CN112488694A - Code scanning control method, device and system - Google Patents

Code scanning control method, device and system Download PDF

Info

Publication number
CN112488694A
CN112488694A CN202011250128.5A CN202011250128A CN112488694A CN 112488694 A CN112488694 A CN 112488694A CN 202011250128 A CN202011250128 A CN 202011250128A CN 112488694 A CN112488694 A CN 112488694A
Authority
CN
China
Prior art keywords
dynamic password
target
equipment
client
target dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011250128.5A
Other languages
Chinese (zh)
Other versions
CN112488694B (en
Inventor
齐元子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202011250128.5A priority Critical patent/CN112488694B/en
Publication of CN112488694A publication Critical patent/CN112488694A/en
Application granted granted Critical
Publication of CN112488694B publication Critical patent/CN112488694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

One or more embodiments of the present specification provide a code scanning control method, apparatus, and system, where the method includes: receiving a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.

Description

Code scanning control method, device and system
The patent application of the invention is a divisional application of Chinese patent application with the application number of 201811066827.7, the application date of 2018.09.13 and the name of 'a code scanning control method, device and system'.
Technical Field
One or more of the descriptions relate to the technical field of internet, and in particular, to a code scanning control method, device and system.
Background
At present, along with internet technology's rapid development, the application at smart machine terminal is more and more extensive, for example, self-service commodity selling cabinet, the user is through using mobile terminal (like smart mobile phone) to scan the commodity and selling the graphics code on the cabinet, can send equipment control request to backstage server, in order to realize the intelligent control who sells the cabinet to the commodity, concretely, backstage server automatic control commodity selling cabinet carries out the operation of opening the door, the user can be followed the commodity of selling the required purchase of oneself in the cabinet, the commodity is sold the cabinet and is sent the commodity information that the user bought to the backstage server, so that the backstage server carries out the payment settlement.
The intelligent terminal is widely applied, convenience is brought to daily life of people, certain potential safety hazards exist in the code scanning control process, malicious users are provided with opportunities of attacking normal users, and therefore certain economic loss is brought to normal users. Specifically, the intelligent device terminal for consumption, such as a self-service commodity selling cabinet, a shared rental commodity and the like.
At present, because the graphic codes arranged on the existing intelligent device terminal and used for providing user scanning are all static graphic codes, as long as a malicious user acquires a URL address and a device identifier corresponding to the static graphic code at one time, the malicious user can trigger a client used by a normal user to send a device control request carrying the URL address and the device identifier to a background server through an illegal means, and the background server directly controls the intelligent device terminal corresponding to the device identifier to execute target operation based on the control request, for example, controls a commodity selling cabinet to execute door opening operation, and pays money deduction for a normal user who sends the control request, so that the malicious user can take out a required commodity from the commodity selling cabinet without paying the cost, and pays money deduction from a fund account number of the normal user directly.
Therefore, it is required to provide a method for controlling a device terminal by scanning codes, which is anti-attack and highly safe.
Disclosure of Invention
One or more embodiments of the present disclosure provide a method, an apparatus, and a system for controlling code scanning, in which a graphic code displayed on a device terminal is dynamically changed, so that a dynamic password uploaded by a client has a certain timeliness, and thus, whether the client is attacked or not can be identified by the timeliness of the dynamic password, and effective control is performed in time for identifying a case that the client is illegally attacked by a malicious user, thereby avoiding unnecessary loss to a normal user.
To solve the above technical problem, one or more embodiments of the present specification are implemented as follows:
one or more embodiments of the present specification provide a code scanning control method, including:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password;
judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
One or more embodiments of the present specification provide a code scanning control method, including:
receiving an equipment control request aiming at code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password;
judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
One or more embodiments of the present specification provide a code scanning control apparatus, including:
the request receiving module is used for receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
the password identification module is used for judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target equipment terminal;
the control module is used for receiving control confirmation information which is sent by a client and carries the target dynamic password if the target dynamic password meets the preset timeliness condition; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
One or more embodiments of the present specification provide a code scanning control apparatus, including:
the request receiving module is used for receiving an equipment control request aiming at the code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
the password identification module is used for judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
the control module is used for receiving control confirmation information which is sent by a client and carries the target dynamic password if the target dynamic password meets the preset timeliness condition; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
One or more embodiments of the present specification provide a code scanning control apparatus, including: a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
One or more embodiments of the present specification provide a code scanning control apparatus, including: a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an equipment control request aiming at code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed, implement the following:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed, implement the following:
receiving an equipment control request aiming at code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
In one or more embodiments of the present description, a code scanning control method, apparatus, and system receive a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions of the present specification, the drawings that are needed in the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some of the embodiments described in one or more of the specification, and that other drawings can be obtained by those skilled in the art without inventive exercise.
Fig. 1 is a schematic application scenario diagram of a code scanning control system provided in one or more embodiments of the present disclosure;
fig. 2 is a first flowchart of a code scanning control method applied to a background server according to one or more embodiments of the present disclosure;
fig. 3 is a second flowchart of a code scanning control method applied to a background server according to one or more embodiments of the present disclosure;
fig. 4 is a third flowchart of a code scanning control method applied to a background server according to one or more embodiments of the present disclosure;
fig. 5 is a fourth flowchart of a code scanning control method applied to a background server according to one or more embodiments of the present disclosure;
fig. 6 is a fifth flowchart of a code scanning control method applied to a background server according to one or more embodiments of the present disclosure;
fig. 7a is a schematic diagram of a first information interaction of a code scanning control method according to one or more embodiments of the present disclosure;
fig. 7b is a schematic diagram of a second information interaction of a code scanning control method according to one or more embodiments of the present disclosure;
fig. 8 is a flowchart illustrating a code scanning control method applied to a client according to one or more embodiments of the present disclosure;
fig. 9 is a flowchart illustrating a code scanning control method applied to a device terminal according to one or more embodiments of the present disclosure;
fig. 10 is a schematic flow chart of a code scanning control method for a code scanning vending apparatus according to one or more embodiments of the present disclosure;
fig. 11 is a schematic block diagram illustrating a code scanning control device disposed at a backend server according to one or more embodiments of the present disclosure;
fig. 12 is a schematic block diagram of a device terminal according to one or more embodiments of the present disclosure;
FIG. 13 is a schematic structural diagram of a code scanning control system according to one or more embodiments of the present disclosure;
fig. 14 is a schematic structural diagram of a code scanning control device according to one or more embodiments of the present disclosure.
Detailed Description
In order to make the technical solutions in one or more embodiments of the present disclosure better understood, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of one or more embodiments of the present disclosure, but not all embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments in one or more of the specification without inventive faculty are intended to fall within the scope of one or more of the specification.
One or more embodiments of the present disclosure provide a code scanning control method, apparatus, and system, where a graphic code displayed on a device terminal is dynamically changed, so that a dynamic password uploaded by a client has a certain timeliness, and thus, whether the client is attacked or not can be identified by means of the timeliness of the dynamic password, and effective control is performed in time for identifying a case where the client is illegally attacked by a malicious user, thereby avoiding unnecessary loss to a normal user.
Fig. 1 is a schematic view of an application scenario of a code scanning control system according to one or more embodiments of the present disclosure, as shown in fig. 1, the control system includes: background server, customer end and equipment terminal, wherein, this customer end can be mobile terminal such as smart mobile phone, panel computer, and this background server can be the background server that is used for carrying out supervisory control and has saas service to equipment terminal, and this equipment terminal can be to sweep a yard selling equipment, sweep a yard lease product etc. and wherein, sweep the concrete process of yard control and do:
firstly, a client sends a device control request to a background server, wherein the device control request carries a target dynamic password;
specifically, the client may be an equipment control request sent based on actively scanning a code on an equipment terminal, that is, belonging to a normal active request control equipment terminal; the client can also be a device control request sent by a malicious user through illegal means, namely passively requesting to control the device terminal after being attacked;
then, after receiving the device control request, the background server judges whether a target dynamic password carried in the device control request meets a preset timeliness condition;
specifically, for the condition of an equipment control request sent by a client based on code scanning operation on a graphic code on an equipment terminal, a target dynamic password carried in the equipment control request is valid; because the dynamic password corresponding to the graphic code displayed on the equipment terminal is dynamically updated, a malicious user needs a certain time from the acquisition of the dynamic password to the triggering of a normal user to send an equipment control request carrying the dynamic password to the background server, and therefore, the target dynamic password carried in the equipment control request is invalid under the condition that the malicious user sends the equipment control request by an illegal means;
finally, the background server executes corresponding control operation according to the timeliness judgment result aiming at the target dynamic password;
specifically, when the target dynamic password is determined to be valid, the client belongs to a control device terminal which is normally actively requested from the background server, and at the moment, the background server needs to normally respond to the device control request to control the device terminal to execute a corresponding control action; when the target dynamic password is determined to be invalid, the client belongs to the attacked state and requests the background server to control the equipment terminal, and at the moment, the background server needs to return prompt information to the client, so that the illegal attack behavior of the malicious user is effectively controlled, and unnecessary loss of normal users is avoided.
Fig. 2 is a first flowchart of a code scanning control method provided in one or more embodiments of the present disclosure, where the method in fig. 2 can be executed by the background server in fig. 1, as shown in fig. 2, and the method at least includes the following steps:
s201, receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
specifically, the device control request received by the background server may be sent by the client based on an active code scanning operation on a graphic code on the device terminal, that is, the device control request belongs to a normal active request control device terminal of the client; the client can also be sent out under the triggering of a malicious user through an illegal means, namely the client passively requests a control equipment terminal after being attacked;
s202, judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal, namely, in a scanning graphic code verification stage, determining the timeliness of the target dynamic password to identify whether a situation that a user is attacked exists or not, and aiming at the situation that the equipment terminal is a code scanning vending device, the scanning graphic code verification stage is a process that the user uses a client to scan the graphic code to request to open a door opening page;
specifically, for the condition of an equipment control request sent by a client based on code scanning operation on a graphic code on an equipment terminal, a target dynamic password carried in the equipment control request meets a preset timeliness condition, namely the graphic code corresponding to the target dynamic password is not invalid, and at the moment, the dynamic password corresponding to the graphic code displayed on the equipment terminal is the target dynamic password;
aiming at the condition that a client sends an equipment control request triggered by a malicious user through an illegal means, a target dynamic password carried in the equipment control request does not meet a preset timeliness condition, namely a graphic code corresponding to the target dynamic password is invalid, and at the moment, a dynamic password corresponding to the graphic code displayed on an equipment terminal is not the target dynamic password;
s203, executing corresponding control operation according to the timeliness judgment result aiming at the target dynamic password, wherein the judgment result can be that the target dynamic password meets the preset timeliness condition or that the target dynamic password does not meet the preset timeliness condition;
specifically, if the target dynamic password meets the preset timeliness condition, it is indicated that the client belongs to a control device terminal which normally actively requests the background server, at this time, the background server needs to normally respond to the device control request, and the control device terminal executes a corresponding control action; if the target dynamic password does not meet the preset timeliness condition, the client is attacked, and the client requests the control equipment terminal from the background server, at this time, the background server needs to return prompt information to the client, for example, the client is triggered to display an error report page.
In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
As shown in fig. 3, the step S203 of executing a corresponding control operation according to the timeliness determination result for the target dynamic password specifically includes:
if the judgment result is yes, executing S2031, and returning a service page to the client so that the client requests the control target device terminal to the background server based on the service page;
specifically, when the determination result is yes, that is, the target dynamic password satisfies the preset timeliness condition, it is indicated that the client belongs to a device terminal which normally actively requests the control device from the background server, and at this time, the background server needs to normally respond to the device control request, that is, the background server can directly send a control instruction to the device terminal, for example, issue a door opening instruction; in order to further improve the accuracy of the device control, the service data used for rendering the service page can be returned to the client first, so that the user sends the confirmation control information to the client based on the service page displayed by the client, and correspondingly, after the background server receives the confirmation control information, the device terminal is controlled to execute the corresponding control action;
if the judgment result is no, executing S2032, and returning first prompt information to the client so that the client prompts based on the first prompt information;
specifically, for the case that the determination result is negative, that is, the target dynamic password does not satisfy the preset timeliness condition, it is indicated that the client is attacked and requests the background server to control the device terminal, at this time, the background server needs to return the first prompt information to the client to prompt the user that there is a possibility of being attacked currently, in addition, an option for confirming the submission of the device control request may be provided on a display page of the first prompt information displayed by the client, for example, an option for manually submitting a door opening request is provided, so as to prevent the problem that the transaction cannot be performed under the condition that the uploaded target dynamic password is invalid due to the time delay of code scanning of the client.
Further, in order to further improve the accuracy of device control, the method may further return service data for rendering a service page to the client, so that the user sends confirmation control information to the client based on the service page displayed by the client, and based on this, as shown in fig. 4, after the step S2031 returns the service page to the client, the method further includes:
s2033, receiving control confirmation information sent by a client terminal aiming at a displayed service page, wherein the service page can be a door opening confirmation page aiming at the condition that an equipment terminal is a code scanning vending device, sending confirmation door opening information to a background server terminal after the client terminal detects that a user clicks a door opening option on the door opening confirmation page, and sending confirmation unlocking information to the background server terminal aiming at the condition that the equipment terminal is a code scanning rental product;
s2034, sending a control instruction to the target device terminal based on the received control confirmation information, so as to enable the target device terminal to execute a corresponding control action, where the control instruction may be a door opening instruction or an unlocking instruction, and correspondingly, the control action executed by the target device terminal may be a door opening operation or an unlocking operation.
The method includes that a background server generates graphic code information including a dynamic password according to a preset rule, and issues the graphic code information to a corresponding device terminal, so that the device terminal displays a graphic code corresponding to the graphic code information, and thus it can be ensured that a graphic code displayed on the device terminal and used for providing scanning of a client is dynamically updated, and thus it is ensured that a target dynamic password carried in a device control request uploaded by the client is dynamically changed, so as to determine what kind of control operation to execute based on timeliness judgment of the target dynamic password in the following process, and specifically, as shown in fig. 5, before the S201 receives the device control request sent by the client, the method further includes:
s204, determining a dynamic password according to at least two of the device identifier of the target device terminal, the identifier key corresponding to the device identifier, and timestamp information, where the device identifier may be a unique identifier pre-allocated to each device terminal, the identifier key may be determined based on the device identifier in a preset manner, the timestamp information may be a current timestamp when the dynamic password is determined, and specifically, the dynamic password may be stored in a key-value database (redis);
s205, generating graphic code information according to the determined dynamic password, wherein the graphic code information can be obtained by splicing a preset URL address and the dynamic password, namely the dynamic password can be added to the tail end of the URL address, and for example, the URL address can be https:// alipay.com/detail.htm;
s206, the generated graphic code information is issued to a target equipment terminal so that the target equipment terminal displays a corresponding graphic code based on the graphic code information, wherein the graphic code information is different because the dynamic passwords generated each time are different, so that the graphic code displayed by the equipment terminal is dynamically updated, and the graphic code can be a two-dimensional code or a bar code;
specifically, in order to reduce the manufacturing cost of the device terminal, the electronic ink label screen may be used as a graphic code display screen, for example, a display screen provided on the device terminal for displaying a graphic code may be reusable.
When scanning a graphic code displayed on a target equipment terminal, a client can analyze a target dynamic password corresponding to the graphic code, then generate an equipment control request based on the target dynamic password, and send the equipment control request to a background server, so that the background server controls the target equipment terminal based on the equipment control request.
Further, in order to improve the efficiency and accuracy of determining the timeliness of the target dynamic password, the method may automatically delete the failed dynamic password, and further determine whether the target dynamic password carried in the device control request exists after receiving the device control request, so as to determine whether the target dynamic password meets a preset timeliness condition, and based on this, as shown in fig. 6, after the step S206 issues the generated graphic code information to the target device terminal, the method further includes:
s207, adding the determined dynamic password into the dynamic password set, and removing any dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises: the dynamic password set comprises at least one valid dynamic password, and the dynamic password set is arranged in a key-value database (redis);
correspondingly, the step S202 of determining whether the target dynamic password carried in the device control request meets the preset timeliness condition specifically includes:
s2021, judging whether a target dynamic password carried in the equipment control request exists in the dynamic password set;
if the judgment result is yes, determining that the target dynamic password meets the preset timeliness condition, and executing the S2031 to return a service page to the client so that the client requests a background server to control the target equipment terminal based on the service page;
if the judgment result is no, determining that the target dynamic password does not meet the preset timeliness condition, and executing the step S2032 to return the first prompt information to the client, so that the client prompts based on the first prompt information.
Specifically, after a certain dynamic password is removed from the dynamic password set, it indicates that the graphic code corresponding to the dynamic password becomes invalid, and the image code displayed on the corresponding device terminal needs to be updated, so that after the dynamic password is removed from the dynamic password set in S207, the method further includes:
generating a new dynamic password, and updating the graphic code displayed on the corresponding target equipment terminal based on the new dynamic password;
specifically, the process of generating a new dynamic password refers to step S204, where after the new dynamic password is generated, graphic code information is generated according to the dynamic password, and the graphic code information is sent to the corresponding target device terminal, so as to update the graphic code displayed on the target device terminal.
Wherein, in the step S204, the determining the dynamic password according to at least two of the device identifier of the target device terminal, the identifier key corresponding to the device identifier, and the timestamp information specifically includes:
and determining a dynamic password according to at least two of the device identifier of the target device terminal, the identifier key corresponding to the device identifier and the timestamp information by using a message digest algorithm, wherein the message digest algorithm can be an md5 encryption algorithm, and specifically, md5 encryption is performed on at least two of the device id, the unique key corresponding to the device id and the timestamp information by using an md5 encryption algorithm to generate a sign field.
Wherein, the step S2034 of sending the control instruction to the target device terminal based on the received control confirmation information specifically includes:
searching whether a dynamic password corresponding to the received control confirmation information exists in the dynamic password set, and specifically, judging whether a corresponding dynamic password exists in the dynamic set again after receiving the control confirmation information sent by the client aiming at the service page;
if so, removing the dynamic password from the dynamic password set, and sending a control instruction to the target equipment terminal;
specifically, after receiving control confirmation information sent by a client terminal aiming at a service page, the background server terminal is required to execute corresponding control operation on an equipment terminal, correspondingly, the dynamic password meets a preset destruction condition, after the dynamic password is destroyed, a new dynamic password is generated aiming at a target equipment terminal displaying a graphic code containing the dynamic password, and the graphic code displayed on the target equipment terminal is updated based on the new dynamic password;
if not, sending a control instruction to the target equipment terminal, or returning second prompt information to the client to prompt the user whether to send an equipment control request to the background server again;
specifically, after the verification is passed in the scanning pattern code verification stage, that is, the target dynamic password carried in the device control request meets the preset timeliness condition, if the client side aims at the control confirmation information sent by the service page to the background server side within the preset time, the target dynamic password corresponding to the device control request should be valid, that is, the target dynamic password exists in the dynamic password set, and if the target dynamic password does not exist in the dynamic password set, it is indicated that the client side does not aim at the control confirmation information sent by the service page to the background server side within the preset time.
In an embodiment, the code scanning control method mainly includes: a graphic code information issuing process and a process of performing equipment control based on graphic code timeliness, as shown in fig. 7a, an information interaction schematic diagram of the graphic code information issuing process in the code scanning control method is provided, and the process specifically includes:
s701, a background server side obtains a device identifier of a target device terminal;
s702, the background server generates a dynamic password according to the device identifier of the target device terminal, the identifier key corresponding to the device identifier and the timestamp information, wherein the dynamic password can be generated to update the graphic code displayed on the target device terminal after the graphic code displayed on the target device terminal is determined to be over, or can be generated to update the graphic code displayed on the target device terminal after the client terminal is determined to send a device control request based on the dynamic password corresponding to the graphic code;
s703, the background server generates graphic code information according to the generated dynamic password and the preset URL address;
s704, the background server side sends graphic code information to the target equipment terminal;
s705, after receiving the graphic code information, the target device terminal displays a graphic code on a display screen based on the graphic code information;
s706, the background server stores the generated dynamic password in a key-value database, wherein the dynamic password is generated by the background server. For the dynamic password stored in the key-value database, if the dynamic password meets the preset destruction condition, deleting the dynamic password;
as shown in fig. 7b, an information interaction schematic diagram of an apparatus control process based on graphic code timeliness in the code scanning control method is provided, and specifically, for a case that an apparatus terminal is a code scanning vending apparatus:
s707, the client sends an equipment control request carrying a target dynamic password to the background server, wherein the equipment control request can be sent by the client based on the active code scanning operation of a graphic code on a target equipment terminal, or sent by the client triggered by a malicious user through an illegal means;
s708, after receiving the device control request, the background server triggers a key-value database to inquire whether a target dynamic password carried in the device control request exists;
s709, returning a query result of the dynamic password to the background server by the key-value database, wherein the query result can be that a target dynamic password exists or not;
s710, when the received query result does not exist, the background server sends an error notification page to the client;
s711, when the received query result is determined to exist, the background server sends service data for rendering the door-opening page to the client;
s712, the client renders and displays the door opening page, wherein the door opening page is used for triggering the user to confirm the door opening request;
s713, if the client side monitors that the user clicks the door opening confirmation option, the client side sends a door opening confirmation request to the background server side;
s714, after receiving the door opening confirmation request, the background server triggers a key-value database to inquire whether a target dynamic password corresponding to the door opening confirmation request exists;
s715, if the key-value database determines that the query result is present, destroying the target dynamic password;
s716, the key-value database returns the query result of the dynamic password to the background server;
s717, after receiving the query result of the dynamic password, the background server side issues a door opening instruction to the equipment terminal; and the number of the first and second groups,
and S718, the background server re-executes the graphic code information issuing step to update the graphic code displayed on the equipment terminal, so that the dynamic update of the graphic code displayed on the control equipment terminal is realized.
In a code scanning control method in one or more embodiments of the present specification, a device control request sent by a client is received; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.
Based on the same technical concept, the code scanning control method described in correspondence to fig. 2 to fig. 6 above, one or more embodiments of the present specification further provide a code scanning control method, fig. 8 is a flowchart of the code scanning control method provided in one or more embodiments of the present specification, and the method in fig. 8 can be executed by the client in fig. 1, as shown in fig. 8, and the method at least includes the following steps:
s801, sending an equipment control request carrying a target dynamic password to a background server, so that the background server judges whether the target dynamic password meets a preset timeliness condition;
s802, receiving feedback information sent by the background server, wherein the feedback information is generated by the background server aiming at the timeliness judgment result of the target dynamic password.
In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
Wherein, the receiving, by the S802, the feedback information sent by the background server specifically includes:
receiving a service page sent by a background server when a target dynamic password meets a preset timeliness condition, and requesting a target equipment terminal to control the background server based on the service page;
and receiving prompt information sent by the background server when the target dynamic password is determined not to meet the preset timeliness condition, and prompting based on the prompt information.
In the code scanning control method in one or more embodiments of the present description, an equipment control request carrying a target dynamic password is sent to a background server, so that the background server determines whether the target dynamic password meets a preset timeliness condition; and receiving feedback information sent by the background server, wherein the feedback information is generated by the background server aiming at the timeliness judgment result of the target dynamic password. In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
It should be noted that the embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, and therefore, the specific implementation of this embodiment may refer to the implementation of the code scanning control method, and repeated details are not repeated.
On the basis of the same technical concept, the code scanning control method described in correspondence to fig. 2 to fig. 6 above, one or more embodiments of the present specification further provide a code scanning control method, fig. 9 is a flowchart of the code scanning control method provided in one or more embodiments of the present specification, and the method in fig. 9 can be executed by the device terminal in fig. 1, as shown in fig. 9, the method at least includes the following steps:
s901, displaying corresponding graphic codes based on graphic code information issued by a background server, wherein the graphic codes are dynamically updated under the control of the background server, and each graphic code corresponds to a unique dynamic password;
and S902, receiving a control instruction sent by the background server, wherein the control instruction is generated by the background server according to a timeliness judgment result of a target dynamic password carried in the received equipment control request.
In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
Wherein, the receiving of the control instruction sent by the background server in S902 specifically includes:
receiving a control instruction sent by a background server side when a target dynamic password meets a preset timeliness condition, and executing a corresponding control action based on the control instruction, wherein the control instruction is a door opening instruction for code scanning selling equipment, and after the code scanning selling equipment receives the door opening instruction, executing door opening operation.
In the code scanning control method in one or more embodiments of the present description, a corresponding graphic code is displayed based on graphic code information issued by a background server, where the graphic code is dynamically updated under the control of the background server, and each graphic code corresponds to a unique dynamic password; and receiving a control instruction sent by the background server, wherein the control instruction is generated by the background server aiming at the timeliness judgment result of the target dynamic password carried in the received equipment control request. In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
It should be noted that the embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, and therefore, the specific implementation of this embodiment may refer to the implementation of the code scanning control method, and repeated details are not repeated.
On the basis of the same technical concept, corresponding to the code scanning control methods described in fig. 2 to fig. 6, one or more embodiments of the present specification further provide a code scanning control method, fig. 10 is a flowchart of the code scanning control method provided in one or more embodiments of the present specification, the method in fig. 10 can be executed by the background server in fig. 1, as shown in fig. 10, and for a case where the device terminal is a code scanning vending device, the method at least includes the following steps:
s1001, receiving an equipment control request aiming at a code scanning vending device sent by a client, wherein the equipment control request carries a target dynamic password, and the code scanning vending device can be an intelligent code scanning door opening self-fetching container; for a specific implementation of step S1001, refer to step S201, which is not described herein again.
S1002, judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition, wherein the target dynamic password corresponds to a dynamically updated graphic code displayed on the target code scanning vending equipment one by one; for a specific implementation of step S1002, refer to step S202, which is not described herein again.
S1003, executing corresponding control operation according to the timeliness judgment result aiming at the target dynamic password; for a specific implementation of step S1003, refer to step S203, which is not described herein again.
In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
Before S1001 receives a device control request for a code-scanning vending device sent by a client, the method further includes:
step one, determining a dynamic password according to at least two of an equipment identifier of a target code scanning selling equipment, an identification key corresponding to the equipment identifier and timestamp information;
generating graphic code information according to the determined dynamic password;
and step three, issuing the generated graphic code information to target code scanning selling equipment so that the target code scanning selling equipment displays the graphic code based on the graphic code information.
After determining the dynamic password according to at least two of the device identifier of the target code scanning vending device, the identifier key corresponding to the device identifier, and the timestamp information, the method further includes:
adding the determined dynamic passwords to a dynamic password set, and removing any dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises that: the dynamic password reaches the preset survival time and/or the dynamic password is used;
correspondingly, the step S1002 of determining whether the target dynamic password carried in the device control request meets a preset timeliness condition specifically includes:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
Wherein, after removing the dynamic password from the dynamic password set, the method further comprises:
and generating a new dynamic password, and updating the graphic code displayed on the target code-scanning selling equipment based on the new dynamic password.
In a code scanning control method in one or more embodiments of the present specification, a device control request sent by a client is received; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on target code scanning vending equipment; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
It should be noted that the embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, and therefore, the specific implementation of this embodiment may refer to the implementation of the code scanning control method, and repeated details are not repeated.
Corresponding to the code scanning control method described in fig. 2 to fig. 6, based on the same technical concept, one or more embodiments of the present disclosure further provide a code scanning control apparatus, and fig. 11 is a schematic diagram of module composition of the code scanning control apparatus provided in one or more embodiments of the present disclosure, the apparatus is configured to execute the code scanning control method described in fig. 2 to fig. 6, and as shown in fig. 11, the apparatus includes:
a request receiving module 1101, configured to receive an equipment control request sent by a client, where the equipment control request carries a target dynamic password;
a password identification module 1102, configured to determine whether the target dynamic password meets a preset timeliness condition, where the target dynamic password corresponds to a dynamically updated graphic code displayed on a target device terminal one to one;
and the control module 1103 is configured to execute a corresponding control operation according to the timeliness determination result for the target dynamic password.
Optionally, the control module 1103 is specifically configured to:
if the judgment result is yes, returning a service page to the client so that the client requests a background server side to control the target equipment terminal based on the service page;
if the judgment result is negative, returning prompt information to the client so that the client carries out prompt based on the prompt information.
Optionally, the apparatus further includes a control instruction issuing module, where the control instruction issuing module is configured to:
after a service page is returned to the client, receiving control confirmation information sent by the client aiming at the service page;
and sending a control instruction to the target equipment terminal based on the control confirmation information so as to enable the target equipment terminal to execute a corresponding control action.
Optionally, the apparatus further includes a graphic code updating module, where the graphic code updating module is configured to:
before receiving an equipment control request sent by a client, determining a dynamic password according to at least two of an equipment identifier of a target equipment terminal, an identifier key corresponding to the equipment identifier and timestamp information;
generating graphic code information according to the determined dynamic password;
and sending the graphic code information to the target equipment terminal so that the target equipment terminal displays a graphic code based on the graphic code information.
Optionally, the apparatus further includes a dynamic password adding and deleting module, where the dynamic password adding and deleting module is configured to:
after determining a dynamic password, adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises: the dynamic password reaches the preset survival time and/or the dynamic password is used;
correspondingly, the password identification module 1102 is specifically configured to:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
Optionally, the graphic code updating module is further configured to:
and after the dynamic password is removed from the dynamic password set, generating a new dynamic password, and updating the graphic code displayed on the target equipment terminal based on the new dynamic password.
Optionally, the graphic code updating module is specifically configured to:
and determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information by using a message digest algorithm.
Optionally, the control instruction issuing module is specifically configured to:
searching whether a dynamic password corresponding to the control confirmation information exists in a dynamic password set;
and if so, triggering a dynamic password adding and deleting module to remove the dynamic password from the dynamic password set and sending a control instruction to the target equipment terminal.
The code scanning control device in one or more embodiments of the present specification receives a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.
Corresponding to the code scanning control method described in fig. 2 to fig. 6, based on the same technical concept, one or more embodiments of the present specification further provide an apparatus terminal, where the terminal apparatus may be a code scanning vending apparatus, and fig. 12 is a schematic diagram of module composition of the apparatus terminal provided in one or more embodiments of the present specification, where the apparatus is configured to execute the code scanning control method described in fig. 9, and as shown in fig. 12, the apparatus terminal includes:
the graphic code display module 1201 is used for displaying corresponding graphic codes based on graphic code information issued by a background server, wherein the graphic codes are dynamically updated under the control of the background server, and each graphic code corresponds to a unique dynamic password;
a control instruction receiving module 1202, configured to receive a control instruction sent by a background server, where the control instruction is generated by the background server according to a timeliness determination result of a target dynamic password carried in a received device control request.
In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
The control instruction receiving module 1202 is specifically configured to:
receiving a control instruction sent by a background server side when a target dynamic password meets a preset timeliness condition, and executing a corresponding control action based on the control instruction, wherein the control instruction is a door opening instruction for code scanning selling equipment, and after the code scanning selling equipment receives the door opening instruction, executing door opening operation.
The device terminal in one or more embodiments of the present description displays a corresponding graphical code based on graphical code information delivered by a background server, where the graphical code is dynamically updated under the control of the background server, and each graphical code corresponds to a unique dynamic password; and receiving a control instruction sent by the background server, wherein the control instruction is generated by the background server aiming at the timeliness judgment result of the target dynamic password carried in the received equipment control request. In one or more embodiments of the present description, a background server controls dynamic update of a graphical code displayed on an equipment terminal, and the graphical code displayed on the equipment terminal is dynamically changed, so that a dynamic password uploaded by a client has certain timeliness, and thus, whether the client is attacked or not can be identified by means of timeliness of the dynamic password, and effective control is performed in time for identifying a situation that the client is illegally attacked by a malicious user, so as to avoid unnecessary loss to a normal user.
It should be noted that the embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, and therefore, the specific implementation of this embodiment may refer to the implementation of the code scanning control method, and repeated details are not repeated.
Corresponding to the code scanning control method described in fig. 2 to fig. 6, based on the same technical concept, one or more embodiments of the present specification further provide a code scanning control system, fig. 13 is a schematic diagram of module composition of an apparatus terminal provided in one or more embodiments of the present specification, where the apparatus is configured to execute the code scanning control method described in fig. 2 to fig. 6, and as shown in fig. 13, the apparatus terminal includes: a background server 20, a client 10 and a device terminal 30;
the background server 20 is configured to receive a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not; executing corresponding control operation according to the timeliness judgment result aiming at the target dynamic password;
the client 10 is configured to send a device control request to a background server; receiving feedback information sent by the background server aiming at the timeliness judgment result of the target dynamic password;
the device terminal 30 is configured to display a corresponding graphic code based on graphic code information issued by a background server, where the graphic code is dynamically updated, and each graphic code corresponds to a unique dynamic password; and receiving a control instruction sent by the background server aiming at the timeliness judgment result of the target dynamic password.
In a code scanning control method in one or more embodiments of the present specification, a device control request sent by a client is received; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.
Further, corresponding to the methods shown in fig. 2 to fig. 6, based on the same technical concept, one or more embodiments of the present specification further provide a code scanning control device, which is configured to execute the code scanning control method, as shown in fig. 14.
The code scanning control device may have a large difference due to different configurations or performances, and may include one or more processors 1401 and a memory 1402, where one or more stored applications or data may be stored in the memory 1402. Memory 1402 may be, among other things, transient storage or persistent storage. The application stored in memory 1402 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for controlling the device in scan code. Still further, processor 1401 can be configured to communicate with memory 1402, and execute a series of computer-executable instructions in memory 1402 on a code scanning control device. The code scan control apparatus may also include one or more power sources 1403, one or more wired or wireless network interfaces 1404, one or more input-output interfaces 1405, one or more keyboards 1406, and the like.
In a particular embodiment, a code scan control apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the code scan control apparatus, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
and executing corresponding control operation according to the timeliness judgment result aiming at the target dynamic password.
Optionally, when executed, the computer-executable instructions perform corresponding control operations according to the timeliness determination result for the target dynamic password, including:
if the judgment result is yes, returning a service page to the client so that the client requests a background server side to control the target equipment terminal based on the service page;
if the judgment result is negative, returning prompt information to the client so that the client carries out prompt based on the prompt information.
Optionally, the computer executable instructions, when executed, further comprise computer executable instructions for:
after returning the service page to the client, the method further comprises the following steps:
receiving control confirmation information sent by the client aiming at the service page;
and sending a control instruction to the target equipment terminal based on the control confirmation information so as to enable the target equipment terminal to execute a corresponding control action.
Optionally, the computer executable instructions, when executed, further comprise computer executable instructions for:
before receiving the device control request sent by the client, the method further comprises the following steps:
determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information;
generating graphic code information according to the determined dynamic password;
and sending the graphic code information to the target equipment terminal so that the target equipment terminal displays a graphic code based on the graphic code information.
Optionally, the computer executable instructions, when executed, further comprise computer executable instructions for:
after determining the dynamic password, the method further comprises the following steps:
adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises: the dynamic password reaches the preset survival time and/or the dynamic password is used;
the judging whether the target dynamic password meets the preset timeliness condition includes:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
Optionally, the computer executable instructions, when executed, further comprise computer executable instructions for:
after the removing the dynamic password from the set of dynamic passwords, further comprising:
and generating a new dynamic password, and updating the graphic code displayed on the target equipment terminal based on the new dynamic password.
Optionally, when executed, the determining a dynamic password according to at least two of the device identifier of the target device terminal, the identifier key corresponding to the device identifier, and the timestamp information includes:
and determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information by using a message digest algorithm.
Optionally, when executed, the sending a control instruction to the target device terminal based on the control confirmation information includes:
searching whether a dynamic password corresponding to the control confirmation information exists in a dynamic password set;
and if so, removing the dynamic password from the dynamic password set, and sending a control instruction to the target equipment terminal.
The code scanning control device in one or more embodiments of the present specification receives a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.
Further, based on the same technical concept, corresponding to the methods shown in fig. 2 to fig. 6, one or more embodiments of the present specification further provide a storage medium for storing computer-executable instructions, where in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores computer-executable instructions that, when executed by a processor, implement the following processes:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
and executing corresponding control operation according to the timeliness judgment result aiming at the target dynamic password.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium perform corresponding control operations according to the timeliness determination result for the target dynamic password, including:
if the judgment result is yes, returning a service page to the client so that the client requests a background server side to control the target equipment terminal based on the service page;
if the judgment result is negative, returning prompt information to the client so that the client carries out prompt based on the prompt information.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, further implement the following process:
after returning the service page to the client, the method further comprises the following steps:
receiving control confirmation information sent by the client aiming at the service page;
and sending a control instruction to the target equipment terminal based on the control confirmation information so as to enable the target equipment terminal to execute a corresponding control action.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, further implement the following process:
before receiving the device control request sent by the client, the method further comprises the following steps:
determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information;
generating graphic code information according to the determined dynamic password;
and sending the graphic code information to the target equipment terminal so that the target equipment terminal displays a graphic code based on the graphic code information.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, further implement the following process:
after determining the dynamic password, the method further comprises the following steps:
adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises: the dynamic password reaches the preset survival time and/or the dynamic password is used;
the judging whether the target dynamic password meets the preset timeliness condition includes:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, further implement the following process:
after the removing the dynamic password from the set of dynamic passwords, further comprising:
and generating a new dynamic password, and updating the graphic code displayed on the target equipment terminal based on the new dynamic password.
Optionally, when executed by a processor, the determining a dynamic password according to at least two of a device identifier of a target device terminal, an identifier key corresponding to the device identifier, and timestamp information includes:
and determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information by using a message digest algorithm.
Optionally, the computer-executable instructions stored in the storage medium, when executed by the processor, send the control instruction to the target device terminal based on the control confirmation information, include:
searching whether a dynamic password corresponding to the control confirmation information exists in a dynamic password set;
and if so, removing the dynamic password from the dynamic password set, and sending a control instruction to the target equipment terminal.
The storage medium in one or more embodiments of the present specification stores computer-executable instructions that, when executed by the processor, receive a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal; and executing corresponding control operation according to the timeliness judgment result. In one or more embodiments of the present description, because the graphic code displayed on the device terminal is dynamically changed, so that the dynamic password uploaded by the client has a certain timeliness, whether the client is attacked can be identified by means of the timeliness of the dynamic password, effective control is performed in time for identifying the condition that the client is illegally attacked by a malicious user, and unnecessary loss brought to a normal user is avoided.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations of one or more of the present descriptions.
As will be appreciated by one skilled in the art, one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied in the medium.
One or more of the present specification has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to one or more embodiments of the specification. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied in the medium.
One or more of the present specification can be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more of the present specification can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is merely illustrative of one or more embodiments of the present disclosure and is not intended to limit one or more embodiments of the present disclosure. Various modifications and alterations to one or more of the present descriptions will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of one or more of the present specification should be included in the scope of one or more claims of the present specification.

Claims (23)

1. A code scanning control method, comprising:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password;
judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
2. The method of claim 1, wherein the receiving control confirmation information carrying the target dynamic password sent by the client comprises:
returning a service page to the client;
and receiving the control confirmation information sent by the client aiming at the service page.
3. The method of claim 1, wherein after determining again whether the target dynamic password satisfies the predetermined timeliness condition, the method further comprises:
if the judgment result is negative, returning prompt information to the client so that the client carries out prompt based on the prompt information.
4. The method of claim 1, prior to receiving the device control request sent by the client, further comprising:
determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information;
generating graphic code information according to the determined dynamic password;
and sending the graphic code information to the target equipment terminal so that the target equipment terminal displays a graphic code based on the graphic code information.
5. The method of claim 4, after determining the dynamic password, further comprising:
adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises: the dynamic password reaches a preset time-to-live and/or the dynamic password is used.
6. The method according to claim 5, wherein the dynamic password set comprises at least one dynamic password generated in advance by a background server and meeting the preset timeliness condition;
the judging whether the target dynamic password meets the preset timeliness condition includes:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
7. The method of claim 5, wherein after removing the dynamic password from the set of dynamic passwords, further comprising:
and generating a new dynamic password, and updating the graphic code displayed on the target equipment terminal based on the new dynamic password.
8. The method of claim 4, wherein determining the dynamic password according to at least two of a device identifier of the target device terminal, an identification key corresponding to the device identifier, and timestamp information comprises:
and determining a dynamic password according to at least two of the equipment identifier of the target equipment terminal, the identifier key corresponding to the equipment identifier and the timestamp information by using a message digest algorithm.
9. A code scanning control method, comprising:
sending an equipment control request carrying a target dynamic password to a background server so that the background server judges whether the target dynamic password meets a preset timeliness condition; the target dynamic password corresponds to a dynamically updated graphic code displayed on a target equipment terminal one by one;
receiving feedback information sent by the background server, wherein the feedback information is generated by the background server aiming at the timeliness judgment result of the target dynamic password;
if the feedback information comprises that the target dynamic password meets the preset timeliness condition, sending control confirmation information carrying the target dynamic password to the background server, so that the background server judges whether the target dynamic password meets the preset timeliness condition again based on the control confirmation information; and sending a control instruction to the target equipment terminal when the judgment result is yes.
10. The method of claim 9, wherein the receiving the feedback information sent by the background server comprises:
receiving a service page sent by the background server when the target dynamic password meets a preset timeliness condition;
the sending of the control confirmation information carrying the target dynamic password to the background server includes:
and sending the control confirmation information to the background server based on the service page.
11. The method of claim 9, wherein the receiving the feedback information sent by the background server comprises:
and receiving prompt information sent by the background server when the target dynamic password is determined not to meet the preset timeliness condition, and prompting based on the prompt information.
12. A code scanning control method, comprising:
receiving an equipment control request aiming at code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password;
judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
13. The method of claim 12, further comprising, prior to receiving a device control request sent by a client for a code-scan vending device:
determining a dynamic password according to at least two of an equipment identifier of a target code scanning selling equipment, an identification key corresponding to the equipment identifier and timestamp information;
generating graphic code information according to the determined dynamic password;
and issuing the graphic code information to the target code scanning selling equipment so that the target code scanning selling equipment displays the graphic code based on the graphic code information.
14. The method of claim 13, after determining the dynamic password, further comprising:
adding the dynamic password to a dynamic password set, and removing the dynamic password from the dynamic password set when the dynamic password meets a preset destruction condition, wherein the preset destruction condition comprises: the dynamic password reaches the preset survival time and/or the dynamic password is used;
the judging whether the target dynamic password meets the preset timeliness condition includes:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
15. The method of claim 14, wherein after removing the dynamic password from the set of dynamic passwords, further comprising:
and generating a new dynamic password, and updating the graphic code displayed on the target code-scanning selling equipment based on the new dynamic password.
16. The method of claim 15, wherein the dynamic password set comprises at least one dynamic password generated in advance by a background server and meeting the preset timeliness condition;
the judging whether the target dynamic password meets the preset timeliness condition includes:
if the target dynamic password exists in the dynamic password set, determining that the target dynamic password meets a preset timeliness condition;
and if the target dynamic password does not exist in the dynamic password set, determining that the target dynamic password does not meet the preset timeliness condition.
17. A code scanning control device is characterized by comprising:
the request receiving module is used for receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
the password identification module is used for judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target equipment terminal;
the control module is used for receiving control confirmation information which is sent by a client and carries the target dynamic password if the target dynamic password meets the preset timeliness condition; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
18. A code scanning control device is characterized by comprising:
the request receiving module is used for receiving an equipment control request aiming at the code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
the password identification module is used for judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
the control module is used for receiving control confirmation information which is sent by a client and carries the target dynamic password if the target dynamic password meets the preset timeliness condition; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
19. A code scanning control system, comprising: the system comprises a background server, a client and a device terminal;
the background server is used for receiving a device control request sent by a client; judging whether a target dynamic password carried in the equipment control request meets a preset timeliness condition or not;
the client is used for sending a device control request to the background server; receiving feedback information sent by the background server aiming at the timeliness judgment result of the target dynamic password; if the feedback information comprises that the target dynamic password meets the preset timeliness condition, control confirmation information carrying the target dynamic password is sent to the background server;
the device terminal is used for displaying corresponding graphic codes based on graphic code information issued by the background server side, wherein the graphic codes are dynamically updated, and each graphic code corresponds to a unique dynamic password; receiving a control instruction sent by the background server aiming at the timeliness judgment result of the target dynamic password;
the background server is used for receiving the control confirmation information sent by the client; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the equipment terminal.
20. A code scanning control device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
21. A code scanning control device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an equipment control request aiming at code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
22. A storage medium storing computer-executable instructions, wherein the executable instructions when executed implement the following:
receiving an equipment control request sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with a dynamically updated graphic code displayed on a target equipment terminal;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target equipment terminal.
23. A storage medium storing computer-executable instructions, wherein the executable instructions when executed implement the following:
receiving an equipment control request aiming at code scanning selling equipment sent by a client, wherein the equipment control request carries a target dynamic password;
judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target code scanning selling equipment;
if the target dynamic password meets the preset timeliness condition, receiving control confirmation information which is sent by a client and carries the target dynamic password; judging whether the target dynamic password meets the preset timeliness condition again based on the received control confirmation information; and if so, sending a control instruction to the target code scanning selling equipment.
CN202011250128.5A 2018-09-13 2018-09-13 Code scanning control method, device and system Active CN112488694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011250128.5A CN112488694B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811066827.7A CN109389386B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system
CN202011250128.5A CN112488694B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201811066827.7A Division CN109389386B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system

Publications (2)

Publication Number Publication Date
CN112488694A true CN112488694A (en) 2021-03-12
CN112488694B CN112488694B (en) 2024-09-03

Family

ID=65418828

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011250128.5A Active CN112488694B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system
CN201811066827.7A Active CN109389386B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201811066827.7A Active CN109389386B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system

Country Status (3)

Country Link
CN (2) CN112488694B (en)
TW (1) TWI724450B (en)
WO (1) WO2020052371A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114912554A (en) * 2022-05-10 2022-08-16 深圳市正联浩东科技发展有限公司 Security verification method and device for two-dimensional code and computer readable storage medium

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488694B (en) * 2018-09-13 2024-09-03 创新先进技术有限公司 Code scanning control method, device and system
CN109949521A (en) * 2019-03-07 2019-06-28 爱布客(武汉)科技有限公司 A kind of method of self-help book returning, system, terminal and storage medium
CN110334559B (en) * 2019-05-31 2024-03-15 努比亚技术有限公司 Code scanning identification method, terminal and computer readable storage medium
CN112561013A (en) * 2020-12-15 2021-03-26 维沃移动通信有限公司 Processing method and device and electronic equipment
CN113938316A (en) * 2021-11-26 2022-01-14 中国船舶重工集团公司第七0七研究所 Distributed node control response method based on dynamic password

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103944910A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive method
CN103944730A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN104253689A (en) * 2013-06-28 2014-12-31 中国电信股份有限公司 User identity module card generated dynamic password authentication method and system based on QR (quick response) code
US20160125401A1 (en) * 2014-01-15 2016-05-05 Tencent Technology (Shenzhen) Company Limited Method, terminal, server, device, and system of verification control
US20160196548A1 (en) * 2015-01-06 2016-07-07 Sk Planet Co., Ltd. Payment service method using integrated barcode and service apparatus thereof
CN106600827A (en) * 2016-12-14 2017-04-26 上海众人网络安全技术有限公司 Selling method and system based on dynamic password transaction authentication
CN106651378A (en) * 2016-10-21 2017-05-10 北京数码视讯支付技术有限公司 Payment terminal, system and method
CN107453871A (en) * 2016-05-30 2017-12-08 阿里巴巴集团控股有限公司 Password generated method, password authentication method, method of payment and device
CN109389386A (en) * 2018-09-13 2019-02-26 阿里巴巴集团控股有限公司 A kind of barcode scanning control method, apparatus and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2333702B1 (en) * 2007-12-04 2015-03-18 A.T Communications Co., Ltd. Two-dimensional code display system and a two-dimensional code display method
US20100125516A1 (en) * 2008-11-14 2010-05-20 Wankmueller John R Methods and systems for secure mobile device initiated payments
KR20120023646A (en) * 2009-04-08 2012-03-13 콘티넨탈 테베스 아게 운트 코. 오하게 Two-dimensional symbol code and method for reading the symbol code
CN104426659B (en) * 2013-09-02 2018-05-18 中国移动通信集团公司 Dynamic password formation method, authentication method and system, relevant device
CN106878245B (en) * 2016-07-18 2020-04-24 阿里巴巴集团控股有限公司 Graphic code information providing and obtaining method, device and terminal
CN106204864A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system based on dynamic two-dimension code and door opening method
CN106790138A (en) * 2016-12-28 2017-05-31 山东浪潮云服务信息科技有限公司 A kind of method of government affairs cloud application User logs in double factor checking
CN107256584A (en) * 2017-08-08 2017-10-17 黎志瀛 The door lock control system that a kind of dynamic code is shown

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253689A (en) * 2013-06-28 2014-12-31 中国电信股份有限公司 User identity module card generated dynamic password authentication method and system based on QR (quick response) code
US20160125401A1 (en) * 2014-01-15 2016-05-05 Tencent Technology (Shenzhen) Company Limited Method, terminal, server, device, and system of verification control
CN103944910A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive method
CN103944730A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
US20160196548A1 (en) * 2015-01-06 2016-07-07 Sk Planet Co., Ltd. Payment service method using integrated barcode and service apparatus thereof
CN107453871A (en) * 2016-05-30 2017-12-08 阿里巴巴集团控股有限公司 Password generated method, password authentication method, method of payment and device
CN106651378A (en) * 2016-10-21 2017-05-10 北京数码视讯支付技术有限公司 Payment terminal, system and method
CN106600827A (en) * 2016-12-14 2017-04-26 上海众人网络安全技术有限公司 Selling method and system based on dynamic password transaction authentication
CN109389386A (en) * 2018-09-13 2019-02-26 阿里巴巴集团控股有限公司 A kind of barcode scanning control method, apparatus and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114912554A (en) * 2022-05-10 2022-08-16 深圳市正联浩东科技发展有限公司 Security verification method and device for two-dimensional code and computer readable storage medium

Also Published As

Publication number Publication date
TW202011310A (en) 2020-03-16
CN109389386A (en) 2019-02-26
CN109389386B (en) 2020-09-29
WO2020052371A1 (en) 2020-03-19
TWI724450B (en) 2021-04-11
CN112488694B (en) 2024-09-03

Similar Documents

Publication Publication Date Title
CN109389386B (en) Code scanning control method, device and system
CN107370730B (en) Login information processing method and equipment
CN104823207B (en) The Personal Identification Number for mobile payment application program is protected by combining with random element
CN111784345B (en) Payment processing method, device, equipment and system
US9495558B2 (en) Systems, methods, and computer program products for managing access control
US11501317B2 (en) Methods, apparatuses, and devices for generating digital document of title
US20180109501A1 (en) Migration containers
CN105825371A (en) Method and device for processing service
CN112508552A (en) Writing-in and payment method and device of NFC portable device and NFC portable device
CN109088914B (en) Block generation method, block chain ecosystem and computer readable storage medium
CN111683039A (en) Authentication method, device and medium
CN108616361B (en) Method and device for identifying uniqueness of equipment
CN109144600B (en) Application program running method and device and computer readable medium
CN114896603A (en) Service processing method, device and equipment
CN112559076B (en) Tenant information processing method, device, system and equipment
KR102114409B1 (en) Revocable platform identifiers
CN116384983A (en) Payment processing method and device
KR102244523B1 (en) System and method for user certification in using web service
CN116340970A (en) Service system login method, device, electronic equipment and readable storage medium
CN115718666A (en) Fine-grained dynamic authority control method and system for WEB service
CN114357426A (en) Interface access verification method and device, electronic equipment and readable storage medium
CN114296651A (en) Method and equipment for storing user-defined data information
CN112883752A (en) Two-dimensional code scanning method, device and equipment
CN110334794B (en) Method and device for generating offline graphic code
US12056674B2 (en) Security for connected devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40047898

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant