CN117371017B - Device management method based on encrypted two-dimension code - Google Patents

Device management method based on encrypted two-dimension code Download PDF

Info

Publication number
CN117371017B
CN117371017B CN202311674665.6A CN202311674665A CN117371017B CN 117371017 B CN117371017 B CN 117371017B CN 202311674665 A CN202311674665 A CN 202311674665A CN 117371017 B CN117371017 B CN 117371017B
Authority
CN
China
Prior art keywords
character string
correction
character
identification
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311674665.6A
Other languages
Chinese (zh)
Other versions
CN117371017A (en
Inventor
于士国
刘长波
刘立金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Sunsam Information Technology Co ltd
Original Assignee
Shandong Sunsam Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Sunsam Information Technology Co ltd filed Critical Shandong Sunsam Information Technology Co ltd
Priority to CN202311674665.6A priority Critical patent/CN117371017B/en
Publication of CN117371017A publication Critical patent/CN117371017A/en
Application granted granted Critical
Publication of CN117371017B publication Critical patent/CN117371017B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The method comprises the steps of utilizing mobile equipment to scan a two-dimension code label attached to equipment to enter a public information display interface, acquiring equipment basic information and scanning identification time in the public information display interface to send the equipment basic information and the scanning identification time to a processor, generating login permission identification according to the equipment basic information and the scanning identification time, simultaneously receiving login input identification sent by the mobile equipment in real time by the processor, judging, generating an electronic two-dimension code by the processor when the login input identification is consistent with the login permission identification, sending the electronic two-dimension code to the mobile equipment, and receiving the electronic two-dimension code sent by the processor by the mobile equipment, and automatically scanning and identifying the electronic two-dimension code to enter a private information display interface by the mobile equipment. The method and the device have the effect of improving the overall safety of the equipment data during storage.

Description

Device management method based on encrypted two-dimension code
Technical Field
The application relates to the field of equipment management technology, in particular to an equipment management method based on encrypted two-dimensional codes.
Background
In each system, management of each device to be used within the system has been a relatively great challenge, such as management of power devices in a power system, and management of passive devices in a communication system.
In the prior art, in order to facilitate the management of devices, a database is generally established to store information of each device, wherein the information of the device comprises publicable information and non-publicable information, the publicable information is information which can be checked by any person, and the non-publicable information is information which can only be checked by staff. In general, in order to facilitate the user to acquire each piece of publicable information of the device, the two-dimensional code recorded with the publicable information is attached to the device, and at this time, the user only needs to use the scanning device to scan the two-dimensional code to acquire the publicable information. When equipment is damaged and a worker needs to maintain, the worker needs to use part of the unpublishable information, and at the moment, the worker needs to scan the two-dimensional code on the equipment to acquire the identification information of the equipment, and then search in the equipment information database by utilizing the identification information to acquire the unpublishable information of the current equipment.
With respect to the above related art, the inventor considers that when the device information database is leaked, an illegal person can conveniently use the identification information to refer to the unpublishable information in the device information database, so that the overall security is lower during data storage, and there is room for improvement.
Disclosure of Invention
In order to improve the overall safety of equipment data during storage, the application provides an equipment management method based on encrypted two-dimension codes.
An encrypted two-dimensional code-based device management method, which is executed on a mobile device, comprises the following steps:
scanning a two-dimensional code label attached to equipment to enter a public information display interface, and acquiring basic information of the equipment and scanning identification time in the public information display interface;
transmitting the basic information of the equipment and the scanning identification time to a processor for generating login permission identification, and acquiring login input identification in real time on a public information display interface and transmitting the login input identification to the processor in real time;
and when the login input identification is consistent with the login permission identification, receiving the electronic two-dimensional code sent by the processor and automatically scanning and identifying the electronic two-dimensional code to enter a private information display interface.
By adopting the technical scheme, when the two-dimensional code label on the equipment is scanned by the mobile equipment, the basic information of the equipment can be obtained for checking, and when a user can synchronously input the login input identification corresponding to the equipment, the processor can generate the electronic two-dimensional code for the mobile equipment to enter the private information display interface, and at the moment, the user can check and manage the unpublishable information, so that the overall security of the data of the equipment is higher during storage.
Optionally, after the mobile device enters the private information display interface, the device management method based on the encrypted two-dimensional code further comprises:
acquiring correction input data of a correction window in a private information display interface;
transmitting the corrected input data to the processor for the processor to perform recognition analysis to output a data correction state and receiving the data correction state;
judging whether the data correction state is consistent with a preset successful correction state or not;
outputting a correction success signal if the data correction state is consistent with the success correction state;
and if the data correction state is inconsistent with the successful correction state, outputting a correction failure signal.
By adopting the technical scheme, when a user enters the private information display interface to modify the data of the equipment, the processor can analyze the data to be modified to determine whether the modification can be performed, so that the condition that the equipment information is inaccurate due to the fact that the information is modified by mistake is reduced.
An equipment management method based on encrypted two-dimensional codes is executed in a processor and comprises the following steps:
acquiring equipment basic information, scanning identification time and login input identification sent by mobile equipment;
generating a login permission identification according to the basic information of the equipment and the scanning identification time;
judging whether the login input identification is consistent with the login permission identification;
if the login input identification is inconsistent with the login permission identification, no action is performed;
if the login input identification is consistent with the login permission identification, generating an electronic two-dimensional code and transmitting the electronic two-dimensional code to the mobile equipment.
By adopting the technical scheme, when the processor receives the information sent by the mobile device, the login permission identification of the device which is required to be managed currently can be generated, and the login input identification input by the user is analyzed and determined to judge whether the electronic two-dimensional code is generated for the mobile device to enter the private information display interface, so that the overall safety of the device during data storage is improved.
Optionally, the step of generating the login permission identifier according to the device basic information and the scan identification time includes:
collecting all the basic information of the equipment according to a preset information ordering sequence in the basic information of the equipment to form a basic character string;
performing character adjustment on the basic character string according to a preset character sequencing order to form an adjustment character string;
performing character position adjustment on the adjustment character strings according to a preset similar ordering sequence to form ordered character strings;
comparing the ordered character strings with the characters in the adjustment character strings in a one-to-one correspondence manner, and defining the characters in the ordered character strings, which do not correspond to the adjustment character strings, as misplacement characters;
counting according to the misplacement characters under the characters of the same type to determine the misplacement quantity, and arranging the misplacement quantity determined in each type according to a character sequencing order to form a digital character string;
judging whether the scanning identification time is singular or not;
if the scanning identification time is singular, generating a login permission identification according to the digital character string;
and if the scanning recognition time is not singular, sequencing the digital character strings from back to front to update the digital character strings, and generating the login permission identification according to the updated digital character strings.
By adopting the technical scheme, the public data and the login time of the user are utilized for analysis and calculation, so that the login permission identification is generated through an encryption algorithm, illegal personnel cannot easily determine the login permission identification, and the safety of information storage is improved.
Optionally, after the formation of the numeric string, the step of generating the login permission identifier further includes:
counting characters according to the digital character strings to obtain the number of the characters;
determining a special character string set corresponding to the number of characters according to a preset special character string matching relationship;
judging whether the digital character string is in the special character string set or not;
if the digital character string is not in the special character string set, determining a login permission identification according to the digital character string;
if the number character string is in the special character string set, defining the character corresponding to the adjustment character string in the ordered character string as a correct character;
the correct number is determined by counting the correct characters under the same type of characters, and the correct number determined in each type is arranged in the character sequencing order to update the digital character string.
By adopting the technical scheme, the special characters can be processed, so that the situation that a user tries to input a login input identifier to enter a private information display interface is reduced.
Optionally, after updating the number character string according to the correct number, the step of generating the login permission identifier further includes:
judging whether the digital character string is in the corresponding special character string set or not according to the updated digital character string;
if the updated digital character string is not in the corresponding special character string set, determining a login permission identification according to the digital character string;
if the updated digital character string is in the corresponding special character string set, determining a median character in the digital character string, and performing average calculation according to all characters in the digital character string to determine a character average;
judging whether the character average value is larger than a preset critical value or not;
if the character mean value is larger than the critical value, sequencing the characters before the middle character from back to front, and updating the digital character string after the characters after the middle character;
if the character mean value is not greater than the critical value, the characters after the median character are sequenced from back to front and the character before the median character is then updated.
By adopting the technical scheme, when the special character string is still the special character string after being processed, the character string can be continuously processed so as to reduce the occurrence of the situation that a user tries to enter the private information display interface.
Optionally, the method further comprises:
acquiring correction input data sent by mobile equipment;
analyzing according to the correction input data to obtain a correction data type and a correction data value;
determining an allowable correction range corresponding to the correction data type according to a preset type range matching relation;
judging whether the value of the correction data is in an allowable correction range or not;
if the value of the correction data is in the allowable correction range, correcting the value of the correction data on the private information display interface according to the correction input data, outputting a successful correction state and sending the successful correction state as a data correction state to the mobile equipment;
if the correction data value is not within the allowable correction range, outputting a failure correction state and sending the failure correction state as a data correction state to the mobile device.
By adopting the technical scheme, when a user enters the private information display interface to propose to modify the data of the equipment, the data to be modified can be analyzed, so that the situation of error modification of the data is reduced.
In summary, the present application includes at least one of the following beneficial technical effects:
when a user scans a two-dimensional code label on the equipment, only the content which can be watched can be checked first, and when the user is a worker and needs to manage the information of the equipment, a corresponding identifier can be input to enter a private information display interface to manage the information, so that the overall security of the unpublishable information is better when the unpublishable information is stored;
the identification can be generated according to the information of the equipment and the login time of the user, so that the encryption function is realized to reduce the occurrence of the condition that illegal personnel enter a private information display interface;
when the registered tag is a special character string, the character string can be automatically modified so as to reduce the occurrence of accidental access of a user to the private information display interface through an attempted method.
Drawings
Fig. 1 is a flowchart of a device management method based on an encrypted two-dimensional code when the device management method is executed on a mobile device.
Fig. 2 is a flowchart of a data correction result determination method.
Fig. 3 is a flowchart of a device management method based on an encrypted two-dimensional code when the device management method is executed in a processor.
Fig. 4 is a flow chart of a method of enabling login identification generation.
Fig. 5 is a flow chart of a first method of updating a numeric string.
Fig. 6 is a flow chart of a second method of updating a numeric string.
Fig. 7 is a flow chart of a data correction situation analysis method.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to fig. 1 to 7 and the embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Embodiments of the present application are described in further detail below with reference to the drawings attached hereto.
The embodiment of the application discloses a device management method based on encrypted two-dimension codes, under normal conditions, a user can read basic information of a device by scanning a two-dimension code label on the device, when the user is a worker and needs to manage information of the device, a corresponding identifier can be input to enter a private information display interface, and the information of the interface can not be acquired by illegal personnel, so that the overall security of the information is higher, and meanwhile, the user can manage the information after entering the display interface, so that the management of the device is effectively realized.
Referring to fig. 1, a method flow when the device management method based on the encrypted two-dimensional code is executed on a mobile device includes the following steps:
step S100: scanning a two-dimensional code label attached to the equipment to enter a public information display interface, and acquiring basic information of the equipment and scanning and identifying time in the public information display interface.
The two-dimensional code label is a label which can be scanned by a mobile device to enter a public information display interface, wherein the mobile device can be a normal smart phone, the public information display interface is an interface recorded with public information of current equipment, when the mobile device enters the public information display interface, basic information of the equipment can be acquired, the basic information of the equipment comprises equipment identity, equipment size, equipment production date and the like, and the basic information of the equipment is specifically set by staff according to actual conditions; the scanning identification time is the time when the mobile equipment scans the two-dimensional code label and enters the public information display interface.
Step S101: transmitting the basic information of the equipment and the scanning identification time to a processor for generating login permission identification, and acquiring login input identification in real time on a public information display interface and transmitting the login input identification to the processor in real time.
The identifier that allows login to be identified as the current mobile device may be allowed to enter the input required to view the non-public information, and a specific generation method is described below; the mobile device can be associated with the processor when scanning the two-dimension code of the tag, so that information can be conveniently transmitted; the login input identifier is a character identifier input by an input window in the public information display interface, and is manually input by a user of the handheld mobile device.
Step S102: and when the login input identification is consistent with the login permission identification, receiving the electronic two-dimensional code sent by the processor and automatically scanning and identifying the electronic two-dimensional code to enter a private information display interface.
When the login input identification is consistent with the login permission identification, the display window which can allow the current user to view the unpublished information is described, the private information display interface is a display window recorded with unpublishable information of the equipment, the electronic two-dimensional code is a label which can enable the mobile equipment to scan for the mobile equipment to enter the private information display interface, the electronic two-dimensional code is recorded and stored in advance, and the processor can send the electronic two-dimensional code to the mobile equipment only when a correct login input identification is input by a worker.
Referring to fig. 2, after the mobile device enters the private information display interface, the device management method based on the encrypted two-dimensional code further includes:
step S200: and acquiring correction input data of a correction window in the private information display interface.
The correction window is a window for a user to propose to modify the data in the private information display interface, the correction input data is the data input by the user in the correction window, for example, the state is corrected from damage to normal use, and the like.
Step S201: the corrected input data is sent to the processor for recognition analysis by the processor to output a data correction state and the data correction state is accepted.
The data correction state is a state reflecting the currently input correction input data to be corrected, the state includes a successful correction state and a failed correction state, and the processor can analyze and determine the type and the numerical value of the data, and a specific determination method is described below.
Step S202: and judging whether the data correction state is consistent with a preset successful correction state or not.
The successful correction state is a state set by a worker when the correction input data input by the worker is determined to be accurate and the data needing to be corrected in the private information display interface can be corrected, and the purpose of judgment is to know whether the corresponding data in the private information display interface needs to be corrected or not.
Step S2021: and outputting a correction success signal if the data correction state is consistent with the success correction state.
When the data correction state is consistent with the successful correction state, the corresponding data in the private information display interface can be corrected, at the moment, the processor has completed content modification, and a correction success signal is output and displayed on the mobile device, so that a user can know the situation.
Step S2022: and if the data correction state is inconsistent with the successful correction state, outputting a correction failure signal.
When the data correction state is inconsistent with the successful correction state, the fact that the corresponding data in the private information display interface cannot be corrected is indicated, a correction failure signal is output to be displayed on the mobile device, and a user can know the situation.
Referring to fig. 3, a method flow when the device management method based on the encrypted two-dimensional code is executed on the processor includes the following steps:
step S300: and acquiring equipment basic information, scanning identification time and login input identification sent by the mobile equipment.
A processor is a device, such as a computer, that can process various pieces of information.
Step S301: and generating an allowed login identification according to the basic information of the equipment and the scanning identification time.
The login permission identification can be generated in the processor according to the basic information of the equipment and the scanning identification time, so that whether the user enters the private information display interface or not can be judged conveniently.
Step S302: and judging whether the login input identification is consistent with the login permission identification.
The purpose of the judgment is to know whether the current user is allowed to enter the private information display interface of the associated device.
Step S3021: if the login input identification is inconsistent with the login permission identification, no action is performed.
When the login input identification is inconsistent with the login permission identification, the fact that the login permission identification input by the user is wrong or the login permission identification is not input is indicated, the situation that the user needs to enter a private information display interface does not exist at the moment, and the original state is maintained.
Step S3022: if the login input identification is consistent with the login permission identification, generating an electronic two-dimensional code and transmitting the electronic two-dimensional code to the mobile equipment.
When the login input identification is consistent with the login permission identification, the user is required to enter the private information display interface, and a corresponding electronic two-dimensional code is generated at the moment and is sent to the mobile equipment for the mobile equipment to enter the private information display interface.
Referring to fig. 4, the step of generating the login permission identification according to the device basic information and the scan identification time includes:
step S400: and collecting all the basic information of the equipment according to a preset information ordering sequence in the basic information of the equipment to form a basic character string.
The information ordering sequence is the ordering sequence of each information in the basic information of the equipment, for example, the basic information of the equipment comprises an equipment identity, a factory number and a production date, wherein the information ordering sequence can be the equipment identity, the reproduction date and the factory number, and the specific information ordering sequence is determined in advance by a worker; the basic character string is a character string obtained by sorting and combining all the basic information of the equipment according to the information sorting order, for example, the equipment identity is L123, the production date is x20231111, and the factory number is y.543, and the basic character string obtained according to the information sorting order corresponding to the above example is L123x20231111y.543.
Step S401: and performing character adjustment on the basic character string according to a preset character sequencing order to form an adjustment character string.
The character sequencing order is the sequencing order of the characters of all types, the character types comprise numbers, uppercase letters, lowercase letters, symbols and the like, the corresponding character sequencing order can be numbers, symbols and uppercase letters, and finally lowercase letters, and the specific order is determined in advance by staff; the adjustment string is a string obtained by adjusting the base string according to the character sorting order, and the adjustment string is 12320231111543.LYx according to the above example.
Step S402: and performing character position adjustment on the adjustment character strings according to a preset similar ordering sequence to form ordered character strings.
The similar ordering sequence is the sequence of ordering the characters of the same type, for example, for numeric characters, 0-9 is used for ordering, for alphabetical characters, the ordering is carried out according to A-Z, and the specific similar ordering sequence is determined in advance by staff; the ordered string is a string obtained by adjusting the string according to the similar sort order, and the obtained ordered string is 01111122233345. LYx, for example, as the example.
Step S403: and comparing the ordered character strings with the characters in the adjustment character strings in a one-to-one correspondence manner, and defining the characters in the ordered character strings, which do not correspond to the adjustment character strings, as misplacement characters.
The method for comparing is to compare the characters at the same position in the two character strings, for example, the first character in the ordered character string is compared with the first character in the adjustment character string, and the misplacement character is defined to identify the character inconsistent after adjustment, so that the subsequent step analysis is facilitated.
Step S404: counting according to the misplaced characters under the characters of the same type to determine the misplaced number, and arranging the misplaced number determined in each type in a character sequencing order to form a digital character string.
The number of misalignments is the number of misalignments occurring in each type of character, and is 14, 0 in this order, and the numeric string is a string obtained by combining and sorting in the order of character sorting according to the number of misalignments, and is 14000 in this example.
Step S405: it is determined whether the scan identification time is singular.
The purpose of the judgment is to further analyze the digital string.
Step S4051: if the scanning identification time is singular, generating the login permission identification according to the digital character string.
When the scanning identification time is singular, the digital character string is directly used as the login permission identification so as to encrypt the private information.
Step S4052: and if the scanning recognition time is not singular, sequencing the digital character strings from back to front to update the digital character strings, and generating the login permission identification according to the updated digital character strings.
When the scanning identification time is not singular, the digital character strings are sequenced from front to back to be used as login permission identification, so that the encryption of private information is realized.
Referring to fig. 5, after the formation of the numeric string, the step of generating the login-permitted identification further includes:
step S500: and counting characters according to the digital character strings to obtain the number of the characters.
The number of characters is the number of characters in the character string, and the number of characters is 5 by taking the above numeric character string as 14000 as an example.
Step S501: and determining a special character string set corresponding to the number of characters according to a preset special character string matching relation.
The special character string set is a set formed by character strings which can be conveniently obtained through the trial by a user, different character numbers correspond to different special character string sets, for example, when the character number is 7, the corresponding special character strings can comprise 1234567, 7654321, 1314520 and the like, the special character string matching relationship between the character number and the special character string set is specifically set by a staff according to actual conditions, and the staff inputs and stores the special character string matching relationship in advance.
Step S502: it is determined whether the numeric string is within a special string set.
The purpose of the judgment is to know whether the current numeric string is readily available during the user's attempt.
Step S5021: if the number character string is not in the special character string set, determining the login permission identification according to the number character string.
When the digital character string is not in the special character string set, the possibility that the current user enters the private information display interface through the attempted method is low, and the login permission identification is determined normally according to the digital character string.
Step S5022: if the number character string is in the special character string set, the character corresponding to the adjustment character string in the ordered character string is defined as the correct character.
When the digital character string is in the special character string set, the possibility that the current user enters the private information display interface through the attempted method is high, and the digital character string needs to be modified to reduce the possibility of the situation; correct characters are defined to facilitate distinguishing between misplaced characters.
Step S503: the correct number is determined by counting the correct characters under the same type of characters, and the correct number determined in each type is arranged in the character sequencing order to update the digital character string.
The correct number is the number of correct characters in the single type of characters, and taking the above example as an example, the corresponding correct numbers are 0, 1, 2 and 1 respectively, and the updated number character string is 0121.
Referring to fig. 6, after updating the numeric string according to the correct number, the step of generating the login-permitted identification further includes:
step S600: and judging whether the character string is in the corresponding special character string set or not according to the updated digital character string.
The purpose of the judgment is to know whether the updated character string is still a special character string.
Step S6001: if the updated digital character string is not in the corresponding special character string set, determining the login permission identification according to the digital character string.
When the updated digital character string is not in the corresponding special character string set, the digital character string is not the special character string, at the moment, the possibility that the user enters the private information display interface through an attempted method is low, and the login permission identification is normally determined according to the digital character string.
Step S6002: if the updated digital character string is in the corresponding special character string set, determining a median character in the digital character string, and performing average calculation according to all characters in the digital character string to determine a character average.
When the updated digital character string is in the corresponding special character string set, the digital character string is described as the special character string, and the possibility that the user enters the private information display interface through the trial method is still higher, so that the user needs to modify the private information display interface again; the middle character is a character in the middle of the digital character string, and when the number of characters of the digital character string is even, the character in the front of the middle two characters can be determined to be the middle character; the character mean is the average value obtained after the calculation of the sum mean of all the characters in the digital character string.
Step S601: and judging whether the character average value is larger than a preset critical value.
The threshold is a constant value set by a worker, for example, 5, and the purpose of the judgment is to perform different character string changing processes for different character average values.
Step S6011: if the character mean value is greater than the critical value, the characters before the median character are sequenced from back to front and the character after the median character is placed in order to update the digital character string.
When the character average value is larger than the critical value, sequencing the characters before the middle character from back to front and updating the digital character string after the characters after the middle character at the moment to modify the digital character string; for example, the original digital character string is 98765, the threshold is 5, and the corrected digital character string is 76589.
Step S6012: if the character mean value is not greater than the critical value, the characters after the median character are sequenced from back to front and the character before the median character is then updated.
When the character mean value is not greater than the critical value, sequencing the characters after the median character from back to front and updating the digital character string after the characters before the median character at the moment to modify the digital character string; for example, if the original number string is 12345 and the threshold is 5, the corrected number string is 12354.
Referring to fig. 7, the device management method based on the encrypted two-dimensional code further includes:
step S700: and acquiring correction input data sent by the mobile device.
The processor receives the correction input data and may analyze the data for the desired modification.
Step S701: and analyzing according to the correction input data to obtain the type of the correction data and the numerical value of the correction data.
The correction data type is the data type required to be corrected in the correction input data, such as the state of equipment, and the correction data value is the value of the data required to be corrected in the correction input data, for example, the state of the equipment is corrected from a damaged state to a normal state, and the remaining available time is switched from 5 days to 4 days.
Step S702: and determining an allowable correction range corresponding to the correction data type according to the preset type range matching relation.
The allowable correction range is a data range when the data is considered to be normal data, for example, the type of the correction data is the remaining available time length, and in general, the remaining available time length when the device is best is 100 days, the allowable correction range is 0-100, different allowable correction ranges correspond to different correction data types, and the type range matching relationship between the two is determined in advance by staff.
Step S703: and judging whether the correction data value is in the allowable correction range or not.
The purpose of the judgment is to know whether the data currently modified is normal or not.
Step S7031: if the value of the correction data is in the allowable correction range, correcting the value of the correction data on the private information display interface according to the correction input data, outputting a successful correction state and sending the successful correction state as a data correction state to the mobile equipment.
When the value of the correction data is in the allowable correction range, the data needing correction at present is normal, the corresponding data is modified on the private information display interface, and meanwhile, the successful correction state is output and sent to the mobile equipment, so that a user using the mobile equipment can know the situation.
Step S7032: if the correction data value is not within the allowable correction range, outputting a failure correction state and sending the failure correction state as a data correction state to the mobile device.
When the corrected data value is not in the allowable correction range, the condition that the data required to be corrected is abnormal at present and the data input error possibly exists is indicated, and a failure correction state is output and sent to the mobile equipment so that a user using the mobile equipment can know the condition, and the subsequent processing is facilitated.

Claims (3)

1. An equipment management method based on encrypted two-dimensional codes is characterized by comprising the following steps:
is executed on a mobile device:
scanning a two-dimensional code label attached to equipment to enter a public information display interface, and acquiring basic information of the equipment and scanning identification time in the public information display interface;
transmitting the basic information of the equipment and the scanning identification time to a processor for generating login permission identification, and acquiring login input identification in real time on a public information display interface and transmitting the login input identification to the processor in real time;
receiving an electronic two-dimensional code sent by a processor when the login input identification is consistent with the login permission identification, and automatically scanning and identifying to enter a private information display interface;
executing in a processor, where the processor is a device capable of processing each piece of information:
acquiring equipment basic information, scanning identification time and login input identification sent by mobile equipment;
generating a login permission identification according to the basic information of the equipment and the scanning identification time;
judging whether the login input identification is consistent with the login permission identification;
if the login input identification is inconsistent with the login permission identification, no action is performed;
if the login input identification is consistent with the login permission identification, generating an electronic two-dimensional code and transmitting the electronic two-dimensional code to the mobile equipment;
the step executed in the processor for generating the login permission identification according to the basic information of the equipment and the scanning identification time comprises the following steps:
collecting all the basic information of the equipment according to a preset information ordering sequence in the basic information of the equipment to form a basic character string;
performing character adjustment on the basic character string according to a preset character sequencing order to form an adjustment character string;
performing character position adjustment on the adjustment character strings according to a preset similar ordering sequence to form ordered character strings;
comparing the ordered character strings with the characters in the adjustment character strings in a one-to-one correspondence manner, and defining the characters in the ordered character strings, which do not correspond to the adjustment character strings, as misplacement characters;
counting according to the misplacement characters under the characters of the same type to determine the misplacement quantity, and arranging the misplacement quantity determined in each type according to a character sequencing order to form a digital character string;
judging whether the scanning identification time is singular or not;
if the scanning identification time is singular, generating a login permission identification according to the digital character string;
if the scanning recognition time is not singular, sequencing the digital character strings from back to front to update the digital character strings, and generating login permission identification according to the updated digital character strings;
after the formation of the digital character string, the step of generating the login permission identification further comprises the following steps of:
counting characters according to the digital character strings to obtain the number of the characters;
determining a special character string set corresponding to the number of characters according to a preset special character string matching relationship;
judging whether the digital character string is in the special character string set or not;
if the digital character string is not in the special character string set, determining a login permission identification according to the digital character string;
if the number character string is in the special character string set, defining the character corresponding to the adjustment character string in the ordered character string as a correct character;
counting according to correct characters under the characters of the same type to determine correct quantity, and arranging the determined correct quantity in each type in a character sequencing order to update the digital character string;
after the processor updates the number character string according to the correct number, the step of generating the login permission identification further comprises the following steps:
judging whether the digital character string is in the corresponding special character string set or not according to the updated digital character string;
if the updated digital character string is not in the corresponding special character string set, determining a login permission identification according to the digital character string;
if the updated digital character string is in the corresponding special character string set, determining a median character in the digital character string, and performing average calculation according to all characters in the digital character string to determine a character average;
judging whether the character average value is larger than a preset critical value or not;
if the character mean value is larger than the critical value, sequencing the characters before the middle character from back to front, and updating the digital character string after the characters after the middle character;
if the character mean value is not greater than the critical value, the characters after the median character are sequenced from back to front and the character before the median character is then updated.
2. The device management method based on encrypted two-dimensional codes according to claim 1, wherein the device management method based on encrypted two-dimensional codes is executed on the mobile device after the mobile device enters the private information display interface, and further comprises:
acquiring correction input data of a correction window in a private information display interface;
transmitting the corrected input data to the processor for the processor to perform recognition analysis to output a data correction state and receiving the data correction state;
judging whether the data correction state is consistent with a preset successful correction state or not;
outputting a correction success signal if the data correction state is consistent with the success correction state;
and if the data correction state is inconsistent with the successful correction state, outputting a correction failure signal.
3. The device management method based on encrypted two-dimensional codes according to claim 1, wherein the device management method is executed in a processor, and further comprising:
acquiring correction input data sent by mobile equipment;
analyzing according to the correction input data to obtain a correction data type and a correction data value;
determining an allowable correction range corresponding to the correction data type according to a preset type range matching relation;
judging whether the value of the correction data is in an allowable correction range or not;
if the value of the correction data is in the allowable correction range, correcting the value of the correction data on the private information display interface according to the correction input data, outputting a successful correction state and sending the successful correction state as a data correction state to the mobile equipment;
if the correction data value is not within the allowable correction range, outputting a failure correction state and sending the failure correction state as a data correction state to the mobile device.
CN202311674665.6A 2023-12-08 2023-12-08 Device management method based on encrypted two-dimension code Active CN117371017B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311674665.6A CN117371017B (en) 2023-12-08 2023-12-08 Device management method based on encrypted two-dimension code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311674665.6A CN117371017B (en) 2023-12-08 2023-12-08 Device management method based on encrypted two-dimension code

Publications (2)

Publication Number Publication Date
CN117371017A CN117371017A (en) 2024-01-09
CN117371017B true CN117371017B (en) 2024-03-01

Family

ID=89391411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311674665.6A Active CN117371017B (en) 2023-12-08 2023-12-08 Device management method based on encrypted two-dimension code

Country Status (1)

Country Link
CN (1) CN117371017B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187429A (en) * 2015-09-15 2015-12-23 新浪网技术(中国)有限公司 ASCII-based character two-dimensional code terminal logging-in method, apparatus, and system
CN107682367A (en) * 2017-11-14 2018-02-09 北京酷我科技有限公司 A kind of PC ends webpage login method and system
CN108108629A (en) * 2017-10-31 2018-06-01 国家电网公司 Power equipment approaches to IM based on Quick Response Code
CN108848057A (en) * 2018-05-04 2018-11-20 浙江大华技术股份有限公司 A kind of method and device of remote secure access
CN110415430A (en) * 2019-08-30 2019-11-05 无锡小净共享网络科技有限公司 Self-service device control method, starter and mobile terminal
CN110929826A (en) * 2019-12-27 2020-03-27 广东电网有限责任公司 Two-dimensional code-based distribution network equipment information management platform and management method
CN112883752A (en) * 2021-02-04 2021-06-01 支付宝(杭州)信息技术有限公司 Two-dimensional code scanning method, device and equipment
CN113051497A (en) * 2021-03-16 2021-06-29 广东核电合营有限公司 Label information viewing method and device, computer equipment and storage medium
JP2023154460A (en) * 2022-04-07 2023-10-20 Tvs Regza株式会社 server management device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187429A (en) * 2015-09-15 2015-12-23 新浪网技术(中国)有限公司 ASCII-based character two-dimensional code terminal logging-in method, apparatus, and system
CN108108629A (en) * 2017-10-31 2018-06-01 国家电网公司 Power equipment approaches to IM based on Quick Response Code
CN107682367A (en) * 2017-11-14 2018-02-09 北京酷我科技有限公司 A kind of PC ends webpage login method and system
CN108848057A (en) * 2018-05-04 2018-11-20 浙江大华技术股份有限公司 A kind of method and device of remote secure access
CN110415430A (en) * 2019-08-30 2019-11-05 无锡小净共享网络科技有限公司 Self-service device control method, starter and mobile terminal
CN110929826A (en) * 2019-12-27 2020-03-27 广东电网有限责任公司 Two-dimensional code-based distribution network equipment information management platform and management method
CN112883752A (en) * 2021-02-04 2021-06-01 支付宝(杭州)信息技术有限公司 Two-dimensional code scanning method, device and equipment
CN113051497A (en) * 2021-03-16 2021-06-29 广东核电合营有限公司 Label information viewing method and device, computer equipment and storage medium
JP2023154460A (en) * 2022-04-07 2023-10-20 Tvs Regza株式会社 server management device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于手机动态验证码的网络支付风险分析;彭州;;金融科技时代;20150110(第01期);全文 *

Also Published As

Publication number Publication date
CN117371017A (en) 2024-01-09

Similar Documents

Publication Publication Date Title
US6446210B1 (en) Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter
EP1260941A2 (en) Face image recording system
CN111815842A (en) Health information uplink method and device, storage medium and electronic device
CN105225304A (en) Access control device and registration system and method thereof
CN112637282B (en) Information pushing method and device, computer equipment and storage medium
CN110782965A (en) Data processing method, data processing device, computer equipment and storage medium
CN111767192B (en) Business data detection method, device, equipment and medium based on artificial intelligence
CN111314218B (en) Multi-link secure transmission router system
CN108834147A (en) Examine WiFi cipher safety method, apparatus, computer equipment and storage medium
CN111553241A (en) Method, device and equipment for rejecting mismatching points of palm print and storage medium
CN117371017B (en) Device management method based on encrypted two-dimension code
CN117391585A (en) Warehouse information management method and system of industrial Internet
CN116432152A (en) Cross-platform collaborative manufacturing system
CN111523867B (en) Personnel information management method, computer device and storage medium
CN110751033A (en) Offline login method and related product
CN113179249A (en) Method for rapidly and safely mining government affair data in big data network
CN113190508A (en) Management-oriented natural language identification method
CN114241633B (en) Remote control system of intelligent door lock
CN109003190B (en) Nuclear protection method, computer readable storage medium and terminal equipment
CN112632247A (en) Method and device for detecting man-hour report, computer equipment and storage medium
CN114466314B (en) Fixed crowd mobile phone number screening method based on base station positioning
CN113792683B (en) Training method, training device, training equipment and training storage medium for text recognition model
CN114499972B (en) Purchasing management login data working system
CN111277702B (en) Multilink safety mobile phone companion system
CN113162918B (en) Method for extracting abnormal data under condition of rapidly mining four-in-one network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant