CN112667985A - Bargun control method and device, bargun and computer readable storage medium - Google Patents

Bargun control method and device, bargun and computer readable storage medium Download PDF

Info

Publication number
CN112667985A
CN112667985A CN202011635581.8A CN202011635581A CN112667985A CN 112667985 A CN112667985 A CN 112667985A CN 202011635581 A CN202011635581 A CN 202011635581A CN 112667985 A CN112667985 A CN 112667985A
Authority
CN
China
Prior art keywords
user
information
code scanning
logged
rifle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011635581.8A
Other languages
Chinese (zh)
Inventor
陈海波
程巍
吉文雅
盛沿桥
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenlan Shengshi Technology Suzhou Co ltd
Deep Blue Technology Shanghai Co Ltd
Original Assignee
Shenlan Shengshi Technology Suzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenlan Shengshi Technology Suzhou Co ltd filed Critical Shenlan Shengshi Technology Suzhou Co ltd
Priority to CN202011635581.8A priority Critical patent/CN112667985A/en
Publication of CN112667985A publication Critical patent/CN112667985A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application provides a bargun control method, a device, a bargun and a computer readable storage medium, wherein the method comprises the following steps: identifying the instruction information, and executing corresponding verification login operation on the user according to the difference of the instruction information; and scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information. In the method, code scanning information can be associated with the user information, and when the code scanning information is wrong, a code scanning user, namely a person responsible for the code scanning can be accurately determined according to the association relation of the code scanning information.

Description

Bargun control method and device, bargun and computer readable storage medium
Technical Field
The application relates to the technical field of code scanning equipment, in particular to a bargun control method and device, a bargun and a computer readable storage medium.
Background
The 'bargun' system takes a mobile phone or a PDA terminal as a carrier for data storage, and is connected with a bar code scanning gun to form a set of data acquisition and transmission system.
In the related technology, the bargun can be used after account login, any user can use the code scanning operation, and the code scanning information is counted under the same account. At this time, when the code scanning information has an error, such as an error code scanning and a missing code scanning, the person responsible for the accident cannot be determined in time; meanwhile, when a non-designated person scans the bar gun for code use, the person cannot be identified, and the problem that whether the data uploading person is correct cannot be determined is caused.
Therefore, there is a need to provide a new technical solution to improve one or more of the problems in the above solutions.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The application aims to provide a bargun control method and device, a bargun and a computer readable storage medium, which are used for realizing data and account number association and solving the problem that responsibility tracing is difficult after data is in problem.
The purpose of the application is realized by adopting the following technical scheme:
in a first aspect, the present application provides a rifle control method, the method comprising:
identifying instruction information, and executing corresponding verification login operation on the user according to different instruction information;
and scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information.
The control method carries out verification login operation on a user according to different instruction information, code scanning operation can be carried out only after the user logs in, code scanning information and the user information can be associated, and when the code scanning information is wrong, a code scanning user, namely a person in charge, can be accurately determined according to the association relation.
In an embodiment of the present invention, before the step of identifying the instruction information and performing the corresponding verification login operation on the user according to the difference of the instruction information, the method further includes:
collecting vein information of a user;
uploading the collected vein information of the user to a server;
and receiving instruction information issued by the server.
In an embodiment of the present invention, the step of identifying the instruction information and performing corresponding verification login operation on the user according to a difference of the instruction information includes:
when the instruction information is that the user is a registered user, acquiring a current login state;
when the current login state is the non-login state, performing verification login operation on the user;
and when the current login state is the logged-in state, judging whether the logged-in user information is the same as the user information, and executing corresponding verification login operation on the user according to a judgment result. And comparing the current user information with the user information in the logged-in state, and performing corresponding verification login operation according to a comparison judgment result, so that the repeated login frequency can be reduced to a certain extent, and the time is saved.
In an embodiment of the present invention, when the current login status is a logged-in status, the step of determining whether the logged-in user information is the same as the user information, and performing a corresponding login verification operation on the user according to a determination result includes:
when the logged-in user information is different from the user information, performing verification login operation on the user;
and when the logged-in user information is the same as the user information, acquiring the standby time length, comparing the standby time length with a preset threshold value, and executing corresponding verification login operation on the user according to the comparison result. And corresponding verification login operation is performed on the user according to the standby time of the rifle, so that the accuracy of login information is ensured to a certain extent.
In an embodiment of the present invention, the step of obtaining the standby time and comparing the standby time with a preset threshold when the logged-in user information is the same as the user information, and performing a corresponding login verification operation on the user according to a comparison result includes:
when the standby time is longer than a preset threshold value, verifying and logging in the user again;
and when the standby time is less than or equal to the preset threshold value, the current logged state is defaulted. When the standby time of the rifle is longer than the preset threshold value, even if the logged-in user information is the same as the current user information, the rifle logs in again, and the accuracy and reliability of the user information are further ensured.
In an embodiment of the present invention, the step of identifying the instruction information and performing corresponding verification login operation on the user according to a difference of the instruction information further includes:
when the instruction information indicates that the user is an unregistered user, displaying prompt information to prompt the user to register user information;
uploading the registration information of the user to a server;
and executing authentication login operation on the user. When the user is an unregistered new user, the user is reminded of registering the user information, the new user can be added in time, and the method is convenient and fast.
In an embodiment of the present invention, the user vein information includes at least one of palm vein information and finger vein information.
In an embodiment of the present invention, the user information includes at least one of the following: name, number, age, job and vein information.
In a second aspect, the present application provides a rifle control apparatus comprising:
the identification login module is used for identifying instruction information and executing corresponding verification login operation on the user according to different instruction information;
and the code scanning association module is used for scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information.
In an embodiment of the present invention, the method further includes:
the acquisition module is used for acquiring the vein information of the user;
the transmission module is used for uploading the collected vein information of the user to a server;
and the receiving module is used for receiving the instruction information sent by the server.
In an embodiment of the present invention, the identification login module includes:
the acquisition unit is used for acquiring the current login state when the instruction information indicates that the user is a registered user;
and the judging unit is used for judging whether the logged user information is the same as the user information or not when the current login state is the logged state.
In an embodiment of the present invention, the determining unit includes:
and the comparison subunit is used for acquiring the standby time length and comparing the standby time length with a preset threshold value when the logged-in user information is the same as the user information.
In an embodiment of the present invention, the method further includes: and the display module is used for displaying prompt information to prompt the user to register the user information when the instruction information indicates that the user is an unregistered user.
In an embodiment of the present invention, the user vein information includes at least one of palm vein information and finger vein information.
In an embodiment of the present invention, the user information includes at least one of the following: name, number, age, job and vein information.
In a third aspect, the present application provides a rifle comprising:
a processor;
a memory for storing a rifle control program;
wherein the rifle control program, when executed by the processor, implements the steps of any of the rifle control methods described above.
In an embodiment of the present invention, the apparatus further includes:
a code scanning component;
the control mainboard comprises the processor and the memory, is electrically connected with the code scanning component, and associates code scanning information obtained by code scanning of the code scanning component with logged-in user information.
The bargun carries out verification login operation on a user according to different instruction information, code scanning operation can be carried out only after the user logs in, code scanning information and user information can be correlated by the method, and when the code scanning information is wrong, a code scanning user, namely a person responsible for the code scanning user, can be accurately determined according to the correlation relation.
In an embodiment of the present invention, the apparatus further includes:
the vein recognition device is electrically connected with the control main board, and is used for collecting vein information of the user and recognizing the identity of the user through the control of the control main board. The vein recognition device is used for collecting user information to recognize the user by palm vein or finger vein information of the user, and the method is fast and accurate.
In an embodiment of the present invention, the apparatus further includes:
and the display device is electrically connected with the control mainboard and is used for displaying the code scanning information and the user information through the control of the control mainboard. Through the display device, information can be timely and visually fed back to the user, and the user can understand the information conveniently.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a rifle control program, which when executed by at least one processor implements the steps of the rifle control method of any preceding claim.
Drawings
The present application is further described below with reference to the drawings and examples.
Fig. 1 is a schematic flow chart of a bargun control method according to an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of another bargun control method provided by an embodiment of the present application;
FIG. 3 is a schematic partial flow chart of another bargun control method provided by an embodiment of the present application;
FIG. 4 is a schematic partial flow chart of another bargun control method provided by an embodiment of the present application;
FIG. 5 is a schematic partial flow chart of another bargun control method provided by an embodiment of the present application;
FIG. 6 is a schematic partial flow chart of another bargun control method provided by an embodiment of the present application;
fig. 7 is a schematic structural diagram of a bargun control device provided in an embodiment of the present application;
FIG. 8 is a schematic structural diagram of another bargun control device provided by an embodiment of the present application;
fig. 9 is a schematic structural diagram of a login module provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of a determining unit provided in an embodiment of the present application;
FIG. 11 is a schematic structural diagram of another bargun control device provided in an embodiment of the present application;
fig. 12 is a schematic structural diagram of a bargun according to an embodiment of the present disclosure;
FIG. 13 is a schematic view of another gun according to an embodiment of the present disclosure;
fig. 14 is a schematic structural diagram of a program product for implementing a type selection method according to an embodiment of the present application.
Detailed Description
The present application is further described with reference to the accompanying drawings and the detailed description, and it should be noted that, in the present application, the embodiments or technical features described below may be arbitrarily combined to form a new embodiment without conflict.
Referring to fig. 1, an embodiment of the present application provides a bargun control method, as shown in fig. 1, which may include:
step S11: identifying instruction information, and executing corresponding verification login operation on the user according to different instruction information;
step S12: and scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information.
The control method carries out verification login operation on a user according to different instruction information, code scanning operation can be carried out only after the user logs in, code scanning information and the user information can be associated, and when the code scanning information is wrong, a code scanning user, namely a person in charge, can be accurately determined according to the association relation.
Hereinafter, each step of the above-described method in the present exemplary embodiment will be described in more detail with reference to fig. 1 to 13.
In step S11: the bargun identifies the instruction information, and executes corresponding verification operation on the user according to different instruction information, wherein the instruction information can be information that the user is a registered user and the user is an unregistered new user;
in step S12: a user can use a gun to scan the code after verification and login, code scanning information acquired by scanning the code is uploaded to a server and is associated with logged-in user information, namely, code scanning data generated by code scanning when different users use the system all have information capable of being identified by the user.
In an embodiment, the step of identifying the instruction information and performing the corresponding authentication login operation on the user according to the difference of the instruction information may further include:
step S11': collecting vein information of a user;
step S12': uploading the collected vein information of the user to a server;
step S13': receiving instruction information issued by the server;
specifically, in step S11': when a user needs to use a bargun, the user holds a handle of the bargun, and the bargun acquires hand vein information of the user through a vein recognition device;
in step S12': the bargun uploads the collected hand vein information of the user to a management center server, wherein the transmission mode can be transmission through a communication module, can be wired transmission or wireless transmission, and is not specifically limited again;
in step S13': the management center server receives the user hand vein information uploaded by the bargun, compares the vein information with the user information stored in the server database, and sends instruction information to the bargun according to a comparison result, and the bargun receives the instruction information sent by the server.
In an embodiment, as shown in fig. 3, the step of identifying the instruction information and performing the corresponding authentication login operation on the user according to the difference of the instruction information may include:
step S21: when the instruction information is that the user is a registered user, acquiring a current login state;
step S211: when the current login state is the non-login state, performing verification login operation on the user;
step S212: and when the current login state is the logged-in state, judging whether the logged-in user information is the same as the user information, and executing corresponding verification login operation on the user according to a judgment result.
Specifically, in step S21: and when the bargun has more instruction information and the user is a registered user, acquiring the current login state of the bargun.
In step S211: and when the current login state of the bargun is an unregistered state and the user is known to be a registered user, performing authentication login operation on the user.
In step S212: and when the current login state of the bargun is the logged-in state, judging whether the login user information in the login state is the same as the user information, and executing corresponding verification login operation on the user according to a judgment result. And comparing the current user information with the user information in the logged-in state, and performing corresponding verification login operation according to a comparison judgment result, so that the repeated login frequency can be reduced to a certain extent, and the time is saved.
In an embodiment, when the current login status is a logged-in status, determining whether the logged-in user information is the same as the user information, and performing a corresponding verification login operation on the user according to a determination result, as shown in fig. 4, the determining may include:
step S311: when the logged-in user information is different from the user information, performing verification login operation on the user;
step S312: and when the logged-in user information is the same as the user information, acquiring the information which is frequently used in standby and comparing the information with a preset threshold value, and executing corresponding verification login operation on the user according to a comparison result.
Specifically, in step S311: when the rifle is in the logged-on state, and the logged-on user information is different from the user information, namely the user needs to be replaced, the logged-on state is logged out or logged off, and the user is logged in.
In step S312: when the bargun is in a logged state and logged user information is the same as the logged user information, acquiring standby time of the bargun, namely how long the bargun is not used for code scanning in the logged state of the user, comparing the standby time with a preset threshold value, and executing corresponding verification login operation on the user according to a comparison result; the preset threshold is a preset time parameter value, which may be written by a developer in a development process, or may be set by a user according to an actual use condition, specifically, the preset threshold may be 15 minutes or half an hour, and is not limited specifically herein.
And corresponding verification login operation is performed on the user according to the standby time of the rifle, so that the accuracy of login information is ensured.
In one embodiment, when the logged-in user information is the same as the user information, the step of obtaining standby time and comparing the standby time with a preset threshold, and performing a corresponding login verification operation on the user according to a comparison result may include, as shown in fig. 5:
step S411: when the standby time is longer than a preset threshold value, verifying and logging in the user again;
step S412: and when the standby time is less than or equal to the preset threshold value, the current logged state is defaulted.
Specifically, in step S411: when the standby time of the rifle is longer than a preset threshold value, namely the same user does not scan codes after logging in and exceeds the preset threshold value, the same user needs to perform verification logging again when using the same gun again after exceeding the preset threshold value, and user information is confirmed again.
In step S412: when the standby time of the bargun is less than or equal to the preset threshold value, the code scanning operation is in a discontinuous state sometimes, and if the merchant has a short pause sometimes in the super-junction account payment, the login cannot be verified again when the merchant is used by the same user and does not exceed the preset threshold value, and the code scanning operation can be performed in the current login state by directly defaulting.
When the standby time of the rifle is longer than the preset threshold value, the rifle logs in again even if the logged-in user information is the same as the current user information, so that the accuracy and reliability of the user information are guaranteed, and the current login state can be defaulted under the condition that the duration does not exceed the preset threshold value, so that the rifle is convenient to operate, repeated login in a short time is reduced, and time and labor are saved.
In an embodiment, as shown in fig. 6, the step of identifying the instruction information and performing a corresponding login authentication operation on the user according to a difference of the instruction information may further include:
step S22: when the instruction information indicates that the user is an unregistered user, displaying prompt information to prompt the user to register user information;
uploading the registration information of the user to a server;
and executing authentication login operation on the user.
In step S22: and when the instruction information indicates that the user is a non-registered user, namely the user is a new user, displaying a registration prompting message by the display device of the rifle, guiding the new user to register the user information, uploading the registration information of the user to the server database for reservation, and simultaneously carrying out verification login operation on the user.
When the user is an unregistered new user, the user is reminded of registering the user information, the new user can be added in time, and the method is convenient and fast.
In one embodiment, the user vein information includes at least one of palm vein information and finger vein information. For example, the vein information may include at least one of palm vein information and finger vein information, that is, when the user uses the bargun, the bargun may collect the palm vein information of the user, the page may collect the finger vein information of the user, and of course, the palm vein information and the finger vein information of the user may also be collected simultaneously.
In one embodiment, the user information includes at least one of: name, number, age, job and vein information. Illustratively, the user information may include name, number, age, position, vein information, etc., and at least the user name or user number of the user should include vein information and markable vein information, but may also include other information, such as working age, gender, etc., again without specific limitation.
The embodiment of the application provides a rifle control device, and the specific implementation manner of the rifle control device is consistent with the implementation manner and the achieved technical effect recorded in the embodiment of the control method of the manipulator, and part of the contents are not repeated.
As shown in fig. 7, the rifle control apparatus may include:
the identification login module 11 is used for identifying instruction information and executing corresponding verification login operation on the user according to different instruction information;
and the code scanning association module 11 is used for scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information.
The control method carries out verification login operation on a user according to different instruction information, code scanning operation can be carried out only after the user logs in, code scanning information and the user information can be associated, and when the code scanning information is wrong, a code scanning user, namely a person in charge, can be accurately determined according to the association relation.
In one embodiment, as shown in fig. 8, the method may further include:
the acquisition module 11' is used for acquiring the vein information of the user;
the transmission module 12' is used for uploading the collected vein information of the user to a server;
and the receiving module 13' is used for receiving the instruction information sent by the server.
In one embodiment, as shown in fig. 9, the identification login module 11 may include:
an obtaining unit 111, configured to obtain a current login state when the instruction information indicates that the user is a registered user;
a determining unit 112, configured to determine whether the logged-in user information is the same as the user information when the current login status is a logged-in status.
In one embodiment, as shown in fig. 10, the determining unit 112 may include:
a comparing sub-unit 1121, configured to, when the logged-in user information is the same as the user information, acquire a standby time and compare the standby time with a preset threshold.
In one embodiment, as shown in fig. 11, the method may further include:
and the display module 13 is configured to display a prompt message to prompt the user to register the user information when the instruction message indicates that the user is an unregistered user.
In one embodiment, the user vein information may include at least one of palm vein information and finger vein information.
In one embodiment, the user information includes at least one of: name, number, age, job and vein information.
Referring to fig. 12, the present embodiment further provides a bargun 200, where the bargun 200 includes at least one memory 210, at least one processor 220, and a bus 230 connecting different platform systems. The memory 210 is configured to store a gun control program, wherein the gun control program implements the steps of any one of the gun control methods when executed by the processor.
The memory 210 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)211 and/or cache memory 212, and may further include Read Only Memory (ROM) 213.
The memory 210 further stores a computer program, and the computer program can be executed by the processor 220, so that the processor 220 executes the steps of the model selection method in the embodiment of the present application, and a specific implementation manner of the method is consistent with the implementation manner and the achieved technical effect described in the embodiment of the control method of the manipulator, and details of the method are not repeated.
Memory 210 may also include a program/utility 214 having a set (at least one) of program modules 215, including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Accordingly, processor 220 may execute the computer programs described above, as well as may execute programs/utilities 214.
Bus 230 may be a local bus representing one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or any other type of bus structure.
The bargun 200 may also communicate with one or more external devices 240, such as a keyboard, pointing device, bluetooth device, etc., as well as with one or more devices capable of interacting with the bargun 200, and/or with any device (e.g., router, modem, etc.) that enables the bargun 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the rifle 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 260. The network adapter 260 may communicate with other modules of the rifle 200 via the bus 230. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the rifle 200, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage platforms, to name a few.
In one embodiment, the bar gun 200 further comprises:
a code scanning section 21;
and the control main board 22 is electrically connected with the code scanning component and is used for associating the code scanning information obtained by code scanning of the code scanning component with the logged-in user information.
In one embodiment, the bar gun 200 further comprises:
and the vein recognition device 23 is electrically connected with the control main board, and is used for collecting vein information of the user and recognizing the identity of the user through the control of the control main board.
In one embodiment, the rifle apparatus 200 further comprises:
and the display device 24 is electrically connected with the control main board and is used for displaying code scanning information and user information under the control of the control main board.
Referring to fig. 13, the gun 200 may include a gun handle 25, and a control main board 22, a vein recognition device 23, and a code scanning part 21 provided on the gun handle 25.
The control main board 22 is electrically connected to the vein recognition device 23 and the code scanning unit 21, respectively. The control motherboard 22 may include a processor 220 and a memory 210, among other things.
The vein recognition device 23 is configured to recognize the identity of the user and send the recognition result to the control main board 22.
The code scanning component 21 is configured to scan the express mail and send the scanning result to the control main board 22.
The bargun 200 collects user information through the vein recognition device 23, and recognizes a user through palm vein or finger vein information of the user, so that the method is fast and accurate; the control main board 22 receives the recognition result and the scanning result, and when a problem occurs in the scanning result, the recognized user, i.e., the person in charge, can be determined.
With continued reference to fig. 13, in an embodiment of the present invention, the bargun 200 may further include a display device 24, and the display device 24 is electrically connected to the control main board 22 for displaying the identification result or the scanning result. Through the display device 24, information can be fed back to the user timely and intuitively, and the user can understand the information conveniently.
In an embodiment of the present invention, the display device 24 may be disposed above the pistol grip 25. Therefore, the display device 24 is not easily blocked by the hand, and the user can conveniently observe the scanning result and the recognition result from the display device 24.
In an embodiment of the present invention, the display device 24 may be a touch screen. Thus, user operation is facilitated.
In one embodiment of the present invention, the control main board 22 may be located close to the left side surface of the pistol grip 25. Therefore, the space for accommodating the control main board 22 is large, a chip with large volume and low cost can be used, and the cost of the bargun is reduced.
In one embodiment of the present invention, the vein recognition device 23 is located proximate to the underside of the pistol grip 25. Thereby, vein recognition by the user is facilitated.
In one embodiment of the present invention, the code scanning member 21 is located adjacent to the side of the pistol grip 25. Therefore, the user can scan the express mail conveniently.
An embodiment of the present application further provides a computer-readable storage medium, where a bargun control program is stored, where the bargun control program is executed by at least one processor to implement the steps of any one of the bargun control methods, and a specific implementation manner of the bargun control program is consistent with the implementation manner and the achieved technical effect described in the embodiments of the control method for a manipulator, and some details are not repeated.
Fig. 13 shows a program product 300 for implementing the method provided by the embodiment, which may employ a portable compact disc read only memory (CD-ROM) and include program codes, and may be run on a terminal device, such as a personal computer. However, the program product 300 of the present invention is not so limited, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. Program product 300 may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The foregoing description and drawings are only for purposes of illustrating the preferred embodiments of the present application and are not intended to limit the present application, which is, therefore, to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present application.

Claims (20)

1. A method of gun control, the method comprising:
identifying instruction information, and executing corresponding verification login operation on the user according to different instruction information;
and scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information.
2. The rifle control method of claim 1, wherein the step of identifying the instruction information and performing the corresponding authenticated login operation on the user according to the instruction information is preceded by the step of:
collecting vein information of a user;
uploading the collected vein information of the user to a server;
and receiving instruction information issued by the server.
3. The rifle control method of claim 2, wherein the step of identifying the instruction information and performing the corresponding authenticated login operation on the user according to the instruction information comprises:
when the instruction information is that the user is a registered user, acquiring a current login state;
when the current login state is the non-login state, performing verification login operation on the user;
and when the current login state is the logged-in state, judging whether the logged-in user information is the same as the user information, and executing corresponding verification login operation on the user according to a judgment result.
4. The rifle control method of claim 3, wherein the step of determining whether the logged-in user information is the same as the user information when the current login status is a logged-in status, and performing a corresponding login verification operation on the user according to a determination result comprises:
when the logged-in user information is different from the user information, performing verification login operation on the user;
and when the logged-in user information is the same as the user information, acquiring the standby time length, comparing the standby time length with a preset threshold value, and executing corresponding verification login operation on the user according to the comparison result.
5. The rifle control method of claim 4, wherein the step of obtaining a standby time and comparing the standby time with a preset threshold when the logged-in user information is the same as the user information, and performing a corresponding login verification operation on the user according to a comparison result comprises:
when the standby time is longer than a preset threshold value, verifying and logging in the user again;
and when the standby time is less than or equal to the preset threshold value, the current logged state is defaulted.
6. The rifle control method according to any one of claims 1 to 5, wherein the step of identifying the instruction information and performing a corresponding authenticated login operation on the user according to a difference between the instruction information further comprises:
when the instruction information indicates that the user is an unregistered user, displaying prompt information to prompt the user to register user information;
uploading the registration information of the user to a server;
and executing authentication login operation on the user.
7. The rifle control of claim 6, wherein the user vein information includes at least one of palm vein information and finger vein information.
8. The rifle control of claim 7, wherein the user information includes at least one of: name, number, age, job and vein information.
9. A rifle control apparatus, comprising:
the identification login module is used for identifying instruction information and executing corresponding verification login operation on the user according to different instruction information;
and the code scanning association module is used for scanning codes, acquiring code scanning information, uploading the code scanning information to the server, and associating the code scanning information with the logged-in user information.
10. The rifle control of claim 9, further comprising:
the acquisition module is used for acquiring the vein information of the user;
the transmission module is used for uploading the collected vein information of the user to a server;
and the receiving module is used for receiving the instruction information sent by the server.
11. The rifle control of claim 10, wherein said identification entry module comprises:
the acquisition unit is used for acquiring the current login state when the instruction information indicates that the user is a registered user;
and the judging unit is used for judging whether the logged user information is the same as the user information or not when the current login state is the logged state.
12. The bar gun control device according to claim 11, wherein the judging unit includes:
and the comparison subunit is used for acquiring the standby time length and comparing the standby time length with a preset threshold value when the logged-in user information is the same as the user information.
13. The bar gun control device according to any one of claims 9 to 12, further comprising:
and the display module is used for displaying prompt information to prompt the user to register the user information when the instruction information indicates that the user is an unregistered user.
14. The rifle control of claim 13, wherein the user vein information includes at least one of palm vein information and finger vein information.
15. The rifle control of claim 14, wherein the user information includes at least one of: name, number, age, job and vein information.
16. A rifle, comprising:
a processor;
a memory for storing a rifle control program;
wherein the bargun control program, when executed by the processor, implements the steps of the bargun control method of any one of claims 1 to 8.
17. The rifle of claim 16, wherein the apparatus further comprises:
a code scanning component;
the control mainboard comprises the processor and the memory, is electrically connected with the code scanning component, and associates code scanning information obtained by code scanning of the code scanning component with logged-in user information.
18. The rifle of claim 17, wherein the apparatus further comprises:
the vein recognition device is electrically connected with the control main board, and is used for collecting vein information of the user and recognizing the identity of the user through the control of the control main board.
19. The rifle of claim 18, wherein the apparatus further comprises:
and the display device is electrically connected with the control mainboard and is used for displaying the code scanning information and the user information through the control of the control mainboard.
20. A computer-readable storage medium having a gun control program stored thereon, wherein the gun control program, when executed by at least one processor, implements the steps of the gun control method of any one of claims 1-8.
CN202011635581.8A 2020-12-31 2020-12-31 Bargun control method and device, bargun and computer readable storage medium Pending CN112667985A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011635581.8A CN112667985A (en) 2020-12-31 2020-12-31 Bargun control method and device, bargun and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011635581.8A CN112667985A (en) 2020-12-31 2020-12-31 Bargun control method and device, bargun and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN112667985A true CN112667985A (en) 2021-04-16

Family

ID=75413450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011635581.8A Pending CN112667985A (en) 2020-12-31 2020-12-31 Bargun control method and device, bargun and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112667985A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188565A1 (en) * 2001-05-09 2002-12-12 Yoshiyuki Nakamura Client terminal device, storage medium product, bank server apparatus, information transmitting method, information transmitting program, and information transmitting/receiving program
CN105938587A (en) * 2016-06-20 2016-09-14 于江涛 Intelligent express mail sending access system and solution scheme based on Internet of things and two-dimensional code technology
CN106713799A (en) * 2015-11-13 2017-05-24 深圳市光峰光电技术有限公司 Projection equipment control method, projection equipment and intelligent terminal
CN108197850A (en) * 2017-11-27 2018-06-22 深圳市丰巢科技有限公司 A kind of express mail processing method and bar rifle based on bar rifle
CN109784174A (en) * 2018-12-14 2019-05-21 深圳壹账通智能科技有限公司 A kind of login method and equipment of user account
CN110427876A (en) * 2019-07-31 2019-11-08 中国工商银行股份有限公司 Refer to vein identification method, device and computer system
WO2020093214A1 (en) * 2018-11-05 2020-05-14 深圳市欢太科技有限公司 Application program login method, application program login device and mobile terminal
CN111460403A (en) * 2020-02-28 2020-07-28 拉扎斯网络科技(上海)有限公司 Information processing method and system
CN111556060A (en) * 2020-04-29 2020-08-18 上海中通吉网络技术有限公司 Method, device, equipment and storage medium for embedding target software into external H5 page
CN111651746A (en) * 2020-06-01 2020-09-11 支付宝(杭州)信息技术有限公司 Login data processing method, device, equipment and system
CN111740942A (en) * 2020-01-17 2020-10-02 北京沃东天骏信息技术有限公司 Login/registration method, device, system, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188565A1 (en) * 2001-05-09 2002-12-12 Yoshiyuki Nakamura Client terminal device, storage medium product, bank server apparatus, information transmitting method, information transmitting program, and information transmitting/receiving program
CN106713799A (en) * 2015-11-13 2017-05-24 深圳市光峰光电技术有限公司 Projection equipment control method, projection equipment and intelligent terminal
CN105938587A (en) * 2016-06-20 2016-09-14 于江涛 Intelligent express mail sending access system and solution scheme based on Internet of things and two-dimensional code technology
CN108197850A (en) * 2017-11-27 2018-06-22 深圳市丰巢科技有限公司 A kind of express mail processing method and bar rifle based on bar rifle
WO2020093214A1 (en) * 2018-11-05 2020-05-14 深圳市欢太科技有限公司 Application program login method, application program login device and mobile terminal
CN109784174A (en) * 2018-12-14 2019-05-21 深圳壹账通智能科技有限公司 A kind of login method and equipment of user account
CN110427876A (en) * 2019-07-31 2019-11-08 中国工商银行股份有限公司 Refer to vein identification method, device and computer system
CN111740942A (en) * 2020-01-17 2020-10-02 北京沃东天骏信息技术有限公司 Login/registration method, device, system, electronic equipment and storage medium
CN111460403A (en) * 2020-02-28 2020-07-28 拉扎斯网络科技(上海)有限公司 Information processing method and system
CN111556060A (en) * 2020-04-29 2020-08-18 上海中通吉网络技术有限公司 Method, device, equipment and storage medium for embedding target software into external H5 page
CN111651746A (en) * 2020-06-01 2020-09-11 支付宝(杭州)信息技术有限公司 Login data processing method, device, equipment and system

Similar Documents

Publication Publication Date Title
CN109644183B (en) Remote use of locally stored biometric authentication data
CN107992728B (en) Face verification method and device
EP3839944A1 (en) Voice processing method and apparatus, device, and computer storage medium
US8121359B2 (en) Fingerprint identification system and method of an electronic device
US20180288040A1 (en) System and Method for Biometric Authentication-Based Electronic Notary Public
CN105592014B (en) A kind of trusted terminal verification method, device
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
CN110942528A (en) Sign-in method, device and system
CN104700012A (en) Biometric data recognition apparatus, method thereof, and computer-readable medium
CN106130739A (en) Application program login process method and device
CN107147632B (en) Bidirectional authentication method and device, storage medium and electronic equipment
CN112839028A (en) Account logout processing method, related device, server and medium
CN113707157B (en) Voiceprint recognition-based identity verification method and device, electronic equipment and medium
CN105471641A (en) Information management method and correlation equipment
CN113961836A (en) Page jump method and device, electronic equipment and storage medium
CN107808082B (en) Electronic device, data access verification method, and computer-readable storage medium
CN214670638U (en) Barn gun
US20190028610A1 (en) Distributed smart card reader for multifunction printer
CN112667985A (en) Bargun control method and device, bargun and computer readable storage medium
CN109903054B (en) Operation confirmation method and device, electronic equipment and storage medium
CN109858583A (en) Electric power instrument borrows information processing method, borrowing method and device
CN110677390B (en) Abnormal account identification method and device, electronic equipment and storage medium
CN114282940A (en) Method and apparatus for intention recognition, storage medium, and electronic device
CN112767064A (en) Article renting method and device, electronic equipment and storage medium
CN114244874A (en) Unlocking control method and system, computer storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination