CN117151136A - Method and device for identifying multiple two-dimensional codes, electronic equipment and medium - Google Patents
Method and device for identifying multiple two-dimensional codes, electronic equipment and medium Download PDFInfo
- Publication number
- CN117151136A CN117151136A CN202311020852.2A CN202311020852A CN117151136A CN 117151136 A CN117151136 A CN 117151136A CN 202311020852 A CN202311020852 A CN 202311020852A CN 117151136 A CN117151136 A CN 117151136A
- Authority
- CN
- China
- Prior art keywords
- dimensional codes
- dimensional
- resource information
- codes
- identifiable
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 73
- 238000013507 mapping Methods 0.000 claims description 20
- 238000004458 analytical method Methods 0.000 claims description 19
- 238000012545 processing Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000005611 electricity Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 241000533950 Leucojum Species 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/1408—Methods for optical code recognition the method being specifically adapted for the type of code
- G06K7/1417—2D bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/14—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
- G06K7/1404—Methods for optical code recognition
- G06K7/146—Methods for optical code recognition the method including quality enhancement steps
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to a method, a device, electronic equipment and a medium for identifying a plurality of two-dimensional codes, wherein the method comprises the following steps: acquiring a plurality of two-dimensional codes to be identified, wherein the plurality of two-dimensional codes at least comprise one two-dimensional code which is different from other two-dimensional codes in the plurality of two-dimensional codes; when the two-dimensional codes contain identifiable two-dimensional codes, obtaining target resource information through the identifiable two-dimensional codes; and when the plurality of two-dimensional codes do not contain the identifiable two-dimensional codes, obtaining target resource information through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes. The method and the device realize the identification of multiple two-dimension codes, remarkably improve the code scanning success rate of users, avoid the loss of clients, improve the experience of user experience, and have wide application range and scene and strong practicability.
Description
Technical Field
The application relates to the technical field of data processing, in particular to a method and a device for identifying a plurality of two-dimensional codes, electronic equipment and a medium.
Background
A scene containing a plurality of two-dimensional codes often appears in a living scene of people, for example, for the same resource, such as a public charging pile, a plurality of two-dimensional codes possibly posted, such as quick electricity, weChat payment, payment treasured payment and the like, usually, different two-dimensional codes are adopted in each channel, and a front-end APP is opened to scan the corresponding two-dimensional code so as to jump to a correct link; in the prior art, when a user scans a plurality of two-dimensional codes through the front-end APP, the user is usually required to manually select the two-dimensional codes which are identified, the efficiency of realizing the service link is reduced, and the user experience is reduced.
Disclosure of Invention
Aiming at the situation, the embodiment of the application provides a method, a device, electronic equipment and a medium for identifying a plurality of two-dimensional codes, so as to overcome or at least partially overcome the defects in the prior art.
In a first aspect, an embodiment of the present application provides a method for identifying a plurality of two-dimensional codes, including:
acquiring a plurality of two-dimensional codes to be identified, wherein the plurality of two-dimensional codes at least comprise one two-dimensional code which is different from other two-dimensional codes in the plurality of two-dimensional codes;
when the two-dimensional codes contain identifiable two-dimensional codes, obtaining target resource information through the identifiable two-dimensional codes;
and when the plurality of two-dimensional codes do not contain the identifiable two-dimensional codes, obtaining target resource information through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes.
Optionally, in the above method, the obtaining a plurality of two-dimensional codes to be identified includes:
and obtaining a reading view field through the camera device, wherein the two-dimensional codes are positioned on the reading view field.
Optionally, in the above method, the obtaining a plurality of two-dimensional codes to be identified includes:
and obtaining a plurality of reading view fields through the camera device, wherein the two-dimensional codes are distributed in the plurality of reading view fields.
Optionally, the method further comprises:
performing image enhancement and denoising processing on the unidentifiable two-dimensional code;
restoring the processed unidentifiable two-dimensional code into an original character string;
determining a resource positioning character string in the original character string;
and establishing a mapping relation between the resource positioning character string and the target resource information.
Optionally, in the above method, when the plurality of two-dimensional codes include identifiable two-dimensional codes, obtaining the target resource information through the identifiable two-dimensional codes includes:
and establishing an association relationship among the two-dimensional codes based on the correspondence between the identifiable two-dimensional codes and the target resource information.
Optionally, in the above method, the obtaining the target resource information according to the association relationship between the unidentifiable two-dimensional code and the identifiable two-dimensional code includes:
and determining the corresponding relation between the unidentifiable two-dimensional code and the target resource information based on the association relation of the plurality of two-dimensional codes, so as to obtain the corresponding target resource information.
Optionally, the method further comprises:
if the target resource information cannot be obtained through the association relation between the unidentifiable two-dimensional code and the identifiable two-dimensional code, traversing the two-dimensional codes;
Analyzing the traversed two-dimensional code according to at least one preset analysis rule to obtain corresponding candidate resource information;
and based on a preset check rule, if the candidate resource information is determined to be legal, the candidate resource information is used as the target resource information, and the traversal is ended.
Optionally, the method further comprises:
if the two-dimensional codes cannot be analyzed, or the candidate resource information of the two-dimensional codes is illegal, an information prompt of failure to identify is returned.
Optionally, in the above method, after the step of obtaining the plurality of two-dimensional codes to be identified, no user selection prompt information is displayed, and whether the plurality of two-dimensional codes include identifiable two-dimensional codes is directly determined.
Optionally, in the foregoing method, the method is applied to charging service, the two-dimensional code is a start code of a charging gun of a charging pile in a charging station, and the target resource information is identity information of the charging gun.
In a second aspect, an embodiment of the present application further provides a device for identifying multiple two-dimensional codes, where the device includes:
the device comprises an acquisition unit, a recognition unit and a storage unit, wherein the acquisition unit is used for acquiring a plurality of two-dimensional codes to be recognized, and the plurality of two-dimensional codes at least comprise one two-dimensional code which is different from other two-dimensional codes in the plurality of two-dimensional codes;
The first identification unit is used for obtaining target resource information through the identifiable two-dimensional codes when the plurality of two-dimensional codes comprise the identifiable two-dimensional codes;
and the second identification unit is used for obtaining target resource information through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes when the unidentifiable two-dimensional codes are not included in the plurality of two-dimensional codes.
In a third aspect, an embodiment of the present application further provides an electronic device, including: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of identifying a plurality of two-dimensional codes of any of the above.
In a fourth aspect, an embodiment of the present application further provides a computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to execute the method for identifying a plurality of two-dimensional codes of any one of the above.
The above at least one technical scheme adopted by the embodiment of the application can achieve the following beneficial effects:
the application provides a method for identifying multiple two-dimensional codes, which comprises the steps of judging whether identifiable two-dimensional codes exist in a plurality of two-dimensional codes to be identified when a front end application scans the two-dimensional codes, and determining target resource information directly according to the identifiable two-dimensional codes if the identifiable two-dimensional codes exist; if the identifiable two-dimensional code does not exist, the association relationship between the unidentifiable two-dimensional code and the identifiable two-dimensional code in the plurality of two-dimensional codes can be established, so that the target resource information can be determined through the association relationship. The method and the device realize the identification of multiple two-dimensional codes, remarkably improve the code scanning success rate of users, avoid the loss of clients, improve the experience of users, and have light algorithm and low calculation force requirement; the application range and the scene are wide, and the practicability is strong.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
fig. 1 is a flowchart illustrating a method for identifying a plurality of two-dimensional codes according to an embodiment of the present application;
fig. 2 illustrates a schematic configuration of a charging service system according to an embodiment of the present application;
fig. 3 is a flow chart illustrating a method for identifying a plurality of two-dimensional codes according to another embodiment of the present application;
fig. 4 is a schematic structural view showing an identification apparatus of a plurality of two-dimensional codes according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
In people's life, can contain a plurality of two-dimensional codes in some scenes, and different channels generally adopt different two-dimensional codes, for example little letter pay and pay precious pay adopt different two-dimensional codes, and the user opens little letter or pay precious APP and need scan corresponding two-dimensional code just can jump to the correct link. This kind of phenomenon also often appears in the electric automobile goes under the scene that public electric pile charged, for example, has pasted a plurality of two-dimensional code on a certain stake, wherein, if contain quick electricity (an APP that provides the service of charging), little letter, pay treasured etc. for a front-end application, if quick electricity, probably contained quick electricity APP identifiable two-dimensional code in a plurality of two-dimensional code, perhaps not including quick electricity APP unidentifiable two-dimensional code yet. In the two cases, problems can occur, if a plurality of two-dimensional codes possibly contain two-dimensional codes which can be identified by the quick-response APP, because the two-dimensional codes are arranged together in a plurality of rows, a user scans through the quick-response APP, and a plurality of two-dimensional codes usually appear in a screen; if the quick-electricity APP cannot be identified, the quick-electricity APP cannot be directly scanned, the APP needs to be replaced by a user, or loss of the user is caused.
In this regard, the present application provides a method for identifying a plurality of two-dimensional codes, fig. 1 shows a flow chart of a method for identifying a plurality of two-dimensional codes according to an embodiment of the present application, and as can be seen from fig. 1, the present application at least includes steps S110 to S130:
step S110: a plurality of two-dimensional codes to be identified are obtained, and the two-dimensional codes at least comprise one two-dimensional code which is different from other two-dimensional codes in the two-dimensional codes.
The application can be applied to various scenes, such as a scene that one shop has a plurality of payment codes, a scene that one charging gun has a plurality of starting codes, and the like, and the application is not limited to the scene, can be set according to business requirements, and is described below by taking charging equipment in a charging station as an example for convenience of description.
The identification method of the multi-two-dimensional code is a lightweight algorithm, can be directly integrated on a client, can be deployed on a server, and is realized by communicating with the client. In addition, the identification method of the multi-two-dimensional code can even be made into a form of a third-party technical service tool, a background is provided in the tool, the mapping relation between the two-dimensional code and the meaning of the resource information can be recorded in the background, an API interface for automatically identifying the scanned multi-code is provided in the foreground, and other technical systems are in butt joint with the tool through the interface.
In the following, a simple description of a charging scenario is provided, fig. 2 shows a schematic structural diagram of a charging service system according to an embodiment of the present application, and as can be seen from fig. 2, the charging service system 100 includes a charging service end 110 and a front end application 120; the charging server 110 is in communication connection with the front-end application 120; in some embodiments of the present disclosure, the front-end application may be presented in the form of, but not limited to, a merchant client (B-end client), a personal user client (C-end client), an applet, a public number, and the like; the front-end application 120 may be deployed in a terminal device of a user, such as a mobile phone, a tablet computer, etc., and in the following description, the front-end application is taken as a fast-power (an APP that provides a charging service) for example.
Referring to fig. 2 again, the charging service system 100 may be externally connected to the charging pile management system 200, specifically, the charging service system 100 may be communicatively connected to the charging pile management system 200 through a pre-agreed interconnection protocol, and may be implemented by calling an interface when data interaction is performed. The charging stake management system 200 may be responsible for the management of a plurality of charging stakes in one or more charging stations. The charging service system 100 controls the charging gun of the charging post in the charging station to charge the device to be charged through the charging post management system 200.
More specifically, in some embodiments of the present disclosure, the above-mentioned charging pile management system 200 includes a charging pile service end 210 and at least one charging pile operating system 220 that are in communication connection, where each charging pile operating system 220 is connected to a plurality of charging piles, and the charging pile service end 210 implements management of the charging piles through the charging pile operating system 220; to the outside, the charging pile server 210 is in communication connection with the charging server 110 of the charging service system 100, so as to implement communication between the charging service system 100 and the charging pile management system 200. In an actual scenario, one charging post is typically configured with two charging guns, each of which may be managed by the charging post operating system 220.
The charging server 110 is in communication connection with the charging pile server 210 through an interconnection protocol, in the interconnection protocol, the communication specifications of the charging server 110 and the charging pile server 210 are limited, and the charging server and the charging pile server can perform information interaction through an interface; and the charging pile server 210 is communicatively connected to each charging pile operating system 220 through a direct connection protocol, such as WLAN direct connection protocol.
The business logic of the multi-two-dimensional code identification method of the application can be directly deployed on the front-end application 120 or on the charging server 110, namely, the multi-two-dimensional code identification device 400 (fig. 4) of the application can be directly deployed on the front-end application 120 or on the charging server 110, and the application is not limited and can be confirmed according to the calculation force requirement and the specific responsibilities of the front-end application and the charging server.
It should be noted that, the identification method of the plurality of two-dimensional codes of the present application may be applied to the charging service system shown in fig. 2, but the method is not limited to fig. 2, and fig. 2 is merely an exemplary illustration of one scenario of the present application, and does not limit the present application in any way.
For convenience of explanation, the front-end application is used as a fast electricity for explanation, and a plurality of two-dimensional codes are usually posted at a proper position of a charging gun, and whether the two-dimensional codes are two-dimensional codes of that channel, the two-dimensional codes at least represent identity information of a charging gun or positioning information of the identity of the charging gun. At least one two-dimensional code which is different from other two-dimensional codes in the two-dimensional codes is contained in the two-dimensional codes. If the two-dimensional codes comprise an already-received two-dimensional code, namely a two-dimensional code provided by a quick-electricity operator, the two-dimensional code provided by the operator of the front-end application is recorded as the already-received two-dimensional code, and other two-dimensional codes such as WeChat two-dimensional codes, payment treasured two-dimensional codes and the like are recorded as third-party two-dimensional codes, and the third-party two-dimensional codes are two-dimensional codes different from other two-dimensional codes; in another case, all of the two-dimensional codes are third party two-dimensional codes.
In some embodiments of the present application, the obtaining a plurality of two-dimensional codes to be identified includes: and obtaining a reading view field through the camera device, wherein the two-dimensional codes are positioned on the reading view field. That is, when the user scans the two-dimensional code of the charging gun by using the front-end application 120, the user can scan a plurality of two-dimensional codes at one time, so that the two-dimensional codes are located in the same lens (reading field of view) of the mobile phone camera.
In other embodiments of the present application, the obtaining a plurality of two-dimensional codes to be identified includes: and obtaining a plurality of reading view fields through the camera device, wherein the two-dimensional codes are distributed in the plurality of reading view fields.
The user can also move the user terminal equipment, so that the camera is moved to realize the scanning of a plurality of two-dimensional codes, and the two-dimensional codes are positioned under a plurality of lenses of the mobile phone camera. For example, a user scans a plurality of two-dimensional codes by using a fast battery, but under the same reading market, the plurality of two-dimensional codes are difficult to cover at one time, or the plurality of two-dimensional codes are scattered relatively, and in this case, the plurality of two-dimensional codes can be scanned by moving a camera. The two-dimensional code is usually in the form of an image, and in order to further improve the analysis accuracy, the two-dimensional code can be subjected to preprocessing such as image enhancement, noise reduction and the like before analysis and recognition.
Step S120: when the plurality of two-dimensional codes contain identifiable two-dimensional codes, obtaining target resource information through the identifiable two-dimensional codes.
When the front-end application scans a plurality of two-dimensional codes, firstly determining whether one or a plurality of identifiable two-dimensional codes exist in the two-dimensional codes.
Two conditions exist for the identifiable two-dimensional code, one is that the front end applies the own two-dimensional code, and the two-dimensional code is marked as the square two-dimensional code, and the other is that the three-dimensional code is associated with the target resource information or the identifiable two-dimensional code after the historical time, and the two-dimensional codes are converted into the identifiable two-dimensional code, so that the subsequent identification can be performed.
In some embodiments of the present application, determining whether at least one identifiable two-dimensional code exists in the plurality of two-dimensional codes includes: determining whether a square two-dimensional code exists in the plurality of two-dimensional codes, if so, determining that at least one identifiable two-dimensional code exists in the plurality of two-dimensional codes, and taking the square two-dimensional code as the identifiable two-dimensional code; if the two-dimensional codes do not exist, determining whether a third party two-dimensional code with an association relationship with the two-dimensional code or the resource information exists in the two-dimensional codes, if so, determining that at least one identifiable two-dimensional code exists in the two-dimensional codes, and taking the third party two-dimensional code with the association relationship with the two-dimensional code or the resource information as the identifiable two-dimensional code; if the third party two-dimensional code which has an association relation with the original two-dimensional code or the resource information does not exist in the plurality of two-dimensional codes, determining that at least one identifiable two-dimensional code does not exist in the plurality of two-dimensional codes.
In some embodiments of the present application, a service information base is provided to maintain and manage two-dimensional code information, where the service information base may be understood as a database of two-dimensional codes and resource information maintained by a front-end application operator, and in the service information base, at least a corresponding relationship between a front-end application's front-end two-dimensional code and the resource information is maintained, and before a plurality of two-dimensional codes are identified this time, related information of a third party two-dimensional code that has fallen into the base, that is, a "third party two-dimensional code that has fallen into the base" refers to that an association relationship has been formed between one third party two-dimensional code and resource information or between one identifiable two-dimensional code, and is maintained in the service information base.
In some embodiments of the present application, the unique two-dimensional code may be embodied in the form of, but not limited to, a unique resource locator (URL address), in which may be included, but not limited to: charging service provider information, charging gun identity information, configuration information and the like; the charging service provider information is quick service operator information, and the charging gun identity information can be directly a plaintext charging gun identity card identification number, a charging gun account number, a charging gun unique code and a charging gun exclusive number; or the character string of the dark text, the character string is used as positioning information, and the identity information of the charging gun can be found in a service information base.
In some embodiments of the present application, after the third party two-dimensional code is restored, the third party two-dimensional code is basically in the form of a character string, and sub-strings at different positions in the character string usually have different meanings and represent different information. All the front-end applications cannot recognize a third-party two-dimensional code, and cannot parse out the character string symbols or substrings in the character string symbols, but do not know the meaning represented by the character string symbols. For example, for a starting code of a charging gun, the character string must have at least part of identity information representing the charging gun, but for a third-party two-dimensional code, the front-end application cannot know the information represented by the character string before the association relationship between the third-party two-dimensional code and the resource information or the identifiable two-dimensional code is not established.
As shown before, after a plurality of two-dimensional codes are scanned quickly, whether the two-dimensional codes exist in the two-dimensional codes or not is first determined, if so, at least one identifiable two-dimensional code exists in the two-dimensional codes, the two-dimensional codes serve as the identifiable two-dimensional codes, and then the two-dimensional codes are analyzed and identified to obtain target resource information.
In the method, after the step of acquiring the plurality of two-dimensional codes to be identified, the step of directly judging whether the identifiable two-dimensional codes exist in the plurality of two-dimensional codes without displaying user selection prompt information.
In the prior art, if one front-end application APP scans a plurality of two-dimensional codes, a plurality of green marks are usually displayed on an interface of the front-end application of a user, so as to prompt the user to select the two-dimensional code to be identified. In the application, even if a plurality of two-dimensional codes are scanned, whether the identifiable two-dimensional codes exist in the plurality of two-dimensional codes can be automatically judged without selection of a user. In some embodiments, in order to enable the two-dimensional code which is originally unrecognizable to be subsequently recognized, a mapping relationship between the unrecognizable two-dimensional code in the plurality of two-dimensional codes and the target resource information may be established and maintained in a service information base, so as to complete a "database-falling operation".
The term "falling a database" can be understood as that an originally unrecognizable third party two-dimensional code has established an association relationship with a resource information or an identifiable two-dimensional code, and the association relationship can be maintained in a service information database, which can be deployed in a front-end application APP or maintained in a charging server, which is not limited in the application.
Specifically, in some embodiments, the operation of dropping the library may be performed by establishing an association between a third party two-dimensional code and the resource information, where the method further includes: performing image enhancement and denoising processing on the unidentifiable two-dimensional code; restoring the processed unidentifiable two-dimensional code into an original character string; determining a resource positioning character string in the original character string; and establishing a mapping relation between the resource positioning character string and the target resource information.
In an actual scene, the two-dimensional code is usually presented in the form of ulr address, and the two-dimensional code can be restored to the original character string according to a certain analysis rule, but some unidentifiable two-dimensional codes are not restored to ulr addresses because the meaning represented by the character string is not known. Therefore, when the originally unrecognizable third-party two-dimensional code is associated with and bound to the target resource information, all the substrings or the character string symbols at a certain position of the third-party two-dimensional code word string symbol can be bound to the target resource information, and a mapping relation can be established. For example, a substring of a third-party two-dimensional code is 987, the target resource information is 5632485, and a mapping relationship between the substring and the target resource information, i.e., 987= 5632485, can be established, where "=" represents a mapping relationship.
In other embodiments, the database may be further configured to store, by establishing an association relationship between two-dimensional codes, where when the plurality of two-dimensional codes includes identifiable two-dimensional codes, the obtaining target resource information through the identifiable two-dimensional codes includes: and establishing an association relationship among the two-dimensional codes based on the correspondence between the identifiable two-dimensional codes and the target resource information.
That is, after the target resource information is determined by the identifiable two-dimensional codes, an association relationship can be established between the two-dimensional codes, so that the two-dimensional codes point to the target resource information. Specifically, for the establishment of a specific association relationship, the establishment can be performed according to the image pixel information of different two-dimensional codes, the pixel information of each two-dimensional code is different, and the binding can be directly performed according to the pixels; the resource positioning character strings of different two-dimensional codes can be obtained through analysis, the resource positioning character strings of the two-dimensional codes are bound and stored, wherein one two-dimensional code points to the target resource information, and then the different two-dimensional codes with association relations point to the target resource information.
If the quick-electricity two-dimension codes do not exist in the two-dimension codes, determining that all the two-dimension codes are third-party two-dimension codes, but not all the third-party two-dimension codes cannot be identified, and the third-party two-dimension codes which are already stored in the business information base in the history time can be identified, so that whether the third-party two-dimension codes with association relation with the resource information or the identifiable two-dimension codes exist in the two-dimension codes can be determined, and if yes, determining that the identifiable two-dimension codes exist in the two-dimension codes. If a plurality of two-dimensional codes exist for the same charging gun, different two-dimensional codes point to the charging gun, therefore, if the number of the third party two-dimensional codes with association relation with the resource information or the identifiable two-dimensional codes is a plurality of, any one of the plurality of third party two-dimensional codes which are already in the warehouse can be taken as the identifiable two-dimensional code, and the target resource information is obtained through analysis and identification.
Therefore, the identifiable two-dimensional code comprises the square two-dimensional code and the third party two-dimensional code which is already in the warehouse. When the identifiable two-dimensional code is the square two-dimensional code, namely the quick-electricity two-dimensional code, the two-dimensional code is analyzed and identified according to the original logic. In some embodiments, if the quick-response two-dimensional code includes the charging robbery identity information of the plaintext, the parsed plaintext is directly used as the target resource information. In other embodiments, if the quick-electricity two-dimensional code includes target resource positioning information, for example, a sub-string that is a position of an original character string of the two-dimensional code, matching is performed in a service information base, for example, a quick-electricity charging gun information base, according to the sub-string, and if the sub-string can be matched with a corresponding charging gun, the identification information of the matched charging gun is used as the target resource information.
When the identifiable two-dimensional code is a third-party two-dimensional code, the identifiable two-dimensional code is a two-dimensional code which is already in a database in the service information base and has a strong binding relation with the target resource information or the identifiable two-dimensional code, so that the target resource information or the resource information of the target resource which is obtained by the identifiable two-dimensional code and has a mapping relation with the third-party two-dimensional code can be searched in the service information base.
Because the related information of the third party two-dimension codes which are already in the database is always maintained in the business information database, even if the third party two-dimension codes of other channels are scanned by adopting a front-end application, the third party two-dimension codes can be identified. In some embodiments, the corresponding relationship between the third-party two-dimensional code and the target resource information may be determined based on the association relationship between the plurality of two-dimensional codes, so as to obtain corresponding target resource information, for example, the resource locator of the third-party two-dimensional code is used for searching in the service information base to obtain corresponding resource information as the target resource information.
For example, when the user scans a third party two-dimensional code that has fallen into the library by using the fast-forwarding APP, the target resource information may be determined by the following method, and in some embodiments, the method further includes: acquiring a third party two-dimensional code to be identified; restoring the third-party two-dimensional code into an original character string; dividing the original character string to obtain at least one character sub-string; and determining resource information with a mapping relation with the third-party two-dimensional code as target resource information according to each character substring.
For the third party two-dimension code which has fallen into the database, even if the user scans by using the quick electricity, the quick identification can be performed according to the information maintained in the service information database, the quick identification is firstly restored into an original character string symbol, then the original character string is divided into a plurality of sub-strings, if the symbol "," ""/", and the like are encountered, the sub-strings are divided into one sub-string, and further, each sub-string can be matched in the service information database, so that the target resource information is obtained.
Step S130: and when the plurality of two-dimensional codes do not contain the identifiable two-dimensional codes, obtaining target resource information through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes.
If it is determined that the two-dimensional codes are unidentifiable two-dimensional codes, that is, the two-dimensional codes do not exist, that is, the two-dimensional code of the party is not present, and that the two-dimensional code of the third party already exists in the service information base, then step S130 is entered.
For the situation that identifiable two-dimensional codes do not exist in the plurality of two-dimensional codes, the association relation between the two-dimensional codes and the identifiable two-dimensional codes pointing to the same target resource information can be established, then the target resource information is obtained through the association relation, the identifiable two-dimensional codes under the situation can be one two-dimensional code maintained in the background and pointing to the same target resource with the plurality of two-dimensional codes, and the identifiable two-dimensional codes can be marked as source two-dimensional codes or operation two-dimensional codes, and the source two-dimensional codes are identifiable by front-end application.
Still taking the foregoing charging service scenario as an example, the source two-dimensional code characterizes identity information of a corresponding resource, such as identity information of a charging gun, where the identity information of the charging gun may be, but is not limited to, a plaintext charging gun identity card identifier, a charging gun account number, a charging gun unique code, a charging gun dedicated number, and so on. The source two-dimension code can be generated according to a certain rule, such as a snowflake algorithm, and is stored in a business information base in the form of an image. When the source two-dimensional code is configured, firstly, generating a two-dimensional code containing or pointing to the resource information of the target resource according to the resource information of the resource as the source two-dimensional code, then obtaining the related information of the first unidentifiable third-party two-dimensional code through scanning, and finally binding and storing the related information of the unidentifiable third-party two-dimensional code with the source two-dimensional code.
The method is particularly used for scenes without the two-dimension codes of the parties, and due to some policy problems or other problems, the two-dimension codes are not allowed to be newly added, for the scenes with the two-dimension codes of the third party, which cannot be identified originally, the front end application of the two-dimension codes of the third party, the staff can establish an association relationship with the source codes pointing to the same resource in advance, and when the two-dimension codes of the third party are scanned, the association relationship between the two-dimension codes which cannot be identified and the target resource information is determined based on the association relationship of the two-dimension codes of the third party, so that the corresponding target resource information is obtained. If the association relation can be used, the corresponding source two-dimensional code is jumped, and the target resource information is obtained by analyzing the source code. After step S130 is entered, a plurality of two-dimensional codes, which are usually third-party two-dimensional codes, may be traversed, and for each traversed third-party two-dimensional code, it is determined whether there is a source two-dimensional code that has an association relationship with the third-party two-dimensional code established in a history time, and specifically, the source two-dimensional code may be searched in a service information base to find whether there is a corresponding source two-dimensional code for the third-party two-dimensional code. If the source two-dimensional code exists, analyzing and identifying the source two-dimensional code to obtain target resource information.
The application also provides a spam scheme, and in particular, in some embodiments of the application, the method further comprises the following steps: if the target resource information cannot be obtained through the association relation between the unidentifiable two-dimensional code and the identifiable two-dimensional code, traversing the two-dimensional codes; analyzing the traversed two-dimensional code according to at least one preset analysis rule to obtain corresponding candidate resource information; and determining the validity of the candidate resource information, if the candidate resource information is legal, taking the candidate resource information as the target resource information, and ending the traversal.
According to the application, at least one analysis rule is preset in advance, and the analysis is not only to restore the two-dimensional code into the original character string, but also to analyze the meaning represented by the original character string, such as the identity information of the charging gun, for example, the No. 1a charging gun of the No. 01 charging pile of the B charging station of the A city.
Specific analysis rules are various, taking target resource information as a charging gun ID (identity) as an example, for example, a format of character strings restored according to two-dimensional codes, and taking a substring at a certain position in the character strings as the charging gun ID; secondly, according to the format of the two-dimensional code character string, converting the format of a substring at a certain position to be used as a charging gun ID; the third party uses the entire character string as the charging gun ID, etc., and the present application is not limited thereto.
The above-mentioned preset analysis rules are adopted to analyze the two-dimensional codes one by one according to a certain sequence, when one two-dimensional code is traversed, if one resource information is obtained through analysis, the resource information is marked as candidate resource information, and it is to be noted that the analysis rules are preconfigured and configured according to some common rules in the industry, and the candidate resource information possibly analyzed by the rules may or may not be paired. Therefore, the validity of the charging gun needs to be checked, if the identity information of the charging gun is 8-bit Arabic numerals plus one-bit check symbols, candidate resource information can be checked according to the rule; in order to ensure the correctness and legality of the resource, the candidate resource information is matched in a service information base, namely whether the candidate resource information is contained in the service information base or not is determined, if so, the candidate resource information is used as target resource information, and the traversal is finished; if the candidate resource information is not contained, determining that the candidate resource information is illegal, and discarding the candidate resource information.
It should be noted that the preset parsing rules may be multiple, when traversing to a two-dimensional code, multiple parsing rules are adopted to parse the two-dimensional code for multiple times, if each parsing rule does not obtain candidate resource information, the two-dimensional code is abandoned, and the next two-dimensional code is traversed; if any analysis rule is adopted to analyze the candidate resource information, entering a verification step of legality; it should be noted that, in general, a situation that one two-dimensional code adopts various algorithms to analyze candidate resource information and each candidate resource information is legal does not occur, so that a plurality of analysis methods are adopted, and at most one legal candidate resource information is obtained.
In some embodiments of the application, the method further comprises: if all the two-dimensional codes cannot be analyzed or candidate resource information of all the two-dimensional codes is illegal, an information prompt which cannot be identified is returned.
If the two-dimensional codes which are scanned quickly cannot be analyzed, or the candidate resource information obtained through analysis is illegal, determining that the two-dimensional codes cannot be scanned, and returning an information prompt which cannot be identified. Even if the two-dimensional codes of various channels can not be completely covered by adopting the modes, the two-dimensional codes can not be identified, and the information prompt of failure to identify is returned.
As can be seen from fig. 1, the present application provides a method for identifying multiple two-dimensional codes, when a front end application scans multiple two-dimensional codes to be identified, it is determined whether there are identifiable two-dimensional codes in the two-dimensional codes, if yes, target resource information is directly determined according to the identifiable two-dimensional codes; if the identifiable two-dimensional code does not exist, the association relationship between the unidentifiable two-dimensional code and the identifiable two-dimensional code in the plurality of two-dimensional codes can be established, so that the target resource information can be determined through the association relationship. The method and the device realize the identification of multiple two-dimensional codes, remarkably improve the code scanning success rate of users, avoid the loss of clients, improve the experience of users, and have light algorithm and low calculation force requirement; the application range and the scene are wide, and the practicability is strong.
Fig. 3 is a flow chart illustrating a method for identifying multiple two-dimensional codes according to another embodiment of the present application, and as can be seen from fig. 3, this embodiment is executed by a front-end application, and includes:
the front-end application obtains a plurality of two-dimensional codes to be identified through scanning.
Judging whether the two-dimensional codes of the parties exist in the two-dimensional codes, if yes, identifying the two-dimensional codes of the parties to obtain target resource information, establishing mapping relations between other two-dimensional codes in the two-dimensional codes and the target resource information, and storing the mapping relations in a service information base (if the mapping relations between the other two-dimensional codes and the target resource information already exist, the mapping relations do not need to be established).
If the two-dimensional codes do not exist, judging whether a third party two-dimensional code with an association relation with the resource information exists in the two-dimensional codes, if so, taking the third party two-dimensional code as an identifiable two-dimensional code, identifying the third party two-dimensional code to obtain target resource information, establishing a mapping relation between other two-dimensional codes in the two-dimensional codes and the target resource information, and storing the mapping relation in a service information base (if the mapping relation exists between the other two-dimensional codes and the target resource information, the establishment is not needed).
If the third party two-dimensional code with the association relation with the resource information does not exist in the two-dimensional codes, traversing the two-dimensional codes, determining whether a source two-dimensional code with the association relation with the two-dimensional code in the history time exists for each two-dimensional code, and if so, turning to the source two-dimensional code and identifying to obtain the target resource information.
If the source two-dimensional code which has the association relation with the two-dimensional code does not exist in the history time, traversing a plurality of two-dimensional codes, analyzing the two-dimensional codes by adopting a preset analysis rule for each two-dimensional code, judging whether candidate resource information can be analyzed, and if not, traversing the next two-dimensional code.
If one two-dimensional code can analyze the candidate resource information, continuously judging whether the analyzed candidate resource information exists in the service information base, and if not, traversing the next two-dimensional code.
And if the analyzed candidate resource information exists in the service information base, taking the candidate resource information as target resource information, finishing traversing, establishing a mapping relation between other two-dimensional codes in the plurality of two-dimensional codes and the target resource information, and storing the mapping relation in the service information base.
Fig. 4 is a schematic structural view of a device for identifying a plurality of two-dimensional codes according to an embodiment of the present application, and as can be seen from fig. 4, a device 400 for identifying a plurality of two-dimensional codes includes:
an obtaining unit 410, configured to obtain a plurality of two-dimensional codes to be identified, where the plurality of two-dimensional codes at least includes one two-dimensional code that is different from other two-dimensional codes in the plurality of two-dimensional codes;
the first identifying unit 420 is configured to obtain target resource information through the identifiable two-dimensional codes when the plurality of two-dimensional codes include the identifiable two-dimensional codes;
the second identifying unit 430 is configured to obtain, when the plurality of two-dimensional codes do not include the identifiable two-dimensional code, the target resource information according to the association relationship between the unidentifiable two-dimensional code and the identifiable two-dimensional code.
In some embodiments of the present application, the acquiring unit is configured to acquire a read field of view through the image capturing device, and the plurality of two-dimensional codes are located on the read field of view.
In some embodiments of the present application, the obtaining unit is configured to obtain a plurality of read fields of view through a camera device, where the plurality of two-dimensional codes are distributed in the plurality of read fields of view.
In some embodiments of the present application, the second identifying unit is further configured to perform image enhancement and denoising processing on the unidentifiable two-dimensional code; restoring the processed unidentifiable two-dimensional code into an original character string; determining a resource positioning character string in the original character string; and establishing a mapping relation between the resource positioning character string and the target resource information.
In some embodiments of the present application, the first identifying unit is configured to establish an association relationship between the plurality of two-dimensional codes based on a correspondence relationship between the identifiable two-dimensional code and the target resource information.
In some embodiments of the present application, the second identifying unit is configured to determine a correspondence between the unidentifiable two-dimensional code and the target resource information based on the association between the plurality of two-dimensional codes, so as to obtain the corresponding target resource information.
In some embodiments of the application, the apparatus further comprises: the third identification unit is used for traversing the two-dimensional codes if the target resource information cannot be acquired through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes; analyzing the traversed two-dimensional code according to at least one preset analysis rule to obtain corresponding candidate resource information; and based on a preset check rule, if the candidate resource information is determined to be legal, the candidate resource information is used as the target resource information, and the traversal is ended.
In some embodiments of the present application, the third identifying unit is further configured to return the information prompt for failing to identify if none of the plurality of two-dimensional codes is resolvable or none of the candidate resource information of the plurality of two-dimensional codes is legal.
In some embodiments of the present application, after the step of obtaining the plurality of two-dimensional codes to be identified, no user selection prompt information is displayed, and whether the plurality of two-dimensional codes include identifiable two-dimensional codes is directly determined.
It should be noted that, the above device for identifying a plurality of two-dimensional codes can implement the method for identifying a plurality of two-dimensional codes one by one, and will not be described again.
Fig. 5 is a schematic structural view of an electronic device according to an embodiment of the present application. Referring to fig. 5, at the hardware level, the electronic device includes a processor, and optionally an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, network interface, and memory may be interconnected by an internal bus, which may be an ISA (Industry Standard Architecture ) bus, a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus, or EISA (Extended Industry Standard Architecture ) bus, among others. The buses may be classified as address buses, data buses, control buses, etc. For ease of illustration, only one bi-directional arrow is shown in FIG. 5, but not only one bus or type of bus.
And the memory is used for storing programs. In particular, the program may include program code including computer-operating instructions. The memory may include memory and non-volatile storage and provide instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory to the memory and then operates the memory to form a plurality of two-dimensional code recognition devices on a logic level. And the processor is used for executing the program stored in the memory and particularly used for executing the method.
The method executed by the multi-two-dimensional code identification device disclosed in the embodiment of fig. 4 of the present application may be applied to a processor or implemented by the processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software. The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be embodied directly in the execution of a hardware decoding processor, or in the execution of a combination of hardware and software modules in a decoding processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
The electronic device may further execute the method executed by the device for identifying a plurality of two-dimensional codes disclosed in the embodiment shown in fig. 4, and implement the functions of the device for identifying a plurality of two-dimensional codes in the embodiment shown in fig. 4, which is not described herein.
The embodiment of the application also provides a computer readable storage medium, which stores one or more programs, the one or more programs including instructions, which when executed by an electronic device including a plurality of application programs, enable the electronic device to execute the method executed by the identification device for a plurality of two-dimensional codes disclosed in the embodiment shown in fig. 4, and is specifically used for executing the method.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other identical elements in a process, method, article or apparatus that comprises the element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.
Claims (10)
1. The method for identifying the plurality of two-dimensional codes is characterized by comprising the following steps of:
acquiring a plurality of two-dimensional codes to be identified, wherein the plurality of two-dimensional codes at least comprise one two-dimensional code which is different from other two-dimensional codes in the plurality of two-dimensional codes;
when the two-dimensional codes contain identifiable two-dimensional codes, obtaining target resource information through the identifiable two-dimensional codes;
and when the plurality of two-dimensional codes do not contain the identifiable two-dimensional codes, obtaining target resource information through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes.
2. The method of claim 1, wherein the obtaining the plurality of two-dimensional codes to be identified comprises:
and obtaining a reading view field through the camera device, wherein the two-dimensional codes are positioned on the reading view field.
3. The method of claim 1, wherein the obtaining the plurality of two-dimensional codes to be identified comprises:
and obtaining a plurality of reading view fields through the camera device, wherein the two-dimensional codes are distributed in the plurality of reading view fields.
4. The method according to claim 1, wherein the method further comprises:
performing image enhancement and denoising processing on the unidentifiable two-dimensional code;
Restoring the processed unidentifiable two-dimensional code into an original character string;
determining a resource positioning character string in the original character string;
and establishing a mapping relation between the resource positioning character string and the target resource information.
5. The method according to claim 1, wherein when the plurality of two-dimensional codes include identifiable two-dimensional codes, obtaining target resource information through the identifiable two-dimensional codes includes:
and establishing an association relationship among the two-dimensional codes based on the correspondence between the identifiable two-dimensional codes and the target resource information.
6. The method of claim 5, wherein the obtaining the target resource information according to the association relationship between the unidentifiable two-dimensional code and the identifiable two-dimensional code comprises:
and determining the corresponding relation between the unidentifiable two-dimensional code and the target resource information based on the association relation of the plurality of two-dimensional codes, so as to obtain the corresponding target resource information.
7. The method according to claim 1, wherein the method further comprises:
if the target resource information cannot be obtained through the association relation between the unidentifiable two-dimensional code and the identifiable two-dimensional code, traversing the two-dimensional codes;
Analyzing the traversed two-dimensional code according to at least one preset analysis rule to obtain corresponding candidate resource information;
and based on a preset check rule, if the candidate resource information is determined to be legal, the candidate resource information is used as the target resource information, and the traversal is ended.
8. An identification device for a plurality of two-dimensional codes, the device comprising:
the device comprises an acquisition unit, a recognition unit and a storage unit, wherein the acquisition unit is used for acquiring a plurality of two-dimensional codes to be recognized, and the plurality of two-dimensional codes at least comprise one two-dimensional code which is different from other two-dimensional codes in the plurality of two-dimensional codes;
the first identification unit is used for obtaining target resource information through the identifiable two-dimensional codes when the plurality of two-dimensional codes comprise the identifiable two-dimensional codes;
and the second identification unit is used for obtaining target resource information through the association relation between the unidentifiable two-dimensional codes and the identifiable two-dimensional codes when the unidentifiable two-dimensional codes are not included in the plurality of two-dimensional codes.
9. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions, wherein the executable instructions when executed cause the processor to perform the method of any of claims 1 to 7.
10. A computer readable storage medium storing one or more programs, which when executed by an electronic device comprising a plurality of application programs, cause the electronic device to perform the method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311020852.2A CN117151136B (en) | 2023-08-14 | 2023-08-14 | Method and device for identifying multiple two-dimensional codes, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311020852.2A CN117151136B (en) | 2023-08-14 | 2023-08-14 | Method and device for identifying multiple two-dimensional codes, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117151136A true CN117151136A (en) | 2023-12-01 |
CN117151136B CN117151136B (en) | 2024-06-28 |
Family
ID=88899759
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311020852.2A Active CN117151136B (en) | 2023-08-14 | 2023-08-14 | Method and device for identifying multiple two-dimensional codes, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117151136B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105291602A (en) * | 2015-11-11 | 2016-02-03 | 叶校然 | Method and equipment for recognizing bar codes of inner layers of circuit boards and printing codes on outer layers of circuit boards |
CN106897341A (en) * | 2016-07-08 | 2017-06-27 | 阿里巴巴集团控股有限公司 | 2 D code information querying method, server, client and system |
CN108416414A (en) * | 2018-03-26 | 2018-08-17 | 中国人民银行印制科学技术研究所 | Self checking anti-fake two-dimension code and production method and device, self checking method and apparatus |
CN109190436A (en) * | 2018-07-30 | 2019-01-11 | 努比亚技术有限公司 | A kind of two-dimensional code identification method, mobile terminal and storage medium |
CN109784452A (en) * | 2018-12-12 | 2019-05-21 | 平安科技(深圳)有限公司 | Card card recognition methods and device based on color 2 D code |
US20190311169A1 (en) * | 2017-03-31 | 2019-10-10 | Tencent Technology (Shenzhen) Company Limited | Two-dimensional code and method, terminal, and apparatus for recognizing two-dimentional code |
CN111950318A (en) * | 2020-08-12 | 2020-11-17 | 上海连尚网络科技有限公司 | Two-dimensional code image identification method and device and storage medium |
CN113496132A (en) * | 2020-04-07 | 2021-10-12 | 深圳爱根斯通科技有限公司 | Two-dimensional code identification method and device, electronic equipment and storage medium |
WO2023045430A1 (en) * | 2021-09-24 | 2023-03-30 | 上海幻电信息科技有限公司 | Two dimensional code-based data processing method, apparatus, and system |
CN116152992A (en) * | 2023-04-18 | 2023-05-23 | 浙江安吉智电控股有限公司 | Processing method and device of charging request and start code for charging service |
-
2023
- 2023-08-14 CN CN202311020852.2A patent/CN117151136B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105291602A (en) * | 2015-11-11 | 2016-02-03 | 叶校然 | Method and equipment for recognizing bar codes of inner layers of circuit boards and printing codes on outer layers of circuit boards |
CN106897341A (en) * | 2016-07-08 | 2017-06-27 | 阿里巴巴集团控股有限公司 | 2 D code information querying method, server, client and system |
US20190311169A1 (en) * | 2017-03-31 | 2019-10-10 | Tencent Technology (Shenzhen) Company Limited | Two-dimensional code and method, terminal, and apparatus for recognizing two-dimentional code |
CN108416414A (en) * | 2018-03-26 | 2018-08-17 | 中国人民银行印制科学技术研究所 | Self checking anti-fake two-dimension code and production method and device, self checking method and apparatus |
CN109190436A (en) * | 2018-07-30 | 2019-01-11 | 努比亚技术有限公司 | A kind of two-dimensional code identification method, mobile terminal and storage medium |
CN109784452A (en) * | 2018-12-12 | 2019-05-21 | 平安科技(深圳)有限公司 | Card card recognition methods and device based on color 2 D code |
CN113496132A (en) * | 2020-04-07 | 2021-10-12 | 深圳爱根斯通科技有限公司 | Two-dimensional code identification method and device, electronic equipment and storage medium |
CN111950318A (en) * | 2020-08-12 | 2020-11-17 | 上海连尚网络科技有限公司 | Two-dimensional code image identification method and device and storage medium |
WO2023045430A1 (en) * | 2021-09-24 | 2023-03-30 | 上海幻电信息科技有限公司 | Two dimensional code-based data processing method, apparatus, and system |
CN116152992A (en) * | 2023-04-18 | 2023-05-23 | 浙江安吉智电控股有限公司 | Processing method and device of charging request and start code for charging service |
Also Published As
Publication number | Publication date |
---|---|
CN117151136B (en) | 2024-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105392178A (en) | Method and device for acquiring access information of wireless access point | |
US10743183B2 (en) | Method and device for realizing wireless access point connection authentication | |
CN110569341A (en) | method and device for configuring chat robot, computer equipment and storage medium | |
CN111523109B (en) | Method and device for verifying electronic equipment application | |
CN110796269B (en) | Method and device for generating model, and method and device for processing information | |
CN113242236A (en) | Method for constructing network entity threat map | |
CN115018565A (en) | Advertisement media image identification method, system, equipment and readable storage medium | |
CN110990541A (en) | Method and device for realizing question answering | |
CN111062433A (en) | Scenic spot confirmation method and device based on SIFT feature matching | |
CN117151136B (en) | Method and device for identifying multiple two-dimensional codes, electronic equipment and medium | |
US10616418B2 (en) | Dynamically generated call triggers | |
CN109982247B (en) | Smart phone positioning method combining two-dimensional code with current WIFI information | |
CN113591079A (en) | Method and device for acquiring abnormal application installation package and electronic equipment | |
CN110752933A (en) | Verification code input method and device, electronic equipment and storage medium | |
CN110928656A (en) | Service processing method, device, computer equipment and storage medium | |
CN115019325A (en) | Service processing method and device based on image recognition and storage medium | |
CN115239590A (en) | Sample image generation method, device, equipment, medium and program product | |
CN109408718B (en) | Information pushing method and related product | |
CN113468446A (en) | Method, system and equipment for supporting identification of third-party two-dimensional code data | |
CN113127767B (en) | Mobile phone number extraction method and device, electronic equipment and storage medium | |
CN110443202B (en) | System, method and storage medium for real-time analysis of paper font regularity | |
CN109359462B (en) | Virtual standby identification method, equipment, storage medium and device | |
CN113079052A (en) | Model training method, device, equipment and storage medium, and method and device for identifying data of Internet of things | |
CN117114711B (en) | Data analysis and management method and platform for tobacco monopoly law enforcement based on artificial intelligence | |
CN116778534B (en) | Image processing method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |