CN111737664B - Method and device for controlling re-authorization use of borrowing equipment - Google Patents

Method and device for controlling re-authorization use of borrowing equipment Download PDF

Info

Publication number
CN111737664B
CN111737664B CN202010429346.9A CN202010429346A CN111737664B CN 111737664 B CN111737664 B CN 111737664B CN 202010429346 A CN202010429346 A CN 202010429346A CN 111737664 B CN111737664 B CN 111737664B
Authority
CN
China
Prior art keywords
borrowing
equipment
authorization
background server
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010429346.9A
Other languages
Chinese (zh)
Other versions
CN111737664A (en
Inventor
李军棉
周胡顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Geli Network Technology Co ltd
Original Assignee
Guangzhou Geli Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Geli Network Technology Co ltd filed Critical Guangzhou Geli Network Technology Co ltd
Priority to CN202010429346.9A priority Critical patent/CN111737664B/en
Publication of CN111737664A publication Critical patent/CN111737664A/en
Application granted granted Critical
Publication of CN111737664B publication Critical patent/CN111737664B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Safety Devices In Control Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method and a device for controlling re-authorization use of borrowing equipment, wherein the method comprises the following steps: when a re-authorization request aiming at the borrowing equipment is received, the background server judges whether the re-authorization request is legal or not, and the re-authorization request is used for requesting the background server to re-authorize the borrowing equipment; if the information is legal, generating the authorization authentication information of the borrowing equipment, and sending the authorization authentication information to the user terminal of the borrower, so that the borrower can conduct authorization confirmation with the borrowing equipment through the user terminal according to the authorization authentication information. Therefore, when the request for authorizing the borrowing equipment is received and the request is judged to be legal, the method and the device generate the re-authorization authentication information of the borrowing equipment, and the re-authorization processing can be carried out on the borrowing equipment when the borrowing equipment encounters emergency power-off, so that a user can use the borrowing equipment continuously, the experience of the user is improved, and the use viscosity and popularization of the borrowing equipment are improved.

Description

Method and device for controlling re-authorization use of borrowing equipment
Technical Field
The invention relates to the technical field of internet, in particular to a method and a device for controlling re-authorization use of borrowing equipment.
Background
In recent years, with the acceleration of the pace of life and work, people put more mind on work and study, so that the demands of people for certain devices are not frequent, but in order to meet the demands of life, the devices have to be used in some cases, for example: an electromagnetic oven. And with the advent of the "sharing concept", a variety of devices are available on the market for people to share and borrow, and people can meet the living needs by borrowing the required devices, for example: the cooking requirement is met by using the induction cooker.
However, it has been found in practice that during the use of borrowing equipment, one often encounters several incidents, such as: suddenly power off, etc., and when borrowing equipment runs into emergency, borrowing equipment can immediately get into forbidden state, and this makes people unable to continue to use borrowed equipment to influence the experience that people used borrowing equipment, be unfavorable for borrowing equipment's use viscosity and popularization. Therefore, it is important to provide a technical scheme that can control the borrowing device to continue to work without delaying the use of the borrowing device when the borrowing device encounters an emergency and enters a disabled state.
Disclosure of Invention
The technical problem to be solved by the invention is to provide a method and a device for controlling the re-authorization use of borrowing equipment, which can perform re-authorization treatment on the borrowing equipment when the borrowing equipment encounters emergency power failure so as to facilitate the user to continue to use the borrowing equipment.
In order to solve the technical problem, a first aspect of the embodiments of the present invention discloses a method for controlling re-authorized use of borrowing equipment, where the method is applied to a background server, and the method includes:
When a re-authorization request triggered by a certain borrower for the borrowing equipment is received, the background server judges whether the re-authorization request is legal or not, and the re-authorization request is used for requesting the background server to re-authorize the certain borrower to use the borrowing equipment;
When judging that the re-authorization request is legal, the background server generates authorization and authentication information of the borrowing equipment and sends the authorization and authentication information to a user terminal of a certain borrower so that the certain borrower can conduct authorization and authentication with the borrowing equipment through the user terminal according to the authorization and authentication information.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the method further includes:
when a re-authorization request triggered by a certain borrower for the borrowing equipment is received, the background server acquires the switch state of the target function of the borrowing equipment;
And the background server judges whether the switch state is used for indicating that the target function is in a closed state, and when the judgment result is yes, the operation for judging whether the re-authorization request is legal is triggered and executed.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the determining, by the background server, whether the re-authorization request is legal includes:
the background server acquires a target parameter for triggering the borrowing equipment to close the target function for the last time in the borrowing process, judges whether the target parameter is an abnormal triggering parameter, and determines that the re-authorization request is legal when judging that the target parameter is the abnormal triggering parameter, wherein the target parameter comprises a power-off triggering parameter or an instruction triggering parameter.
In an optional implementation manner, in the first aspect of the embodiment of the present invention, the step of determining, by the background server, whether the target parameter is an abnormal triggering parameter includes:
When the target parameter is the power-off triggering parameter, the background server acquires an electric signal of the borrowing equipment when the borrowing equipment is powered off for the last time in the borrowing process, judges whether the electric signal is in a preset electric signal range corresponding to normal power-off of the borrowing equipment, and determines that the target parameter is an abnormal triggering parameter when the judging result is negative.
In an optional implementation manner, in the first aspect of the embodiment of the present invention, the step of determining, by the background server, whether the target parameter is an abnormal triggering parameter includes:
The background server acquires equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process, judges whether the target function is in a working state according to the equipment parameters, and determines that the target parameters are abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
In a first aspect of the embodiment of the present invention, after determining that the re-authorization request is legal and before the background server generates authorization authentication information of the borrowing device, the method further includes:
The background server determines first target information, wherein the first target information comprises at least one of a first identifier uniquely corresponding to the borrowing equipment, a target moment and a second identifier uniquely corresponding to a certain borrower;
the background server generates authorization authentication information of the borrowing equipment, which comprises the following steps:
The background server inputs the first target information into a pre-established authorization authentication generation model for analysis, and obtains an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
The first identifier includes at least one of an equipment identifier of the borrowing equipment, an equipment model of the borrowing equipment and a current geographic location identifier of the borrowing equipment, the target time includes a time of determining the first target information and/or a time of receiving the re-authorization request, and the second identifier includes at least one of a terminal identifier of a user terminal of the certain borrower, an account identifier of the certain borrower and an attribute identifier of the certain borrower.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the method further includes:
When judging that the re-authorization request is legal, the background server generates an effective borrowing identifier of the borrowing device according to the acquired second target information, and sends the effective borrowing identifier to a user terminal of the certain borrower, wherein the effective borrowing identifier comprises duration and/or power-on times that the certain borrower can use the borrowing device after the borrowing device authorization authentication is passed;
The second target information comprises borrowing type of the certain borrower and/or information corresponding to the borrowing equipment.
As an optional implementation manner, in the first aspect of the embodiment of the present invention, the method further includes:
When a legal use request for the borrowing equipment is detected, the background server determines the current environment of the borrowing equipment and judges whether the environment is matched with a predetermined power-on environment of the borrowing equipment;
and when the environment is judged to be matched with the electrified environment of the borrowing equipment, the background server controls the borrowing equipment to start according to the legal use request.
The second aspect of the embodiment of the invention discloses a method and a device for controlling the re-authorization use of borrowing equipment, wherein the device is applied to a background server and comprises a judging module, a generating module and a communication module, wherein:
The judging module is used for judging whether a re-authorization request is legal or not when receiving the re-authorization request triggered by a certain borrower aiming at the borrowing equipment, wherein the re-authorization request is used for requesting the background server to re-authorize the certain borrower to use the borrowing equipment;
The generation module is used for generating the authorization authentication information of the borrowing equipment when the judgment module judges that the re-authorization request is legal;
And the communication module is used for sending the authorization authentication information to the user terminal of a certain borrower so that the certain borrower can conduct authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the apparatus further includes an acquisition module, where:
the acquisition module is used for acquiring the switch state of the target function of the borrowing equipment when receiving a re-authorization request triggered by a certain borrower for the borrowing equipment;
The judging module is further configured to judge whether the switch state is used to indicate that the target function is in a closed state, and when the judging result is yes, trigger to execute the operation of judging whether the re-authorization request is legal.
In a second aspect of the embodiment of the present invention, the determining means for determining whether the re-authorization request is legal specifically includes:
And acquiring a target parameter for triggering the borrowing equipment to close the target function for the last time in the borrowing process, judging whether the target parameter is an abnormal triggering parameter, and determining that the re-authorization request is legal when the target parameter is judged to be the abnormal triggering parameter, wherein the target parameter comprises a power-off triggering parameter or an instruction triggering parameter.
In a second aspect of the embodiment of the present invention, the determining means determines whether the target parameter is an abnormal trigger parameter specifically includes:
when the target parameter is the power-off triggering parameter, acquiring an electric signal of the borrowing equipment when the borrowing equipment is powered off for the last time in the borrowing process, judging whether the electric signal is in a preset electric signal range corresponding to normal power-off of the borrowing equipment, and when the judging result is negative, determining that the target parameter is an abnormal triggering parameter.
In a second aspect of the embodiment of the present invention, the determining means for determining whether the target parameter is an abnormal triggering parameter specifically includes:
Acquiring equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process, judging whether the target function is in a working state according to the equipment parameters, and determining that the target parameters are abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the apparatus further includes a first determining module, where:
The first determining module is configured to determine, after the judging module judges that the re-authorization request is legal, and before the generating module generates authorization authentication information of the borrowing device, first target information, where the first target information includes at least one of a first identifier uniquely corresponding to the borrowing device, a target time, and a second identifier uniquely corresponding to the certain borrower;
The method for generating the authorization authentication information of the borrowing equipment by the generation module specifically comprises the following steps:
inputting the first target information into a pre-established authorization authentication generation model for analysis, and acquiring an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
The first identifier includes at least one of an equipment identifier of the borrowing equipment, an equipment model of the borrowing equipment and a current geographic location identifier of the borrowing equipment, the target time includes a time of determining the first target information and/or a time of receiving the re-authorization request, and the second identifier includes at least one of a terminal identifier of a user terminal of the certain borrower, an account identifier of the certain borrower and an attribute identifier of the certain borrower.
In a second aspect of the embodiment of the present invention, the generating module is further configured to generate, when the determining module determines that the re-authorization request is legal, an effective borrowing identifier of the borrowing device according to the obtained second target information;
The communication module is further configured to send the valid borrowing identifier to a user terminal of the certain borrower, where the valid borrowing identifier includes a duration and/or a power-on number that the certain borrower can use the borrowing device after the borrowing device authorization authentication is passed;
The second target information comprises borrowing type of the certain borrower and/or information corresponding to the borrowing equipment.
As an optional implementation manner, in the second aspect of the embodiment of the present invention, the apparatus further includes a second determining module and a control module, where:
The second determining module is used for determining the current environment of the borrowing equipment when detecting a legal use request aiming at the borrowing equipment;
the judging module is further used for judging whether the environment is matched with a predetermined electrifying environment of the borrowing equipment;
and the control module is used for controlling the borrowing equipment to start according to the legal use request when the judging module judges that the environment is matched with the electrified environment of the borrowing equipment.
The third aspect of the present invention discloses another method and apparatus for controlling re-authorized use of borrowing equipment, the apparatus comprising:
a memory storing executable program code;
a processor coupled to the memory;
The processor invokes the executable program code stored in the memory to execute the re-authorized use control method of the borrowing device disclosed in the first aspect of the present invention.
A fourth aspect of the present invention discloses a computer-readable storage medium storing computer instructions that, when invoked, are operable to perform the re-authorized use control method of the borrowing device disclosed in the first aspect of the present invention.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
The embodiment of the invention provides a method and a device for controlling re-authorized use of borrowing equipment, wherein the method comprises the following steps: when a re-authorization request triggered by a certain borrower for borrowing equipment is received, the background server judges whether the re-authorization request is legal or not, and the re-authorization request is used for requesting the background server to re-authorize the certain borrower to use the borrowing equipment; when the re-authorization request is judged to be legal, the background server generates authorization authentication information of the borrowing equipment and sends the authorization authentication information to a user terminal of a certain borrower, so that the certain borrower can conduct authorization recognition with the borrowing equipment through the user terminal according to the authorization authentication information. Therefore, when the request for authorizing the borrowing equipment is received and the request is judged to be legal, the embodiment of the invention generates the re-authorization authentication information of the borrowing equipment, and when the borrowing equipment encounters emergency power failure, the re-authorization processing can be carried out on the borrowing equipment, so that the user can use the borrowing equipment continuously, the experience of the user is improved, and the use viscosity and popularization of the borrowing equipment are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for controlling re-authorized use of a borrowing device according to an embodiment of the present invention;
FIG. 2 is a flow chart of another method for controlling re-authorized use of a borrowing device according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a device for controlling re-authorized use of borrowing equipment according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of another apparatus for controlling re-authorized use of borrowing equipment according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a device for controlling re-authorized use of a borrowing facility according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms first, second and the like in the description and in the claims and in the above-described figures are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, apparatus, article, or device that comprises a list of steps or elements is not limited to the list of steps or elements but may, in the alternative, include other steps or elements not expressly listed or inherent to such process, method, article, or device.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The invention discloses a method and a device for controlling the re-authorization use of borrowing equipment, which can generate re-authorization authentication information of the borrowing equipment when receiving a request for re-requesting to authorize the use of the borrowing equipment and judging that the request is legal, and can perform re-authorization treatment on the borrowing equipment when the borrowing equipment encounters emergency power failure so as to facilitate a user to continue to use the borrowing equipment, improve the experience of the user, and further facilitate the improvement of the use viscosity and popularization of the borrowing equipment. The following will describe in detail.
Example 1
Referring to fig. 1, fig. 1 is a flowchart of a method for controlling re-authorized use of a borrowing device according to an embodiment of the present invention. The method for controlling the re-authorization use of the borrowing device described in fig. 1 may be applied to a background server for managing the borrowing device or a use control platform. As shown in fig. 1, the re-authorized use control method of the borrowing device may include the following operations:
101. When a re-authorization request triggered by a borrower for borrowing equipment is received, the background server judges whether the re-authorization request is legal or not. When the judgment result is yes, triggering and executing step 102; and ending the flow when the judgment result is negative.
In the embodiment of the invention, borrowing is also called leasing or sharing. The borrowing device is any borrower of borrowing devices, the borrowing device is any borrowing device borrowed by a borrower, and the borrowing devices can comprise any borrowing device needing to be electrified, such as an intelligent electromagnetic oven, an intelligent electric cooker, an intelligent pressure cooker, an intelligent kettle, an intelligent barbecue oven, an intelligent microwave oven, an intelligent sweeper, an intelligent electric fan, an intelligent cooker, an intelligent lamp, an intelligent garbage can and the like, and the embodiment of the invention is not limited. Further, borrowing equipment borrowed by a certain borrower can be independent or complete, and under the condition that the borrowing equipment is independent, each borrowing equipment is provided with a unique identification code; under the condition that the borrowing equipment is a complete set, each set of borrowing equipment is provided with a unique main identification code, and further, each borrowing equipment included in the set of borrowing equipment is provided with a unique sub-identification code corresponding to the unique main identification code, so that the corresponding sub-identification code can be determined according to the main identification code, the corresponding main identification code can be determined according to the sub-identification code, and the mutual identification flexibility of each borrowing equipment in the complete set of borrowing equipment is improved; and the circulation process of the borrowing equipment and the related information in the flow process can be monitored according to the identification code identification corresponding to the borrowing equipment so as to form the traceability information of the borrowing equipment for inquiry. The identification code corresponding to the borrowing device can be generated through the following mechanism:
encrypting the serial number of the borrowing equipment to obtain an encryption code;
At least one random code of a plurality of (for example, 4) random codes is implanted into the encryption code to obtain a tableware identification code corresponding to the borrowing equipment, wherein the plurality of random codes can comprise a position random code, a number random code and a character random code. Thus, the safe and reliable identification code is obtained by encrypting the identification code of the borrowing equipment.
In the embodiment of the invention, the re-authorization request is used for requesting the background server to re-authorize a borrower to use the borrowing equipment. Further, the re-authorization request may be sent by a borrower to the background server through any one of APP, applet, public number, etc. on the user terminal (e.g., mobile phone, etc.); when the borrowing device is powered on, the re-authorization request may also be triggered by a borrowing device to be sent to the background server by the borrowing device on the borrowing device, which is not limited by the embodiment of the present invention. Still further alternatively, the re-authorization request may include information indicating the borrowing device's uniqueness and/or a requested authorization-to-use duration of the borrowing device. The information for indicating the uniqueness of the borrowing device may include at least one of a device identifier, a device type, and a current geographic location of the borrowing device, which is not limited by the embodiment of the present invention.
In the embodiment of the present invention, a borrower is a direct borrower of a borrowing device, and may also be a user authorized by the direct borrower, for example: parents, etc.
In an alternative embodiment, the method for controlling re-authorized use of the borrowing device may further include the following operations:
when a re-authorization request triggered by a certain borrower for borrowing equipment is received, a background server acquires the switch state of the target function of the borrowing equipment;
The background server judges whether the switch state is used for indicating that the target function is in a closed state, and when the judgment result is yes, the operation of judging whether the re-authorization request is legal or not is triggered and executed.
In this alternative embodiment, further optionally, when the switch state is determined to indicate that the target function is in the on state and is in the off (e.g., locked) state, the above operation of determining whether the re-authorization request is legal may be triggered.
In this alternative embodiment, when it is further optional that the switch state is used to indicate that the target function is in the on state, the current flow is ended.
In this alternative embodiment, the switch of each function of the borrowing device sets an on flag and an off flag, for example: the switch of the electromagnetic oven frying function is set to be 1 when the switch of the frying function is in an on state, and set to be 0 when the switch of the frying function is in an off state.
Therefore, in this optional embodiment, after receiving the re-authorization request for the borrowing device, the switch state of the target function of the borrowing device is further acquired, and when the switch state is in the off state, that is, the target function of the borrowing device is in the off state, a subsequent operation of judging whether the re-authorization request is legal is performed, so that the accuracy and reliability of judging whether the re-authorization request is legal can be improved, and further the accuracy of generating the authorization authentication information is improved.
In another alternative embodiment, the background server determines whether the re-authorization request is legitimate, including:
The background server acquires a target parameter for triggering the borrowing equipment to close the target function for the last time in the borrowing process, judges whether the target parameter is an abnormal triggering parameter, and determines that the re-authorization request is legal when judging that the target parameter is the abnormal triggering parameter.
In this alternative embodiment, the target parameter comprises a power-down trigger parameter or an instruction trigger parameter. The instruction triggering parameter may include a touch triggering parameter or a parameter sent by a user terminal that establishes communication with the borrowing device to the borrowing device. The touch trigger parameter is specifically a parameter generated when the borrower touches the borrowing device.
In this optional embodiment, as an optional implementation manner, the background server determining whether the target parameter is an abnormal triggering parameter may include:
when the target parameter is the power-off triggering parameter, the background server acquires the electric signal of the borrowing equipment when the borrowing equipment is powered off for the last time in the borrowing process, judges whether the electric signal is in a preset electric signal range corresponding to normal power-off of the borrowing equipment, and determines that the target parameter is the abnormal triggering parameter when the judging result is negative.
And when the judgment result is yes, determining that the target parameter is not the abnormal trigger parameter.
In this alternative embodiment, the electrical signal may comprise a voltage and/or a current. The voltage and the current have corresponding preset electric signal ranges, for example: the preset electric signal range (preset voltage range) corresponding to the voltage is 220V-250V, and the preset electric signal range (preset current range) corresponding to the current is 70A-90A.
Therefore, the optional implementation manner obtains the electric signal of the borrowing device when the borrowing device is powered off for the last time in the borrowing process, compares the electric signal with the electric signal of the borrowing device when the borrowing device is powered off normally, and can realize the abnormal judgment of the target parameter of the borrowing device.
In this optional embodiment, as another optional implementation manner, the step of determining, by the background server, whether the target parameter is an abnormal triggering parameter may include:
The background server acquires equipment parameters of borrowing equipment before the borrowing equipment closes the target function for the last time in the borrowing process, judges whether the target function is in a working state according to the equipment parameters, and determines that the target parameter is an abnormal trigger parameter when the target function is in the working state.
In this alternative embodiment, the device parameters include an operating parameter of the borrowing device and/or a temperature within a cavity of the borrowing device, wherein the operating parameter of the borrowing device includes a real-time operating parameter and/or an accumulated operating parameter of the borrowing device. The real-time working parameters are specifically real-time working time, and the accumulated working parameters are specifically accumulated working time.
In this alternative embodiment, the time before the target function is closed includes the time at which the target function was closed and before that time.
In this optional embodiment, the background server determines, according to the device parameter, whether the target function is in a working state, specifically:
The background server judges whether the equipment parameters of the borrowing equipment are matched with the parameters of the borrowing equipment which are determined in advance, and when the equipment parameters are not matched, the target function of the borrowing equipment is determined to be in a working state, and more specifically:
When the equipment parameter of the borrowing equipment is the real-time working time length of the borrowing equipment, the background server judges whether the real-time working time length is more than or equal to the rated working time length (for example, 20 minutes and the like) corresponding to the target function or the preset working time length (for example, 15 minutes and the like) of the relevant borrower aiming at the target function, and when the judging result is negative, the target function of the borrowing equipment is determined to be in a working state; it should be noted that, the method for judging the accumulated working time length is similar to the method for judging the real-time working time length, and is not repeated here;
When the equipment parameter of the borrowing equipment is the temperature in the cavity of the borrowing equipment, the background server judges whether the temperature in the cavity of the borrowing equipment is larger than or equal to the rated temperature (for example, 100 ℃) corresponding to the target function or the preset temperature (for example, 80 ℃) of the relevant borrower for the target function, and when the judging result is negative, the target function of the borrowing equipment is determined to be in a working state.
In this alternative embodiment, the borrowing device has a corresponding function closing identifier, where the function closing identifier includes a power outage closing identifier (e.g. 1) and/or a non-power outage closing identifier (e.g. 0), where the power outage closing identifier includes a power outage closing identifier (e.g. 10) and/or a non-power outage closing identifier (e.g. an identifier corresponding to a poor plug contact power outage, 11), and the non-power outage closing identifier may include a touch closing identifier (e.g. 00) and/or a non-touch closing identifier (e.g. an identifier corresponding to a closing instruction sent to the borrowing device by a user terminal that establishes communication with the borrowing device, 01). And each identification has a corresponding output device, such as: and a light output device. Thus, when the borrowing device is in the function closing state, the reasons for the function closing can be intuitively caused through each function closing mark. For example, when the small lamp corresponding to the non-touch-control closing identifier 01 emits a blinking light, the reason for indicating that the current function of the borrowing device is closed is due to the instruction parameter sent by the user terminal establishing communication with the borrowing device.
Therefore, in this optional embodiment, the device parameter of the borrowing device is obtained before the borrowing device closes the target function for the last time in the borrowing process, and the state of the target function of the borrowing device is judged according to the device parameter, so that the abnormal judgment of the target parameter of the borrowing device can be realized.
Therefore, in the optional embodiment, whether the target parameter of the last closing target function of the borrowing equipment in the borrowing process is an abnormal trigger parameter is obtained and judged, so that legal judgment of the re-authorization request can be realized; and by acquiring the real-time working parameters, the accumulated working parameters and the temperature in the cavity of the borrowing equipment and comparing the real-time working parameters, the accumulated working parameters and the temperature with the determined parameters, the judgment accuracy and reliability of whether the target parameters are abnormal triggering parameters can be improved, the judgment mode of whether various target parameters are abnormal triggering parameters can be provided, and the intelligent function of the background server is enriched.
In yet another alternative embodiment, after receiving a re-authorization request triggered by a borrower for a borrowing device and before the background server determines whether the re-authorization request is legal, the re-authorization usage control method of the borrowing device may include the following operations:
The background server judges whether a certain borrower is an authorized borrower of the borrowing equipment in the borrowing process, and when the certain borrower is judged to be the authorized borrower, the operation of judging whether the re-authorization request is legal or not is triggered and executed;
In this optional embodiment, as an optional implementation manner, the background server determining whether a borrower is an authorized borrower of the borrowing device in the borrowing process may include:
When the borrowing request of the borrowing equipment is sent through a certain user terminal, a background server obtains a terminal identifier corresponding to the terminal for sending the re-authorization request and judges whether the terminal identifier is matched with the terminal identifier of the certain user terminal; when the matching is judged, a certain borrower is determined to be an authorized borrower of the borrowing equipment in the borrowing process, and the terminal identification of a certain user terminal is stored in a background server.
In this optional embodiment, as another optional implementation manner, the step of determining, by the background server, whether a borrower is an authorized borrower of the borrowing device in the borrowing process may include:
The background server acquires attribute information of a certain borrower and judges whether the attribute information is matched with certain attribute information in a pre-stored attribute information set; when the matching is judged, a certain borrower is determined to be an authorized borrower of the borrowing equipment in the borrowing process.
In this optional embodiment, optionally, when it is determined that a borrower is not an authorized borrower, the background server ends the current flow.
In this alternative embodiment, the attribute information of a borrower may include at least one of a fingerprint parameter, a face parameter, an iris parameter, and a voiceprint parameter of a borrower, where the alternative embodiment is not limited.
Therefore, after receiving the re-authorization request of the borrowing device, the optional embodiment further judges whether the borrower is an authorized borrower of the borrowing device, if so, the follow-up operation is continuously executed, and the situation that the illegal borrower uses the borrowing device can be reduced; and through checking the terminal identification and/or checking the attribute information of the borrower, the judgment of whether the borrower is an authorized borrower of the borrowing equipment in the borrowing process can be realized.
In yet another alternative embodiment, the method for controlling re-authorized use of the borrowing device may further include the steps of:
When step 101 determines that the re-authorization request is illegal, the background server sends an illegal request prompt to a user terminal of a certain borrower, where the illegal request prompt is used to prompt that the certain borrower does not meet the requirement of re-requesting to use the borrowing device and if the borrowing device is wanted to use the borrowing device, the borrowing request of the borrowing device needs to be re-initiated.
It can be seen that, when the alternative embodiment determines that the re-authorization request of the borrowing device is illegal, the alternative embodiment sends a prompt for re-initiating the borrowing request of the borrowing device to the borrower, so that the possibility that the borrower borrows the borrowing device can be improved.
102. The background server generates authorization authentication information of the borrowing device.
In the embodiment of the invention, the authorization authentication information can be the authorization authentication information which is generated in advance or the authorization authentication information which is regenerated. Further, the authorization authentication information is encrypted authorization information. Still further, the authorization and authentication information may include a device identification of the borrowing device that is authorized and/or a valid duration of the authorization and authentication information (e.g., 10 minutes, i.e., the borrower must perform authorization and authentication with the borrowing device based on the authorization and authentication information within 10 minutes after receiving the authorization and authentication information of the borrowing device).
In yet another alternative embodiment, when the authorization-to-authenticate information is regenerated authorization-to-authenticate information, after performing the finishing step 101 and before performing the step 102, the re-authorized-use control method of the borrowing device may include the following operations:
the background server determines first target information, where the first target information includes at least one of a first identifier uniquely corresponding to the borrowing device, a target moment, and a second identifier uniquely corresponding to a certain borrower, and the optional embodiment is not limited;
In this optional embodiment, as an optional implementation manner, the generating, by the background server, authorization authentication information of the borrowing device may include:
the background server inputs the first target information into a pre-established authorization authentication generation model for analysis, and obtains an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment.
In this optional embodiment, the first identifier includes at least one of a device identifier of the borrowing device, a device model of the borrowing device, and a current geographical location identifier of the borrowing device, the target time includes a time of determining the first target information and/or a time of receiving the re-authorization request, and the second identifier includes at least one of a terminal identifier of a user terminal of a certain borrower, an account identifier of a certain borrower, and an attribute identifier of a certain borrower. Thus, the more and more personalized the content of the first target information, the more beneficial to generating the safe and reliable authorization authentication information.
In this alternative embodiment, the authorization authentication generation model is built by:
The background server acquires a sample information set, trains a predetermined authorization authentication generation model through the sample information set to obtain a trained authorization authentication generation model, and stores the authorization authentication generation model, wherein the sample information set comprises a device identifier of sample borrowing equipment, a device model of the sample borrowing equipment, a current geographic position identifier of the sample borrowing equipment, a sample target moment, a terminal identifier of a sample user terminal, a sample account identifier and a sample user attribute identifier.
It can be seen that, in this alternative embodiment, dynamic authorization and authentication information can be obtained by obtaining the first target information and generating authorization and authentication information according to the first target information; the first target information is input into a pre-established authorization authentication generation model for analysis, authorization authentication information is obtained, and the generation efficiency of the authorization authentication information can be improved; and determining the first target information with larger content and individuation according to the actual situation, thereby improving the generation safety and reliability of the authorization authentication information and reducing the possibility of interception and cracking of the authorization authentication information.
103. The background server sends the authorization authentication information to a user terminal of a certain borrower, so that the certain borrower performs authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
In yet another alternative embodiment, the method of controlling re-authorized use of the borrowing device may include the operations of:
When step 101 judges that the re-authorization request is legal, the background server generates an effective borrowing identifier of the borrowing device according to the acquired second target information, and sends the effective borrowing identifier to a user terminal of a certain borrower.
In this alternative embodiment, the valid borrowing identification includes a duration and/or number of power-ups that a borrower can use the borrowing device after the borrowing device authorization is authenticated. The second target information comprises information corresponding to borrowing types and/or borrowing equipment of a certain borrower. The borrowing type comprises a family borrowing type or a restaurant borrowing type; the information corresponding to the borrowing equipment comprises the use condition of the borrowing equipment in the borrowing process and/or equipment information of the borrowing equipment.
In this alternative embodiment, it should be noted that the step of generating the valid borrowing identification may also occur after step 102 or simultaneously with step 102, which is not limited by the embodiment of the present invention.
In this alternative embodiment, when the step of generating the valid borrowing identification may also occur after step 102, optionally, the valid borrowing identification of the borrowing device may be carried on the authorization authentication information, so that the valid borrowing identification is sent to the user terminal of a certain borrower together with the authorization authentication information. Therefore, the effective borrowing identification is carried on the authorization authentication information and is sent to the user terminal of the borrower, the situation that the effective borrowing identification and the authorization authentication information need to be respectively turned over due to separate sending can be reduced, and experience of the borrower is not facilitated.
It can be seen that, in this optional embodiment, after determining that the re-authorization request of the borrowing device is legal, the effective borrowing identifier of the borrowing device is further generated, so that the borrower is enabled to know the lending condition of the borrowing device, without multiple users to initiate the re-authorization request and be convenient for the borrower to execute corresponding operations according to the lending condition of the borrowing device, for example: the borrowing equipment re-initiates the borrowing request of the borrowing equipment after the borrowing equipment finishes, so that the experience of a borrower is improved, and the borrowing viscosity and popularization of the borrowing equipment are facilitated; and by carrying the valid borrowing identification on the authorization authentication information and transmitting the valid borrowing identification to the user terminal of the borrower together, the situation that the valid borrowing identification and the authorization authentication information need to be respectively turned over due to separate transmission can be reduced.
Therefore, the method for controlling the re-authorization use of the borrowing equipment described in fig. 1 can generate the re-authorization authentication information of the borrowing equipment when receiving the request for re-requesting to authorize the use of the borrowing equipment and judging that the request is legal, and can perform re-authorization processing on the borrowing equipment when the borrowing equipment encounters emergency power-off, so that a user can use the borrowing equipment continuously, the experience of the user is improved, and the use viscosity and popularization of the borrowing equipment are improved. In addition, the generation efficiency of the authorization authentication information can be improved; the first target information with larger content and individuation is determined according to actual conditions, so that the generation safety and reliability of the authorization authentication information can be improved, and the possibility that the authorization authentication information is intercepted and cracked is reduced; the borrower can also know the continuous borrowing condition of the borrowing equipment, a user is not required to initiate a re-authorization request repeatedly, and the borrower can conveniently execute corresponding operations according to the continuous borrowing condition of the borrowing equipment.
Example two
Referring to fig. 2, fig. 2 is a flowchart illustrating another method for controlling re-authorized use of a borrowing device according to an embodiment of the present invention. The method for controlling the re-authorization use of the borrowing device described in fig. 2 may be applied to a background server for managing the borrowing device or a use control platform, which is not limited by the embodiment of the present invention. As shown in fig. 2, the re-authorized use control method of the borrowing device may include the following operations:
201. When a re-authorization request triggered by a borrower for borrowing equipment is received, the background server judges whether the re-authorization request is legal or not. When the judgment result is yes, triggering and executing step 102; and ending the flow when the judgment result is negative.
In the embodiment of the invention, the re-authorization request is used for requesting the background server to re-authorize a borrower to use the borrowing equipment.
202. The background server generates authorization authentication information of the borrowing device.
203. The background server sends the authorization authentication information to a user terminal of a certain borrower, so that the certain borrower performs authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information.
In the embodiment of the present invention, after step 203 is completed, execution of step 204 may be triggered.
It should be noted that, step 204 may also occur in the process of each use request after the borrowing device authorization authentication passes in the present borrowing process.
204. The background server detects whether a legal use request for the borrowing equipment is received, and when the legal use request for the borrowing equipment is detected, the step 205 is triggered and executed; and ending the flow when the legal use request for the borrowing equipment is not detected.
In the embodiment of the invention, when the use request is triggered within the usable duration and/or the power-on times after the authentication of the borrowing equipment is authorized to pass, the detection of the legal use request for the borrowing equipment is indicated.
In the embodiment of the present invention, the legal use request includes functions that a borrower needs to borrow equipment to implement, for example: rice cooking functions, etc.
205. The background server determines the current environment of the borrowing equipment and judges whether the environment is matched with the pre-determined electrifying environment of the borrowing equipment; triggering execution step 206 when it is determined that the environment matches the powered-on environment of the borrowing device; and when the environment is not matched with the electrified environment of the borrowing equipment, ending the flow.
In the embodiment of the invention, the environment (also referred to as an environmental parameter) where the borrowing device is currently located may be uploaded to the background server based on the fact that the borrowing device collects the sensor of the borrowing device and/or the user terminal of a certain borrower collects the sensor of the borrowing device and uploads the sensor to the background server.
In the embodiment of the invention, the background server stores parameters of the power-on environment of the borrowing equipment, for example: humidity below 70% RH, etc.
In the embodiment of the invention, the background server judges whether the environment is matched with the pre-determined electrifying environment of the borrowing equipment, and particularly, the background server determines that the environment where the borrowing equipment is currently located is matched with the pre-determined electrifying environment of the borrowing equipment according to whether the environment parameters of the environment where the borrowing equipment is currently located are matched with the parameters of the pre-determined electrifying environment of the borrowing equipment if the environment parameters of the environment where the borrowing equipment is currently located are matched with the parameters of the electrifying environment of the pre-determined electrifying environment of the borrowing equipment.
In an alternative embodiment, the method for controlling re-authorized use of the borrowing device may further include the following operations:
The background server acquires the service condition of the borrowing equipment, judges whether the borrowing equipment needs maintenance according to the service condition, and sends maintenance prompt of the borrowing equipment to a user terminal of a certain borrower when judging that the borrowing equipment needs maintenance.
In this alternative embodiment, the usage situation of the borrowing device may include at least one of a historical power-on duration of the borrowing device, a historical power-on number of times of the borrowing device, and an interval duration between a time period of a last maintenance of the borrowing device and the present time, where the alternative embodiment is not limited.
In this optional embodiment, the background server determines, according to the use condition, whether the borrowing device needs maintenance, and may include: the background server judges whether the interval duration is smaller than or equal to a preset interval duration threshold value, and when the judgment result is yes, the borrowing equipment is determined to need maintenance; or the background server judges whether the historical power-on duration is greater than or equal to a predetermined power-on duration threshold, and when the judging result is yes, the borrowing equipment is determined to need maintenance; or the background server judges whether the historical power-on times are larger than or equal to a predetermined power-on times threshold, and when the judgment result is yes, the borrowing equipment is determined to need maintenance.
Therefore, according to the alternative embodiment, the borrowing equipment can be maintained in time by acquiring the service condition of the borrowing equipment and sending the maintenance prompt to the user terminal of the borrower when the borrowing equipment is judged to be required to be maintained according to the service condition of the borrowing equipment, so that the service life of the borrowing equipment can be prolonged; and by any one or combination of the historical power-on duration, the historical power-on times of the borrowing equipment and the interval duration between the current moment and the last maintenance duration of the borrowing equipment, the judgment that the borrowing equipment needs to be maintained can be determined in various modes, and the judgment accuracy that the borrowing equipment needs to be maintained is improved.
In another alternative embodiment, the method for controlling re-authorized use of the borrowing device may further include the operations of:
the background server acquires the processing condition of the borrowing equipment after each time the borrowing equipment is used by a certain borrower in the borrowing process, judges whether the processing condition meets the predetermined cleaning condition, and pushes a corresponding integral accumulated value to an integral pool bound by an account of the certain borrower when the judgment result is yes; and when the judgment result is negative, ending the flow, or deducting the corresponding accumulated point value from an accumulated point pool bound by an account of a certain borrower.
In this alternative embodiment, the points in the pool of points may be used to offset all or part of the cost incurred by the borrowing facility.
In this alternative embodiment, the processing for the borrowing equipment includes at least one of processing time, processing degree (e.g., whole body processing of the borrowing equipment, etc.), and material used for processing (e.g., wire brush, etc.), and the alternative embodiment is not limited.
Therefore, this optional embodiment is through obtaining borrower's processing condition to borrowing equipment after finishing at every turn using borrowing equipment in this borrowing process to when processing condition satisfies the clearance condition, to borrower's account propelling movement integral cumulative value, when not satisfying the clearance condition, deduct integral cumulative value, can supervise borrower's use borrowing equipment's action like this, thereby be favorable to standardizing borrower's use borrowing equipment's action, and improve borrowing equipment's life, and then improve borrowing equipment's utilization ratio.
206. And the background server controls the starting of the borrowing equipment according to the legal use request.
Therefore, after the legal use request of the borrowing equipment is detected, whether the current environment of the borrowing equipment is matched with the electrified environment of the borrowing equipment is further judged, and the borrowing equipment is controlled to be started when the current environment is matched with the electrified environment of the borrowing equipment, so that the situation that the borrowing equipment is damaged due to the fact that the current environment is not matched with the electrified environment of the borrowing equipment but the borrowing equipment is started can be reduced, and the service life of the borrowing equipment is prolonged.
In the embodiment of the present invention, please refer to the detailed description of step 101 to step 103 in the first embodiment for the related description of step 201 to step 203, and the detailed description of the embodiment of the present invention is omitted.
Therefore, the method for controlling the re-authorization use of the borrowing equipment described in fig. 2 can generate the re-authorization authentication information of the borrowing equipment when receiving the request for re-requesting authorization to use the borrowing equipment and judging that the request is legal, and can perform re-authorization processing on the borrowing equipment when the borrowing equipment encounters emergency power failure, so that a user can use the borrowing equipment continuously, experience of the user is improved, use viscosity and popularization of the borrowing equipment are improved, occurrence of damage to a circuit device of the borrowing equipment due to the fact that the current environment is not matched with the electrified environment of the borrowing equipment but the borrowing equipment is started can be reduced, and service life of the borrowing equipment is prolonged.
Example III
Referring to fig. 3, fig. 3 is a schematic structural diagram of a device for controlling re-authorization-use of borrowing equipment according to an embodiment of the present invention. The method and apparatus for controlling re-authorization use of borrowing equipment described in fig. 3 may be applied to a background server for managing borrowing equipment or a use control platform, which are not limited by the embodiments of the present invention. As shown in fig. 3, the method and apparatus for controlling re-authorization use of a borrowing device may include a determining module 301, a generating module 302, and a communication module 303, where:
The judging module 301 is configured to, when receiving a re-authorization request triggered by a borrower for a borrowing device, judge whether the re-authorization request is legal, where the re-authorization request is used to request a background server to re-authorize the borrowing device to be used by the borrowing device.
The generating module 302 is configured to generate authorization authentication information of the borrowing device when the judging module 301 judges that the re-authorization request is legal.
The communication module 303 is configured to send the authorization authentication information to a user terminal of a borrower, so that the borrower performs authorization authentication with the borrowing device according to the authorization authentication information through the user terminal.
Therefore, the re-authorization-use control device for the borrowing device described in fig. 3 can generate re-authorization authentication information of the borrowing device when receiving a request for re-requesting authorization to use the borrowing device and judging that the request is legal, and can perform re-authorization treatment on the borrowing device when the borrowing device encounters emergency power-off, so that a user can use the borrowing device continuously, experience of the user is improved, and use viscosity and popularization of the borrowing device are improved.
In an alternative embodiment, based on the schematic structural diagram of the re-authorization-use control apparatus of the borrowing device described in fig. 3, the re-authorization-use control apparatus of the borrowing device may further include a collection module 304, where the re-authorization-use control apparatus of the borrowing device may further be as shown in fig. 4, and fig. 4 is a schematic structural diagram of another re-authorization-use control apparatus of the borrowing device, where:
And the acquisition module 304 is configured to acquire a switch state of a target function of the borrowing device when receiving a re-authorization request triggered by a borrower for the borrowing device.
The judging module 301 is further configured to judge whether the switch state is used to indicate that the target function is in the off state, and when the judging result is yes, trigger to execute the above operation of judging whether the re-authorization request is legal.
Therefore, the re-authorization-use control device for the borrowing device described in fig. 4 can further obtain the switch state of the target function of the borrowing device after receiving the re-authorization request for the borrowing device, and execute the subsequent operation of judging whether the re-authorization request is legal or not only when the switch state is in the off state, that is, the target function of the borrowing device is in the off state, so that the accuracy and the reliability of judging whether the re-authorization request is legal or not can be improved, and further the accuracy of generating the authorization authentication information can be improved.
In another alternative embodiment, as shown in fig. 4, the determining module 301 determines whether the re-authorization request is legal specifically is:
And when the target parameter is judged to be the abnormal triggering parameter, determining that the re-authorization request is legal, wherein the target parameter comprises a power-off triggering parameter or an instruction triggering parameter.
In this alternative embodiment, further, the determining module 301 determines whether the target parameter is an abnormal triggering parameter specifically includes:
When the target parameter is the power-off trigger parameter, acquiring an electric signal of the borrowing equipment when the borrowing equipment is powered off for the last time in the borrowing process, judging whether the electric signal is in a preset electric signal range corresponding to normal power-off of the borrowing equipment, and when the judging result is negative, determining that the target parameter is the abnormal trigger parameter.
In this alternative embodiment, further, the mode of determining whether the target parameter is the abnormal triggering parameter by the determining module 301 is specifically:
Acquiring equipment parameters of borrowing equipment before the target function is closed for the last time in the borrowing process, judging whether the target function is in a working state according to the equipment parameters, and determining that the target parameter is an abnormal trigger parameter when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
Therefore, the re-authorization-use control device for implementing the borrowing device described in fig. 4 can implement the legal judgment of the re-authorization request by acquiring and judging whether the target parameter of the last closing target function of the borrowing device in the borrowing process is an abnormal trigger parameter; and by acquiring the real-time working parameters, the accumulated working parameters and the temperature in the cavity of the borrowing equipment and comparing the real-time working parameters, the accumulated working parameters and the temperature with the determined parameters, the judgment accuracy and reliability of whether the target parameters are abnormal triggering parameters can be improved, the judgment mode of whether various target parameters are abnormal triggering parameters can be provided, and the intelligent function of the background server is enriched.
In yet another alternative embodiment, as shown in fig. 4, the re-authorized use control device of the borrowing device may further include a first determining module 305, wherein:
A first determining module 305, configured to determine, after the judging module 301 judges that the re-authorization request is legal, and before the generating module 302 generates authorization authentication information of the borrowing device, first target information, where the first target information includes at least one of a first identifier uniquely corresponding to the borrowing device, a target moment, and a second identifier uniquely corresponding to a certain borrower;
the method for generating the authorization authentication information of the borrowing device by the generating module 302 specifically includes:
Inputting the first target information into a pre-established authorization authentication generation model for analysis, and acquiring an analysis result output by the authorization authentication generation model as authorization authentication information of borrowing equipment;
The first identifier comprises at least one of an equipment identifier of borrowing equipment, an equipment model of the borrowing equipment and a current geographic position identifier of the borrowing equipment, the target moment comprises a moment for determining first target information and/or a moment for receiving a re-authorization request, and the second identifier comprises at least one of a terminal identifier of a user terminal of a certain borrower, an account identifier of a certain borrower and an attribute identifier of a certain borrower.
It can be seen that, implementing the re-authorization-use control apparatus of the borrowing device described in fig. 4 can obtain the first target information, and generate authorization authentication information according to the first target information, so as to obtain dynamic authorization authentication information; the first target information is input into a pre-established authorization authentication generation model for analysis, authorization authentication information is obtained, and the generation efficiency of the authorization authentication information can be improved; and determining the first target information with larger content and individuation according to the actual situation, thereby improving the generation safety and reliability of the authorization authentication information and reducing the possibility of interception and cracking of the authorization authentication information.
In yet another alternative embodiment, as shown in fig. 3 or 4, the generating module 302 is further configured to generate, when the determining module 301 determines that the re-authorization request is legal, a valid borrowing identifier of the borrowing device according to the obtained second target information.
The communication module 303 is further configured to send an effective borrowing identifier to a user terminal of a certain borrower, where the effective borrowing identifier includes a duration and/or a number of times that the certain borrower can use the borrowing device after the borrowing device authorization authentication passes.
The second target information comprises information corresponding to borrowing types and/or borrowing equipment of a certain borrower.
It can be seen that implementing the re-authorization-use control apparatus of the borrowing device described in fig. 3 or 4 can further generate the valid borrowing identifier of the borrowing device after determining that the re-authorization request of the borrowing device is legal, so that the borrower can know the borrowing condition of the borrowing device, without multiple users to initiate the re-authorization request and be convenient for the borrower to perform corresponding operations according to the borrowing condition of the borrowing device, for example: the borrowing equipment re-initiates the borrowing request of the borrowing equipment after the borrowing equipment finishes, so that the experience of a borrower is improved, and the borrowing viscosity and popularization of the borrowing equipment are facilitated; and by carrying the valid borrowing identification on the authorization authentication information and transmitting the valid borrowing identification to the user terminal of the borrower together, the situation that the valid borrowing identification and the authorization authentication information need to be respectively turned over due to separate transmission can be reduced.
In yet another alternative embodiment, as shown in fig. 4, the apparatus for controlling re-authorized use of a borrowing device may further include a second determining module 306 and a control module 307, where:
A second determining module 306 is configured to determine, when a legal use request for the borrowing device is detected, an environment in which the borrowing device is currently located.
The determining module 301 is further configured to determine whether the environment matches a predetermined power-on environment of the borrowing device.
And the control module 307 is configured to control the borrowing device to be started according to the legal use request when the judging module 301 judges that the environment matches with the powered-on environment of the borrowing device.
Therefore, the re-authorization-use control device for the borrowing device described in fig. 4 can further judge whether the current environment of the borrowing device is matched with the power-on environment of the borrowing device after detecting the legal use request of the borrowing device, and when the current environment is matched with the power-on environment of the borrowing device, the starting of the borrowing device is controlled, so that the situation that the circuit device of the borrowing device is damaged due to the fact that the current environment is not matched with the power-on environment of the borrowing device but the borrowing device is started can be reduced, and the service life of the borrowing device is prolonged.
Example IV
Referring to fig. 5, fig. 5 is a schematic diagram of a device for controlling re-authorized use of a borrowing apparatus according to an embodiment of the present invention. As shown in fig. 5, the re-authorized use control apparatus of the borrowing device may include:
a memory 01 in which executable program codes are stored;
A processor 502 coupled to the memory 501;
Further, an input interface 503 and an output interface 504 coupled to the processor 502 may also be included;
The processor 502 invokes executable program code stored in the memory 501 for performing the steps performed by the background server in the method for controlling re-authorized use of a borrowing device described in embodiment one or embodiment two.
Example five
The embodiment of the invention discloses a computer readable storage medium storing a computer program for electronic data exchange, wherein the computer program causes a computer to execute steps executed by a background server in a method for controlling re-authorized use of borrowed equipment described in the first or second embodiment.
Example six
An embodiment of the present invention discloses a computer program product comprising a non-transitory computer-readable storage medium storing a computer program operable to cause a computer to execute the steps executed by a background server in the method for controlling re-authorized use of a borrowing device described in the first or second embodiment
The apparatus embodiments described above are merely illustrative, wherein the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
From the above detailed description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product that may be stored in a computer-readable storage medium including Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), one-time programmable Read-Only Memory (OTPROM), electrically erasable programmable Read-Only Memory (EEPROM), compact disc Read-Only Memory (Compact Disc Read-Only Memory, CD-ROM) or other optical disc Memory, magnetic disc Memory, tape Memory, or any other medium that can be used for computer-readable carrying or storing data.
Finally, it should be noted that: the embodiment of the invention discloses a control method and a device for re-authorizing use of borrowing equipment, which are disclosed by the embodiment of the invention only for illustrating the technical scheme of the invention, but not limiting the technical scheme; although the invention has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that; the technical scheme recorded in the various embodiments can be modified or part of technical features in the technical scheme can be replaced equivalently; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.

Claims (9)

1. A method for controlling re-authorized use of a borrowing device, wherein the method is applied to a background server, and the method comprises:
When a re-authorization request triggered by a certain borrower for the borrowing equipment is received, the background server judges whether the re-authorization request is legal or not, and the re-authorization request is used for requesting the background server to re-authorize the certain borrower to use the borrowing equipment;
When judging that the re-authorization request is legal, the background server generates authorization and authentication information of the borrowing equipment and sends the authorization and authentication information to a user terminal of a certain borrower so that the certain borrower performs authorization and authentication with the borrowing equipment through the user terminal according to the authorization and authentication information;
The background server judging whether the re-authorization request is legal or not, comprising:
The background server acquires a target parameter for triggering the borrowing equipment to close a target function for the last time in the borrowing process, judges whether the target parameter is an abnormal triggering parameter, and determines that the re-authorization request is legal when judging that the target parameter is the abnormal triggering parameter, wherein the target parameter comprises a power-off triggering parameter or an instruction triggering parameter.
2. The method of controlling re-authorized use of a borrowing device of claim 1, further comprising:
when a re-authorization request triggered by a certain borrower for the borrowing equipment is received, the background server acquires the switch state of the target function of the borrowing equipment;
And the background server judges whether the switch state is used for indicating that the target function is in a closed state, and when the judgment result is yes, the operation for judging whether the re-authorization request is legal is triggered and executed.
3. The method for controlling re-authorized use of a borrowing device according to claim 1, wherein the background server determining whether the target parameter is an abnormal trigger parameter comprises:
When the target parameter is the power-off triggering parameter, the background server acquires an electric signal of the borrowing equipment when the borrowing equipment is powered off for the last time in the borrowing process, judges whether the electric signal is in a preset electric signal range corresponding to normal power-off of the borrowing equipment, and determines that the target parameter is an abnormal triggering parameter when the judging result is negative.
4. The method for controlling re-authorized use of a borrowing device according to claim 1, wherein the background server determining whether the target parameter is an abnormal trigger parameter comprises:
The background server acquires equipment parameters of the borrowing equipment before the target function is closed for the last time in the borrowing process, judges whether the target function is in a working state according to the equipment parameters, and determines that the target parameters are abnormal triggering parameters when the target function is in the working state, wherein the equipment parameters comprise working parameters of the borrowing equipment and/or internal temperature of a cavity of the borrowing equipment, and the working parameters of the borrowing equipment comprise real-time working parameters and/or accumulated working parameters of the borrowing equipment.
5. The method for controlling re-authorized use of a borrowing device according to any one of claims 1 to 4, wherein after determining that the re-authorization request is legal and before the background server generates the authorization authentication information of the borrowing device, the method further comprises:
The background server determines first target information, wherein the first target information comprises at least one of a first identifier uniquely corresponding to the borrowing equipment, a target moment and a second identifier uniquely corresponding to a certain borrower;
the background server generates authorization authentication information of the borrowing equipment, which comprises the following steps:
The background server inputs the first target information into a pre-established authorization authentication generation model for analysis, and obtains an analysis result output by the authorization authentication generation model as authorization authentication information of the borrowing equipment;
The first identifier includes at least one of an equipment identifier of the borrowing equipment, an equipment model of the borrowing equipment and a current geographic location identifier of the borrowing equipment, the target time includes a time of determining the first target information and/or a time of receiving the re-authorization request, and the second identifier includes at least one of a terminal identifier of a user terminal of the certain borrower, an account identifier of the certain borrower and an attribute identifier of the certain borrower.
6. A method of controlling re-authorized use of a borrowing device according to any one of claims 1-4, further comprising:
When judging that the re-authorization request is legal, the background server generates an effective borrowing identifier of the borrowing device according to the acquired second target information, and sends the effective borrowing identifier to a user terminal of the certain borrower, wherein the effective borrowing identifier comprises duration and/or power-on times that the certain borrower can use the borrowing device after the borrowing device authorization authentication is passed;
The second target information comprises borrowing type of the certain borrower and/or information corresponding to the borrowing equipment.
7. A method of controlling re-authorized use of a borrowing device according to any one of claims 1-4, further comprising:
When a legal use request for the borrowing equipment is detected, the background server determines the current environment of the borrowing equipment and judges whether the environment is matched with a predetermined power-on environment of the borrowing equipment;
and when the environment is judged to be matched with the electrified environment of the borrowing equipment, the background server controls the borrowing equipment to start according to the legal use request.
8. The device is applied to a background server, and comprises a judging module, a generating module and a communication module, wherein:
The judging module is used for judging whether a re-authorization request is legal or not when receiving the re-authorization request triggered by a certain borrower aiming at the borrowing equipment, wherein the re-authorization request is used for requesting the background server to re-authorize the certain borrower to use the borrowing equipment;
The generation module is used for generating the authorization authentication information of the borrowing equipment when the judgment module judges that the re-authorization request is legal;
the communication module is used for sending the authorization authentication information to the user terminal of a certain borrower so that the certain borrower can conduct authorization authentication with the borrowing equipment through the user terminal according to the authorization authentication information;
The judging module judges whether the re-authorization request is legal or not specifically comprises the following steps:
And acquiring a target parameter for triggering the borrowing equipment to close a target function for the last time in the borrowing process, judging whether the target parameter is an abnormal trigger parameter, and determining that the re-authorization request is legal when the target parameter is judged to be the abnormal trigger parameter, wherein the target parameter comprises a power-off trigger parameter or an instruction trigger parameter.
9. A re-authorized use control apparatus for a borrowing facility, the apparatus comprising:
a memory storing executable program code;
a processor coupled to the memory;
The processor invokes the executable program code stored in the memory to perform the re-authorized use control method of the borrowing device as claimed in any one of claims 1-7.
CN202010429346.9A 2020-05-20 2020-05-20 Method and device for controlling re-authorization use of borrowing equipment Active CN111737664B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010429346.9A CN111737664B (en) 2020-05-20 2020-05-20 Method and device for controlling re-authorization use of borrowing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010429346.9A CN111737664B (en) 2020-05-20 2020-05-20 Method and device for controlling re-authorization use of borrowing equipment

Publications (2)

Publication Number Publication Date
CN111737664A CN111737664A (en) 2020-10-02
CN111737664B true CN111737664B (en) 2024-06-28

Family

ID=72647429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010429346.9A Active CN111737664B (en) 2020-05-20 2020-05-20 Method and device for controlling re-authorization use of borrowing equipment

Country Status (1)

Country Link
CN (1) CN111737664B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111737663A (en) * 2020-05-20 2020-10-02 广州市格利网络技术有限公司 Use control method and device of borrowing equipment
CN113450520B (en) * 2021-06-22 2023-06-13 平安壹钱包电子商务有限公司 Equipment management method, device, server and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563840A (en) * 2017-07-31 2018-01-09 北京三快在线科技有限公司 Portable power source leasing method, system, electronic equipment and readable storage medium storing program for executing

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9979730B2 (en) * 2015-10-30 2018-05-22 Futurewei Technologies, Inc. System and method for secure provisioning of out-of-network user equipment
CN108777672A (en) * 2018-01-18 2018-11-09 上海求敏信息科技有限公司 A kind of authentication method and system of multiple authentication
CN108569250B (en) * 2018-03-30 2020-12-22 上海汽车集团股份有限公司 Automatic authorization method of Bluetooth key based on shared automobile
CN108932427A (en) * 2018-05-18 2018-12-04 华中科技大学 A kind of Android is using the control method and system for limiting access in more open loop borders
CN109359037A (en) * 2018-09-26 2019-02-19 深圳壹账通智能科技有限公司 A kind of management method of shared device, storage medium and server
CN109285055A (en) * 2018-09-27 2019-01-29 深圳来电科技有限公司 A kind of rent method of sharing articles, mobile terminal and server
CN109597327B (en) * 2018-11-16 2021-09-03 广州市格利网络技术有限公司 Use control method and device of reusable catering tool
CN110807178B (en) * 2019-10-11 2022-07-01 东风汽车有限公司 Vehicle authorization management method and device, terminal and server
CN110795321A (en) * 2019-10-23 2020-02-14 北京云测信息技术有限公司 Misoperation processing method and device and terminal equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107563840A (en) * 2017-07-31 2018-01-09 北京三快在线科技有限公司 Portable power source leasing method, system, electronic equipment and readable storage medium storing program for executing

Also Published As

Publication number Publication date
CN111737664A (en) 2020-10-02

Similar Documents

Publication Publication Date Title
US10867026B1 (en) Authentication and control interface of a security system
CN111737664B (en) Method and device for controlling re-authorization use of borrowing equipment
CN110851809B (en) Fingerprint identification method and device and touch screen terminal
CN104850771B (en) A kind of indentity identifying method and relevant device
CN109067628B (en) Voice control method and control device of intelligent household appliance and intelligent household appliance
CN109684799A (en) Account logon method, entering device, Account Logon equipment and storage medium
CN107426160B (en) Control method, system and terminal of smart home, FIDO server and safety equipment
WO2018040045A1 (en) Monitoring method, apparatus and electronic device
CN109523662B (en) Identity verification electricity taking method, electricity taking device, access control method and device
WO2017088316A1 (en) Payment method and device thereof
CN108257270A (en) A kind of unlocked by fingerprint method, apparatus, shared device server and shared equipment
CN105025015A (en) Equipment user authorization management and safety starting method and system
CN110149618B (en) Intelligent device access method, device, equipment and medium based on voiceprint authorization
CN110601842B (en) Control method of household appliance and household appliance
US11245543B2 (en) Identifying abnormal usage of electronic device
CN109445296A (en) A kind of safety access device and method applied to smart home system
JP2011028623A (en) Information processing apparatus and program
CN107222465B (en) Network access control system of intelligent gateway
CN111737663A (en) Use control method and device of borrowing equipment
CN113591600A (en) Cooking equipment control method and device based on user identification and gas stove
CN112449020A (en) Management system of ion introduction beauty instrument
CN111079111A (en) Computer network identity verification system
CN112555920B (en) Cooking appliance control method, system and device and storage medium
US10366225B2 (en) Method for allowing a configuration change of an intelligent electronic device of a power system
CN108737386A (en) Safety-protection system based on mobile terminal identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant