to initiate a re-authorization request at many times, and the borrower can conveniently execute corresponding operation according to the lending condition of the borrowing equipment.
Example two
Referring to fig. 2, fig. 2 is a flowchart illustrating another method for controlling unauthorized use of a borrowing device according to an embodiment of the present invention. The re-authorization use control method for the borrowing device described in fig. 2 may be applied to a background server for managing the borrowing device or a use control platform, and the embodiment of the present invention is not limited. As shown in fig. 2, the method of controlling re-authorized use of a borrowing device may include the operations of:
201. when a re-authorization request triggered by a borrower for the borrowing equipment is received, the background server judges whether the re-authorization request is legal or not. If yes, triggering to execute the step 102; and when the judgment result is negative, ending the process.
In the embodiment of the invention, the re-authorization request is used for requesting the background server to re-authorize a borrower to use the borrowing equipment.
202. The background server generates authorization authentication information of the borrowing device.
203. And the background server sends the authorization authentication information to a user terminal of a certain borrower so that the certain borrower carries out authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
In the embodiment of the present invention, after step 203 is completed, step 204 may be triggered to be executed.
It should be noted that step 204 may also occur in the process of requesting each use after the borrowing device authorization authentication passes in the borrowing process.
204. The background server detects whether a legal use request for the borrowing equipment is received or not, and triggers to execute step 205 when the legal use request for the borrowing equipment is detected; and when the legal use request aiming at the borrowing equipment is not detected, ending the process.
In the embodiment of the invention, when the use request is triggered within the available use time and/or the power-on times after the authorization authentication of the borrowing equipment passes, the detection of a legal use request for the borrowing equipment is represented.
In the embodiment of the present invention, the legal use request includes a function that a borrower needs to borrow a device to implement, for example: cooking function, etc.
205. The background server determines the current environment of the borrowing equipment and judges whether the environment is matched with the predetermined power-on environment of the borrowing equipment; when the environment is judged to match the power-on environment of the borrowing device, triggering to execute step 206; and when the environment is judged not to be matched with the power-on environment of the borrowing equipment, ending the process.
In the embodiment of the present invention, the current environment (also referred to as environment parameters) of the borrowing device may be obtained by the borrowing device based on the sensor thereof and uploaded to the background server and/or obtained by a user terminal of a borrower and uploaded to the background server.
In the embodiment of the present invention, the background server stores parameters of the power-on environment of the borrowing device, such as: humidity below 70% RH, etc.
In the embodiment of the invention, the background server judges whether the environment is matched with the preset power-on environment of the borrowing equipment, specifically, the background server determines whether the environment parameter of the current environment of the borrowing equipment is matched with the preset power-on environment parameter of the borrowing equipment, and if so, determines that the current environment of the borrowing equipment is matched with the preset power-on environment of the borrowing equipment.
In an optional embodiment, the method for controlling re-authorized use of a borrowing device may further include the operations of:
the background server acquires the use condition of the borrowing equipment, judges whether the borrowing equipment needs maintenance or not according to the use condition, and sends a maintenance prompt of the borrowing equipment to a user terminal of a certain borrower when the borrowing equipment needs maintenance.
In this alternative embodiment, the usage condition of the borrowing device may include at least one of a historical power-on duration of the borrowing device, a historical power-on number of the borrowing device, and an interval duration between a current time and a last time of maintenance of the borrowing device, and this alternative embodiment is not limited.
In this optional embodiment, the determining, by the background server, whether the borrowing device needs to be maintained according to the use condition may include: the background server judges whether the interval duration is less than or equal to a preset interval duration threshold, and determines that the borrowing equipment needs to be maintained when the judgment result is yes; or the background server judges whether the historical power-on time is greater than or equal to a predetermined power-on time threshold, and when the judgment result is yes, the borrowing equipment is determined to need maintenance; or the background server judges whether the historical power-on times are larger than or equal to a predetermined power-on time threshold value, and determines that the borrowing equipment needs to be maintained when the judgment result is yes.
Therefore, in the alternative embodiment, by acquiring the use condition of the borrowing equipment and sending the maintenance prompt to the user terminal of the borrower when the borrowing equipment is judged to need maintenance according to the use condition of the borrowing equipment, the borrowing equipment can be maintained in time, so that the service life of the borrowing equipment can be prolonged; and by any one or combination of the historical power-on duration, the historical power-on times and the interval duration between the current time and the last maintenance duration of the borrowing equipment, the judgment that the borrowing equipment needs to be maintained can be determined in multiple ways, and the judgment accuracy that the borrowing equipment needs to be maintained is improved.
In another alternative embodiment, the method for controlling re-authorized use of a borrowing device may further include the operations of:
the method comprises the steps that a background server obtains the processing condition of a borrower for borrowing equipment after the borrower finishes using the borrowing equipment every time in the borrowing process, judges whether the processing condition meets the predetermined cleaning condition or not, and pushes a corresponding point accumulated value to a point pool bound to an account of the borrower when the judgment result is yes; and if the result is negative, ending the process, or deducting a corresponding point accumulated value from a point pool bound by the account of a borrower.
In this alternative embodiment, the credits in the pool of credits may be used to offset all or part of the cost incurred by the borrowing device.
In this alternative embodiment, the processing for the borrowing device includes at least one of processing time, processing degree (for example, whole body processing of the borrowing device, etc.), and material used for processing (for example, wire brush, etc.), and this alternative embodiment is not limited.
Therefore, in the optional embodiment, the processing condition of the borrower for the borrowing equipment after the borrower finishes using the borrowing equipment every time in the borrowing process is obtained, the accumulated point value is pushed to the account of the borrower when the processing condition meets the cleaning condition, and the accumulated point value is deducted when the cleaning condition is not met, so that the behavior of the borrower using the borrowing equipment can be supervised, the behavior of the borrower using the borrowing equipment is favorably normalized, the service life of the borrowing equipment is prolonged, and the utilization rate of the borrowing equipment is further improved.
206. And the background server controls the borrowing equipment to start according to the legal use request.
Therefore, the embodiment of the invention further judges whether the current environment of the borrowing equipment is matched with the power-on environment of the borrowing equipment after the legal use request of the borrowing equipment is detected, and controls the borrowing equipment to start when the current environment is matched with the power-on environment of the borrowing equipment, so that the occurrence of the situation that circuit devices of the borrowing equipment are damaged due to the fact that the current environment is not matched with the power-on environment of the borrowing equipment but the borrowing equipment is started can be reduced, and the service life of the borrowing equipment is prolonged.
In the embodiment of the present invention, please refer to the detailed description of step 101 to step 103 in the first embodiment for the related description of step 201 to step 203, which is not described again in the embodiment of the present invention.
It can be seen that, by implementing the method for controlling the unauthorized use of the borrowing device described in fig. 2, when the request for requesting the use of the borrowing device again is received and the request is judged to be legal, the unauthorized use authentication information of the borrowing device is generated, and the unauthorized use of the borrowing device can be performed when the borrowing device is powered off in an emergency, so that the user can use the borrowing device continuously, the experience of the user is improved, the use viscosity and the popularization of the borrowing device are improved, the occurrence of the situation that circuit devices of the borrowing device are damaged due to the fact that the current environment is not matched with the power-on environment of the borrowing device but the borrowing device is started can be reduced, and the service life of the borrowing device is prolonged.
EXAMPLE III
Referring to fig. 3, fig. 3 is a schematic structural diagram of a unauthorized use control apparatus of a borrowing device according to an embodiment of the present invention. The method and apparatus for controlling re-authorization of use of borrowing equipment described in fig. 3 may be applied to a background server for managing borrowing equipment or a use control platform, and the embodiment of the present invention is not limited. As shown in fig. 3, the method and apparatus for controlling unauthorized use of a borrowing device may include a determining module 301, a generating module 302, and a communication module 303, where:
a determining module 301, configured to determine whether a re-authorization request triggered by a borrower for a borrowing device is legal or not when the re-authorization request is received, where the re-authorization request is used to request a background server to re-authorize a borrower to use the borrowing device.
A generating module 302, configured to generate authorization and authentication information of the borrowing device when the determining module 301 determines that the re-authorization request is legal.
The communication module 303 is configured to send the authorization and authentication information to a user terminal of a certain borrower, so that the certain borrower performs authorization and authentication with the borrowing device through the user terminal according to the authorization and authentication information.
It can be seen that, by implementing the re-authorization use control apparatus for borrowing equipment described in fig. 3, when receiving a request for requesting to authorize the use of the borrowing equipment again and when judging that the request is legal, the re-authorization authentication information of the borrowing equipment is generated, and when the power of the borrowing equipment is cut off in an emergency, the re-authorization processing can be performed on the borrowing equipment, so that a user can continue to use the borrowing equipment, the experience of the user is improved, and the use viscosity and popularization of the borrowing equipment are improved.
In an alternative embodiment, on the basis of the schematic structural diagram of the apparatus for controlling unauthorized use of a borrowing device described in fig. 3, the apparatus for controlling unauthorized use of a borrowing device may further include a collecting module 304, in this case, the apparatus for controlling unauthorized use of a borrowing device may also be as shown in fig. 4, and fig. 4 is a schematic structural diagram of another apparatus for controlling unauthorized use of a borrowing device, where:
an acquiring module 304, configured to acquire a switch state of a target function of the borrowing device when a request for re-authorization triggered by a borrower for the borrowing device is received.
The determining module 301 is further configured to determine whether the switch state is used to indicate that the target function is in the off state, and when the determination result is yes, trigger execution of the operation of determining whether the re-authorization request is legal.
It can be seen that, by implementing the re-authorization use control apparatus for the borrowing device described in fig. 4, after receiving the re-authorization request for the borrowing device, the on-off state of the target function of the borrowing device can be further obtained, and when the on-off state is in the off state, that is, the target function of the borrowing device is in the off state, the subsequent operation of judging whether the re-authorization request is legal is executed, so that the accuracy and reliability of judging whether the re-authorization request is legal can be improved, and the accuracy of generating the authorization authentication information is further improved.
In another alternative embodiment, as shown in fig. 4, the manner for the determining module 301 to determine whether the re-authorization request is legal specifically includes:
and obtaining a target parameter for triggering the borrowing equipment to close the target function for the last time in the borrowing process, judging whether the target parameter is an abnormal triggering parameter, and determining that the re-authorization request is legal when the target parameter is judged to be the abnormal triggering parameter, wherein the target parameter comprises a power-off triggering parameter or an instruction triggering parameter.
In this optional embodiment, further, the manner for determining whether the target parameter is the abnormal triggering parameter by the determining module 301 specifically is as follows:
when the target parameter is the power-off triggering parameter, acquiring an electric signal of the borrowing equipment during the last power-off of the borrowing equipment in the borrowing process, judging whether the electric signal is in a preset electric signal range corresponding to the normal power-off of the borrowing equipment, and when the judgment result is negative, determining that the target parameter is the abnormal triggering parameter.
In this optional embodiment, further, the manner for the determining module 301 to determine whether the target parameter is the abnormal triggering parameter specifically is:
the method comprises the steps of obtaining equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process, judging whether the target function is in a working state or not according to the equipment parameters, and determining the target parameters as abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or the internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
It can be seen that, by acquiring and judging whether the target parameter of the last target function shutdown of the borrowing device in the borrowing process of this time is the abnormal trigger parameter, the re-authorization use control device implementing the borrowing device described in fig. 4 can realize the judgment that the re-authorization request is legal; by acquiring the real-time working parameters, the accumulated working parameters and the internal temperature of the cavity of the borrowing equipment and comparing the real-time working parameters, the accumulated working parameters and the internal temperature of the cavity with the determined parameters, the accuracy and the reliability of judging whether the target parameters are abnormal triggering parameters can be improved, a judging mode of judging whether various target parameters are abnormal triggering parameters can be provided, and the intelligent function of the background server is enriched.
In yet another alternative embodiment, as shown in fig. 4, the apparatus for controlling re-authorized use of a borrowing device may further include a first determining module 305, wherein:
a first determining module 305, configured to determine first target information after the determining module 301 determines that the re-authorization request is legal and before the generating module 302 generates the authorization authentication information of the borrowing device, where the first target information includes at least one of a first identifier uniquely corresponding to the borrowing device, a target time, and a second identifier uniquely corresponding to a borrower;
the manner of generating the authorization authentication information of the borrowing device by the generating module 302 specifically is as follows:
inputting the first target information into a pre-established authorization authentication generation model for analysis, and acquiring an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
the first identification comprises at least one of an equipment identification of the borrowing equipment, an equipment model of the borrowing equipment and a current geographic position identification of the borrowing equipment, the target time comprises a time for determining first target information and/or a time for receiving a re-authorization request, and the second identification comprises at least one of a terminal identification of a user terminal of a borrower, an account identification of the borrower and an attribute identification of the borrower.
It can be seen that the re-authorization use control device implementing the borrowing device described in fig. 4 can obtain dynamic authorization authentication information by obtaining the first target information and generating the authorization authentication information according to the first target information; the first target information is input into a pre-established authorization authentication generation model for analysis to obtain authorization authentication information, so that the generation efficiency of the authorization authentication information can be improved; and the first target information with larger content and individuation is determined according to the actual situation, so that the generation safety and reliability of the authorization authentication information can be improved, and the possibility of intercepting and cracking the authorization authentication information is reduced.
In yet another alternative embodiment, as shown in fig. 3 or 4, the generating module 302 is further configured to generate a valid borrowing identifier of the borrowing device according to the acquired second target information when the judging module 301 judges that the re-authorization request is legal.
The communication module 303 is further configured to send a valid borrowing identifier to the user terminal of a certain borrower, where the valid borrowing identifier includes a duration and/or a power-on number of times that the certain borrower can use the borrowing device after the authorization authentication of the borrowing device passes.
The second target information includes the borrowing type of a borrower and/or information corresponding to the borrowing device.
It can be seen that, implementing the re-authorization use control apparatus for a borrowing device described in fig. 3 or 4 can further generate a valid borrowing identifier of the borrowing device after determining that the re-authorization request of the borrowing device is legal, so that a borrower can know the renewal condition of the borrowing device, without the need for a user to initiate a re-authorization request more often and the borrower can perform corresponding operations according to the renewal condition of the borrowing device, for example: the borrowing request of the borrowing equipment is reinitiated after the borrowing of the borrowing equipment is finished, so that the experience of a borrower is improved, and the borrowing viscosity and the popularization of the borrowing equipment are facilitated; and the effective borrowing identifier is borne on the authorization authentication information and is sent to the user terminal of the borrower together, so that the situation that the effective borrowing identifier and the authorization authentication information need to be respectively browsed due to separate sending can be reduced.
In yet another alternative embodiment, as shown in fig. 4, the apparatus for controlling re-authorized use of a borrowing device may further include a second determining module 306 and a control module 307, wherein:
a second determination module 306 to determine the environment in which the borrowing device is currently located when a legitimate use request for the borrowing device is detected.
The determining module 301 is further configured to determine whether the environment matches a predetermined power-on environment of the borrowing device.
A control module 307, configured to control the borrowing device to start according to the legal use request when the determining module 301 determines that the environment matches the power-on environment of the borrowing device.
It can be seen that, by implementing the re-authorization use control apparatus for borrowing equipment described in fig. 4, after detecting a legal use request of the borrowing equipment, it can be further determined whether the current environment of the borrowing equipment matches with the power-on environment thereof, and only when matching, the borrowing equipment is controlled to be started, so that the occurrence of a situation that a circuit device of the borrowing equipment is damaged due to the fact that the current environment does not match with the power-on environment of the borrowing equipment but the borrowing equipment is started can be reduced, and the service life of the borrowing equipment can be prolonged.
Example four
Referring to fig. 5, fig. 5 is a diagram illustrating a re-authorization control apparatus for a borrowing device according to another embodiment of the present invention. As shown in fig. 5, the apparatus for controlling re-authorized use of a borrowing device may include:
a memory 01 storing executable program codes;
a processor 502 coupled to a memory 501;
further, an input interface 503 and an output interface 504 coupled to the processor 502 may be included;
the processor 502 invokes executable program code stored in the memory 501 for performing the steps performed by the backend server in the method for controlling re-authorized use of a borrowing device as described in embodiment one or embodiment two.
EXAMPLE five
The embodiment of the invention discloses a computer readable storage medium which stores a computer program for electronic data exchange, wherein the computer program enables a computer to execute the steps executed by a background server in the method for controlling the re-authorized use of a borrowing device described in the first embodiment or the second embodiment.
EXAMPLE six
An embodiment of the present invention discloses a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to execute the steps performed by a background server in the method for controlling re-authorized use of a borrowing device described in the first or second embodiment
The above-described embodiments of the apparatus are merely illustrative, and the modules described as separate components may or may not be physically separate, and the components shown as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above detailed description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. Based on such understanding, the above technical solutions may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, wherein the storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), a One-time Programmable Read-Only Memory (OTPROM), an Electrically Erasable rewritable Read-Only Memory (EEPROM), a compact disc-Read-Only Memory (CD-ROM) or other magnetic disk memories, a magnetic tape Memory, a magnetic disk, a magnetic tape Memory, a magnetic tape, and a magnetic tape, Or any other medium which can be used to carry or store data and which can be read by a computer.
Finally, it should be noted that: the method and apparatus for controlling unauthorized use of borrowing equipment disclosed in the embodiments of the present invention are only the preferred embodiments of the present invention, and are only used for illustrating the technical solutions of the present invention, not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art; the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A re-authorization use control method of a borrowing device is applied to a background server, and the method comprises the following steps:
when a re-authorization request triggered by a borrower for the borrowing device is received, the background server judges whether the re-authorization request is legal or not, wherein the re-authorization request is used for requesting the background server to re-authorize the borrower to use the borrowing device;
and when the re-authorization request is judged to be legal, the background server generates authorization authentication information of the borrowing equipment and sends the authorization authentication information to a user terminal of a certain borrower, so that the certain borrower performs authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
2. The re-authorization usage control method of a borrowing device according to claim 1, wherein the method further comprises:
when a re-authorization request triggered by a borrower for the borrowing equipment is received, the background server acquires the on-off state of a target function of the borrowing equipment;
and the background server judges whether the switch state is used for indicating that the target function is in a closed state, and triggers and executes the operation of judging whether the re-authorization request is legal or not when the judgment result is yes.
3. The method for controlling re-authorization use of a borrowing device according to claim 2, wherein the background server determining whether the re-authorization request is legitimate comprises:
the background server acquires a target parameter for triggering the borrowing device to close the target function for the last time in the borrowing process, judges whether the target parameter is an abnormal trigger parameter, and determines that the re-authorization request is legal when the target parameter is judged to be the abnormal trigger parameter, wherein the target parameter comprises a power-off trigger parameter or an instruction trigger parameter.
4. The re-authorization usage control method of a borrowing device according to claim 3, wherein the background server determining whether the target parameter is an abnormal triggering parameter comprises:
when the target parameter is the power-off triggering parameter, the background server acquires an electric signal of the borrowing device during the last power-off in the borrowing process, judges whether the electric signal is within a preset electric signal range corresponding to the normal power-off of the borrowing device, and determines that the target parameter is an abnormal triggering parameter when the judgment result is negative.
5. The re-authorization usage control method of a borrowing device according to claim 3, wherein the background server determining whether the target parameter is an abnormal triggering parameter comprises:
the background server obtains equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process, judges whether the target function is in a working state or not according to the equipment parameters, and determines that the target parameters are abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or the internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
6. The re-authorization use control method of a borrowing device according to any one of claims 1-5, wherein after determining that the re-authorization request is legitimate and before the background server generates authorization authentication information of the borrowing device, the method further comprises:
the background server determines first target information, wherein the first target information comprises at least one of a first identifier uniquely corresponding to the borrowing equipment, a target time and a second identifier uniquely corresponding to a certain borrower;
wherein the generating, by the background server, the authorization and authentication information of the borrowing device includes:
the background server inputs the first target information into a pre-established authorization authentication generation model for analysis, and obtains an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
the first identifier includes at least one of an equipment identifier of the borrowing equipment, an equipment model of the borrowing equipment, and a current geographic location identifier of the borrowing equipment, the target time includes a time when the first target information is determined and/or a time when the re-authorization request is received, and the second identifier includes at least one of a terminal identifier of a user terminal of the borrower, an account identifier of the borrower, and an attribute identifier of the borrower.
7. The re-authorized use control method of a borrowing device according to any one of claims 1-6, wherein said method further comprises:
when the re-authorization request is judged to be legal, the background server generates an effective borrowing identifier of the borrowing equipment according to the obtained second target information, and sends the effective borrowing identifier to the user terminal of the borrower, wherein the effective borrowing identifier comprises the time length and/or the power-on times of the borrowing equipment which can be used by the borrower after the authorization authentication of the borrowing equipment passes;
wherein the second target information includes the borrowing type of the borrower and/or information corresponding to the borrowing device.
8. The re-authorized use control method of a borrowing device according to any one of claims 1-7, wherein said method further comprises:
when a legal use request for the borrowing equipment is detected, the background server determines the current environment of the borrowing equipment and judges whether the environment is matched with the predetermined power-on environment of the borrowing equipment;
and when the environment is judged to be matched with the power-on environment of the borrowing equipment, the background server controls the borrowing equipment to start according to the legal use request.
9. The utility model provides a method and a device for controlling the use of borrowing equipment by re-authorization, which is characterized in that the device is applied to a background server, the device comprises a judging module, a generating module and a communication module, wherein:
the judging module is configured to judge whether a re-authorization request triggered by a borrower for the borrowing device is legal or not when the re-authorization request is received, where the re-authorization request is used to request the background server to re-authorize the borrower to use the borrowing device;
the generating module is configured to generate authorization and authentication information of the borrowing device when the judging module judges that the re-authorization request is legal;
the communication module is configured to send the authorization and authentication information to the user terminal of the borrower, so that the borrower performs authorization and authentication with the borrowing device through the user terminal according to the authorization and authentication information.
10. A method and a device for controlling re-authorization use of a borrowing device are characterized in that the device comprises:
a memory storing executable program code;
a processor coupled with the memory;
the processor invokes the executable program code stored in the memory to perform a re-authorization use control method of a borrowing device as recited in any one of claims 1-8.
CN202010429346.9A 2020-05-20 2020-05-20 Re-authorization use control method and device of borrowing equipment Pending CN111737664A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010429346.9A CN111737664A (en) 2020-05-20 2020-05-20 Re-authorization use control method and device of borrowing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010429346.9A CN111737664A (en) 2020-05-20 2020-05-20 Re-authorization use control method and device of borrowing equipment

Publications (1)

Publication Number Publication Date
CN111737664A true CN111737664A (en) 2020-10-02

Family

ID=72647429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010429346.9A Pending CN111737664A (en) 2020-05-20 2020-05-20 Re-authorization use control method and device of borrowing equipment

Country Status (1)

Country Link
CN (1) CN111737664A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737663A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Use control method and device of borrowing equipment
CN113450520A (en) * 2021-06-22 2021-09-28 平安壹钱包电子商务有限公司 Equipment management method, device, server and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170126682A1 (en) * 2015-10-30 2017-05-04 Futurewei Technologies, Inc. System and method for secure provisioning of out-of-network user equipment
CN107563840A (en) * 2017-07-31 2018-01-09 北京三快在线科技有限公司 Portable power source leasing method, system, electronic equipment and readable storage medium storing program for executing
CN108569250A (en) * 2018-03-30 2018-09-25 上海汽车集团股份有限公司 The automatic authorization method of bluetooth key based on shared automobile
CN109285055A (en) * 2018-09-27 2019-01-29 深圳来电科技有限公司 A kind of rent method of sharing articles, mobile terminal and server
CN109359037A (en) * 2018-09-26 2019-02-19 深圳壹账通智能科技有限公司 A kind of management method of shared device, storage medium and server
CN109597327A (en) * 2018-11-16 2019-04-09 广州市格利网络技术有限公司 The use control method and device of reusable table ware
CN110795321A (en) * 2019-10-23 2020-02-14 北京云测信息技术有限公司 Misoperation processing method and device and terminal equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170126682A1 (en) * 2015-10-30 2017-05-04 Futurewei Technologies, Inc. System and method for secure provisioning of out-of-network user equipment
CN107563840A (en) * 2017-07-31 2018-01-09 北京三快在线科技有限公司 Portable power source leasing method, system, electronic equipment and readable storage medium storing program for executing
CN108569250A (en) * 2018-03-30 2018-09-25 上海汽车集团股份有限公司 The automatic authorization method of bluetooth key based on shared automobile
CN109359037A (en) * 2018-09-26 2019-02-19 深圳壹账通智能科技有限公司 A kind of management method of shared device, storage medium and server
CN109285055A (en) * 2018-09-27 2019-01-29 深圳来电科技有限公司 A kind of rent method of sharing articles, mobile terminal and server
CN109597327A (en) * 2018-11-16 2019-04-09 广州市格利网络技术有限公司 The use control method and device of reusable table ware
CN110795321A (en) * 2019-10-23 2020-02-14 北京云测信息技术有限公司 Misoperation processing method and device and terminal equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HONG LIU等: "Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing", pages 1 - 11, Retrieved from the Internet <URL:《网页在线公开:https://ieeexplore.ieee.org/abstract/document/6748054》> *
宋宇波等: "权限可控传递的物联网共享设备委托授权访问机制", 《网络与信息安全学报》, vol. 5, no. 2, 28 May 2019 (2019-05-28), pages 40 - 49 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737663A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Use control method and device of borrowing equipment
CN113450520A (en) * 2021-06-22 2021-09-28 平安壹钱包电子商务有限公司 Equipment management method, device, server and storage medium

Similar Documents

Publication Publication Date Title
CN110851809B (en) Fingerprint identification method and device and touch screen terminal
CN106911650B (en) Intelligent household control method, device and system
CN104850771A (en) Identity verification method and related equipment
CN107222373B (en) Control method, system and terminal of smart home, FIDO server and safety equipment
CN111737664A (en) Re-authorization use control method and device of borrowing equipment
CN107426160B (en) Control method, system and terminal of smart home, FIDO server and safety equipment
CN103745148A (en) Information protection method based on fingerprint recognition and mobile terminal
WO2017088316A1 (en) Payment method and device thereof
CN105259771A (en) Authentication method and associated device
CN103167149A (en) System and method of safety of mobile phone based on face recognition
CN109523662B (en) Identity verification electricity taking method, electricity taking device, access control method and device
CN105389497A (en) Security verification method and system for operation interface of fingerprint recognition
CN112785008A (en) Water heater fault processing method and water heater
CN110048916B (en) Equipment control method and device and storage medium
CN104937602B (en) Privacy protection method and electronic equipment
CN102938031A (en) Electrical equipment
WO2017129071A1 (en) Password authentication method, device and application server
CN111737663A (en) Use control method and device of borrowing equipment
CN113850938B (en) Intelligent door lock control method and device, storage medium and electronic equipment
CN113591600A (en) Cooking equipment control method and device based on user identification and gas stove
CN108390893A (en) A kind of login method, mobile terminal and computer readable storage medium
WO2016180234A1 (en) Method and apparatus for building secure environment
CN110432748B (en) Pot detection method, device and equipment of electromagnetic heating electric appliance
CN107222465B (en) Network access control system of intelligent gateway
CN114495444B (en) Leakage monitoring method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination