CN113946765A - Two-dimensional code processing method and device, storage medium and electronic equipment - Google Patents
Two-dimensional code processing method and device, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN113946765A CN113946765A CN202010682297.XA CN202010682297A CN113946765A CN 113946765 A CN113946765 A CN 113946765A CN 202010682297 A CN202010682297 A CN 202010682297A CN 113946765 A CN113946765 A CN 113946765A
- Authority
- CN
- China
- Prior art keywords
- application
- identifier
- dimensional code
- service scene
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Medical Informatics (AREA)
- Data Mining & Analysis (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a two-dimensional code processing method and device, a storage medium and electronic equipment. Wherein, the method comprises the following steps: the method comprises the steps of acquiring first two-dimensional code information sent by a first application, wherein the first two-dimensional code information records a first service scene identifier used for representing a first service scene corresponding to a target two-dimensional code scanned by the first application, sending the first two-dimensional code information to second application background equipment based on a callback address of the second application background equipment corresponding to a second application identifier, and returning response data sent by the second application background equipment to the first application. The invention solves the technical problems of non-intercommunication of data and poor user experience among different application programs.
Description
Technical Field
The invention relates to the field of computers, in particular to a two-dimensional code processing method and device, a storage medium and electronic equipment.
Background
In the current related art, when two-dimensional codes are scanned through application programs in the same scene, if a user is in different regions or scans the two-dimensional codes by using different application programs, the same two-dimensional code is difficult to be analyzed, the two-dimensional codes generated by different application programs are difficult to identify with each other, so that the user needs to repeatedly register different application programs when the user is in different regions or different scenes, and the privacy safety of personal information and data of the user is low, and the user is inconvenient to use.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a two-dimensional code processing method and device, a storage medium and electronic equipment, and aims to at least solve the technical problems of data non-intercommunication and poor user experience among different application programs.
According to an aspect of the embodiments of the present invention, there is provided a method for processing a two-dimensional code, including: acquiring first two-dimension code information sent by a first application, wherein the first two-dimension code information comprises: the first service scene identification is used for representing a first service scene corresponding to the first application when the first application scans the target two-dimensional code; acquiring a callback address of second application background equipment corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background equipment according to the callback address; acquiring first response data sent by the second application background device, wherein the first response data is response data of the first user identifier in the first service scenario represented by the first service scenario identifier; sending the first response data to the first application.
Optionally, before the obtaining of the first two-dimensional code information sent by the first application, the method further includes: acquiring an application registration request sent by an access party, wherein the application registration request carries a callback address of the second application background device, and the access party is the second application background device or a second application corresponding to the second application background device; responding to the application registration request, distributing the second application identifier for the access party, and recording a callback address of the second application background equipment carried in the application registration request; and sending the second application identification to the access party.
Optionally, after sending the second application identifier to the access party, the method further includes: configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; and generating the target two-dimensional code on the second application background equipment according to the first user identification and the second application identification.
Optionally, after sending the second application identifier to the access party, the method further includes: configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; sending the second application identifier to the second application on the second application background device, and generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier; or sending the second application identifier to the second application on the second application background device under the condition that the access party is the second application background device, generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers include the first service scene identifier.
Optionally, after sending the second application identifier to the access party, the method further includes: configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; and generating the target two-dimensional code on the second application according to the first user identification and the second application identification.
Optionally, after sending the second application identifier to the access party, the method further includes: configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; sending the second application identifier to the second application background equipment on the second application, and generating the target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier; or sending the second application identifier to the second application background device on the second application under the condition that the access party is the second application, generating the target two-dimensional code on the second application background device according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application background device, wherein the one or more service scene identifiers include the first service scene identifier.
Optionally, after acquiring the application registration request sent by the access party, the method further includes: distributing a target encryption key and a target decryption key for the access party; and sending the target encryption key and the target decryption key to the access party.
Optionally, before the obtaining of the first two-dimensional code information sent by the first application, the method further includes: scanning the target two-dimensional code on the first application to obtain a first user identifier and a second application identifier, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene; acquiring the first service scene identification of the first service scene on the first application; and determining the first two-dimension code information as comprising the first user identifier, the second application identifier and the first service scene identifier on the first application.
Optionally, the method further comprises: acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises: a first user identifier, a second application identifier, and a second service scene identifier, where the first user identifier and the second application identifier are identifiers obtained by scanning the target two-dimensional code by the third application, and the second service scene identifier is used to represent a second service scene corresponding to the target two-dimensional code scanned by the third application; acquiring the callback address of the second application background equipment corresponding to the second application identifier, and sending the first user identifier and the second service scene identifier to the second application background equipment according to the callback address; second response data sent by the second application background device is obtained, wherein the second response data is response data of the first user identifier in the second service scenario represented by the second service scenario identifier; sending the second response data to the third application.
According to another aspect of the embodiments of the present invention, there is also provided a processing apparatus for a two-dimensional code, including: the first obtaining module is configured to obtain first two-dimensional code information sent by a first application, where the first two-dimensional code information includes: the first service scene identification is used for representing a first service scene corresponding to the first application when the first application scans the target two-dimensional code; the processing module is used for acquiring a callback address of second application background equipment corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background equipment according to the callback address; a second obtaining module, configured to obtain first response data sent by the second application background device, where the first response data is response data of the first user identifier in the first service scenario represented by the first service scenario identifier; a sending module, configured to send the first response data to the first application.
Optionally, the apparatus is further configured to: before the first two-dimension code information sent by the first application is obtained, an application registration request sent by an access party is obtained, wherein the application registration request carries a callback address of the second application background equipment, and the access party is the second application background equipment or a second application corresponding to the second application background equipment; responding to the application registration request, distributing the second application identifier for the access party, and recording a callback address of the second application background equipment carried in the application registration request; and sending the second application identification to the access party.
Optionally, the apparatus is further configured to: configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; and sending the second application identifier to the second application on the second application background equipment, and generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier.
Optionally, the apparatus is further configured to: after the second application identifier is sent to the access party, configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; generating the target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier; or sending the second application identifier to the second application on the second application background device under the condition that the access party is the second application background device, generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers include the first service scene identifier.
Optionally, the apparatus is further configured to: after the second application identifier is sent to the access party, configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier; or configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; sending the second application identifier to the second application background equipment on the second application, and generating the target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier; or sending the second application identifier to the second application background device on the second application under the condition that the access party is the second application, generating the target two-dimensional code on the second application background device according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application background device, wherein the one or more service scene identifiers include the first service scene identifier.
Optionally, the apparatus is further configured to: after the application registration request sent by the access party is obtained, distributing a target encryption key and a target decryption key for the access party; and sending the target encryption key and the target decryption key to the access party.
Optionally, the apparatus is further configured to: before the first two-dimension code information sent by the first application is obtained, scanning the target two-dimension code on the first application to obtain the first user identification and the second application identification, wherein when the target two-dimension code is scanned on the first application, a service scene where the first application is located is a first service scene; acquiring the first service scene identification of the first service scene on the first application; and determining the first two-dimension code information as comprising the first user identifier, the second application identifier and the first service scene identifier on the first application.
Optionally, the apparatus is further configured to: acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises: a first user identifier, a second application identifier, and a second service scene identifier, where the first user identifier and the second application identifier are identifiers obtained by scanning the target two-dimensional code by the third application, and the second service scene identifier is used to represent a second service scene corresponding to the target two-dimensional code scanned by the third application; acquiring the callback address of the second application background equipment corresponding to the second application identifier, and sending the first user identifier and the second service scene identifier to the second application background equipment according to the callback address; second response data sent by the second application background device is obtained, wherein the second response data is response data of the first user identifier in the second service scenario represented by the second service scenario identifier; sending the second response data to the third application.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the processing method of the two-dimensional code when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the processing method of the two-dimensional code through the computer program.
In the embodiment of the invention, the method comprises the steps of acquiring first two-dimensional code information sent by a first application, wherein the first two-dimensional code information records a first service scene identifier for representing a first service scene corresponding to a target two-dimensional code scanned by the first application, sending the first two-dimensional code information to a second application background device based on a callback address of the second application background device corresponding to the second application identifier, and returning response data sent by the second application background device to the first application, and realizing interconnection and intercommunication among different application program data by configuring the corresponding service scene identifiers, so that the purpose that different application programs can mutually identify two-dimensional codes of opposite sides to provide corresponding services is achieved, the privacy security of personal information and data of a user is improved, the technical effect of user use experience is optimized, and further the problem of data intercommunication among different application programs is solved, the user experience is poor.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a schematic diagram of an application environment of an alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of another alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of another alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 6 is a schematic flowchart of another alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 7 is a schematic flowchart of another alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 8 is a schematic flowchart of another alternative two-dimensional code processing method according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of an alternative two-dimensional code processing apparatus according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an alternative electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, partial nouns or terms appearing in the description of the embodiments of the present application are applicable to the following explanations:
service template ID (identity): each service template ID represents a service scenario and a request and response parameter format agreed upon by the service scenario.
The invention is illustrated below with reference to examples:
according to an aspect of the embodiment of the present invention, a two-dimensional code processing method is provided, and optionally, in this embodiment, the two-dimensional code processing method may be applied to a hardware environment formed by a server 101 and a user terminal 103 as shown in fig. 1. As shown in fig. 1, a server 101 is connected to a terminal 103 through a network, and may be configured to provide a service to a user terminal or a client installed on the user terminal, where the client may be a video client, an instant messaging client, a browser client, an education client, or the like. The database 105 may be provided on or separate from the server for providing data storage services for the server 101, and the network may include, but is not limited to: a wired network, a wireless network, wherein the wired network comprises: a local area network, a metropolitan area network, and a wide area network, the wireless network comprising: bluetooth, WIFI, and other wireless communication enabled networks, the user terminal 103 may be a target client configured terminal, and may include but is not limited to at least one of the following: computer Devices such as Mobile phones (e.g., Android phone, iOS phone, etc.), notebook computers, tablet computers, palm computers, MID (Mobile Internet Devices), PAD, desktop computers, smart televisions, etc., the server can be a single server, or a server cluster composed of a plurality of servers, or a cloud server, which may include, but is not limited to, a router or a gateway, the processing application 107 of the two-dimensional code is displayed through the user terminal 103, a target two-dimensional code generated or displayed by the second application 109 for two-dimensional code processing may be scanned through an entrance of the first application 107 for two-dimensional code processing configured on the terminal, a processing service that has used the above two-dimensional code, the first application 107 and the second application 109 are both connected to the server 101 through a network, which is only an example and is not limited in this embodiment.
Optionally, as an optional implementation manner, taking application of the processing service of the two-dimensional code to a server as an example, as shown in fig. 2, the processing method of the two-dimensional code includes:
s202, first two-dimension code information sent by a first application is obtained, wherein the first two-dimension code information comprises: the system comprises a first user identifier, a second application identifier and a first service scene identifier, wherein the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by a first application, and the first service scene identifier is used for representing a first service scene corresponding to the target two-dimensional code scanned by the first application;
optionally, in this embodiment, the two-dimensional code may be generated by the first application or the second application, and the two-dimensional code is generated by the second application, which is further described in this embodiment.
It should be noted that the first two-dimensional code information may include, but is not limited to, first two-dimensional code information generated after the first application 107 scans a two-dimensional code, when the two-dimensional code scanned by the first application 107 is generated by the second application 109 corresponding to the second application identifier, the first application 107 scans the two-dimensional code generated by the second application 109 in a corresponding first service scenario to generate first two-dimensional code information recorded with the first user identifier, the second application identifier and a first service scenario identifier, the first user identifier is used to indicate a user registered in the first application 107 and the second application 109 in advance, and may be recorded in the two-dimensional code generated by the second application 109 or generated after the two-dimensional code is scanned by the first application 107, and after the server 101 acquires the first two-dimensional code information, the server may determine the second application based on the second application identifier in the first two-dimensional code information, and the first user identification determines the user identification corresponding to the data which needs to be acquired from the second application background equipment, and acquires the data corresponding to the first user identification in the second application background equipment according to the first service scene, wherein the type of the data is determined by the first service scene.
Optionally, in this embodiment, the first application may include, but is not limited to, an application program, app (application), an applet, and the like, fig. 3 is a schematic diagram of an optional two-dimensional code processing method according to an embodiment of the present invention, the first two-dimensional code information may include, but is not limited to, as shown in fig. 3, where a second application identifier in the first two-dimensional code information is a preset character string "appid" in fig. 3, a first service scene identifier is a preset character string corresponding to "time" in fig. 3, a first user identifier is a preset character string corresponding to "user ID" in fig. 3, and the first two-dimensional code information may further include, but is not limited to, a timestamp identifier for indicating an effective period of the target two-dimensional code, for example, the preset character string corresponding to "expire" in fig. 3 is a portion for indicating an effective period of the two-dimensional code.
Optionally, in this embodiment, the first service scenario may include, but is not limited to, a first service scenario in a plurality of service scenarios that require to call the same type of data, for example, a different-place use of a bus card, where a bus scenario corresponding to a city where the first application is located is a first service scenario, where the first application and the second application correspond to bus taking services using different cities, respectively, after the user completes bus information registration and recharging in the second application, the user uses a two-dimensional code generated by the second application and scans through a scanning area of the first application, and then the server scans the two-dimensional code according to the first application to generate first two-dimensional code information, acquires relevant data corresponding to the bus scenario from a database corresponding to the second application, and feeds the relevant data back to the first application for subsequent processing by the first application, where the relevant data may include, but is not limited to, a name, and a name corresponding to the first application, and a second application corresponding to the second application, and a second application, where the second application is a second application, and a second application is used to generate a second application, where the second application, and a second application, where the second application is used to generate a second application, where the second application is used for generating a second service corresponding to generate a second service, where the second service corresponding to generate a second service, where the second service corresponding to generate a second service, where a second service corresponding to generate a second service, where a second service corresponding to generate a second service corresponding to a second service of a second service corresponding to a second service, where a second service corresponding to a second service, where a second service of a second, Age, balance, etc.
Optionally, in this embodiment, the first service scenario may further include, but is not limited to, a first service scenario in a plurality of service scenarios that need to record the same type of data in advance, for example, bus taking and shopping payment, and both the service scenarios need to record financial information of the user.
The first service scenario may also include, but is not limited to, that the content of the database may be shared, but the purpose of service processing may be the same or different service scenarios, for example, all service scenarios that can be processed by the same user, such as shopping, transportation, entrance guard, hospitalization, virtual account login, dining, ticket purchase, financial service, social service, and the like, which are just examples, and the specific service scenario category may include, but is not limited to, one or more combinations of the foregoing, which is not limited in this disclosure.
S204, obtaining a callback address of the second application background equipment corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background equipment according to the callback address;
optionally, in this embodiment, the second application may be, but is not limited to be, consistent with a service scenario of the first application, and may also include, but is not limited to be, associated with the service scenario of the first application, or data corresponding to the target two-dimensional code, which is required by the first application, is stored in a background device of the second application.
Optionally, in this embodiment, the callback address is a callback address allocated by a gateway or routed to the first application and the second application when the first application and the second application are registered in the gateway,
s206, first response data sent by the second application background equipment is obtained, wherein the first response data is response data of the first user identifier under the first service scene represented by the first service scene identifier;
optionally, in this embodiment, the first response data is a data packet generated by the second application background device according to a first service scene identifier and a first user identifier recorded in the first two-dimensional code information, the first service scene identifier corresponds to response data corresponding to the first service scene identifier through a preset rule, the preset rule is pre-configured in the server, and before the first response data sent by the second application background device is acquired, the preset rule is sent to the second application background device, so that the second application background device can generate corresponding response data according to the first service scene identifier.
S208, first response data is sent to the first application.
Optionally, in this embodiment, taking "zhang san" of the user as an example, the user "zhang san" wants to go to a supermarket for shopping: zhang III needs to take a bus to go to a supermarket, a small program is opened at the moment to display a two-dimensional code (equivalent to a target two-dimensional code) of the Zhang III, the two-dimensional code of the bus is subjected to card swiping payment, the body temperature is required to be measured after Zhang III arrives at the door of the supermarket, the health state is checked, the same two-dimensional code is displayed at the moment, an inspector can check the health state of Zhang III after scanning the code by using own inspection equipment, wherein the inspector can send two-dimensional code information displayed by Zhang III and a first service scene identifier corresponding to the inspection equipment to a server after scanning the code, the server executes subsequent logic processing according to the acquired two-dimensional code information and the first service scene identifier corresponding to the health detection and according to the service logic which is configured in advance and corresponds to the first service scene identifier, and the specific method can include but is not limited to acquiring the health information corresponding to Zhang III and the like, after the Zusanzi shopping is completed, the two-dimensional code is highlighted again for settlement, a cashier scans the same two-dimensional code for deduction, the cashier can send the two-dimensional code information displayed by the Zusanzi and a first service scene identifier corresponding to the code scanning equipment to the server after scanning the code, and the server executes subsequent logic processing again according to the acquired two-dimensional code information and the first service scene identifier corresponding to payment and preset service logic corresponding to the first service scene identifier.
By the embodiment, the first two-dimensional code information sent by the first application is acquired, wherein the first two-dimensional code information records a first service scene identifier for representing a first service scene corresponding to the first application when the first application scans the target two-dimensional code, the first two-dimensional code information is sent to the second application background equipment based on the callback address of the second application background equipment corresponding to the second application identifier, and the response data sent by the second application background equipment is returned to the first application, and the interconnection and intercommunication among different application program data are realized by configuring the corresponding service scene identifiers, so that the two-dimensional codes of different application programs which can mutually identify each other are realized to provide corresponding services, thereby realizing the purpose of improving the privacy security of personal information and data of a user, optimizing the technical effect of user experience, and further solving the problem of data intercommunication among different application programs, the user experience is poor.
In an optional embodiment, fig. 4 is a schematic flowchart of an optional two-dimensional code processing method according to an embodiment of the present invention, where before obtaining first two-dimensional code information sent by a first application, the method further includes:
s402, acquiring an application registration request sent by an access party, wherein the application registration request carries a callback address of second application background equipment, and the access party is the second application background equipment or a second application corresponding to the second application background equipment;
s404, responding to the application registration request, distributing a second application identifier for the access party, and recording a callback address of the second application background equipment carried in the application registration request;
s406, the second application identification is sent to the access party.
Optionally, in this embodiment, the access party may include, but is not limited to, a first application and a second application, may include, but is not limited to, the target two-dimensional code generator, the target two-dimensional code parsing processor, and may also include an application program or a background device of the application program, where the application program or the background device is used to generate the target two-dimensional code and parse the target two-dimensional code, which is only an example, and the present invention is not limited to this.
It should be noted that, the first application and the second application both need to complete the registration process at the server, and then receive the application identifiers allocated by the server to the first application and the second application according to the application registration request, so as to facilitate subsequent two-dimensional code processing.
According to the embodiment, the access party is registered to the server, so that the server issues the application identifier for the access party, and the callback address corresponding to the access party is acquired, so that different access parties can perform interconnection and intercommunication of data through the server, the technical effect of optimizing the user experience is achieved, and the technical problems of data non-intercommunication and poor user experience among different application programs are solved.
In an optional embodiment, fig. 5 is a schematic flowchart of an optional two-dimensional code processing method according to an embodiment of the present invention, and as shown in fig. 5, after sending the second application identifier to the access party, the method further includes:
s502, under the condition that the access party is a second application background device, configuring one or more service scene identifiers on the second application background device, wherein the one or more service scene identifiers comprise a first service scene identifier; generating a target two-dimensional code on second application background equipment according to the first user identifier and the second application identifier; or
S504, under the condition that the access party is a second application background device, configuring one or more service scene identifiers on the second application background device, wherein the one or more service scene identifiers comprise a first service scene identifier; sending the second application identifier to a second application on second application background equipment, and generating a target two-dimensional code on the second application according to the first user identifier and the second application identifier; or
S506, under the condition that the access party is a second application background device, sending a second application identifier to a second application on the second application background device, generating a target two-dimensional code on the second application according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers comprise the first service scene identifier.
Optionally, in this embodiment, the execution sequence of the steps S502, S504 and S506 is alternative execution.
Optionally, in this embodiment, the target two-dimensional code may be generated by a second application background device or a second application, and the method may further include, but is not limited to, generating a service scene identifier by the second application background device, and then sending the service scene identifier to the second application, so as to implement that the target two-dimensional code carries the service scene identifier.
Optionally, in this embodiment, the method may further include, but is not limited to, allocating, by the server, a corresponding service scene identifier for the second application background device, or allocating, by another application or another application background device, a corresponding service scene identifier for the second application background device.
Through the embodiment, under the condition that the access party is the second application background device, configuring the service scene identifier for the second application background device can enable the generated target two-dimensional code to record the service scene information corresponding to the background device generating the two-dimensional code, and further can realize acquiring the corresponding service execution logic according to the preset service scene identifier, and further execute the corresponding service, so that data required by service execution can be acquired through the target two-dimensional code between a plurality of applications and the application background device, data interconnection and intercommunication between the plurality of applications are completed, and further the technical problems of data non-intercommunication and poor user experience among different application programs are solved.
In an optional embodiment, fig. 6 is a schematic flowchart of an optional two-dimensional code processing method according to an embodiment of the present invention, and as shown in fig. 6, after sending the second application identifier to the access party, the method further includes:
s602, under the condition that the access party is a second application, configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers comprise a first service scene identifier; generating a target two-dimensional code on a second application according to the first user identifier and the second application identifier; or
S604, under the condition that the access party is a second application, configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers comprise a first service scene identifier; sending a second application identifier to second application background equipment on a second application, and generating a target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier; or
And S606, under the condition that the access party is the second application, sending the second application identifier to the second application background equipment on the second application, generating a target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application background equipment, wherein the one or more service scene identifiers comprise the first service scene identifier.
Optionally, in this embodiment, the target two-dimensional code may be generated by a second application background device or a second application, and the method may further include, but is not limited to, generating a service scene identifier by the second application background device, and then sending the service scene identifier to the second application, so as to implement that the target two-dimensional code carries the service scene identifier.
Optionally, in this embodiment, the method may further include, but is not limited to, allocating, by the server, a corresponding service scene identifier for the second application, or allocating, by another application or another application background device, a corresponding service scene identifier for the second application.
Through the embodiment, under the condition that the access party is the second application, configuring the service scene identifier for the second application can enable the generated target two-dimensional code to record the service scene information corresponding to the application generating the two-dimensional code, so that the corresponding service execution logic can be obtained according to the preset service scene identifier, and the corresponding service can be executed, so that data required by service execution can be obtained through the target two-dimensional code between a plurality of applications and application background equipment, data interconnection and intercommunication among the plurality of applications are completed, and the technical problems of data non-intercommunication and poor user experience among different application programs are solved.
In an optional embodiment, after acquiring the application registration request sent by the access party, the method further includes: distributing a target encryption key and a target decryption key for an access party; the target encryption key and the target decryption key are sent to the access party.
Optionally, in this embodiment, the target encryption key and the target decryption key may be preconfigured by the server for the access party, the server may return the target encryption key and the target decryption key to the access party after the access party sends the registration request message to the server, the server may be preconfigured with an algorithm that generates the target encryption key and the target decryption key according to the application identifier, and the access party itself may generate the target encryption key and the target decryption key according to the algorithm.
Optionally, in this embodiment, in a process of data interaction between the first application and the server, the data packet needs to carry the target encryption key and the target decryption key, where the target encryption key and the target decryption key correspond to the application identifier. For example, the first application corresponds to a first target encryption key and a first target decryption key, and the second application corresponds to a second target encryption key and a second target decryption key.
By the embodiment, the safety of the first two-dimensional code information and the first response information in the transmission process is effectively ensured, the technical effect of safe and reliable data transmission when data are interconnected and intercommunicated is achieved,
in an optional embodiment, before obtaining the first two-dimensional code information sent by the first application, the method further includes: scanning a target two-dimensional code on a first application to obtain a first user identifier and a second application identifier, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene; acquiring a first service scene identifier of a first service scene on a first application; the first two-dimensional code information is determined to include a first user identifier, a second application identifier and a first service scenario identifier on the first application.
Optionally, in this embodiment, the target two-dimensional code may be generated by, but not limited to, a second application, so that when the target two-dimensional code is scanned, a second application identifier corresponding to the second application may be obtained, the two-dimensional code information obtained after the target two-dimensional code is scanned is repackaged, and the first two-dimensional code information is obtained by adding the first service scene identifier to the two-dimensional code information obtained after the target two-dimensional code is scanned.
According to the embodiment, based on the second application identifier, the server can forward the first two-dimensional code information to the second application corresponding to the second application identifier, the background equipment of the second application acquires data associated with the user and the service scene based on the first user identifier and the first service scene identifier and returns the data to the server, and the server sends the data to the first application, so that interconnection and intercommunication between the first application and the second application are realized, and the technical effect of optimizing user experience is achieved.
For example, in a case that the first service scenario is a health check, the obtaining, by the background device of the second application, data associated with the user and the service scenario based on the first user identifier and the first service scenario identifier may include, but is not limited to: the term "name", "phone", "gender", "birthday", "certificate type", "identification card", "city zone", "address", "creation time", "health risk rating", etc., are merely examples, and the data associated with the user and the business scenario may include one or more combinations of the above, and the invention is not limited in this respect.
In an optional embodiment, the method further includes: acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises: the first user identifier and the second application identifier are obtained by scanning a target two-dimensional code by a third application, and the second service scene identifier is used for representing a second service scene corresponding to the target two-dimensional code scanned by the third application; acquiring a callback address of second application background equipment corresponding to the second application identifier, and sending the first user identifier and the second service scene identifier to the second application background equipment according to the callback address; acquiring second response data sent by second application background equipment, wherein the second response data is response data of the first user identifier in a second service scene represented by the second service scene identifier; and sending the second response data to the third application.
Optionally, in this embodiment, the third application may include, but is not limited to, an application that is different from the first application and the second application in terms of service scenarios, and may also include, but is not limited to, the same as the first application or the second application, where the second user identifier may be the same as or different from the first user identifier, and where the second user identifier is different from the first user identifier, the second user identifier and the first user identifier correspond to different users, so that an application scenario in which a service is provided for multiple users can be implemented.
Optionally, in this embodiment, before the second two-dimensional code information sent by the third application is obtained for data interworking and interconnection, the third application needs to be registered in a server, so that the third application can be simultaneously intercommunicated and interconnected with the first application and the second application, and the use experience of the user is optimized.
The invention is further illustrated by the following specific examples:
taking the target two-dimensional code as an example of a health code, fig. 7 is a schematic flowchart of an optional two-dimensional code processing method according to an embodiment of the present invention, as shown in fig. 7, the steps of the flowchart are as follows:
s702, registering app information in a routing center (corresponding to a server) by an applet a (corresponding to a first application) and an applet B (corresponding to a second application);
s704, the routing center returns an AppID (equivalent to the first application identification and the second application identification) and appsect (equivalent to the target encryption key and the target decryption key corresponding to the first application and the target encryption key and the target decryption key corresponding to the second application) to the applet a and the applet B.
S706, the applet B requests the two-dimensional code content from the applet B background'
S708, generating a target two-dimensional code by the small program B background, and sending the target two-dimensional code to the small program B;
s710, scanning a target two-dimensional code corresponding to the small program B by the small program A;
s712, the small program A sends a message requesting the two-dimensional code content to the background of the small program A;
s714, the background of the small program A sends a request message to the routing center;
s716, the routing center forwards the request message to the background of the applet B through the pre-configured callback interface;
s718, the background of the applet B generates a processing result according to the request message and returns the processing result to the routing center;
s720, the routing center sends the processing result to the background of the applet A through a pre-configured callback interface;
and S722, the background of the applet A feeds back the processing result to the applet A.
In addition, the routing center can also maintain the appsect key and the corresponding callback interface of the small program A or B. In order to ensure the safety of the interface, the registered applets cannot mutually call the applet interfaces at will, and the calling of the interface to complete the interconnection and intercommunication of data can be finally realized only after the two applets are applied by one party before the calling is needed.
The service template is a set of service scenes agreed by the intercommunicated small programs and a convention rule of unified parameters and return values of the corresponding scenes.
For example, the following steps are carried out: the service template ID is 10001, which represents the service template for obtaining the user identity information, and the request parameter of the service template is
a request parameter of pathtoapid & tplid & 00001;
wherein, toappid: the routing center identifies the target application to be requested to be forwarded through the ID of the finally processed application identifier ID;
tplid: template ID, the service scene corresponding to the request.
Access party request header
A request head:
the above is only an example, and the specific response parameter and the request parameter constitute, and this embodiment is not limited in any way.
In an optional embodiment, fig. 8 is a schematic flowchart of an optional two-dimensional code processing method according to an embodiment of the present invention, and as shown in fig. 8, the steps of the flowchart are as follows:
s802, an administrator creates an application in a routing center for the access party, fills a callback address of the access party when the application is created, and allocates an apid and appexecute to the access party.
S804, after the client (terminal, app or applet) of the access party identifies the two-dimensional code, the template ID needs to be determined according to the current service scene (payment, health check and the like), when a request message is sent to a routing center, the two-dimensional code parameter and the template ID need to be carried, and the routing center uses appid and appcert to sign according to the requirement of the routing center, and then requests the routing center to process the two-dimensional code and return a result;
s806, the access side needs to provide an interface address to the routing center for calling, so as to process the intercommunication two-dimensional code service, the interface needs to use appid and appcert to perform secure signature verification according to the signature requirement of the routing center, and the corresponding service scene is realized through the template ID of the parameter verification.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
According to another aspect of the embodiment of the invention, a two-dimensional code processing device for implementing the two-dimensional code processing method is also provided. As shown in fig. 9, the apparatus includes:
a first obtaining module 902, configured to obtain first two-dimensional code information sent by a first application, where the first two-dimensional code information includes: the system comprises a first user identifier, a second application identifier and a first service scene identifier, wherein the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by a first application, and the first service scene identifier is used for representing a first service scene corresponding to the target two-dimensional code scanned by the first application; the processing module 904 is configured to obtain a callback address of the second application background device corresponding to the second application identifier, and send the first user identifier and the first service scene identifier to the second application background device according to the callback address; a second obtaining module 906, configured to obtain first response data sent by a second application background device, where the first response data is response data of the first user identifier in a first service scenario represented by the first service scenario identifier; a sending module 908 for sending the first response data to the first application.
In an alternative embodiment, the apparatus is further configured to: before acquiring first two-dimension code information sent by a first application, acquiring an application registration request sent by an access party, wherein the application registration request carries a callback address of second application background equipment, and the access party is the second application background equipment or a second application corresponding to the second application background equipment; responding to the application registration request, distributing a second application identifier for the access party, and recording a callback address of second application background equipment carried in the application registration request; and sending the second application identification to the access party.
In an alternative embodiment, the apparatus is further configured to: after sending the second application identifier to the access party, configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; generating a target two-dimensional code on second application background equipment according to the first user identifier and the second application identifier; or under the condition that the access party is a second application background device, configuring one or more service scene identifiers on the second application background device, wherein the one or more service scene identifiers comprise a first service scene identifier; sending the second application identifier to a second application on second application background equipment, and generating a target two-dimensional code on the second application according to the first user identifier and the second application identifier; or under the condition that the access party is a second application background device, sending a second application identifier to a second application on the second application background device, generating a target two-dimensional code on the second application according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application, wherein the one or more service scene identifiers comprise the first service scene identifier.
In an alternative embodiment, the apparatus is further configured to: after sending the second application identifier to the access party, configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; generating a target two-dimensional code on a second application according to the first user identifier and the second application identifier; or configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; sending a second application identifier to second application background equipment on a second application, and generating a target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier; or under the condition that the access party is the second application, sending the second application identifier to the second application background equipment on the second application, generating a target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier, and configuring one or more service scene identifiers on the second application background equipment, wherein the one or more service scene identifiers comprise the first service scene identifier.
In an alternative embodiment, the apparatus is further configured to: after an application registration request sent by an access party is acquired, distributing a target encryption key and a target decryption key for the access party; the target encryption key and the target decryption key are sent to the access party.
In an alternative embodiment, the apparatus is further configured to: scanning a target two-dimensional code on a first application before acquiring first two-dimensional code information sent by the first application to obtain a first user identifier and a second application identifier, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene; acquiring a first service scene identifier of a first service scene on a first application; the first two-dimensional code information is determined to include a first user identifier, a second application identifier and a first service scenario identifier on the first application.
In an alternative embodiment, the apparatus is further configured to: acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises: the first user identifier and the second application identifier are obtained by scanning a target two-dimensional code by a third application, and the second service scene identifier is used for representing a second service scene corresponding to the target two-dimensional code scanned by the third application; acquiring a callback address of second application background equipment corresponding to the second application identifier, and sending the first user identifier and the second service scene identifier to the second application background equipment according to the callback address; acquiring second response data sent by second application background equipment, wherein the second response data is response data of the first user identifier in a second service scene represented by the second service scene identifier; and sending the second response data to the third application.
According to another aspect of the embodiment of the present invention, there is also provided an electronic device for implementing the processing method of the two-dimensional code, where the electronic device may be a terminal device or a server shown in fig. 1. The present embodiment takes the electronic device as a server as an example for explanation. As shown in fig. 10, the electronic device comprises a memory 1002 and a processor 1004, the memory 1002 having stored therein a computer program, the processor 1004 being arranged to execute the steps of any of the method embodiments described above by means of the computer program.
Optionally, in this embodiment, the electronic device may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, first two-dimensional code information sent by the first application is obtained, wherein the first two-dimensional code information comprises: the system comprises a first user identifier, a second application identifier and a first service scene identifier, wherein the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by a first application, and the first service scene identifier is used for representing a first service scene corresponding to the target two-dimensional code scanned by the first application;
s2, obtaining a callback address of the second application background device corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background device according to the callback address;
s3, first response data sent by the second application background device is obtained, wherein the first response data is response data of the first user identifier under the first service scene represented by the first service scene identifier;
s4, the first response data is sent to the first application.
Alternatively, it can be understood by those skilled in the art that the structure shown in fig. 10 is only an illustration, and the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palmtop computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 10 is a diagram illustrating a structure of the electronic device. For example, the electronics may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
The memory 1002 may be used to store software programs and modules, such as program instructions/modules corresponding to the two-dimensional code processing method and apparatus in the embodiment of the present invention, and the processor 1004 executes various functional applications and data processing by running the software programs and modules stored in the memory 1002, that is, implements the two-dimensional code processing method described above. The memory 1002 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 1002 may further include memory located remotely from the processor 1004, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 1002 may be, but not limited to, specifically configured to store information such as user data and data related to an application program. As an example, as shown in fig. 10, the memory 1002 may include, but is not limited to, a first obtaining module 902, a processing module 904, a second obtaining module 906, and a sending module 908 in the processing apparatus that includes the two-dimensional code, and is configured to send the first response data to the first application.
In addition, the two-dimensional code processing apparatus may further include, but is not limited to, other module units in the two-dimensional code processing apparatus, which is not described in detail in this example.
Optionally, the above-mentioned transmission device 1006 is used for receiving or sending data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 1006 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices so as to communicate with the internet or a local area Network. In one example, the transmission device 1006 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In other embodiments, the terminal device or the server may be a node in a distributed system, where the distributed system may be a blockchain system, and the blockchain system may be a distributed system formed by connecting a plurality of nodes through a network communication. Nodes can form a Peer-To-Peer (P2P, Peer To Peer) network, and any type of computing device, such as a server, a terminal, and other electronic devices, can become a node in the blockchain system by joining the Peer-To-Peer network.
According to a further aspect of an embodiment of the invention, there is provided a computer program product or a computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method provided in the various alternative implementations of the processing of the two-dimensional code described above.
Alternatively, in the present embodiment, the above-mentioned computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, first two-dimensional code information sent by the first application is obtained, wherein the first two-dimensional code information comprises: the system comprises a first user identifier, a second application identifier and a first service scene identifier, wherein the first user identifier and the second application identifier are identifiers obtained by scanning a target two-dimensional code by a first application, and the first service scene identifier is used for representing a first service scene corresponding to the target two-dimensional code scanned by the first application;
s2, obtaining a callback address of the second application background device corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background device according to the callback address;
s3, first response data sent by the second application background device is obtained, wherein the first response data is response data of the first user identifier under the first service scene represented by the first service scene identifier;
s4, the first response data is sent to the first application.
Alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit or device may be implemented in the form of hardware or a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (15)
1. A two-dimensional code processing method is characterized by comprising the following steps:
acquiring first two-dimension code information sent by a first application, wherein the first two-dimension code information comprises: the first service scene identification is used for representing a first service scene corresponding to the first application when the first application scans the target two-dimensional code;
acquiring a callback address of second application background equipment corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background equipment according to the callback address;
acquiring first response data sent by the second application background device, wherein the first response data is response data of the first user identifier in the first service scenario represented by the first service scenario identifier;
sending the first response data to the first application.
2. The method of claim 1, wherein before the obtaining the first two-dimensional code information sent by the first application, the method further comprises:
acquiring an application registration request sent by an access party, wherein the application registration request carries a callback address of the second application background device, and the access party is the second application background device or a second application corresponding to the second application background device;
responding to the application registration request, distributing the second application identifier for the access party, and recording a callback address of the second application background equipment carried in the application registration request;
and sending the second application identification to the access party.
3. The method of claim 2, wherein after sending the second application identification to the access party, the method further comprises:
configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; and generating the target two-dimensional code on the second application background equipment according to the first user identification and the second application identification.
4. The method of claim 2, wherein after sending the second application identification to the access party, the method further comprises:
configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; and generating the target two-dimensional code on the second application according to the first user identification and the second application identification.
5. The method of claim 2, wherein after the obtaining of the application registration request sent by the access party, the method further comprises:
distributing a target encryption key and a target decryption key for the access party;
and sending the target encryption key and the target decryption key to the access party.
6. The method of claim 1, wherein before the obtaining the first two-dimensional code information sent by the first application, the method further comprises:
scanning the target two-dimensional code on the first application to obtain a first user identifier and a second application identifier, wherein when the target two-dimensional code is scanned on the first application, a service scene where the first application is located is a first service scene;
acquiring the first service scene identification of the first service scene on the first application;
and determining the first two-dimension code information as comprising the first user identifier, the second application identifier and the first service scene identifier on the first application.
7. The method of claim 1, further comprising:
acquiring second two-dimensional code information sent by a third application, wherein the second two-dimensional code information comprises: a first user identifier, a second application identifier, and a second service scene identifier, where the first user identifier and the second application identifier are identifiers obtained by scanning the target two-dimensional code by the third application, and the second service scene identifier is used to represent a second service scene corresponding to the target two-dimensional code scanned by the third application;
acquiring the callback address of the second application background equipment corresponding to the second application identifier, and sending the first user identifier and the second service scene identifier to the second application background equipment according to the callback address;
second response data sent by the second application background device is obtained, wherein the second response data is response data of the first user identifier in the second service scenario represented by the second service scenario identifier;
sending the second response data to the third application.
8. A processing apparatus of a two-dimensional code, comprising:
the first obtaining module is configured to obtain first two-dimensional code information sent by a first application, where the first two-dimensional code information includes: the first service scene identification is used for representing a first service scene corresponding to the first application when the first application scans the target two-dimensional code;
the processing module is used for acquiring a callback address of second application background equipment corresponding to the second application identifier, and sending the first user identifier and the first service scene identifier to the second application background equipment according to the callback address;
a second obtaining module, configured to obtain first response data sent by the second application background device, where the first response data is response data of the first user identifier in the first service scenario represented by the first service scenario identifier;
a sending module, configured to send the first response data to the first application.
9. The apparatus of claim 8, wherein the apparatus is further configured to:
before the first two-dimension code information sent by the first application is obtained, an application registration request sent by an access party is obtained, wherein the application registration request carries a callback address of the second application background equipment, and the access party is the second application background equipment or a second application corresponding to the second application background equipment;
responding to the application registration request, distributing the second application identifier for the access party, and recording a callback address of the second application background equipment carried in the application registration request;
and sending the second application identification to the access party.
10. The apparatus of claim 9, wherein the apparatus is further configured to:
configuring one or more service scene identifiers on the second application background device under the condition that the access party is the second application background device, wherein the one or more service scene identifiers comprise the first service scene identifier; and sending the second application identifier to the second application on the second application background equipment, and generating the target two-dimensional code on the second application according to the first user identifier and the second application identifier.
11. The apparatus of claim 9, wherein the apparatus is further configured to:
configuring one or more service scene identifiers on the second application under the condition that the access party is the second application, wherein the one or more service scene identifiers comprise the first service scene identifier; and sending the second application identifier to the second application background equipment on the second application, and generating the target two-dimensional code on the second application background equipment according to the first user identifier and the second application identifier.
12. The apparatus of claim 9, wherein the apparatus is further configured to:
after the application registration request sent by the access party is obtained, distributing a target encryption key and a target decryption key for the access party;
and sending the target encryption key and the target decryption key to the access party.
13. The apparatus of claim 8, wherein the apparatus is further configured to:
before the first two-dimension code information sent by the first application is obtained, scanning the target two-dimension code on the first application to obtain the first user identification and the second application identification, wherein when the target two-dimension code is scanned on the first application, a service scene where the first application is located is a first service scene;
acquiring the first service scene identification of the first service scene on the first application;
and determining the first two-dimension code information as comprising the first user identifier, the second application identifier and the first service scene identifier on the first application.
14. A computer-readable storage medium comprising a stored program, wherein the program when executed performs the method of any of claims 1 to 7.
15. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 7 by means of the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682297.XA CN113946765A (en) | 2020-07-15 | 2020-07-15 | Two-dimensional code processing method and device, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682297.XA CN113946765A (en) | 2020-07-15 | 2020-07-15 | Two-dimensional code processing method and device, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113946765A true CN113946765A (en) | 2022-01-18 |
Family
ID=79326773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010682297.XA Pending CN113946765A (en) | 2020-07-15 | 2020-07-15 | Two-dimensional code processing method and device, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113946765A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115842653A (en) * | 2022-11-03 | 2023-03-24 | 支付宝(杭州)信息技术有限公司 | Information exchange method, device, equipment and computer storage medium |
CN118627126A (en) * | 2024-08-13 | 2024-09-10 | 山东师范大学 | Intelligent hierarchical anonymity protection method, system, equipment, medium and product |
-
2020
- 2020-07-15 CN CN202010682297.XA patent/CN113946765A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115842653A (en) * | 2022-11-03 | 2023-03-24 | 支付宝(杭州)信息技术有限公司 | Information exchange method, device, equipment and computer storage medium |
CN118627126A (en) * | 2024-08-13 | 2024-09-10 | 山东师范大学 | Intelligent hierarchical anonymity protection method, system, equipment, medium and product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9736094B2 (en) | Accessing third-party communication service via a social networking system | |
CN110430288B (en) | Node access method, node access device, computer equipment and storage medium | |
JP6837066B2 (en) | Information processing method and server, computer storage medium | |
CN111447133B (en) | Message transmission method and device, storage medium and electronic device | |
EP3065435A1 (en) | Method for generating a digital identity for a user of a mobile device, digital user identity, and authentication method using said digital user identity | |
US11658963B2 (en) | Cooperative communication validation | |
US20170371625A1 (en) | Content delivery method | |
US9798895B2 (en) | Platform identity architecture with a temporary pseudonymous identity | |
CN105100071B (en) | A kind of login method, apparatus and system | |
JP2019503533A5 (en) | ||
CN112769684B (en) | Method and device for adding friends | |
US11553314B2 (en) | Method and system for providing interoperability for rich communication suite (RCS) messaging with local and remote applications with e-commerce and data collection | |
CN103442084B (en) | Data box system capable of providing data exchanging, acquiring and sensing service and use method of data box system | |
US11431493B1 (en) | Systems and methods for secure authentication | |
CN113946765A (en) | Two-dimensional code processing method and device, storage medium and electronic equipment | |
CN110611725B (en) | Node access method, node access device, computer equipment and storage medium | |
CN109558710B (en) | User login method, device, system and storage medium | |
CN110969474A (en) | Resource acquisition processing method, data processing system, storage medium and processor | |
Ray et al. | Design of an efficient mobile health system for achieving HIPAA privacy-security regulations | |
US10165126B2 (en) | Method for securing a transaction between a mobile terminal and a server of a service provider through a platform | |
US11637819B2 (en) | Establishing connectivity between user devices | |
CN113452513B (en) | Key distribution method, device and system | |
CN117521154A (en) | Digital product processing method, device, equipment, medium and program product | |
KR20150072680A (en) | Apparatus and Method for managing Safety Number | |
CN104123636B (en) | A kind of method, system and equipment that handling object is processed |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |