為了更好的理解上述技術方案,下面透過圖式以及具體實施例對本說明書實施例的技術方案做詳細的說明,應當理解本說明書實施例以及實施例中的具體特徵是對本說明書實施例技術方案的詳細的說明,而不是對本說明書技術方案的限定,在不衝突的情況下,本說明書實施例以及實施例中的技術特徵可以相互組合。
參見圖1,為本說明書實施例智能設備授權控制方法應用場景示意圖。在該場景中,包括智能設備10、移動終端20以及後台伺服器30。其中,智能設備10例如是自助購物機、智能家電等;移動終端20是手機、ipad、筆記型電腦、智能手錶等;後台伺服器30是位於網路側的服務設備。
本說明書實施例中,智能設備10掃描移動終端20條碼(例如二維碼),由後台伺服器30控制對智能設備10進行授權。例如,用戶透過移動終端20對後台伺服器30請求生成二維碼,後台伺服器透過用戶帳戶資訊生成用戶標識碼,移動終端20根據標識碼生成對應二維碼;智能設備10拍攝解析二維碼後向後台伺服器30進行確認授權請求,後台伺服器30對用戶身份進行驗證後,授權綁定智能設備10。
第一態樣,本說明書實施例提供一種智能設備授權控制方法,根據移動終端生成的條碼控制對智能設備的授權,請參考圖2,包括S201-S202。
S201:移動終端確定登錄智能設備的用戶帳戶資訊,生成用戶帳戶資訊對應的條碼,並向智能設備展示條碼。
為了確保智能設備的安全性,只有授權使用者才能登錄。用戶預先獲取授權的帳戶資訊,用於登錄智能設備。
本說明書實施例中,與常規移動終端掃描智能設備的條碼的方式不同,是在移動終端生成條碼,用於智能設備的授權驗證資訊。
例如,在一種可選方式中,透過如下方式在移動終端生成條碼:
(1)移動終端將用戶帳戶資訊及移動終端資訊發送給後台伺服器;
(2)後台伺服器根據用戶帳戶資訊及移動終端資訊,對移動終端進行驗證,驗證通過後,向移動終端返回用戶標識碼;
(3)移動終端根據用戶標識碼,生成條碼。
用戶帳戶資訊,是指合法用戶預先授權登錄智能設備的帳號資訊,例如,合法用戶透過註冊等方式,得到的包括用戶名、手機號等內容的帳戶資訊。
移動終端資訊,是指唯一標識移動終端的資訊,例如終端ID等。
其中,後台伺服器根據用戶帳戶資訊及移動終端資訊對移動終端進行驗證的過程,例如可以是,後台伺服器根據用戶帳戶資訊及移動終端資訊,在預先儲存的有關智能設備的合法用戶的帳戶資訊庫及終端資訊庫中進行比對,如果帳戶資訊庫及終端資訊庫中儲存有當前用戶帳戶資訊和移動終端資訊,則確認驗證通過。
用戶標識碼,可以理解是唯一標識該合法用戶的資訊,可以根據用戶帳戶資訊利用各種演算法生成得到,例如,根據用戶帳戶資訊利用雜湊演算法得到用戶標識碼。
條碼,是以一定的編碼演算法,包含唯一資訊的條碼,例如包括但不限於一維條碼、二維條碼、三維條碼、彩色條碼等,本說明書實施例對條碼的具體形式不做限定,不過為了說明,下文會以二維條碼(二維碼)作為示例進行描述。以二維碼為例,它是使用若干個與二進位相對應的幾何形體來表示文字數值資訊,將資訊換算成二進位的幾何形體,並生成一個矩陣圖。
S202:根據智能設備掃描條碼的解析資訊,控制對智能設備的授權。
如果是合法用戶,則合法用戶利用移動終端生成的條碼被智能設備掃描後,會得到合法的解析資訊。後台伺服器可對解析資訊進行驗證,從而確定是否向用戶授權該智能設備。
在一種可選方式中,根據解析資訊控制對智能設備的授權的過程包括:
(1)後台伺服器接收智能設備掃描條碼的解析資訊,並獲取智能設備的設備資訊;
(2)後台伺服器根據解析資訊以及設備資訊,對智能設備進行授權驗證;
(3)驗證通過後,向智能設備發送授權成功資訊,從而啟動智能設備的使用。
二維碼生成之後,要用專門的解碼器解碼,例如採用紅外線探頭來抓取圖形,一般分為硬解碼和軟解碼。硬解碼是探頭抓取圖形之後用軟體直接解碼,軟解碼是透過抓取圖形之後傳送到二維碼庫裡去對比解碼。
本說明書實施例中,智能設備利用自身攝像頭對二維碼進行掃描,得到解析資訊。由於二維碼是根據用戶標識碼生成的,因此二維碼的解析資訊即包含了用戶標識碼的資訊內容。
智能設備的設備資訊,是指唯一標識智能設備的資訊,例如包括設備出廠資訊、設備ID等。
其中,後台伺服器根據解析資訊以及設備資訊對智能設備進行授權驗證的過程,例如可以是,後台伺服器預先保存有用戶標識碼庫及智能設備資訊庫,將當前解析資訊與設備資訊分別至用戶標識碼庫及智能設備資訊庫進行比對,如果有,則確定驗證通過。
參見圖3,為本說明書實施例第一態樣提供的智能設備授權控制方法實例流程圖。
S301:移動終端向後台伺服器發送用戶帳戶資訊,請求生成用戶標識碼;
S302:後台伺服器驗證移動終端和用戶帳戶資訊,驗證通過後,生成用戶標識碼;
S303:後台伺服器將用戶標識碼返回給移動終端;
S304:移動終端根據用戶標識碼生成對應的二維碼,並展示該二維碼;
S305:用戶打開智能設備的攝像頭,掃描二維碼;
S306:智能設備將掃描二維碼得到的解析資訊提供給後台伺服器;
S307:後台伺服器驗證解析資訊及設備資訊;
S308:驗證完成後,後台伺服器向智能設備發送授權資訊,授權資訊是指授權成功資訊或授權失敗資訊;
S309:智能設備根據授權資訊,開啟或禁止使用智能設備。
可見,本說明書實施例中,在移動終端根據用戶帳戶資訊生成用於授權智能設備的條碼,然後智能設備透過掃描條碼,根據掃描條碼的解析資訊進行用戶身份驗證,如果驗證通過,則允許使用智能設備,否則不允許使用。由此,透過這種在移動終端生成條碼、智能設備掃描條碼的方式,可以適用各種移動終端登錄智能設備的情形,例如,相對於利用移動終端掃描智能設備二維碼進行登錄的方式,不會因為移動終端攝像頭效果不理想而導致掃描失敗,由此提高授權準確率。
第二態樣,基於同一發明構思,本說明書實施例提供一種智能設備授權控制系統, 根據移動終端生成的條碼控制對智能設備的授權,請參考圖4,該系統包括智能設備401、移動終端402和後台伺服器403;
所述移動終端402,用於確定登錄所述智能設備401的用戶帳戶資訊,生成用戶帳戶資訊對應的條碼,並向所述智能設備401展示所述條碼;
所述後台伺服器403,根據所述智能設備401掃描所述條碼的解析資訊,控制對智能設備401的授權。
在一種可選方式中,
所述移動終端402具體用於,將所述用戶帳戶資訊及移動終端資訊發送給後台伺服器403;以及根據所述後台伺服器403返回的用戶標識碼,生成所述條碼;
所述後台伺服器403,根據所述用戶帳戶資訊及所述移動終端資訊,對所述移動終端402進行驗證,驗證通過後,向所述移動終端402返回用戶標識碼。
在一種可選方式中,
所述後台伺服器403具體用於:根據用戶帳戶資訊及移動終端資訊,在預先儲存的智能設備401的合法用戶的帳戶資訊庫及終端資訊庫中進行比對,如果帳戶資訊庫及終端資訊庫中儲存有當前用戶帳戶資訊和移動終端資訊,則確認驗證通過。
在一種可選方式中,
所述後台伺服器403具體用於,接收所述智能設備401掃描所述條碼的解析資訊,並獲取智能設備401的設備資訊;根據所述解析資訊以及所述設備資訊,對所述智能設備401進行授權驗證;以及,驗證通過後,向所述智能設備401發送授權成功資訊,從而啟動所述智能設備401的使用。
在一種可選方式中,
後台伺服器403具體用於:預先保存有用戶標識碼庫及智能設備資訊庫,將當前解析資訊與設備資訊分別輸入至用戶標識碼庫及智能設備資訊庫進行比對,如果比對成功,則確定驗證通過。
本說明書是參照根據本說明書實施例的方法、設備(系統)、和電腦程式產品的流程圖和/或方框圖來描述的。應理解可由電腦程式指令實現流程圖和/或方框圖中的每一流程和/或方框、以及流程圖和/或方框圖中的流程和/或方框的結合。可提供這些電腦程式指令到通用電腦、專用電腦、嵌入式處理機或其他可編程資料處理設備的處理器以產生一個機器,使得透過電腦或其他可編程資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程和/或方框圖一個方框或多個方框中指定的功能的設備。
這些電腦程式指令也可儲存在能引導電腦或其他可編程資料處理設備以特定方式工作的電腦可讀記憶體中,使得儲存在該電腦可讀記憶體中的指令產生包括指令設備的製造品,該指令設備實現在流程圖一個流程或多個流程和/或方框圖一個方框或多個方框中指定的功能。
這些電腦程式指令也可裝載到電腦或其他可編程資料處理設備上,使得在電腦或其他可編程設備上執行一系列操作步驟以產生電腦實現的處理,從而在電腦或其他可編程設備上執行的指令提供用於實現在流程圖一個流程或多個流程和/或方框圖一個方框或多個方框中指定的功能的步驟。
儘管已描述了本說明書的優選實施例,但本領域內的技術人員一旦得知了基本創造性概念,則可對這些實施例作出另外的變更和修改。所以,所附申請專利範圍意欲解釋為包括較佳實施例以及落入本說明書範圍的所有變更和修改。
顯然,本領域的技術人員可以對本說明書進行各種改動和變型而不脫離本說明書的精神和範圍。這樣,倘若本說明書的這些修改和變型屬於本說明書申請專利範圍及其等同技術的範圍之內,則本說明書也意圖包含這些改動和變型在內。In order to better understand the above technical solutions, the following describes the technical solutions of the embodiments of the specification in detail through the drawings and specific embodiments. It should be understood that the embodiments of the specification and the specific features in the embodiments are the technical solutions of the embodiments of the specification The detailed description, rather than the limitation on the technical solutions of this specification, the embodiments of this specification and the technical features in the embodiments can be combined with each other without conflict.
Refer to FIG. 1, which is a schematic diagram of an application scenario of an intelligent device authorization control method according to an embodiment of the present specification. In this scenario, the smart device 10, the mobile terminal 20, and the background server 30 are included. Among them, the smart device 10 is, for example, a self-service shopping machine, a smart home appliance, etc.; the mobile terminal 20 is a mobile phone, ipad, notebook computer, smart watch, etc.; and the background server 30 is a service device located on the network side.
In the embodiment of the present specification, the smart device 10 scans the barcode (for example, two-dimensional code) of the mobile terminal 20, and the background server 30 controls the authorization of the smart device 10. For example, the user requests the background server 30 to generate a QR code through the mobile terminal 20, the background server generates a user identification code through the user account information, and the mobile terminal 20 generates a corresponding QR code according to the identification code; the smart device 10 shoots and analyzes the QR code After confirming the authorization request to the background server 30, the background server 30 verifies the identity of the user and authorizes the smart device 10 to be bound.
In the first aspect, the embodiments of the present specification provide a smart device authorization control method, which controls the authorization of a smart device according to a barcode generated by a mobile terminal, please refer to FIG. 2, including S201-S202.
S201: The mobile terminal determines the user account information logged into the smart device, generates a barcode corresponding to the user account information, and displays the barcode to the smart device.
In order to ensure the security of smart devices, only authorized users can log in. The user obtains authorized account information in advance for logging into the smart device.
In the embodiment of the present specification, unlike the conventional mobile terminal scanning the barcode of the smart device, the barcode is generated on the mobile terminal for authorization verification information of the smart device.
For example, in an optional manner, a barcode is generated on the mobile terminal in the following manner:
(1) The mobile terminal sends the user account information and mobile terminal information to the background server;
(2) The background server verifies the mobile terminal based on the user account information and the mobile terminal information, and after verification, returns the user identification code to the mobile terminal;
(3) The mobile terminal generates a barcode based on the user identification code.
User account information refers to account information that a legal user has authorized to log in to the smart device in advance. For example, the legal user obtains account information including user name, mobile phone number, etc. through registration and other methods.
Mobile terminal information refers to information that uniquely identifies the mobile terminal, such as terminal ID.
The background server authenticates the mobile terminal based on the user account information and mobile terminal information. For example, the background server may pre-store the account information of the legitimate user of the smart device based on the user account information and mobile terminal information. Compare with the library and terminal information library. If the account information library and terminal information library store the current user account information and mobile terminal information, confirm that the verification is passed.
The user identification code can be understood as information that uniquely identifies the legitimate user, and can be generated using various algorithms based on the user account information, for example, using a hash algorithm to obtain the user identification code based on the user account information.
Barcodes are barcodes that contain unique information, such as but not limited to one-dimensional barcodes, two-dimensional barcodes, three-dimensional barcodes, color barcodes, etc. The specific forms of barcodes are not limited in the embodiments of this specification, but For illustration, a two-dimensional barcode (two-dimensional code) will be described as an example below. Taking the two-dimensional code as an example, it uses a number of geometric shapes corresponding to the binary to represent the textual numerical information, converts the information into a binary geometric shape, and generates a matrix diagram.
S202: Control the authorization of the smart device according to the analysis information of the smart device scanning the barcode.
If it is a legal user, the legal user will obtain the legal resolution information after the barcode generated by the mobile terminal is scanned by the smart device. The background server can verify the resolution information to determine whether to authorize the smart device to the user.
In an optional manner, the process of controlling the authorization of the smart device according to the resolution information includes:
(1) The background server receives the parsing information of the smart device scanning barcode and obtains the device information of the smart device;
(2) The background server performs authorization verification on the smart device based on the analysis information and device information;
(3) After the verification is passed, the successful authorization information is sent to the smart device to start the use of the smart device.
After the two-dimensional code is generated, it needs to be decoded with a special decoder. For example, an infrared probe is used to capture graphics, which is generally divided into hard decoding and soft decoding. Hard decoding is to use the software to decode directly after the probe grabs the graphics. Soft decoding is to capture the graphics and send it to the two-dimensional code library to compare and decode.
In the embodiment of the present specification, the smart device uses its own camera to scan the two-dimensional code to obtain analytical information. Since the two-dimensional code is generated based on the user identification code, the analysis information of the two-dimensional code includes the information content of the user identification code.
The device information of the smart device refers to the information that uniquely identifies the smart device, including, for example, the device factory information and device ID.
Among them, the background server performs authorization verification on the smart device according to the analysis information and the device information, for example, the background server pre-stores the user identification code library and the smart device information library to separate the current analysis information and device information to the user The identification code library and the intelligent device information library are compared, and if there is, the verification is confirmed.
Referring to FIG. 3, it is a flowchart of an example of a method for controlling an authorization of an intelligent device provided in the first aspect of the embodiment of the present specification.
S301: The mobile terminal sends user account information to the background server, requesting to generate a user identification code;
S302: The background server verifies the information of the mobile terminal and the user account, and after verification, generates a user identification code;
S303: The background server returns the user identification code to the mobile terminal;
S304: The mobile terminal generates a corresponding two-dimensional code according to the user identification code and displays the two-dimensional code;
S305: The user turns on the camera of the smart device and scans the QR code;
S306: The smart device provides the analytical information obtained by scanning the QR code to the background server;
S307: The background server verifies the analysis information and equipment information;
S308: After the verification is completed, the background server sends authorization information to the smart device. The authorization information refers to authorization success information or authorization failure information;
S309: The smart device enables or prohibits the use of the smart device according to the authorized information.
It can be seen that in the embodiment of this specification, the mobile terminal generates a barcode for authorizing the smart device based on the user account information, and then the smart device performs user identity verification by scanning the barcode and based on the parsed information of the scanned barcode. If the verification is passed, the use of smart Equipment, otherwise it is not allowed to use. Therefore, this method of generating barcodes on mobile terminals and scanning barcodes on smart devices can be applied to various situations where mobile terminals log in to smart devices. For example, compared with the method of using mobile terminals to scan two-dimensional codes on smart devices for registration, it does not Because the camera effect of the mobile terminal is not ideal, the scan fails, thereby increasing the accuracy of authorization.
In a second aspect, based on the same inventive concept, the embodiments of the present specification provide a smart device authorization control system that controls the authorization of smart devices based on a barcode generated by a mobile terminal. Please refer to FIG. 4, the system includes a smart device 401 and a mobile terminal 402 And background server 403;
The mobile terminal 402 is configured to determine user account information logged into the smart device 401, generate a bar code corresponding to the user account information, and display the bar code to the smart device 401;
The background server 403 controls the authorization of the smart device 401 based on the smart device 401 scanning the bar code analysis information.
In an alternative way,
The mobile terminal 402 is specifically configured to send the user account information and mobile terminal information to the background server 403; and generate the barcode according to the user identification code returned by the background server 403;
The background server 403 verifies the mobile terminal 402 based on the user account information and the mobile terminal information, and returns the user identification code to the mobile terminal 402 after the verification is passed.
In an alternative way,
The background server 403 is specifically used for comparing the account information library and terminal information library of the legitimate user of the smart device 401 pre-stored based on the user account information and mobile terminal information, if the account information library and terminal information library The current user account information and mobile terminal information are stored in it, and then verification is confirmed.
In an alternative way,
The background server 403 is specifically used to receive the parsing information of the smart device 401 scanning the barcode and obtain the device information of the smart device 401; according to the parsing information and the device information, the smart device 401 Perform authorization verification; and, after the verification is passed, send the authorization success information to the smart device 401, thereby starting the use of the smart device 401.
In an alternative way,
The background server 403 is specifically used for pre-storing the user identification code library and the smart device information library, and input the current analytical information and device information to the user identification code library and the smart device information library for comparison, if the comparison is successful, then Confirm verification.
This specification is described with reference to flowcharts and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the specification. It should be understood that each flow and/or block in the flowchart and/or block diagram and a combination of the flow and/or block in the flowchart and/or block diagram can be implemented by computer program instructions. These computer program instructions can be provided to the processors of general-purpose computers, special-purpose computers, embedded processors, or other programmable data processing equipment to produce a machine that enables the generation of instructions executed by the processor of the computer or other programmable data processing equipment A device for realizing the functions specified in one block or multiple blocks of one flow or multiple blocks of a flowchart.
These computer program instructions can also be stored in a computer readable memory that can guide the computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer readable memory produce manufactured products including the instruction equipment, The instruction device implements the functions specified in one block or multiple blocks in one flow or multiple flows in the flowchart and/or one block in the block diagram.
These computer program instructions can also be loaded on a computer or other programmable data processing device, so that a series of operating steps can be performed on the computer or other programmable device to generate computer-implemented processing, which can be executed on the computer or other programmable device The instructions provide steps for implementing the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and/or block diagrams.
Although the preferred embodiments of the present specification have been described, those skilled in the art can make additional changes and modifications to these embodiments once they learn the basic inventive concept. Therefore, the scope of the attached patent application is intended to be interpreted as including the preferred embodiments and all changes and modifications falling within the scope of this specification.
Obviously, those skilled in the art can make various modifications and variations to this description without departing from the spirit and scope of this description. In this way, if these modifications and variations of this specification fall within the scope of the patent application of this specification and the scope of its equivalent technology, this specification is also intended to include these modifications and variations.