CN113780022A - Near field communication triggering method and device, electronic equipment and storage medium - Google Patents

Near field communication triggering method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113780022A
CN113780022A CN202111058856.0A CN202111058856A CN113780022A CN 113780022 A CN113780022 A CN 113780022A CN 202111058856 A CN202111058856 A CN 202111058856A CN 113780022 A CN113780022 A CN 113780022A
Authority
CN
China
Prior art keywords
near field
field communication
tag
forbidden
nfc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111058856.0A
Other languages
Chinese (zh)
Inventor
白青昀
刘旭阳
聂利波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202111058856.0A priority Critical patent/CN113780022A/en
Publication of CN113780022A publication Critical patent/CN113780022A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10118Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step

Abstract

The invention discloses a near field communication triggering method and device, electronic equipment and a storage medium. The method comprises the steps that when a near field communication tag is induced, whether the near field communication tag belongs to a forbidden tag or not is judged, and the near field communication equipment is forbidden to read instructions from the forbidden tag; when the near field communication tag does not belong to a forbidden tag, reading and executing an instruction from the near field communication tag; and when the near field communication tag belongs to a forbidden tag, forbidding to read the instruction from the near field communication tag. By adopting the scheme provided by the invention, only the near field communication tag which does not belong to the forbidden tag is read and the instruction is completed after the forbidden tag is set, and the targeted reading triggered by the near field communication is realized, so that the special scene use requirement is realized, and the use experience of a user is improved.

Description

Near field communication triggering method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of near field communication sensing technologies, and in particular, to a near field communication triggering method and apparatus, an electronic device, and a storage medium.
Background
Near Field Communication (NFC) is an emerging technology, and devices (such as mobile phones) using NFC technology can exchange data in close proximity to each other. In practical application, the frequency of the NFC is 13.56MHz (megahertz), the communication connection establishment time is less than 1 second, and the communication distance is less than 10 centimeters.
Generally, there are some specific occasions where NFC triggers exist, where some NFC devices do not allow reading of instructions in NFC tags. That is, for some NFC tags, different personnel are required to write and read to meet the process requirements. For example: the NFC label of overhaul of the equipments needs the installer to write in the operation to the NFC label to the security that needs overhaul of the equipments personnel, examine and repair through scanning the NFC label representation promptly. At this time, the equipment installer and the equipment maintenance worker cannot be the same person, and if the equipment installer and the equipment maintenance worker are the same person to perform writing and scanning operations, the meaning of maintenance is lost. In addition, for visitor code setting, after the NFC device of the host performs setting, the NFC device of the host does not generally want to trigger, but wants to trigger by other NFC devices.
Disclosure of Invention
In order to solve the technical problem that NFC induction does not meet the requirements of some specific occasions, embodiments of the present invention provide an NFC triggering method, an apparatus, an electronic device, and a storage medium.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides an NFC triggering method, which is applied to NFC equipment and comprises the following steps:
when an NFC label is induced, judging whether the NFC label belongs to a forbidden label or not; the NFC device prohibits reading instructions from the prohibited tag;
when the NFC tag does not belong to the forbidden tag, reading and executing an instruction from the NFC tag;
and when the NFC tag belongs to a forbidden tag, forbidding to read the instruction from the NFC tag.
In the foregoing solution, the determining whether the NFC tag belongs to a prohibited tag includes:
acquiring identification information of the NFC tag;
judging whether the identification information is stored in the identification information set of the forbidden tag or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden tag, judging that the NFC tag corresponding to the identification information belongs to the forbidden tag.
In the foregoing solution, before determining whether the NFC tag belongs to a prohibited tag, the method further includes:
when the data writing operation on the designated NFC label is finished, acquiring the identification information of the designated NFC label;
and storing the identification information of the designated NFC label in the identification information set of the forbidden label.
The embodiment of the invention also provides another NFC triggering method which is applied to an NFC label and comprises the following steps:
when the NFC equipment is induced, judging whether the NFC equipment belongs to forbidden equipment or not; the NFC tag prohibits sending instructions to the prohibiting device;
when the NFC equipment does not belong to forbidden equipment, sending an instruction to the NFC equipment so that the NFC equipment receives and executes the instruction;
and when the NFC equipment belongs to a forbidden device, forbidding sending of an instruction to the NFC equipment.
In the foregoing solution, the determining whether the NFC device belongs to a prohibited device includes:
acquiring identification information of the NFC equipment;
judging whether the identification information is stored in an identification information set of the forbidden device or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden device, determining that the NFC device corresponding to the identification information belongs to the forbidden device.
In the foregoing solution, before the NFC device is sensed, the method further includes:
when the data writing operation on the designated NFC label is completed, acquiring the identification information of the designated NFC equipment of the data writing operation;
storing the identification information of the designated NFC device in the identification information set of the forbidden device.
An embodiment of the present invention further provides an NFC trigger device, where the NFC trigger device includes:
the judgment module is used for judging whether the NFC label belongs to a forbidden label or not when the NFC label is induced; the NFC device prohibits reading instructions from the prohibited tag;
the execution module is used for reading and executing the instruction from the NFC tag when the NFC tag does not belong to the forbidden tag; and when the NFC tag belongs to a forbidden tag, forbidding to read the instruction from the NFC tag.
An embodiment of the present invention further provides another NFC trigger device, where the NFC trigger device includes:
the judgment module is used for judging whether the NFC equipment belongs to forbidden equipment or not when the NFC equipment is induced; the NFC tag is prohibited from sending instructions to the prohibition device;
the execution module is used for sending an instruction to the NFC equipment when the NFC equipment does not belong to the forbidden equipment so that the NFC equipment receives and executes the instruction; and when the NFC equipment belongs to a forbidden device, forbidding sending of an instruction to the NFC equipment.
An embodiment of the present invention further provides an electronic device, including: a processor and a memory for storing a computer program capable of running on the processor; wherein the content of the first and second substances,
the processor is adapted to perform the steps of any of the methods described above when running the computer program.
The embodiment of the invention also provides a storage medium, wherein a computer program is stored in the storage medium, and when the computer program is executed by a processor, the steps of any one of the methods are realized.
According to the NFC triggering method, the NFC triggering device, the electronic equipment and the storage medium, whether the NFC label belongs to a forbidden label or not is judged when the NFC label is induced; the NFC device prohibits reading instructions from the prohibited tag; when the NFC tag does not belong to the forbidden tag, reading and executing an instruction from the NFC tag; and when the NFC tag belongs to a forbidden tag, forbidding to read the instruction from the NFC tag. By adopting the scheme provided by the invention, only the NFC label which does not belong to the forbidden label is read and the instruction is completed after the forbidden label is set, and the targeted reading triggered by the NFC is realized, so that the special scene use requirement is realized, and the use experience of a user is improved.
Drawings
Fig. 1 is a flowchart illustrating an NFC triggering method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating another NFC triggering method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an NFC triggering process according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an NFC trigger device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another NFC trigger device according to an embodiment of the present invention;
fig. 6 is an internal structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
At present, after the NFC tag is written in, reading can be carried out on the equipment which accords with the reading condition, the read equipment cannot be distinguished, and reading disorder can be caused on scenes with strict requirements on the reading equipment.
For example, for some special instructions (such as generation of a visitor code), only triggering is needed on the non-setting device, but once the NFC tag enters the sensing range of the setting device, the special instructions are triggered, and it cannot be avoided that the setting device triggers the special instructions which are not needed to be triggered.
In view of the above situation, at present, to solve the above problems, the method mainly adopted is: in order to distinguish the reading device, normally, the NFC data of the reading device is modified. For example: the device A can identify the NFC label, and the device B cannot read the NFC label by modifying the authority or modifying the internal program. However, the above operation is very troublesome and requires a separate and targeted setting. In addition, when the NFC tag needs to be read again by the B device, the program needs to be rewritten to enable reading. The use difficulty is high, and the process is complicated.
Based on this, the present embodiment provides an NFC triggering method, an apparatus, an electronic device, and a storage medium, and when an NFC tag is sensed, whether the NFC tag belongs to a prohibited tag is determined; the NFC device prohibits reading instructions from the prohibited tag; when the NFC tag does not belong to the forbidden tag, reading and executing an instruction from the NFC tag; and when the NFC tag belongs to a forbidden tag, forbidding to read the instruction from the NFC tag. By adopting the scheme provided by the invention, only the NFC label which does not belong to the forbidden label is read and the instruction is completed after the forbidden label is set, and the targeted reading triggered by the NFC is realized, so that the special scene use requirement is realized, and the use experience of a user is improved.
Specifically, an embodiment of the present invention provides an NFC triggering method, which is applied to an NFC device, and as shown in fig. 1, the method includes:
step 101: when an NFC label is induced, judging whether the NFC label belongs to a forbidden label or not; the NFC device prohibits reading instructions from the prohibited tag;
step 102: when the NFC tag does not belong to the forbidden tag, reading and executing an instruction from the NFC tag;
step 103: and when the NFC beacon tag belongs to a prohibited tag, prohibiting reading of the instruction from the NFC tag.
In particular, Near Field Communication (NFC) is a fast short-distance high-frequency wireless Communication technology that operates at a frequency of 13.56MHz (megahertz), has a Communication connection establishment time of less than 1 second, and has a Communication distance generally limited to 10 centimeters.
The NFC label comprises an NFC coil and an NFC chip and can be communicated with the NFC induction equipment. The NFC coil is a coil which is formed by surrounding an NFC antenna into a circle or an ellipse or any other shape and is used for capturing electric energy from an electromagnetic field and carrying out transceiving communication with smaller data volume by demodulating or modulating the electromagnetic field. And the NFC chip is used for storing the chip of the circuit module of the information. The NFC sensing device may be an NFC reader, or may also be an electronic device supporting NFC communication, such as a mobile phone supporting NFC communication. When NFC equipment induction equipment is close to the NFC label, NFC induction equipment sends electromagnetic energy to the NFC label, and the NFC coil on the NFC label couples this electromagnetic energy and passes it to the NFC chip that links to each other with the NFC coil in, and the NFC chip passes through rectifier circuit and turns into the required power of circuits such as its inside microcontroller, modem and memory with this electromagnetic energy. When the circuits such as the microcontroller, the modem, and the memory start to operate after power-on, information stored in the NFC chip can be transmitted to the NFC inductive device through the NFC coil.
For example, the NFC tag may communicate with a portable communication device such as a mobile phone with an NFC function, so as to change an operating state of the device or open related software and settings. The NFC label is stored with data written in advance by a mobile phone (with an NFC function), when the mobile phone with the NFC function is close to the NFC label, the mobile phone senses the NFC label and effectively recognizes the NFC label, the working state of the mobile phone can be converted through mobile phone software, if navigation is automatically opened, the mobile phone automatically enters a meeting mode, automatically connects an appointed Wifi hotspot, automatically listens to music, automatically closes a Wifi signal, enters a flight mode and the like.
In practical application, when the NFC tag belongs to a prohibited tag, the NFC device prohibits reading of instructions from the NFC tag.
Further, in an embodiment, the determining whether the NFC tag belongs to a prohibited tag includes:
acquiring identification information of the NFC tag;
judging whether the identification information is stored in the identification information set of the forbidden tag or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden tag, judging that the NFC tag corresponding to the identification information belongs to the forbidden tag.
Here, the identification information may be an ID of the NFC tag, which is used to distinguish the NFC tag from other NFC tags. Generally, one NFC tag is provided with one ID.
Further, in an embodiment, before the NFC tag is sensed, the method further includes:
acquiring identification information of the NFC label after data writing operation of the NFC label is completed;
storing the identification information in an identification information set of the prohibited tag.
According to the NFC triggering method provided by the embodiment of the invention, when an NFC label is induced, whether the NFC label belongs to a forbidden label is judged; the NFC device prohibits reading instructions from the prohibited tag; when the NFC tag does not belong to the forbidden tag, reading and executing an instruction from the NFC tag; and when the NFC beacon tag belongs to a prohibited tag, prohibiting reading of the instruction from the NFC tag. By adopting the scheme provided by the invention, only the NFC label which does not belong to the forbidden label is read and the instruction is completed after the forbidden label is set, and the targeted reading triggered by the NFC is realized, so that the special scene use requirement is realized, and the use experience of a user is improved.
An embodiment of the present invention further provides another NFC triggering method, which is applied to an NFC tag, and as shown in fig. 2, the method includes:
step 201: when the NFC equipment is induced, judging whether the NFC equipment belongs to forbidden equipment or not; the NFC tag prohibits sending instructions to the prohibiting device;
step 202: when the NFC equipment does not belong to forbidden equipment, sending an instruction to the NFC equipment so that the NFC equipment receives and executes the instruction;
step 203: and when the NFC equipment belongs to a forbidden device, forbidding sending of an instruction to the NFC equipment.
In particular, Near Field Communication (NFC) is a fast short-distance high-frequency wireless Communication technology that operates at a frequency of 13.56MHz (megahertz), has a Communication connection establishment time of less than 1 second, and has a Communication distance generally limited to 10 centimeters.
The NFC label comprises an NFC coil and an NFC chip and can be communicated with the NFC induction equipment. The NFC coil is a coil which is formed by surrounding an NFC antenna into a circle or an ellipse or any other shape and is used for capturing electric energy from an electromagnetic field and carrying out transceiving communication with smaller data volume by demodulating or modulating the electromagnetic field. And the NFC chip is used for storing the chip of the circuit module of the information. The NFC sensing device may be an NFC reader, or may also be an electronic device supporting NFC communication, such as a mobile phone supporting NFC communication. When NFC equipment induction equipment is close to the NFC label, NFC induction equipment sends electromagnetic energy to the NFC label, and the NFC coil on the NFC label couples this electromagnetic energy and passes it to the NFC chip that links to each other with the NFC coil in, and the NFC chip passes through rectifier circuit and turns into the required power of circuits such as its inside microcontroller, modem and memory with this electromagnetic energy. When the circuits such as the microcontroller, the modem, and the memory start to operate after power-on, information stored in the NFC chip can be transmitted to the NFC inductive device through the NFC coil.
For example, the NFC tag may communicate with a portable communication device such as a mobile phone with an NFC function, so as to change an operating state of the device or open related software and settings. The NFC label is stored with data written in advance by a mobile phone (with an NFC function), when the mobile phone with the NFC function is close to the NFC label, the mobile phone senses the NFC label and effectively recognizes the NFC label, the working state of the mobile phone can be converted through mobile phone software, if navigation is automatically opened, the mobile phone automatically enters a meeting mode, automatically connects an appointed Wifi hotspot, automatically listens to music, automatically closes a Wifi signal, enters a flight mode and the like.
In practical application, when the NFC equipment belongs to forbidden equipment, the NFC tag forbids sending instructions to the NFC equipment.
Further, in an embodiment, the determining whether the NFC device belongs to a prohibited device includes:
acquiring identification information of the NFC equipment;
judging whether the identification information is stored in an identification information set of the forbidden device or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden device, judging that the NFC device corresponding to the identification information belongs to the forbidden device.
Here, the identification information may be an ID of the NFC device, which is used to distinguish the NFC device from other NFC devices. Generally, one NFC device is correspondingly provided with one ID.
Further, in an embodiment, before the NFC device is sensed, the method further includes:
when the data writing operation on the designated NFC label is completed, acquiring the identification information of the NFC equipment in which the data writing operation is performed;
storing the identification information in a set of identification information of the forbidden device.
According to the NFC triggering method provided by the embodiment of the invention, when the NFC equipment is induced, whether the NFC equipment belongs to forbidden equipment is judged; the NFC tag is prohibited from sending instructions to the prohibition device; when the NFC equipment does not belong to forbidden equipment, sending an instruction to the NFC equipment so that the NFC equipment receives and executes the instruction; and when the NFC equipment belongs to a forbidden device, forbidding sending of an instruction to the NFC equipment. By adopting the scheme provided by the invention, the NFC equipment which does not belong to the forbidden equipment can be sent with the instruction after the forbidden equipment is set, and the targeted reading triggered by the NFC equipment is realized, so that the special scene use requirement is realized, and the use experience of a user is improved.
The present invention will be described in further detail with reference to the following application examples.
For some scenes with strict requirements on reading devices, reading confusion is caused because reading devices cannot be distinguished, and the embodiment of the application provides an NFC triggering method.
Specifically, the method may be the first manner as follows:
after the NFC device writes a special instruction (only an instruction triggered on a non-writing device) into the NFC tag, the ID of the NFC tag is stored in the NFC device, and the ID is set as the tag from which the instruction is forbidden to be read.
When any NFC label enters the induction range of the NFC equipment, acquiring the ID of the NFC label, and judging whether the NFC label is a label from which an instruction is forbidden to be read; if so, not reading the instruction in the NFC label; and if not, reading the instruction in the NFC label.
Here, an example will be explained. The mobile phone a writes 1 "generate guest code" instruction in a certain NFC tag, the ID of the certain NFC tag is "409 xx 6", and the mobile phone a sets "409 xx 6" as a tag from which instruction reading is prohibited. When an NFC tag enters the sensing range of the mobile phone a, the mobile phone a first obtains the ID of the NFC tag, determines whether the ID is "409 xx 6", and if the determination result is "yes", does not read the instruction in the tag. When the tag with the ID of "409 xx 6" enters the sensing range of the mobile phone B, the mobile phone B can directly read the instruction in the tag to generate a visitor code in the mobile phone B.
In addition, the above functions can also be realized on the NFC tag side. When any NFC equipment enters the induction range of the NFC label, the ID of the NFC equipment is acquired, and whether the NFC equipment is a label (such as a visitor code) which prohibits sending instructions or not is judged; if so, not sending the instruction in the NFC label; and if not, sending an instruction in the NFC label.
In addition, the method may be a second method:
referring to fig. 3, when an NFC tag is sensed, information in the NFC tag is acquired, including a tag ID and an instruction combination; searching writing information of the history writing operation on the NFC label, wherein the writing information comprises: NFC tag information; the write operation may be a set, which includes writing to a plurality of NFC tags, and whether there is write information of the same ID is searched from a set of historical write information; if yes, not triggering. If the same ID does not exist, the instruction combination is triggered directly.
According to the embodiment, the instruction in the NFC label can be triggered only by the non-set equipment, the use requirements under certain special scenes are met, and the use experience of a user is improved.
In order to implement the method according to the embodiment of the present invention, an embodiment of the present invention further provides an NFC trigger device, and as shown in fig. 4, an NFC trigger device 400 includes: a judging module 401 and an executing module 402; wherein the content of the first and second substances,
the determining module 401 is configured to, when an NFC tag is sensed, determine whether the NFC tag belongs to a prohibited tag; the NFC device prohibits reading instructions from the prohibited tag;
an executing module 402, configured to read and execute an instruction from the NFC tag when the NFC tag does not belong to a prohibited tag; and when the NFC tag belongs to a forbidden tag, forbidding to read the instruction from the NFC tag.
In an embodiment, the determining module 401 is further configured to:
acquiring identification information of the NFC tag;
judging whether the identification information is stored in the identification information set of the forbidden tag or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden tag, judging that the NFC tag corresponding to the identification information belongs to the forbidden tag.
In an embodiment, the determining module 401 is further configured to:
when the data writing operation on the designated NFC label is finished, acquiring the identification information of the designated NFC label;
and storing the identification information of the designated NFC label in the identification information set of the forbidden label.
In practical applications, the determining module 401 and the executing module 402 may be implemented by a processor in the NFC trigger device.
In order to implement the method according to the embodiment of the present invention, an embodiment of the present invention further provides an NFC trigger device, and as shown in fig. 5, an NFC trigger device 500 includes: a judging module 501 and an executing module 502; wherein the content of the first and second substances,
the determining module 501 is configured to, when an NFC device is sensed, determine whether the NFC device belongs to a prohibited device; the NFC tag prohibits sending instructions to the prohibiting device;
an executing module 502, configured to send an instruction to the NFC device when the NFC device does not belong to a prohibited device, so that the NFC device receives and executes the instruction; and when the near field communication equipment belongs to a prohibition equipment, prohibiting sending an instruction to the near field communication equipment.
In an embodiment, the determining module 501 is further configured to:
acquiring identification information of the NFC equipment;
judging whether the identification information is stored in an identification information set of the forbidden device or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden device, determining that the NFC device corresponding to the identification information belongs to the forbidden device.
In an embodiment, the determining module 501 is further configured to:
after the data writing operation on the appointed near field communication tag is completed, acquiring the identification information of the appointed NFC equipment of the data writing operation;
storing the identification information of the designated NFC device in the identification information set of the forbidden device.
In practical applications, the determining module 501 and the executing module 502 may be implemented by a processor in the NFC trigger device.
It should be noted that: the above-mentioned apparatus provided in the above-mentioned embodiment is only exemplified by the division of the above-mentioned program modules when executing, and in practical application, the above-mentioned processing may be distributed to be completed by different program modules according to needs, that is, the internal structure of the terminal is divided into different program modules to complete all or part of the above-mentioned processing. In addition, the apparatus provided by the above embodiment and the method embodiment belong to the same concept, and the specific implementation process thereof is described in the method embodiment and is not described herein again.
Based on the hardware implementation of the program module, in order to implement the method according to the embodiment of the present invention, an electronic device (computer device) is also provided in the embodiment of the present invention. Specifically, in one embodiment, the computer device may be a terminal, and its internal structure diagram may be as shown in fig. 6. The computer apparatus includes a processor a01, a network interface a02, a display screen a04, an input device a05, and a memory (not shown in the figure) connected through a system bus. Wherein processor a01 of the computer device is used to provide computing and control capabilities. The memory of the computer device comprises an internal memory a03 and a non-volatile storage medium a 06. The nonvolatile storage medium a06 stores an operating system B01 and a computer program B02. The internal memory a03 provides an environment for the operation of the operating system B01 and the computer program B02 in the nonvolatile storage medium a 06. The network interface a02 of the computer device is used for communication with an external terminal through a network connection. The computer program is executed by the processor a01 to implement the method of any of the above embodiments. The display screen a04 of the computer device may be a liquid crystal display screen or an electronic ink display screen, and the input device a05 of the computer device may be a touch layer covered on the display screen, a button, a trackball or a touch pad arranged on a casing of the computer device, or an external keyboard, a touch pad or a mouse.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The device provided by the embodiment of the present invention includes a processor, a memory, and a program stored in the memory and capable of running on the processor, and when the processor executes the program, the method according to any one of the embodiments described above is implemented.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
It will be appreciated that the memory of embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), Synchronous Dynamic Random Access Memory (SLDRAM), Direct Memory (DRmb Access), and Random Access Memory (DRAM). The described memory for embodiments of the present invention is intended to comprise, without being limited to, these and any other suitable types of memory.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A near field communication triggering method is applied to a near field communication device, and comprises the following steps:
when a near field communication tag is induced, judging whether the near field communication tag belongs to a forbidden tag or not; the near field communication equipment forbids reading instructions from the forbidden tag;
when the near field communication tag does not belong to a forbidden tag, reading and executing an instruction from the near field communication tag;
and when the near field communication tag belongs to a forbidden tag, forbidding to read the instruction from the near field communication tag.
2. The method of claim 1, wherein the determining whether the near field communication tag belongs to a forbidden tag comprises:
acquiring identification information of the near field communication tag;
judging whether the identification information is stored in the identification information set of the forbidden tag or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden tag, judging that the near field communication tag corresponding to the identification information belongs to the forbidden tag.
3. The method of claim 1, wherein before determining whether the near field communication tag belongs to a forbidden tag, the method further comprises:
when the data writing operation of the appointed near field communication tag is finished, acquiring the identification information of the appointed near field communication tag;
storing the identification information of the designated near field communication tag in the identification information set of the forbidden tag.
4. A near field communication triggering method, applied to a near field communication tag, the method comprising:
when the near field communication equipment is induced, judging whether the near field communication equipment belongs to forbidden equipment or not; the near field communication tag prohibits sending instructions to the prohibiting device;
when the near field communication equipment does not belong to the forbidden equipment, sending an instruction to the near field communication equipment so that the near field communication equipment receives and executes the instruction;
and when the near field communication equipment belongs to a prohibition equipment, prohibiting sending an instruction to the near field communication equipment.
5. The method of claim 4, wherein the determining whether the near field communication device belongs to a disabled device comprises:
acquiring identification information of the near field communication equipment;
judging whether the identification information is stored in an identification information set of the forbidden device or not according to the identification information;
and when the identification information is stored in the identification information set of the forbidden device, determining that the near field communication device corresponding to the identification information belongs to the forbidden device.
6. The method of claim 5, wherein prior to sensing the near field communication device, the method further comprises:
when the data writing operation of the appointed near field communication tag is finished, acquiring the identification information of the appointed near field communication equipment of the data writing operation;
storing the identification information of the designated near field communication device in the set of identification information of the forbidden device.
7. A near field communication trigger device, the near field communication trigger device comprising:
the judging module is used for judging whether the near field communication tag belongs to a forbidden tag or not when the near field communication tag is induced; the near field communication equipment forbids reading instructions from the forbidden tag;
the execution module is used for reading and executing instructions from the near field communication tag when the near field communication tag does not belong to a forbidden tag; and when the near field communication tag belongs to a forbidden tag, forbidding to read the instruction from the near field communication tag.
8. A near field communication trigger device, the near field communication trigger device comprising:
the judging module is used for judging whether the near field communication equipment belongs to forbidden equipment or not when the near field communication equipment is induced; the near field communication tag is inhibited from sending instructions to the inhibiting device;
the execution module is used for sending an instruction to the near field communication equipment when the near field communication equipment does not belong to the forbidden equipment, so that the near field communication equipment receives and executes the instruction; and when the near field communication equipment belongs to a prohibition equipment, prohibiting sending an instruction to the near field communication equipment.
9. An electronic device, comprising: a processor and a memory for storing a computer program capable of running on the processor; wherein the content of the first and second substances,
the processor is adapted to perform the steps of the method of any one of claims 1 to 6 when running the computer program.
10. A storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the steps of the method of any one of claims 1 to 6.
CN202111058856.0A 2021-09-09 2021-09-09 Near field communication triggering method and device, electronic equipment and storage medium Pending CN113780022A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111058856.0A CN113780022A (en) 2021-09-09 2021-09-09 Near field communication triggering method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111058856.0A CN113780022A (en) 2021-09-09 2021-09-09 Near field communication triggering method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113780022A true CN113780022A (en) 2021-12-10

Family

ID=78842167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111058856.0A Pending CN113780022A (en) 2021-09-09 2021-09-09 Near field communication triggering method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113780022A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544457A (en) * 2013-09-30 2014-01-29 小米科技有限责任公司 Method and device for identification of near field communication labels and mobile terminal
CN104318286A (en) * 2014-10-31 2015-01-28 东莞宇龙通信科技有限公司 NFC label data management method and system and terminal
CN107590519A (en) * 2017-08-04 2018-01-16 咪咕视讯科技有限公司 A kind of player method of multimedia file, device and computer-readable recording medium
CN112686358A (en) * 2020-12-09 2021-04-20 Oppo(重庆)智能科技有限公司 Data transmission method, NFC electronic tag, terminal device and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544457A (en) * 2013-09-30 2014-01-29 小米科技有限责任公司 Method and device for identification of near field communication labels and mobile terminal
CN104318286A (en) * 2014-10-31 2015-01-28 东莞宇龙通信科技有限公司 NFC label data management method and system and terminal
CN107590519A (en) * 2017-08-04 2018-01-16 咪咕视讯科技有限公司 A kind of player method of multimedia file, device and computer-readable recording medium
CN112686358A (en) * 2020-12-09 2021-04-20 Oppo(重庆)智能科技有限公司 Data transmission method, NFC electronic tag, terminal device and storage medium

Similar Documents

Publication Publication Date Title
EP2389023A1 (en) Telecommunications chip card and NFC-enabled mobile telephone device
EP3435221B1 (en) Apparatus and method for controlling running of multiple pieces of security application software
US9064247B2 (en) User-configurable activation of card applets
EP2696309B1 (en) Universal access device
US20120295588A1 (en) Mobile device and nfc service protection method of the mobile device
CN105026896A (en) Sensor hierarchy
JP6858256B2 (en) Payment application separation methods and devices, as well as terminals
CN106062763A (en) Method and apparatus for displaying application and picture, and electronic device
EP3273706B1 (en) Configuration of near field communication (nfc) settings in a mobile device
JP2018088288A (en) Information processing apparatus, information processing method, and program
KR102071530B1 (en) Apparatas and method for proposing a response manual of occurring denial in an electronic device
CN112558843A (en) Theme switching method and device, main body of wearable equipment and wearing assembly
CN103686603A (en) Method and system for searching for electronic device
US9503159B2 (en) Storing and retrieving electronic device information
CN104252388B (en) Untrusted environment in mobile device and the switching between trusted context
CN111352862A (en) Key destroying method, system, password card and password machine
JP2015023450A (en) Method and electronic apparatus for short distance radio communication
CN104091188A (en) Wearable equipment and smart card system
US9477917B1 (en) System and method of context specific identity in a radio frequency identity (RFID) chip
CN113780022A (en) Near field communication triggering method and device, electronic equipment and storage medium
CN110750162B (en) Input method and device
CN113780017B (en) Near field communication triggering method, device, electronic equipment and storage medium
CN113962233B (en) Near field communication triggering method, device, electronic equipment and storage medium
KR101247654B1 (en) Contactless IC chip, portable terminal, information processing method, and program
CN113852962A (en) Network connection control method, device, storage medium and software program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination