CN111783065A - Authorization method and device based on two-dimension code, electronic equipment and storage medium - Google Patents

Authorization method and device based on two-dimension code, electronic equipment and storage medium Download PDF

Info

Publication number
CN111783065A
CN111783065A CN202010623951.XA CN202010623951A CN111783065A CN 111783065 A CN111783065 A CN 111783065A CN 202010623951 A CN202010623951 A CN 202010623951A CN 111783065 A CN111783065 A CN 111783065A
Authority
CN
China
Prior art keywords
authorization
electronic device
electronic equipment
dimensional code
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010623951.XA
Other languages
Chinese (zh)
Inventor
安伟丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
Shanghai Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Electronic Technology Co Ltd filed Critical Shanghai Wingtech Electronic Technology Co Ltd
Priority to CN202010623951.XA priority Critical patent/CN111783065A/en
Publication of CN111783065A publication Critical patent/CN111783065A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Abstract

The invention relates to the technical field of authority control, and provides an authorization method, an authorization device, electronic equipment and a storage medium based on a two-dimension code, wherein the method comprises the following steps: obtaining authorization setting information by scanning an authorization two-dimensional code displayed by second electronic equipment, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic equipment; and carrying out authorization control on the first electronic equipment according to the authorization setting information. Compared with the prior art, the embodiment of the invention scans the two-dimensional code carrying the authorization setting information, and then carries out authorization control on the electronic equipment according to the authorization setting information, thereby realizing effective authorization control on the electronic equipment and improving effective supervision on the use of the electronic equipment.

Description

Authorization method and device based on two-dimension code, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of authority control, in particular to an authorization method and device based on a two-dimension code, electronic equipment and a storage medium.
Background
The popularization of electronic equipment such as smart phones and tablet computers brings a revolution to teaching modes, teachers arrange homework on the electronic equipment, and students submit homework on the electronic equipment, so that the teaching mode becomes one of the very common teaching modes. And the student inevitably can be attracted by the amusement application on the electronic equipment when using electronic equipment, because lack self-control ability, needs the head of a family to supervise the length of time that the student used electronic equipment.
The existing supervision mode is as follows: the parents set up the lock screen for the electronic equipment that student used, and when the student needed to use electronic equipment, the parents input the password for it in order to unblock electronic equipment to reach and lock the electronic equipment once more when presetting the time length.
The existing supervision mode is too dependent on parents, so that the students cannot be effectively supervised when the parents forget or delay things.
Disclosure of Invention
The embodiment of the invention aims to provide an authorization method, an authorization device, electronic equipment and a storage medium based on a two-dimensional code, which can perform authorization control on the electronic equipment according to authorization setting information by scanning the two-dimensional code carrying the authorization setting information, realize effective authorization control on the electronic equipment and improve effective supervision on using the electronic equipment.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect, an embodiment of the present invention provides a two-dimensional code-based authorization method, applied to a first electronic device, where the first electronic device is in communication connection with a second electronic device, and the authorization method includes:
obtaining authorization setting information by scanning an authorization two-dimensional code displayed by the second electronic device, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic device;
and carrying out authorization control on the first electronic equipment according to the authorization setting information.
In one embodiment, the authorization setting information includes an authorization object identifier and authorization control information, and the number of login users preset by the first electronic device is multiple, and the authorization method further includes:
acquiring a user identifier of the first electronic device which is currently logged in;
and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
In one embodiment, the authorization control information further includes an authorization duration, and the authorization control of the first electronic device according to the authorization control information includes:
recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device;
and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
In one embodiment, the authorization control information further includes an authorization period, and the step of performing authorization control on the first electronic device according to the authorization control information includes:
acquiring current time;
when the current time is within the authorization time period, unlocking a preset function of the first electronic equipment;
when the current time is not within the authorized time period, locking a preset function of the first electronic device.
In a second aspect, an embodiment of the present invention provides an authorization apparatus based on a two-dimensional code, which is applied to a first electronic device, where the first electronic device is in communication connection with a second electronic device, and the apparatus includes:
the scanning module is used for scanning an authorized two-dimensional code displayed by the second electronic equipment to acquire authorized setting information, wherein the authorized two-dimensional code carries the authorized setting information received by the second electronic equipment;
and the control module is used for carrying out authorization control on the first electronic equipment according to the authorization setting information.
In one embodiment, the authorization setting information includes an authorization object identifier and authorization control information, the number of login users preset by the first electronic device is multiple, and the control module is further configured to:
acquiring a user identifier of the first electronic device which is currently logged in;
and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
In one embodiment, the authorization control information further includes an authorization duration, and the control module is specifically configured to:
recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device;
and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
In one embodiment, the authorization control information further includes an authorization period, and the control module is specifically configured to:
acquiring current time;
when the current time is within the authorization time period, unlocking a preset function of the first electronic equipment;
when the current time is not within the authorized time period, locking a preset function of the first electronic device.
In a third aspect, an embodiment of the present invention provides an electronic device, where the electronic device includes:
one or more processors;
a memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to implement a two-dimensional code based authorization method as described above.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the two-dimensional code-based authorization method as described above.
Compared with the prior art, the embodiment of the invention provides an authorization method and device based on a two-dimension code, an electronic device and a storage medium, a user inputs authorization setting information through a second electronic device, the second electronic device generates an authorization two-dimension code according to the authorization setting information, a first electronic device obtains the authorization setting information by scanning the authorization two-dimension code displayed by the second electronic device, and the first electronic device performs authorization control according to the authorization setting information. Compared with the prior art, the embodiment of the invention realizes effective authorization control on the first electronic equipment by scanning the two-dimensional code carrying the authorization setting information and then carrying out authorization control on the first electronic equipment according to the authorization setting information, thereby improving effective supervision on the use of the first electronic equipment.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 shows an application scenario diagram provided in an embodiment of the present invention.
Fig. 2 is a block diagram of an electronic device according to an embodiment of the present invention.
Fig. 3 shows a flowchart of an authorization method based on a two-dimensional code according to an embodiment of the present invention.
Fig. 4 shows a flowchart of another authorization method based on two-dimensional codes according to an embodiment of the present invention.
Fig. 5 is a flowchart illustrating another authorization method based on two-dimensional codes according to an embodiment of the present invention.
Fig. 6 shows a flowchart of another authorization method based on two-dimensional codes according to an embodiment of the present invention.
Fig. 7 is a block diagram illustrating a two-dimensional code-based authorization apparatus according to an embodiment of the present invention.
Icon: 10-an electronic device; 11-a processor; 12-a memory; 13-a bus; 14-a communication interface; 20-a first electronic device; 30-a second electronic device; 100-two-dimensional code based authorization device; 110-a scanning module; 120-control module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that if the terms "upper", "lower", "inside", "outside", etc. indicate an orientation or a positional relationship based on that shown in the drawings or that the product of the present invention is used as it is, this is only for convenience of description and simplification of the description, and it does not indicate or imply that the device or the element referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus should not be construed as limiting the present invention.
Furthermore, the appearances of the terms "first," "second," and the like, if any, are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
It should be noted that the features of the embodiments of the present invention may be combined with each other without conflict.
Referring to fig. 1, fig. 1 shows an application scenario diagram provided by an embodiment of the present invention, in fig. 1, a first electronic device 20 and a second electronic device 30 are in communication connection, where a specific connection manner may be wired or wireless, and when the first electronic device is in wireless connection, the first electronic device may be in WIFI connection or bluetooth connection.
The first electronic device 20 is started to have a two-dimensional code scanning function, the second electronic device 30 displays an authorized two-dimensional code, the first electronic device 20 obtains authorization setting information by scanning the authorized two-dimensional code displayed on the second electronic device 30, and then authorization control is performed on the first electronic device 20 according to the authorization setting information, for example, the first electronic device 20 is locked or unlocked, or a preset function on the first electronic device 20 is locked or unlocked.
The first electronic device 20 is provided with a scanner capable of scanning the two-dimensional code, and the first electronic device 20 may be an electronic device such as a mobile phone, a tablet computer, and a wearable device.
The second electronic device 30 may be a mobile phone, a tablet computer, a wearable device, a host, or other electronic devices.
One practical application scenario may be: the first electronic device is a mobile phone or a tablet for students, and the second electronic device is a mobile phone or a tablet for parents.
Another practical application scenario may be: the first electronic device is an electronic device for limiting the authorized ordinary users to use, and the second electronic device is an electronic device for the administrator to use.
On the basis of fig. 1, an embodiment of the present invention further provides a block schematic diagram of an electronic device 10, where the electronic device 10 may be the first electronic device 20 in fig. 1, please refer to fig. 2, and fig. 2 shows the block schematic diagram of the electronic device 10 provided in the embodiment of the present invention. The electronic device 10 includes a processor 11, a memory 12, a bus 13, and a communication interface 14, and the processor 11, the memory 12, and the communication interface 14 are connected by the bus 13.
The processor 11 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the two-dimensional code-based authorization method may be implemented by integrated logic circuits of hardware in the processor 11 or instructions in the form of software. The Processor 11 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components.
The memory 12 is used for storing a program, such as the two-dimensional code-based authorization apparatus 100 described above. The two-dimensional code-based authorization apparatus 100 includes at least one software function module that can be stored in the memory 12 in the form of software or firmware (firmware) or solidified in an Operating System (OS) of the electronic device 10. After receiving the execution instruction, the processor 11 executes the program to implement the two-dimensional code-based authorization method disclosed in the following embodiments.
The electronic device 10 communicates with other electronic devices, or with other peripheral devices, via the communication interface 14.
Generally, in the prior art, in order to obtain authorization, a controlled device first scans a two-dimensional code on a designated device, where the two-dimensional code carries an address of a server, and the controlled device or the designated device sends a request for obtaining authorization to the server according to the address of the server, and then the server returns authorization information to perform authorization control on the controlled device. In this way, the two-dimensional code is actually equivalent to an address link and does not include actually valid authorization information, and in order to acquire authorization, no matter the controlled device or the designated device needs to communicate with the server once again so as to acquire the authorization information, thereby increasing the processing procedure of communication and the waiting delay time of the user, and reducing the user experience.
In view of the above problems and the application scenario shown in fig. 1, an embodiment of the present invention provides an authorization method and apparatus based on a two-dimensional code, an electronic device, and a storage medium, where a user may directly input authorization setting information on a second electronic device, the second electronic device generates an authorization two-dimensional code according to the authorization setting information, that is, the authorization setting information is carried in the authorization two-dimensional code, and a first electronic device may directly obtain the authorization setting information by scanning the authorization two-dimensional code to implement authorization control, so as to omit a process of interacting with a server, simplify an implementation process of authorization control, further reduce a time delay of user waiting, and improve user experience, which will be described in detail below.
On the basis of fig. 1 and fig. 2, an embodiment of the present invention provides an authorization method based on a two-dimensional code, please refer to fig. 3, and fig. 3 shows a flowchart of an authorization method based on a two-dimensional code provided by an embodiment of the present invention, where the method includes the following steps:
step S110, obtaining authorization setting information by scanning an authorization two-dimensional code displayed by the second electronic device, where the authorization two-dimensional code carries authorization setting information received by the second electronic device.
In this embodiment, the user inputs the authorization setting information into the second electronic device 30, the second electronic device 30 generates an authorization two-dimensional code carrying the authorization setting information, and the first electronic device 20 obtains the authorization setting information by scanning the authorization two-dimensional code displayed by the second electronic device 30.
In this embodiment, the authorization setup information includes, but is not limited to, an authorization duration, an authorization period, and the like.
In this embodiment, before scanning the authorized two-dimensional code, the first electronic device 20 may be configured to open only limited functions, for example, the first electronic device 20 may open only the function of scanning the two-dimensional code, or the first electronic device 20 may open only the function of scanning the two-dimensional code and open only a preset education application or training application.
And step S120, performing authorization control on the first electronic device according to the authorization setting information.
In this embodiment, the authorization control on the first electronic device 20 may be to unlock the first electronic device 20 after the authorized two-dimensional code is successfully scanned, or unlock the start of the preset function on the first electronic device 20, and continue to monitor the authorization, for example, when the unlocking duration reaches the preset duration, lock the first electronic device 20, or lock the start of the preset function on the first electronic device 20.
According to the method provided by the embodiment of the invention, the two-dimensional code carrying the authorization setting information is scanned, and then the authorization control is performed on the first electronic device 20 according to the authorization setting information, so that the effective authorization control on the first electronic device 20 is realized, and the effective supervision on the use of the first electronic device 20 is improved.
On the basis of fig. 3, when the first electronic device 20 is provided with a plurality of login users, an embodiment of the present invention further provides a processing method for performing authorization control on a specified login user among the plurality of login users, please refer to fig. 4, where fig. 4 shows a flowchart of another authorization method based on two-dimensional codes provided by the embodiment of the present invention, and the method further includes:
step S210, obtaining a user identifier of the currently logged first electronic device.
In this embodiment, the authorization setting information may include an authorized object identifier and authorization control information, where the authorized object identifier is a target user identifier for receiving authorization control, the authorization control information is configuration information required for performing authorization control on an authorized object represented by the authorized object identifier, for example, the authorized object identifier is abc, the authorization control information includes an authorization duration, the value of the authorization duration is 10 minutes, after scanning the authorized two-dimensional code, a duration for unlocking the first electronic device 20 by the user abc logging in the first electronic device 20 is 10 minutes, and when the unlocking duration reaches 10 minutes, the first electronic device 20 is locked again.
The first electronic device 20 may be configured for use by multiple users, and the functionality on the first electronic device may be different for different users, e.g., user abc may launch a game or log on to a video website, and user xyz may launch a learning application or a training application. Different users can set different authorization setting information to ensure the flexibility of authorization control and meet the requirements of various scenes.
Step S220, when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic device according to the authorization control information.
The method provided by the embodiment of the invention ensures the independence of authorization control among users, improves the flexibility of authorization control and expands the application scene of the method by setting different authorization control information for different users.
In this embodiment, the user may set different authorization control information to perform different authorization control on the first electronic device 20. The embodiment of the present invention provides at least two specific implementation manners for performing authorization control on the first electronic device 20, please refer to fig. 5, fig. 5 shows a flowchart of another authorization method based on two-dimensional codes according to the embodiment of the present invention, and step S220 includes the following sub-steps:
and a substep S220-10 of recording the scanning time of successfully scanning the authorized two-dimensional code and unlocking the preset function of the first electronic equipment.
In this embodiment, in order to effectively control the authorized duration, the authorization control information further includes an authorized duration, the authorized duration is an authorized effective duration, when the authorized duration is exceeded, the authorization is invalid, and the first electronic device 20 returns to the locking state before scanning the authorized two-dimensional code.
In this embodiment, the authorized start time is a scanning time for successfully scanning the authorized two-dimensional code, for example, the scanning time for successfully scanning the authorized two-dimensional code by the first electronic device 20 is 10: 50, then from 10: 50 begins to calculate the duration of this authorization.
And a substep S220-11 of locking the preset function of the first electronic device when the time duration between the current time and the scanning time reaches the authorized time duration.
In this embodiment, as a specific implementation manner, the first electronic device 20 may periodically obtain the current time of the local system, calculate a duration between the current time and the scanning time, and determine whether the duration reaches an authorized duration, and lock the preset function of the first electronic device 20 when the duration reaches the authorized duration. As another specific embodiment, the first electronic device 20 may create a timer, the timed duration of the timer is set as the authorized duration, and when the timer expires, the preset function of the first electronic device 20 is locked.
The method provided by the embodiment of the invention ensures that the authorization control duration is within the expected duration range by setting the authorization duration, and realizes effective control on the authorization duration.
In this embodiment, in order to enrich the authorization control manner, an embodiment of the present invention further provides a specific implementation manner of controlling an authorization time interval, please refer to fig. 6, where fig. 6 shows a flowchart of another authorization method based on a two-dimensional code provided in the embodiment of the present invention, and step S220 may further include the following sub-steps:
and a substep S220-20 of obtaining the current time.
In this embodiment, the current time may be the system time of the first electronic device 20, and in order to avoid the user bypassing the authorization period by setting the system time, the first electronic device may turn off the setting function of the system time.
And a substep S220-21 of unlocking a preset function of the first electronic device when the current time is within the authorized period.
In this embodiment, the authorization period may be represented as a time interval, for example: 19: 00-19: 30, may also be expressed as a duration from a preset start time, such as: 19: 00, 30m, meaning from 19: 00 times for 30 minutes.
And a substep S220-22 of locking the preset function of the first electronic device when the current time is not within the authorized period.
In this embodiment, as in sub-steps S220-10 to S220-11, the first electronic device 20 may also periodically obtain the current time, and determine whether the current time is within the authorized time period, so as to unlock or lock the preset function of the first electronic device 20. Of course, the same effect can be achieved by means of a timer.
It should be noted that, the implementation manners of the sub-steps S220-10 to S220-11 and the implementation manners of the sub-steps S220-20 to S220-22 may be used individually or in combination, and when the two are combined, the time that the authorization control information is reached first may be used as the time when the authorization fails, and may be specifically set according to actual needs, for example, the authorization duration may be set to 10 minutes, and the authorization period may be set to 19: 00-20: 00, if the user is at 19: successful scanning of the authorized two-dimensional code 55 unlocks the first electronic device 20, 20: the first electronic device 20 will lock again at 00.
The method provided by the embodiment of the invention ensures that the authorization control is in the expected time period range by setting the authorization time period, realizes the control of the authorization validity in the authorization time period, enriches the authorization control mode by combining the authorization duration and the authorization time period, and expands the application scene of the embodiment of the invention.
In order to perform the corresponding steps in the above embodiments and various possible implementations, an implementation manner of the authorization apparatus 100 based on the two-dimensional code is given below. Referring to fig. 7, fig. 7 is a block diagram illustrating an authorization apparatus 100 based on two-dimensional code according to an embodiment of the present invention. It should be noted that the basic principle and the generated technical effect of the authorization device 100 based on the two-dimensional code provided in the embodiment are the same as those of the above embodiments, and for the sake of brief description, no reference is made to this embodiment.
The authorization device 100 based on the two-dimensional code comprises at least one software functional module which can be stored in the memory 12 in fig. 2 in the form of software or firmware (firmware), and after receiving the execution instruction, the processor 11 reads the software functional module from the memory 12 and executes the software functional module to implement the authorization method based on the two-dimensional code disclosed in the above embodiment. The two-dimensional code-based authorization apparatus 100 includes a scanning module 110 and a control module 120.
The scan module 110 is configured to: and obtaining authorization setting information by scanning an authorization two-dimensional code displayed by the second electronic equipment, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic equipment.
The control module 120 is configured to: and carrying out authorization control on the first electronic equipment according to the authorization setting information.
In one embodiment, the authorization setup information includes authorization object identification and authorization control information, and the control module 120 is further configured to: acquiring a user identifier of a first electronic device currently logged in; and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
In one embodiment, the authorization control information further includes an authorization duration, and the control module 120 is specifically configured to: recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device; and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
In one embodiment, the authorization control information further includes an authorization period, and the control module 120 is specifically configured to: acquiring current time; when the current time is within the authorized time period, unlocking a preset function of the first electronic equipment; and when the current time is not within the authorized time period, locking the preset function of the first electronic equipment.
In one embodiment, an electronic device is provided, the electronic device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: obtaining authorization setting information by scanning an authorization two-dimensional code displayed by second electronic equipment, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic equipment; and carrying out authorization control on the first electronic equipment according to the authorization setting information.
In one embodiment, the authorization setup information includes authorization object identification and authorization control information, and the processor when executing the computer program further performs the following steps: acquiring a user identifier of a first electronic device currently logged in; and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
In one embodiment, the authorization control information further includes an authorization duration, and the processor, when executing the computer program, further performs the following steps: recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device; and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
In one embodiment, the authorization control information further comprises an authorization period, and the processor when executing the computer program further performs the steps of: acquiring current time; when the current time is within the authorized time period, unlocking a preset function of the first electronic equipment; and when the current time is not within the authorized time period, locking the preset function of the first electronic equipment.
The electronic device provided by the embodiment of the invention can execute the authorization method based on the two-dimensional code realized by the first electronic device, and has the following beneficial effects: firstly, the two-dimensional code carrying the authorization setting information is scanned, and then the first electronic equipment is authorized and controlled according to the authorization setting information, so that the effective authorization control of the first electronic equipment is realized, and the effective supervision of using the first electronic equipment is improved; secondly, different authorization control information is set for different users, so that the independence of authorization control among the users is ensured, the flexibility of authorization control is improved, and the application scene of the method is expanded; thirdly, the authorization duration is set, so that the authorization control duration is ensured to be within the expected duration range, and the effective control on the authorization duration is realized; finally, the authorization time interval is set, the authorization control is ensured to be in the expected time interval range, the validity of the authorization in the authorization time interval is controlled, in addition, the authorization control mode is enriched by combining the authorization time interval and the authorization time interval, and the application scene of the embodiment of the invention is expanded.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: obtaining authorization setting information by scanning an authorization two-dimensional code displayed by second electronic equipment, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic equipment; and carrying out authorization control on the first electronic equipment according to the authorization setting information.
In an embodiment, the authorization setup information comprises authorization object identification and authorization control information, the computer program when executed by the processor further performing the steps of: acquiring a user identifier of a first electronic device currently logged in; and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
In one embodiment, the authorization control information further comprises an authorization duration, and the computer program when executed by the processor further performs the steps of: recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device; and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
In one embodiment, the authorization control information further comprises an authorization period, the computer program when executed by the processor further implementing the steps of: acquiring current time; when the current time is within the authorized time period, unlocking a preset function of the first electronic equipment; and when the current time is not within the authorized time period, locking the preset function of the first electronic equipment.
The computer-readable storage medium provided by the embodiment of the invention firstly scans the two-dimensional code carrying the authorization setting information, and then performs authorization control on the first electronic device according to the authorization setting information, so that effective authorization control on the first electronic device is realized, and effective supervision on using the first electronic device is improved; secondly, different authorization control information is set for different users, so that the independence of authorization control among the users is ensured, the flexibility of authorization control is improved, and the application scene of the method is expanded; thirdly, the authorization duration is set, so that the authorization control duration is ensured to be within the expected duration range, and the effective control on the authorization duration is realized; finally, the authorization time interval is set, the authorization control is ensured to be in the expected time interval range, the validity of the authorization in the authorization time interval is controlled, in addition, the authorization control mode is enriched by combining the authorization time interval and the authorization time interval, and the application scene of the embodiment of the invention is expanded.
In summary, embodiments of the present invention provide an authorization method, an authorization apparatus, an electronic device, and a storage medium based on a two-dimensional code, where the method is applied to a first electronic device, and the first electronic device is in communication connection with a second electronic device, and the method includes: obtaining authorization setting information by scanning an authorization two-dimensional code displayed by second electronic equipment, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic equipment; and carrying out authorization control on the first electronic equipment according to the authorization setting information. Compared with the prior art, the embodiment of the invention realizes effective authorization control on the first electronic equipment by scanning the two-dimensional code carrying the authorization setting information and then carrying out authorization control on the first electronic equipment according to the authorization setting information, thereby improving effective supervision on the use of the first electronic equipment.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. The authorization method based on the two-dimensional code is applied to first electronic equipment, wherein the first electronic equipment is in communication connection with second electronic equipment, and comprises the following steps:
obtaining authorization setting information by scanning an authorization two-dimensional code displayed by the second electronic device, wherein the authorization two-dimensional code carries the authorization setting information received by the second electronic device;
and carrying out authorization control on the first electronic equipment according to the authorization setting information.
2. The two-dimensional code-based authorization method according to claim 1, wherein the authorization setting information includes authorization object identifiers and authorization control information, and a plurality of login users preset by the first electronic device are included, the authorization method further comprising:
acquiring a user identifier of the first electronic device which is currently logged in;
and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
3. The two-dimensional code based authorization method according to claim 2, wherein the authorization control information further includes an authorization duration, and the authorization control step for the first electronic device according to the authorization control information includes:
recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device;
and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
4. The two-dimensional code based authorization method according to claim 2, wherein the authorization control information further includes an authorization time period, and the step of performing authorization control on the first electronic device according to the authorization control information includes:
acquiring current time;
when the current time is within the authorization time period, unlocking a preset function of the first electronic equipment;
when the current time is not within the authorized time period, locking a preset function of the first electronic device.
5. The authorization device based on the two-dimensional code is applied to first electronic equipment, wherein the first electronic equipment is in communication connection with second electronic equipment, and the authorization device comprises:
the scanning module is used for scanning an authorized two-dimensional code displayed by the second electronic equipment to acquire authorized setting information, wherein the authorized two-dimensional code carries the authorized setting information received by the second electronic equipment;
and the control module is used for carrying out authorization control on the first electronic equipment according to the authorization setting information.
6. The two-dimensional code-based authorization device according to claim 5, wherein the authorization setup information includes an authorization object identifier and authorization control information, the number of login users preset by the first electronic device is plural, and the control module is further configured to:
acquiring a user identifier of the first electronic device which is currently logged in;
and when the authorization object identifier is consistent with the user identifier, performing authorization control on the first electronic equipment according to the authorization control information.
7. The two-dimensional code-based authorization device according to claim 6, wherein the authorization control information further includes an authorization duration, and the control module is specifically configured to:
recording scanning time for successfully scanning the authorized two-dimensional code and unlocking a preset function of the first electronic device;
and when the time length between the current time and the scanning time reaches the authorized time length, locking the preset function of the first electronic equipment.
8. The two-dimensional code-based authorization device according to claim 6, wherein the authorization control information further includes an authorization time period, and the control module is specifically configured to:
acquiring current time;
when the current time is within the authorization time period, unlocking a preset function of the first electronic equipment;
when the current time is not within the authorized time period, locking a preset function of the first electronic device.
9. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to implement the two-dimensional code based authorization method of any of claims 1-4.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the two-dimensional code based authorization method according to any one of claims 1 to 4.
CN202010623951.XA 2020-06-30 2020-06-30 Authorization method and device based on two-dimension code, electronic equipment and storage medium Pending CN111783065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010623951.XA CN111783065A (en) 2020-06-30 2020-06-30 Authorization method and device based on two-dimension code, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010623951.XA CN111783065A (en) 2020-06-30 2020-06-30 Authorization method and device based on two-dimension code, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111783065A true CN111783065A (en) 2020-10-16

Family

ID=72760166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010623951.XA Pending CN111783065A (en) 2020-06-30 2020-06-30 Authorization method and device based on two-dimension code, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111783065A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104966015A (en) * 2015-07-30 2015-10-07 成都中科创达软件有限公司 Control method and system between intelligent equipment
CN106060259A (en) * 2012-12-06 2016-10-26 北京三星通信技术研究有限公司 Method and device for authorization between user devices
CN108846277A (en) * 2018-06-05 2018-11-20 掌阅科技股份有限公司 Reading control method, equipment and computer storage medium
CN108989331A (en) * 2018-08-09 2018-12-11 芜湖机智智能科技有限公司 Data storage device uses method for authenticating and its equipment and storage medium
CN109214166A (en) * 2018-08-20 2019-01-15 阿里巴巴集团控股有限公司 Smart machine authentication control method and system
CN110336720A (en) * 2019-06-29 2019-10-15 华为技术有限公司 Apparatus control method and equipment
CN110830262A (en) * 2019-10-29 2020-02-21 维沃移动通信有限公司 Authorization management method and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106060259A (en) * 2012-12-06 2016-10-26 北京三星通信技术研究有限公司 Method and device for authorization between user devices
CN104966015A (en) * 2015-07-30 2015-10-07 成都中科创达软件有限公司 Control method and system between intelligent equipment
CN108846277A (en) * 2018-06-05 2018-11-20 掌阅科技股份有限公司 Reading control method, equipment and computer storage medium
CN108989331A (en) * 2018-08-09 2018-12-11 芜湖机智智能科技有限公司 Data storage device uses method for authenticating and its equipment and storage medium
CN109214166A (en) * 2018-08-20 2019-01-15 阿里巴巴集团控股有限公司 Smart machine authentication control method and system
CN110336720A (en) * 2019-06-29 2019-10-15 华为技术有限公司 Apparatus control method and equipment
CN110830262A (en) * 2019-10-29 2020-02-21 维沃移动通信有限公司 Authorization management method and electronic equipment

Similar Documents

Publication Publication Date Title
US10498723B2 (en) Method, and apparatus for authenticating access
CN104753943B (en) The log-in control method of third party's account and device
CN105245542B (en) Account authorization method, server and client
US9813410B2 (en) Information processing apparatus, information processing method, and information processing program
CN105187266B (en) information monitoring method and device
EP3425566A1 (en) Electronic device and method of registering personal cloud apparatus in user portal server thereof
CN109361642B (en) Remote authorization unlocking method and system
US11237636B2 (en) System and method for network configuration and behavior control by proximity enabled devices
CN103701503A (en) Bluetooth pairing method and system, and Bluetooth KEY
CN105282088A (en) Method and system for controlling verification server and method and system for controlling verification
US10831816B2 (en) Method for controlling electronic picture frame, electronic picture frame, electronic picture frame cloud platform and mobile terminal
CN108811179B (en) Wireless network connection method, device and storage medium
CN103761502A (en) Safety certification device and method
WO2014161259A1 (en) Verification code processing method, device, terminal and server
WO2020253197A1 (en) Method and apparatus for managing virtual user identification card, terminal device and storage medium
CN110336870A (en) Method for building up, device, system and the storage medium in telecommuting O&M channel
CN107040934B (en) WiFi device network distribution method and related device
US9871792B2 (en) Hostless mDNS-SD responder with authenticated host wake service
EP3841469A1 (en) Enforcement of role-based constraints on the modification of components of a multi-user aware computing device
CN111783065A (en) Authorization method and device based on two-dimension code, electronic equipment and storage medium
KR20130082980A (en) User personalized recommendation system based on face-recognition
CN111475078B (en) Method, device and equipment for checking screen locking message and computer readable medium
CN111831367A (en) Application operation method, wearable device and device with storage function
CN105429954A (en) Eyeball registration method and device
CN114999030A (en) Unlocking method, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination