TWI724450B - Code scanning control method, device and system - Google Patents

Code scanning control method, device and system Download PDF

Info

Publication number
TWI724450B
TWI724450B TW108123746A TW108123746A TWI724450B TW I724450 B TWI724450 B TW I724450B TW 108123746 A TW108123746 A TW 108123746A TW 108123746 A TW108123746 A TW 108123746A TW I724450 B TWI724450 B TW I724450B
Authority
TW
Taiwan
Prior art keywords
dynamic password
target
graphic code
client
control
Prior art date
Application number
TW108123746A
Other languages
Chinese (zh)
Other versions
TW202011310A (en
Inventor
齊元子
Original Assignee
開曼群島商創新先進技術有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 開曼群島商創新先進技術有限公司 filed Critical 開曼群島商創新先進技術有限公司
Publication of TW202011310A publication Critical patent/TW202011310A/en
Application granted granted Critical
Publication of TWI724450B publication Critical patent/TWI724450B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/18Payment architectures involving self-service terminals [SST], vending machines, kiosks or multimedia terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3276Short range or proximity payments by means of M-devices using a pictured code, e.g. barcode or QR-code, being read by the M-device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment

Abstract

本說明書一個或多個實施例提供了一種掃碼控制方法、裝置及系統,其中,該方法包括:接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。One or more embodiments of this specification provide a code scanning control method, device, and system, wherein the method includes: receiving a device control request sent by a client; determining whether the target dynamic password carried in the device control request satisfies a preset Timeliness conditions, where the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal one-to-one; corresponding control operations are executed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users.

Description

掃碼控制方法、裝置及系統Code scanning control method, device and system

本說明書一個或多個涉及網際網路技術領域,尤其涉及一種掃碼控制方法、裝置及系統。One or more of this specification relates to the field of Internet technology, and in particular to a method, device and system for scanning code control.

目前,隨著網際網路技術的快速發展,智慧設備終端的應用越來越廣泛,例如自取式商品售賣櫃,用戶透過使用行動終端(如智慧型手機)掃描商品售賣櫃上的圖形碼,能夠向後台服務端發送設備控制請求,以實現對商品售賣櫃的智慧控制,具體的,後台服務端自動控制商品售賣櫃執行開門操作,這樣用戶能夠從商品售賣櫃內取出自身所需購買的商品,商品售賣櫃向後台服務端發送用戶所購買商品資訊,以使後台服務端進行支付結算。 其中,針對智慧設備終端的廣泛應用,給人們的日常生活帶來便利性的同時,在掃碼控制的過程中存在一定的安全隱患,給惡意用戶提供了攻擊正常用戶的機會,從而將給正常用戶帶來一定的經濟損失。具體的,針對消費類的智慧設備終端,如自取式商品售賣櫃、共享租賃商品等。 當前,由於現有的智慧設備終端上設置的用於提供用戶掃描的圖形碼均為靜態圖形碼,只要惡意用戶一次性獲取到該靜態圖形碼對應的URL地址和設備標識後,惡意用戶可以透過非法手段觸發正常用戶所用的客戶端向後台服務端發送攜帶該URL地址和設備標識的設備控制請求,後台服務端直接基於該控制請求控制與該設備標識對應的智慧設備終端執行目標操作,例如,控制商品售賣櫃執行開門操作,並對發出該控制請求的正常用戶進行支付扣款,使得惡意用戶能夠實現在不需要支付費用的情況下,從商品售賣櫃中取出所需的商品,而是直接從正常用戶的資金帳號上扣款。 由此可知,需要提供一種防攻擊且安全性高的掃碼控制設備終端的方法。At present, with the rapid development of Internet technology, the application of smart device terminals is becoming more and more extensive, such as self-pickup merchandise vending cabinets. Users use mobile terminals (such as smart phones) to scan the graphic codes on the merchandise vending cabinets. Able to send equipment control requests to the back-end server to realize intelligent control of the merchandise sales cabinet. Specifically, the back-end server automatically controls the merchandise sales cabinet to open the door, so that users can take out the goods they need to buy from the merchandise sales cabinet , The merchandise sales cabinet sends information about the products purchased by the user to the back-end server so that the back-end server can make payment and settlement. Among them, the wide application of smart device terminals brings convenience to people’s daily lives. At the same time, there are certain security risks in the process of scanning code control, which provides malicious users with the opportunity to attack normal users, which will give normal users an opportunity to attack normal users. Users bring certain economic losses. Specifically, for consumer smart device terminals, such as self-pickup merchandise sales cabinets, shared leased merchandise, etc. At present, since the graphic codes set on the existing smart device terminals to provide users with scanning are static graphic codes, as long as the malicious user obtains the URL address and device identification corresponding to the static graphic code at one time, the malicious user can use the illegal The method triggers the client used by normal users to send a device control request carrying the URL address and device identification to the back-end server, and the back-end server directly controls the smart device terminal corresponding to the device identification to perform the target operation based on the control request, for example, control The merchandise vending cabinet executes the door opening operation, and the normal user who issued the control request is paid and deducted, so that the malicious user can take out the required merchandise from the merchandise vending cabinet without paying any fees, but directly from The money is deducted from the funds account of normal users. It can be seen from this that there is a need to provide a method for scanning code control device terminals that is anti-attack and highly secure.

本說明書一個或多個實施例的目的是提供一種掃碼控制方法、裝置及系統,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 為解決上述技術問題,本說明書一個或多個實施例是這樣實現的: 本說明書一個或多個實施例提供了一種掃碼控制方法,包括: 接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種掃碼控制方法,包括: 接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種掃碼控制裝置,包括: 請求接收模組,用於接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 密碼識別模組,用於判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 控制模組,用於根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種掃碼控制裝置,包括: 請求接收模組,用於接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 密碼識別模組,用於判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應; 控制模組,用於根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種掃碼控制設備,包括:處理器;以及 被安排成儲存計算機可執行指令的記憶體,所述可執行指令在被執行時使所述處理器: 接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種掃碼控制設備,包括:處理器;以及 被安排成儲存計算機可執行指令的記憶體,所述可執行指令在被執行時使所述處理器: 接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種儲存媒體,用於儲存計算機可執行指令,所述可執行指令在被執行時實現以下流程: 接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例提供了一種儲存媒體,用於儲存計算機可執行指令,所述可執行指令在被執行時實現以下流程: 接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 本說明書一個或多個實施例中的掃碼控制方法、裝置及系統,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。The purpose of one or more embodiments of this specification is to provide a scanning code control method, device and system. Since the graphic code displayed on the device terminal is dynamically changed, the dynamic password uploaded by the client should have a certain timeliness. The timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users in response to the situation where the client is identified as being illegally attacked by malicious users. In order to solve the above technical problems, one or more embodiments of this specification are implemented as follows: One or more embodiments of this specification provide a code scanning control method, including: Receiving a device control request sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a code scanning control method, including: Receiving a device control request for a code scanning sales device sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password satisfies a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target scan code sales device in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a code scanning control device, including: The request receiving module is configured to receive a device control request sent by the client, wherein the device control request carries a target dynamic password; The password identification module is used to determine whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; The control module is used to perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a code scanning control device, including: The request receiving module is configured to receive a device control request for a code-scanning sales device sent by a client, wherein the device control request carries a target dynamic password; The password identification module is used to determine whether the target dynamic password satisfies a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target scan code sales device in a one-to-one correspondence; The control module is used to perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a code scanning control device, including: a processor; and A memory arranged to store computer-executable instructions that, when executed, cause the processor to: Receiving a device control request sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a code scanning control device, including: a processor; and A memory arranged to store computer-executable instructions that, when executed, cause the processor to: Receiving a device control request for a code scanning sales device sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password satisfies a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target scan code sales device in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a storage medium for storing computer-executable instructions that, when executed, implement the following processes: Receiving a device control request sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. One or more embodiments of this specification provide a storage medium for storing computer-executable instructions that, when executed, implement the following processes: Receiving a device control request for a code scanning sales device sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password satisfies a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target scan code sales device in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. The code scanning control method, device and system in one or more embodiments of this specification receives a device control request sent by a client; determines whether the target dynamic password carried in the device control request satisfies the preset timeliness condition, wherein the The target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target device terminal; corresponding control operations are executed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users.

為了使本技術領域的人員更好地理解本說明書一個或多個中的技術方案,下面將結合本說明書一個或多個實施例中的附圖,對本說明書一個或多個實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本說明書一個或多個一部分實施例,而不是全部的實施例。基於本說明書一個或多個中的實施例,本領域普通技術人員在沒有作出創造性勞動前提下所獲得的所有其他實施例,都應當屬本說明書一個或多個保護的範圍。 本說明書一個或多個實施例提供了一種掃碼控制方法、裝置及系統,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 圖1為本說明書一個或多個實施例提供的掃碼控制系統的應用場景示意圖,如圖1所示,該控制系統包括:後台服務端、客戶端和設備終端,其中,該客戶端可以是智慧型手機、平板電腦等行動終端,該後台服務端可以是用於對設備終端進行管理控制且具有saas服務的後台伺服器,該設備終端可以是掃碼售賣設備、掃碼租賃產品等等,其中,掃碼控制的具體過程為: 首先,客戶端向後台服務端發送設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼; 具體的,客戶端可以是基於主動對設備終端上的圖形碼進行掃碼操作而發出的設備控制請求,即屬正常主動請求控制設備終端;客戶端還可以是在惡意用戶透過非法手段觸發下而發出的設備控制請求,即被攻擊後被動請求控制設備終端; 然後,後台服務端接收到上述設備控制請求後,判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件; 具體的,針對客戶端基於對設備終端上的圖形碼進行掃碼操作而發出的設備控制請求的情況,設備控制請求中攜帶的目標動態密碼是有效的;由於設備終端上顯示的圖形碼對應的動態密碼是動態更新的,惡意用戶從獲取動態密碼再到觸發正常用戶向後台服務端發出攜帶該動態密碼的設備控制請求的過程需要一定時間,因此,針對客戶端在惡意用戶透過非法手段觸發下而發出的設備控制請求的情況,設備控制請求中攜帶的目標動態密碼是無效的; 最後,後台服務端根據針對目標動態密碼的時效性判斷結果執行相應的控制操作; 具體的,當確定出目標動態密碼有效時,說明客戶端屬正常主動向後台服務端請求控制設備終端,此時,後台服務端需要正常響應該設備控制請求,控制設備終端執行相應的控制動作;當確定出目標動態密碼無效時,說明客戶端屬被攻擊而向後台服務端請求控制設備終端,此時,後台服務端需要向客戶端回傳提示資訊,從而實現對惡意用戶的非法攻擊行為進行有效控制,避免給正常用戶帶來不必要的損失。 圖2為本說明書一個或多個實施例提供的掃碼控制方法的第一種流程示意圖,圖2中的方法能夠由圖1中的後台服務端執行,如圖2所示,該方法至少包括以下步驟: S201,接收客戶端發送的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼; 具體的,後台服務端接收到的設備控制請求可以是客戶端基於主動對設備終端上的圖形碼進行掃碼操作而發出的,即屬客戶端正常主動請求控制設備終端;還可以是客戶端在惡意用戶透過非法手段觸發下而發出的,即屬客戶端被攻擊後被動請求控制設備終端; S202,判斷設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應,即在掃描圖形碼驗證階段,確定目標動態密碼的時效性,以識別是否存在用戶被攻擊的情形,針對設備終端為掃碼售賣設備的情況,該掃描圖形碼驗證階段即為用戶使用客戶端掃描圖形碼請求打開開門頁面的過程; 具體的,針對客戶端基於對設備終端上的圖形碼進行掃碼操作而發出的設備控制請求的情況,設備控制請求中攜帶的目標動態密碼是滿足預設時效性條件的,即目標動態密碼對應的圖形碼未失效,此時設備終端上顯示的圖形碼對應的動態密碼即為該目標動態密碼; 針對客戶端在惡意用戶透過非法手段觸發下而發出的設備控制請求的情況,設備控制請求中攜帶的目標動態密碼是不滿足預設時效性條件的,即目標動態密碼對應的圖形碼已失效,此時設備終端上顯示的圖形碼對應的動態密碼不是該目標動態密碼; S203,根據針對目標動態密碼的時效性判斷結果執行相應的控制操作,其中,該判斷結果可以是目標動態密碼滿足預設時效性條件,還可以是目標動態密碼不滿足預設時效性條件; 具體的,若目標動態密碼滿足預設時效性條件,說明客戶端屬正常主動向後台服務端請求控制設備終端,此時,後台服務端需要正常響應該設備控制請求,控制設備終端執行相應的控制動作;若目標動態密碼不滿足預設時效性條件,說明客戶端屬被攻擊而向後台服務端請求控制設備終端,此時,後台服務端需要向客戶端回傳提示資訊,例如,觸發客戶端展示報錯頁面。 本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 其中,如圖3所示,上述S203根據針對目標動態密碼的時效性判斷結果執行相應的控制操作,具體包括: 若判斷結果為是,則執行S2031,向客戶端回傳業務頁面,以使該客戶端基於該業務頁面向後台服務端請求控制目標設備終端; 具體的,針對判斷結果為是的情況,即目標動態密碼滿足預設時效性條件,說明客戶端屬正常主動向後台服務端請求控制設備終端,此時,後台服務端需要正常響應該設備控制請求,即後台服務端可以直接向設備終端發送控制指令,例如,下發開門指令;為了進一步提高設備控制的準確度,還可以先向客戶端回傳用於渲染業務頁面的業務資料,以使用戶基於客戶端展示的業務頁面向客戶端發送確認控制資訊,對應的,後台服務端接收到該確認控制資訊後,控制設備終端執行相應的控制動作; 若判斷結果為否,則執行S2032,向客戶端回傳第一提示資訊,以使該客戶端基於該第一提示資訊進行提示; 具體的,針對判斷結果為否的情況,即目標動態密碼不滿足預設時效性條件,說明客戶端屬被攻擊而向後台服務端請求控制設備終端,此時,後台服務端需要向客戶端回傳第一提示資訊,以提示用戶當前存在被攻擊的可能性,另外,還可以在客戶端顯示的第一提示資訊的展示頁面上,提供確認提交設備控制請求的選項,例如,提供手動提交開門請求的選項,以防止因客戶端掃碼延時而出現上傳的目標動態密碼失效的情況下導致無法交易的問題。 進一步的,為了進一步提高設備控制的準確度,還可以先向客戶端回傳用於渲染業務頁面的業務資料,以使用戶基於客戶端展示的業務頁面向客戶端發送確認控制資訊,基於此,如圖4所示,在上述S2031向客戶端回傳業務頁面之後,還包括: S2033,接收客戶端針對展示的業務頁面發送的控制確認資訊,其中,針對設備終端為掃碼售賣設備的情況,該業務頁面可以是開門確認頁面,當客戶端檢測到用戶在開門確認頁面上點擊開門選項後,向後台服務端發送確認開門資訊,針對設備終端為掃碼租賃產品的情況,該業務頁面還可以是開鎖確認頁面,當客戶端檢測到用戶在開鎖確認頁面上點擊開鎖選項後,向後台服務端發送確認開鎖資訊; S2034,基於接收到的控制確認資訊向目標設備終端發送控制指令,以使該目標設備終端執行相應的控制動作,其中,該控制指令可以是開門指令,還可以是開鎖指令,對應的,該目標設備終端執行的控制動作可以是開門操作,還可以是開鎖操作等等。 其中,後台服務端需要按照預設規則生成包含動態密碼的圖形碼資訊,並將該圖形碼資訊下發給對應的設備終端,以使設備終端顯示於該圖形碼資訊對應的圖形碼,這樣能夠保證設備終端上顯示的用於提供客戶端掃描的圖形碼是動態更新的,從而保證客戶端上傳的設備控制請求中攜帶的目標動態密碼是動態變化的,以便後續基於對目標動態密碼的時效性判斷來確定執行何種控制操作,具體的,如圖5所示,在上述S201接收客戶端發送的設備控制請求之前,還包括: S204,根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼,其中,該設備標識可以是預先為每個設備終端分配的唯一性標識,該標識密鑰可以是按照預設方式基於設備標識確定的,該時間戳資訊可以是確定動態密碼時的當前時間戳,具體的,可以將該動態密碼儲存於key-value資料庫(即redis)中; S205,根據確定出的動態密碼,生成圖形碼資訊,其中,該圖形碼資訊可以是預設URL地址與動態密碼拼接得到的,即可以將動態密碼添加至URL地址的尾端,例如,該URL地址可以是https://alipay.com/detail.htm; S206,將生成的圖形碼資訊下發給目標設備終端,以使該目標設備終端基於該圖形碼資訊顯示相應的圖形碼,其中,由於每次生成的動態密碼各不相同,因此,圖形碼資訊各不相同,以使設備終端展示的圖形碼是動態更新的,該圖形碼可以是二維碼,還可以是條形碼; 具體的,為了降低設備終端的製造成本,可以以電子墨水標簽屏幕作為圖形碼顯示螢幕,例如,設備終端上設置的用於顯示圖形碼的顯示螢幕可複用。 其中,客戶端在掃描目標設備終端上顯示的圖形碼時,能夠解析出該圖形碼對應的目標動態密碼,再基於該目標動態密碼生成設備控制請求,以及向後台服務端發送該設備控制請求,以使該後台服務端基於該設備控制請求對目標設備終端進行控制。 進一步的,為了提高目標動態密碼的時效性的判斷效率和判斷準確度,可以將失效的動態密碼自動刪除,進而在接收到設備控制請求後,判斷是否存在該設備控制請求中攜帶的目標動態密碼,從而確定該目標動態密碼是否滿足預設時效性條件,基於此,如圖6所示,在上述S206將生成的圖形碼資訊下發給目標設備終端之後,還包括: S207,將確定出的動態密碼添加至動態密碼集合中,以及當任一動態密碼滿足預設銷毀條件時,將該動態密碼從動態密碼集合中移除,其中,該預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用,具體的,動態密碼達到預設存活時間是指動態密碼的存貨時間大於預設時效閾值,即動態密碼過期銷毀,動態密碼已使用是指已針對該動態密碼進行設備終端控制,即動態密碼已使用銷毀,其中,該動態密碼集合包括至少一個有效的動態密碼,該動態密碼集合設置於key-value資料庫(即redis)中; 對應的,上述S202判斷設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,具體包括: S2021,判斷動態密碼集合中是否存在設備控制請求中攜帶的目標動態密碼; 若判斷結果為是,則確定目標動態密碼滿足預設時效性條件,並執行上述S2031向客戶端回傳業務頁面,以使該客戶端基於該業務頁面向後台服務端請求控制目標設備終端; 若判斷結果為否,則確定目標動態密碼不滿足預設時效性條件,並執行上述S2032向客戶端回傳第一提示資訊,以使該客戶端基於該第一提示資訊進行提示。 具體的,當將某一動態密碼從動態密碼集合中移除後,說明該動態密碼對應的圖形碼變為失效,需要更新對應的設備終端上顯示的圖像碼,基於此,上述S207將該動態密碼從動態密碼集合中移除之後,還包括: 生成新的動態密碼,基於該新的動態密碼更新對應的目標設備終端上顯示的圖形碼; 具體的,生成新的動態密碼的過程,參見上述步驟S204,其中,生成新的動態密碼後,根據該動態密碼,生成圖形碼資訊,將該圖形碼資訊下發給對應的目標設備終端,以更新該目標設備終端上顯示的圖形碼。 其中,上述S204根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼,具體包括: 利用消息摘要算法根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊的至少兩個,確定動態密碼,其中,該消息摘要算法可以是md5加密算法,具體的,利用md5加密算法對設備id、與該設備id對應的唯一key以及時間戳資訊中至少兩個進行md5加密,生成sign字段。 其中,上述S2034基於接收到的控制確認資訊向目標設備終端發送控制指令,具體包括: 在動態密碼集合中,查找是否存在與接收到的控制確認資訊對應的動態密碼,具體的,在接收到客戶端針對業務頁面發送的控制確認資訊後,再次判斷動態集合中是否存在對應的動態密碼; 若是,則將該動態密碼從上述動態密碼集合中移除,以及向目標設備終端發送控制指令; 具體的,在接收到客戶端針對業務頁面發送的控制確認資訊後,說明後台服務端需要對設備終端執行相應的控制操作,對應的,該動態密碼滿足預設銷毀條件,銷毀該動態密碼後,針對展示包含該動態密碼的圖形碼的目標設備終端,生成新的動態密碼,基於該新的動態密碼更新該目標設備終端上顯示的圖形碼; 若否,則向目標設備終端發送控制指令,或者向客戶端回傳第二提示資訊,以提示用戶是否重新向後台服務端發送設備控制請求; 具體的,由於在掃描圖形碼驗證階段驗證通過後,即設備控制請求中攜帶的目標動態密碼滿足預設時效性條件,如果客戶端在預設時間內針對業務頁面向後台服務端發送的控制確認資訊,本次設備控制請求對應的目標動態密碼應該是有效的,即在動態密碼集合中存在目標動態密碼,若在動態密碼集合中不存在目標動態密碼,則說明客戶端未在預設時間內針對業務頁面向後台服務端發送的控制確認資訊。 在一個具體實施例中,上述掃碼控制方法主要包括:圖形碼資訊下發過程和基於圖形碼時效性進行設備控制的過程,如圖7a所示,給出了掃碼控制方法中圖形碼資訊下發過程的資訊互動示意圖,具體為: S701,後台服務端獲取目標設備終端的設備標識; S702,後台服務端根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊,生成動態密碼,其中,可以是在確定目標設備終端上顯示的圖形碼過期後,生成新的動態密碼,以更新目標設備終端上顯示的圖形碼,還可以是在確定客戶端已基於圖形碼對於的動態密碼發出設備控制請求後,生成新的動態密碼,以更新目標設備終端上顯示的圖形碼; S703,後台服務端根據生成的動態密碼和預設URL地址,生成圖形碼資訊; S704,後台服務端向目標設備終端發送圖形碼資訊; S705,目標設備終端在接收到圖形碼資訊後,在顯示螢幕上基於該圖形碼資訊展示圖形碼; S706,後台服務端在key-value資料庫中儲存生成的動態密碼,其中。針對儲存於key-value資料庫中的動態密碼,若該動態密碼滿足預設銷毀條件,則刪除該動態密碼; 如圖7b所示,給出了掃碼控制方法中基於圖形碼時效性進行設備控制過程的資訊互動示意圖,針對設備終端為掃碼售賣設備的情況,具體為: S707,客戶端向後台服務端發送攜帶有目標動態密碼的設備控制請求,其中,該設備控制請求可以是客戶端基於主動對目標設備終端上的圖形碼進行掃碼操作而發出的,還可以是客戶端在惡意用戶透過非法手段觸發下而發出的; S708,後台服務端在接收到設備控制請求後,觸發key-value資料庫查詢是否存在設備控制請求中攜帶的目標動態密碼; S709,key-value資料庫向後台服務端回傳動態密碼的查詢結果,其中,該查詢結果可以是存在目標動態密碼,還可以是不存在目標動態密碼; S710,後台服務端在接收到的查詢結果為不存在時,向客戶端發送報錯提示頁面; S711,後台服務端在接收到的確定查詢結果為存在時,則向客戶端發送用於渲染開門頁面的業務資料; S712,客戶端渲染並展示開門頁面,其中,該開門頁面用於觸發用戶進行開門請求確認; S713,客戶端若監測到用戶點擊確認開門選項後,向後台服務端發送確認開門請求; S714,後台服務端在接收到確認開門請求後,觸發key-value資料庫查詢是否存在與該確認開門請求對應的目標動態密碼; S715,key-value資料庫若確定查詢結果為存在,則銷毀目標動態密碼; S716,key-value資料庫向後台服務端回傳動態密碼存在的查詢結果; S717,後台服務端在接收到動態密碼存在的查詢結果後,向設備終端下發開門指令;以及, S718,後台服務端重新執行圖形碼資訊下發步驟,以更新設備終端上顯示的圖形碼,從而實現控制設備終端上顯示的圖形碼動態更新。 本說明書一個或多個實施例中的掃碼控制方法,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 對應上述圖2至圖6描述的掃碼控制方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種掃碼控制方法,圖8為本說明書一個或多個實施例提供的掃碼控制方法的流程示意圖,圖8中的方法能夠由圖1中的客戶端執行,如圖8所示,該方法至少包括以下步驟: S801,向後台服務端發送攜帶有目標動態密碼的設備控制請求,以使後台服務端判斷該目標動態密碼是否滿足預設時效性條件; S802,接收後台服務端發送的回饋資訊,其中,該回饋資訊是後台服務端針對目標動態密碼的時效性判斷結果生成的。 本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 其中,上述S802接收後台服務端發送的回饋資訊,具體包括: 接收後台服務端確定目標動態密碼滿足預設時效性條件時所發送的業務頁面,並基於該業務頁面向後台服務端請求控制目標設備終端; 接收後台服務端確定目標動態密碼不滿足預設時效性條件時所發送的提示資訊,並基於該提示資訊進行提示。 本說明書一個或多個實施例中的掃碼控制方法,向後台服務端發送攜帶有目標動態密碼的設備控制請求,以使後台服務端判斷該目標動態密碼是否滿足預設時效性條件;以及接收後台服務端發送的回饋資訊,其中,該回饋資訊是後台服務端針對目標動態密碼的時效性判斷結果生成的。本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 需要說明的是,本說明書中該實施例與本說明書中上一實施例基於同一發明構思,因此該實施例的具體實施可以參見前述掃碼控制方法的實施,重複之處不再贅述。 對應上述圖2至圖6描述的掃碼控制方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種掃碼控制方法,圖9為本說明書一個或多個實施例提供的掃碼控制方法的流程示意圖,圖9中的方法能夠由圖1中的設備終端執行,如圖9所示,該方法至少包括以下步驟: S901,基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,該圖形碼是在後台服務端控制下動態更新的,每個圖形碼對應於一個唯一的動態密碼; S902,接收後台服務端發送的控制指令,其中,該控制指令是後台服務端針對接收到的設備控制請求中攜帶的目標動態密碼的時效性判斷結果生成的。 本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 其中,上述S902接收後台服務端發送的控制指令,具體包括: 接收後台服務端確定目標動態密碼滿足預設時效性條件時所發送的控制指令,以及基於該控制指令執行相應的控制動作,其中,針對掃碼售賣設備而言,該控制指令為開門指令,掃碼售賣設備接收到該開門指令後,執行開門操作。 本說明書一個或多個實施例中的掃碼控制方法,基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,該圖形碼是在後台服務端控制下動態更新的,每個圖形碼對應於一個唯一的動態密碼;以及接收後台服務端發送的控制指令,其中,該控制指令是後台服務端針對接收到的設備控制請求中攜帶的目標動態密碼的時效性判斷結果生成的。本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 需要說明的是,本說明書中該實施例與本說明書中上一實施例基於同一發明構思,因此該實施例的具體實施可以參見前述掃碼控制方法的實施,重複之處不再贅述。 對應上述圖2至圖6描述的掃碼控制方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種掃碼控制方法,圖10為本說明書一個或多個實施例提供的掃碼控制方法的流程示意圖,圖10中的方法能夠由圖1中的後台服務端執行,如圖10所示,針對設備終端為掃碼售賣設備的情況,該方法至少包括以下步驟: S1001,接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼,該掃碼售賣設備可以是智慧掃碼開門自取式貨櫃;其中,步驟S1001的具體實施方式參見步驟S201,這裡不再贅述。 S1002,判斷設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應;其中,步驟S1002的具體實施方式參見步驟S202,這裡不再贅述。 S1003,根據針對目標動態密碼的時效性判斷結果執行相應的控制操作;其中,步驟S1003的具體實施方式參見步驟S203,這裡不再贅述。 本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 其中,在S1001接收客戶端發送的針對掃碼售賣設備的設備控制請求之前,還包括: 步驟一,根據目標掃碼售賣設備的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼; 步驟二,根據確定出的動態密碼,生成圖形碼資訊; 步驟三,將生成的圖形碼資訊下發給目標掃碼售賣設備,以使該目標掃碼售賣設備基於該圖形碼資訊顯示圖形碼。 其中,上述步驟一根據目標掃碼售賣設備的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼之後,還包括: 將確定出的動態密碼添加至動態密碼集合,以及當任一動態密碼滿足預設銷毀條件時,將該動態密碼從動態密碼集合中移除,其中,該預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用; 對應的,上述S1002判斷設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,具體包括: 若動態密碼集合中存在目標動態密碼,則確定該目標動態密碼滿足預設時效性條件; 若動態密碼集合中不存在目標動態密碼,則確定該目標動態密碼不滿足預設時效性條件。 其中,上述將動態密碼從動態密碼集合中移除之後,還包括: 生成新的動態密碼,基於該新的動態密碼更新目標掃碼售賣設備上顯示的圖形碼。 本說明書一個或多個實施例中的掃碼控制方法,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 需要說明的是,本說明書中該實施例與本說明書中上一實施例基於同一發明構思,因此該實施例的具體實施可以參見前述掃碼控制方法的實施,重複之處不再贅述。 對應上述圖2至圖6描述的掃碼控制方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種掃碼控制裝置,圖11為本說明書一個或多個實施例提供的掃碼控制裝置的模組組成示意圖,該裝置用於執行圖2至圖6描述的掃碼控制方法,如圖11所示,該裝置包括: 請求接收模組1101,用於接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 密碼識別模組1102,用於判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 控制模組1103,用於根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 可選地,上述控制模組1103,具體用於: 若判斷結果為是,則向所述客戶端回傳業務頁面,以使所述客戶端基於所述業務頁面向後台服務端請求控制所述目標設備終端; 若判斷結果為否,則向所述客戶端回傳提示資訊,以使所述客戶端基於所述提示資訊進行提示。 可選地,上述裝置還包括控制指令下發模組,其中,該控制指令下發模組,用於: 在向所述客戶端回傳業務頁面之後,接收所述客戶端針對所述業務頁面發送的控制確認資訊; 基於所述控制確認資訊向所述目標設備終端發送控制指令,以使所述目標設備終端執行相應的控制動作。 可選地,上述裝置還包括圖形碼更新模組,其中,該圖形碼更新模組,用於: 在接收客戶端發送的設備控制請求之前,根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼; 根據確定出的所述動態密碼,生成圖形碼資訊; 將所述圖形碼資訊下發給所述目標設備終端,以使所述目標設備終端基於所述圖形碼資訊顯示圖形碼。 可選地,上述裝置還包括動態密碼增刪模組,其中,該動態密碼增刪模組,用於: 在確定動態密碼之後,將所述動態密碼添加至動態密碼集合,以及當所述動態密碼滿足預設銷毀條件時,將所述動態密碼從所述動態密碼集合中移除,其中,所述預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用; 對應的,上述密碼識別模組1102,具體用於: 若所述動態密碼集合中存在所述目標動態密碼,則確定所述目標動態密碼滿足預設時效性條件; 若所述動態密碼集合中不存在所述目標動態密碼,則確定所述目標動態密碼不滿足預設時效性條件。 可選地,上述圖形碼更新模組,還用於: 將所述動態密碼從所述動態密碼集合中移除之後,生成新的動態密碼,基於所述新的動態密碼更新所述目標設備終端上顯示的圖形碼。 可選地,上述圖形碼更新模組,具體用於: 利用消息摘要算法根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼。 可選地,上述控制指令下發模組,具體用於: 在動態密碼集合中,查找是否存在與所述控制確認資訊對應的動態密碼; 若是,則觸發動態密碼增刪模組將所述動態密碼從所述動態密碼集合中移除,以及向目標設備終端發送控制指令。 本說明書一個或多個實施例中的掃碼控制裝置,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 對應上述圖2至圖6描述的掃碼控制方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種設備終端,其中,該終端設備可以是掃碼售賣設備,圖12為本說明書一個或多個實施例提供的設備終端的模組組成示意圖,該裝置用於執行圖9描述的掃碼控制方法,如圖12所示,該設備終端包括: 圖形碼展示模組1201,用於基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,該圖形碼是在後台服務端控制下動態更新的,每個圖形碼對應於一個唯一的動態密碼; 控制指令接收模組1202,用於接收後台服務端發送的控制指令,其中,該控制指令是後台服務端針對接收到的設備控制請求中攜帶的目標動態密碼的時效性判斷結果生成的。 本說明書一個或多個實施例中,透過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 其中,上述控制指令接收模組1202,具體用於: 接收後台服務端確定目標動態密碼滿足預設時效性條件時所發送的控制指令,以及基於該控制指令執行相應的控制動作,其中,針對掃碼售賣設備而言,該控制指令為開門指令,掃碼售賣設備接收到該開門指令後,執行開門操作。 本說明書一個或多個實施例中的設備終端,基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,該圖形碼是在後台服務端控制下動態更新的,每個圖形碼對應於一個唯一的動態密碼;以及接收後台服務端發送的控制指令,其中,該控制指令是後台服務端針對接收到的設備控制請求中攜帶的目標動態密碼的時效性判斷結果生成的。本說明書一個或多個實施例中,通過後台服務端控制設備終端上顯示的圖形碼動態更新,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 需要說明的是,本說明書中該實施例與本說明書中上一實施例基於同一發明構思,因此該實施例的具體實施可以參見前述掃碼控制方法的實施,重複之處不再贅述。 對應上述圖2至圖6描述的掃碼控制方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種掃碼控制系統,圖13為本說明書一個或多個實施例提供的設備終端的模組組成示意圖,該裝置用於執行圖2至圖6描述的掃碼控制方法,如圖13所示,該設備終端包括:後台服務端20、客戶端10和設備終端30; 其中,上述後台服務端20,用於接收客戶端發送的設備控制請求;判斷所述設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件;根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作; 上述客戶端10,用於向後台服務端發送設備控制請求;以及接收所述後台服務端針對所述目標動態密碼的時效性判斷結果發送的回饋資訊; 上述設備終端30,用於基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,所述圖形碼是動態更新的,每個所述圖形碼對應於一個唯一的動態密碼;以及接收所述後台服務端針對所述目標動態密碼的時效性判斷結果發送的控制指令。 本說明書一個或多個實施例中的掃碼控制方法,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 進一步地,對應上述圖2至圖6所示的方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種掃碼控制設備,該設備用於執行上述的掃碼控制方法,如圖14所示。 掃碼控制設備可因配置或性能不同而產生比較大的差異,可以包括一個或一個以上的處理器1401和記憶體1402,記憶體1402中可以儲存有一個或一個以上儲存應用程式或資料。其中,記憶體1402可以是短暫儲存或持久儲存。儲存在記憶體1402的應用程式可以包括一個或一個以上模組(圖示未示出),每個模組可以包括對掃碼控制設備中的一系列計算機可執行指令。更進一步地,處理器1401可以設置為與記憶體1402通信,在掃碼控制設備上執行記憶體1402中的一系列計算機可執行指令。掃碼控制設備還可以包括一個或一個以上電源1403,一個或一個以上有線或無線網路介面1404,一個或一個以上輸入輸出介面1405,一個或一個以上鍵盤1406等。 在一個具體的實施例中,掃碼控制設備包括有記憶體,以及一個或一個以上的程式,其中一個或者一個以上程式儲存於記憶體中,且一個或者一個以上程式可以包括一個或一個以上模組,且每個模組可以包括對掃碼控制設備中的一系列計算機可執行指令,且經配置以由一個或者一個以上處理器執行該一個或者一個以上程式包含用於進行以下計算機可執行指令: 接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 可選地,計算機可執行指令在被執行時,所述根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作,包括: 若判斷結果為是,則向所述客戶端回傳業務頁面,以使所述客戶端基於所述業務頁面向後台服務端請求控制所述目標設備終端; 若判斷結果為否,則向所述客戶端回傳提示資訊,以使所述客戶端基於所述提示資訊進行提示。 可選地,計算機可執行指令在被執行時,還包含用於進行以下計算機可執行指令: 在向所述客戶端回傳業務頁面之後,還包括: 接收所述客戶端針對所述業務頁面發送的控制確認資訊; 基於所述控制確認資訊向所述目標設備終端發送控制指令,以使所述目標設備終端執行相應的控制動作。 可選地,計算機可執行指令在被執行時,還包含用於進行以下計算機可執行指令: 在接收客戶端發送的設備控制請求之前,還包括: 根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼; 根據確定出的所述動態密碼,生成圖形碼資訊; 將所述圖形碼資訊下發給所述目標設備終端,以使所述目標設備終端基於所述圖形碼資訊顯示圖形碼。 可選地,計算機可執行指令在被執行時,還包含用於進行以下計算機可執行指令: 在確定動態密碼之後,還包括: 將所述動態密碼添加至動態密碼集合,以及當所述動態密碼滿足預設銷毀條件時,將所述動態密碼從所述動態密碼集合中移除,其中,所述預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用; 所述判斷所述目標動態密碼是否滿足預設時效性條件,包括: 若所述動態密碼集合中存在所述目標動態密碼,則確定所述目標動態密碼滿足預設時效性條件; 若所述動態密碼集合中不存在所述目標動態密碼,則確定所述目標動態密碼不滿足預設時效性條件。 可選地,計算機可執行指令在被執行時,還包含用於進行以下計算機可執行指令: 所述將所述動態密碼從所述動態密碼集合中移除之後,還包括: 生成新的動態密碼,基於所述新的動態密碼更新所述目標設備終端上顯示的圖形碼。 可選地,計算機可執行指令在被執行時,所述根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼,包括: 利用消息摘要算法根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼。 可選地,計算機可執行指令在被執行時,所述基於所述控制確認資訊向所述目標設備終端發送控制指令,包括: 在動態密碼集合中,查找是否存在與所述控制確認資訊對應的動態密碼; 若是,則將所述動態密碼從所述動態密碼集合中移除,以及向目標設備終端發送控制指令。 本說明書一個或多個實施例中的掃碼控制設備,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 進一步地,對應上述圖2至圖6所示的方法,基於相同的技術構思,本說明書一個或多個實施例還提供了一種儲存媒體,用於儲存計算機可執行指令,一種具體的實施例中,該儲存媒體可以為U碟、光碟、硬碟等,該儲存媒體儲存的計算機可執行指令在被處理器執行時,能實現以下流程: 接收客戶端發送的設備控制請求,其中,所述設備控制請求中攜帶有目標動態密碼; 判斷所述目標動態密碼是否滿足預設時效性條件,其中,所述目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應; 根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,所述根據針對所述目標動態密碼的時效性判斷結果執行相應的控制操作,包括: 若判斷結果為是,則向所述客戶端回傳業務頁面,以使所述客戶端基於所述業務頁面向後台服務端請求控制所述目標設備終端; 若判斷結果為否,則向所述客戶端回傳提示資訊,以使所述客戶端基於所述提示資訊進行提示。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,還實現以下流程: 在向所述客戶端回傳業務頁面之後,還包括: 接收所述客戶端針對所述業務頁面發送的控制確認資訊; 基於所述控制確認資訊向所述目標設備終端發送控制指令,以使所述目標設備終端執行相應的控制動作。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,還實現以下流程: 在接收客戶端發送的設備控制請求之前,還包括: 根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼; 根據確定出的所述動態密碼,生成圖形碼資訊; 將所述圖形碼資訊下發給所述目標設備終端,以使所述目標設備終端基於所述圖形碼資訊顯示圖形碼。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,還實現以下流程: 在確定動態密碼之後,還包括: 將所述動態密碼添加至動態密碼集合,以及當所述動態密碼滿足預設銷毀條件時,將所述動態密碼從所述動態密碼集合中移除,其中,所述預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用; 所述判斷所述目標動態密碼是否滿足預設時效性條件,包括: 若所述動態密碼集合中存在所述目標動態密碼,則確定所述目標動態密碼滿足預設時效性條件; 若所述動態密碼集合中不存在所述目標動態密碼,則確定所述目標動態密碼不滿足預設時效性條件。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,還實現以下流程: 所述將所述動態密碼從所述動態密碼集合中移除之後,還包括: 生成新的動態密碼,基於所述新的動態密碼更新所述目標設備終端上顯示的圖形碼。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,所述根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼,包括: 利用消息摘要算法根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼。 可選地,該儲存媒體儲存的計算機可執行指令在被處理器執行時,所述基於所述控制確認資訊向所述目標設備終端發送控制指令,包括: 在動態密碼集合中,查找是否存在與所述控制確認資訊對應的動態密碼; 若是,則將所述動態密碼從所述動態密碼集合中移除,以及向目標設備終端發送控制指令。 本說明書一個或多個實施例中的儲存媒體儲存的計算機可執行指令在被處理器執行時,接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據時效性判斷結果執行相應的控制操作。本說明書一個或多個實施例中,由於設備終端上顯示的圖形碼是動態變化的,以使客戶端上傳的動態密碼應具有一定時效性,這樣能夠借助動態密碼的時效性識別客戶端是否被攻擊,針對識別出客戶端被惡意用戶非法攻擊的情況,及時進行有效控制,避免給正常用戶帶來不必要的損失。 在20世紀90年代,對於一個技術的改進可以很明顯地區分是硬體上的改進(例如,對二極體、電晶體、開關等電路結構的改進)還是軟體上的改進(對於方法流程的改進)。然而,隨著技術的發展,當今的很多方法流程的改進已經可以視為硬體電路結構的直接改進。設計人員幾乎都透過將改進的方法流程編程到硬體電路中來得到相應的硬體電路結構。因此,不能說一個方法流程的改進就不能用硬體實體模組來實現。例如,可編程邏輯器件(Programmable Logic Device,PLD)(例如現場可編程閘陣列(Field Programmable Gate Array,FPGA))就是這樣一種積體電路,其邏輯功能由用戶對器件編程來確定。由設計人員自行編程來把一個數位系統“整合”在一片PLD上,而不需要請晶片製造廠商來設計和製作專用的積體電路晶片。而且,如今,取代手工地製作積體電路晶片,這種編程也多半改用“邏輯編譯器(logic compiler)”軟體來實現,它與程式開發撰寫時所用的軟體編譯器相類似,而要編譯之前的原始代碼也得用特定的編程語言來撰寫,此稱之為硬體描述語言(Hardware Description Language,HDL),而HDL也並非僅有一種,而是有許多種,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HD Cal、JHDL(Java Hardware Description Language)、Lava、Lola、My HDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)與Verilog。本領域技術人員也應該清楚,只需要將方法流程用上述幾種硬體描述語言稍作邏輯編程並編程到積體電路中,就可以很容易得到實現該邏輯方法流程的硬體電路。 控制器可以按任何適當的方式實現,例如,控制器可以採取例如微處理器或處理器以及儲存可由該(微)處理器執行的計算機可讀程式代碼(例如軟體或韌體)的計算機可讀媒體、邏輯閘、開關、專用積體電路(Application Specific Integrated Circuit,ASIC)、可編程邏輯控制器和嵌入微控制器的形式,控制器的例子包括但不限於以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20 以及Silicone Labs C8051F320,記憶體控制器還可以被實現為記憶體的控制邏輯的一部分。本領域技術人員也知道,除了以純計算機可讀程式代碼方式實現控制器以外,完全可以透過將方法步驟進行邏輯編程來使得控制器以邏輯閘、開關、專用積體電路、可編程邏輯控制器和嵌入微控制器等的形式來實現相同功能。因此這種控制器可以被認為是一種硬體部件,而對其內包括的用於實現各種功能的裝置也可以視為硬體部件內的結構。或者甚至,可以將用於實現各種功能的裝置視為既可以是實現方法的軟體模組又可以是硬體部件內的結構。 上述實施例闡明的系統、裝置、模組或單元,具體可以由計算機晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為計算機。具體的,計算機例如可以為個人計算機、膝上型計算機、蜂巢式電話、相機電話、智慧電話、個人數位助理、媒體播放器、導航設備、電子郵件設備、遊戲控制台、平板計算機、可穿戴設備或者這些設備中的任何設備的組合。 為了描述的方便,描述以上裝置時以功能分為各種單元分別描述。當然,在實施本說明書一個或多個時可以把各單元的功能在同一個或多個軟體及/或硬體中實現。 本領域內的技術人員應明白,本說明書一個或多個的實施例可提供為方法、系統、或計算機程式產品。因此,本說明書一個或多個可採用完全硬體實施例、完全軟體實施例、或結合軟體和硬體方面的實施例的形式。而且,本說明書一個或多個可採用在一個或多個其中包含有計算機可用程式代碼的計算機可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的計算機程式產品的形式。 本說明書一個或多個是參照根據本說明書一個或多個實施例的方法、設備(系統)、和計算機程式產品的流程圖及/或方框圖來描述的。應理解可由計算機程式指令實現流程圖及/或方框圖中的每一流程及/或方框、以及流程圖及/或方框圖中的流程和/或方框的結合。可提供這些計算機程式指令到通用計算機、專用計算機、嵌入式處理機或其他可編程資料處理設備的處理器以產生一個機器,使得透過計算機或其他可編程資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程及/或方框圖一個方框或多個方框中指定的功能的裝置。 這些計算機程式指令也可儲存在能引導計算機或其他可編程資料處理設備以特定方式工作的計算機可讀記憶體中,使得儲存在該計算機可讀記憶體中的指令產生包括指令裝置的製造品,該指令裝置實現在流程圖一個流程或多個流程及/或方框圖一個方框或多個方框中指定的功能。 這些計算機程式指令也可裝載到計算機或其他可編程資料處理設備上,使得在計算機或其他可編程設備上執行一系列操作步驟以產生計算機實現的處理,從而在計算機或其他可編程設備上執行的指令提供用於實現在流程圖一個流程或多個流程及/或方框圖一個方框或多個方框中指定的功能的步驟。 在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和內存記憶體。 內存記憶體可能包括計算機可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)及/或非揮發性內存記憶體等形式,如只讀記憶體(ROM)或閃存(flash RAM)。內存記憶體是計算機可讀媒體的示例。 計算機可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是計算機可讀指令、資料結構、程式的模組或其他資料。計算機的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可編程唯讀記憶體(EEPROM)、快閃記憶體或其他內存記憶體技術、只讀光碟只讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁碟儲存或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,計算機可讀媒體不包括暫存電腦可讀媒體(transitory media),如調變的資料信號和載波。 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 本領域技術人員應明白,本說明書一個或多個的實施例可提供為方法、系統或計算機程式產品。因此,本說明書一個或多個可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。而且,本說明書一個或多個可採用在一個或多個其中包含有計算機可用程式代碼的計算機可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的計算機程式產品的形式。 本說明書一個或多個可以在由計算機執行的計算機可執行指令的一般上下文中描述,例如程式模組。一般地,程式模組包括執行特定任務或實現特定抽象資料類型的例程、程式、物件、組件、資料結構等等。也可以在分布式計算環境中實踐本說明書一個或多個,在這些分布式計算環境中,由透過通信網路而被連接的遠程處理設備來執行任務。在分布式計算環境中,程式模組可以位於包括儲存設備在內的本地和遠程計算機儲存媒體中。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。 以上所述僅為本說明書一個或多個的實施例而已,並不用於限制本說明書一個或多個。對於本領域技術人員來說,本說明書一個或多個可以有各種更改和變化。凡在本說明書一個或多個的精神和原理之內所作的任何修改、等同替換、改進等,均應包含在本說明書一個或多個的申請專利範圍的範圍之內。In order to enable those skilled in the art to better understand one or more technical solutions in this specification, the following will combine the drawings in one or more embodiments of this specification to compare the technical solutions in one or more embodiments of this specification. For a clear and complete description, it is obvious that the described embodiments are only a part of one or more embodiments in this specification, rather than all of the embodiments. Based on one or more of the embodiments in this specification, all other embodiments obtained by a person of ordinary skill in the art without creative work shall fall within the scope of protection of one or more of this specification. One or more embodiments of this specification provide a scanning code control method, device and system. Since the graphic code displayed on the device terminal is dynamically changing, the dynamic password uploaded by the client should have a certain timeliness, so that it can use The timeliness of the dynamic password identifies whether the client is attacked, and in response to the situation where the client is identified as being illegally attacked by a malicious user, effective control is carried out in time to avoid unnecessary losses to normal users. Figure 1 is a schematic diagram of the application scenario of the code scanning control system provided by one or more embodiments of this specification. As shown in Figure 1, the control system includes: a background server, a client, and a device terminal, where the client can be For mobile terminals such as smart phones and tablet computers, the back-end server can be a back-end server that is used to manage and control the device terminal and has a saas service. The device terminal can be a scan code to sell equipment, scan code to rent products, etc., Among them, the specific process of scanning code control is: First, the client sends a device control request to the background server, where the device control request carries the target dynamic password; Specifically, the client can be a device control request based on actively scanning the graphic code on the device terminal, which is a normal active request to control the device terminal; the client can also be triggered by a malicious user through illegal means. The issued device control request, that is, passively request to control the device terminal after being attacked; Then, after receiving the above device control request, the background server determines whether the target dynamic password carried in the device control request meets the preset timeliness condition; Specifically, in the case of a device control request issued by the client based on a code scanning operation on the graphic code on the device terminal, the target dynamic password carried in the device control request is valid; because the graphic code displayed on the device terminal corresponds to The dynamic password is dynamically updated. It takes a certain amount of time for a malicious user to obtain a dynamic password and then trigger a normal user to send a device control request carrying the dynamic password to the back-end server. Therefore, it takes a certain amount of time for the client to be triggered by the malicious user through illegal means. In the case of a device control request, the target dynamic password carried in the device control request is invalid; Finally, the background server executes corresponding control operations according to the timeliness of the target dynamic password judgment result; Specifically, when it is determined that the target dynamic password is valid, it means that the client is normally actively requesting control of the device terminal from the background server. At this time, the background server needs to respond to the device control request normally and control the device terminal to perform corresponding control actions; When it is determined that the target dynamic password is invalid, it means that the client is being attacked and requests the back-end server to control the device terminal. At this time, the back-end server needs to send back prompt information to the client, so as to implement illegal attacks against malicious users. Effective control to avoid unnecessary losses to normal users. Fig. 2 is a schematic diagram of the first flow chart of the code scanning control method provided by one or more embodiments of this specification. The method in Fig. 2 can be executed by the backend server in Fig. 1. As shown in Fig. 2, the method at least includes The following steps: S201: Receive a device control request sent by a client, where the device control request carries a target dynamic password; Specifically, the device control request received by the back-end server may be sent by the client based on actively scanning the graphic code on the device terminal, that is, the client normally actively requests to control the device terminal; it may also be the client's active request to control the device terminal. Triggered by a malicious user through illegal means, it is a passive request to control the device terminal after the client is attacked; S202: Determine whether the target dynamic password carried in the device control request meets the preset timeliness condition, where the target dynamic password corresponds to the dynamically updated graphic code displayed on the terminal of the target device in a one-to-one correspondence, that is, in the scanning graphic code verification stage, Determine the timeliness of the target dynamic password to identify whether there is a situation where the user is attacked. For the case where the device terminal is a scan code to sell the device, the scan graphic code verification phase is the process of the user using the client to scan the graphic code to request the opening page ; Specifically, in the case of a device control request issued by the client based on a code scanning operation on the graphic code on the device terminal, the target dynamic password carried in the device control request satisfies the preset timeliness condition, that is, the target dynamic password corresponds to The graphic code is not invalid, and the dynamic password corresponding to the graphic code displayed on the device terminal is the target dynamic password; In the case of a device control request sent by the client by a malicious user through illegal means, the target dynamic password carried in the device control request does not meet the preset timeliness condition, that is, the graphic code corresponding to the target dynamic password has expired. At this time, the dynamic password corresponding to the graphic code displayed on the device terminal is not the target dynamic password; S203: Perform a corresponding control operation according to the timeliness judgment result for the target dynamic password, where the judgment result may be that the target dynamic password meets the preset timeliness condition, or the target dynamic password does not meet the preset timeliness condition; Specifically, if the target dynamic password satisfies the preset timeliness condition, it means that the client is normal and actively requests the back-end server to control the device terminal. At this time, the back-end server needs to respond to the device control request normally and control the device terminal to perform corresponding control. Action; if the target dynamic password does not meet the preset timeliness condition, it means that the client is attacked and requests the back-end server to control the device terminal. At this time, the back-end server needs to send back prompt information to the client, for example, trigger the client Display the error page. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. Wherein, as shown in FIG. 3, the above S203 executes corresponding control operations according to the timeliness judgment result for the target dynamic password, which specifically includes: If the judgment result is yes, execute S2031 to return the service page to the client, so that the client requests the background server to control the target device terminal based on the service page; Specifically, for the case where the judgment result is yes, that is, the target dynamic password meets the preset timeliness condition, it means that the client is normal and actively requests the back-end server to control the device terminal. At this time, the back-end server needs to respond to the device control request normally. , That is, the back-end server can directly send control instructions to the device terminal, for example, issue a door opening instruction; in order to further improve the accuracy of device control, it can also send back the business data used to render the business page to the client first, so that the user Send confirmation control information to the client based on the business page displayed by the client. Correspondingly, after the background server receives the confirmation control information, the control device terminal executes the corresponding control action; If the judgment result is no, execute S2032 to return the first prompt information to the client, so that the client prompts based on the first prompt information; Specifically, for the case where the judgment result is negative, that is, the target dynamic password does not meet the preset timeliness condition, it means that the client is attacked and requests the back-end server to control the device terminal. At this time, the back-end server needs to return to the client. Send the first prompt information to remind the user that there is currently a possibility of being attacked. In addition, you can also provide the option to confirm the submission of the device control request on the display page of the first prompt information displayed on the client side, for example, provide manual submission to open the door The requested option to prevent the problem of unable to trade when the uploaded target dynamic password becomes invalid due to the delay of the client's scanning code. Furthermore, in order to further improve the accuracy of device control, the business data used to render the business page can also be returned to the client first, so that the user can send confirmation control information to the client based on the business page displayed by the client. Based on this, As shown in Figure 4, after the above S2031 returns the service page to the client, it also includes: S2033: Receive control confirmation information sent by the client for the displayed business page. For the case where the device terminal is a scan code selling device, the business page can be a door opening confirmation page. When the client detects that the user clicks on the door opening confirmation page After opening the door option, it sends a confirmation message to the back-end server. For the case that the device terminal is a scan code rental product, the business page can also be the unlock confirmation page. When the client detects that the user clicks the unlock option on the unlock confirmation page, Send confirmation of unlocking information to the background server; S2034: Send a control instruction to the target device terminal based on the received control confirmation information, so that the target device terminal executes a corresponding control action, where the control instruction may be a door opening instruction or an unlocking instruction. Correspondingly, the target The control action performed by the device terminal can be a door opening operation, or an unlocking operation, and so on. Among them, the background server needs to generate graphic code information including dynamic passwords according to preset rules, and send the graphic code information to the corresponding equipment terminal, so that the equipment terminal can display the graphic code corresponding to the graphic code information. Ensure that the graphic code displayed on the device terminal for the client to scan is dynamically updated, so as to ensure that the target dynamic password carried in the device control request uploaded by the client is dynamically changed, so that the subsequent timeliness of the target dynamic password is based on the timeliness of the target dynamic password. It is judged to determine which control operation to perform. Specifically, as shown in FIG. 5, before the device control request sent by the client is received in S201, the method further includes: S204: Determine a dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information, where the device identification may be a uniqueness assigned to each device terminal in advance Identification. The identification key can be determined based on the device identification in a preset manner. The time stamp information can be the current time stamp when the dynamic password is determined. Specifically, the dynamic password can be stored in the key-value database (ie redis); S205: Generate graphic code information according to the determined dynamic password, where the graphic code information can be obtained by splicing a preset URL address and a dynamic password, that is, the dynamic password can be added to the end of the URL address, for example, the URL The address can be https://alipay.com/detail.htm; S206: Send the generated graphic code information to the target device terminal, so that the target device terminal displays the corresponding graphic code based on the graphic code information. The dynamic password generated each time is different, so the graphic code information Each is different, so that the graphic code displayed on the device terminal is dynamically updated. The graphic code can be a two-dimensional code or a barcode; Specifically, in order to reduce the manufacturing cost of the device terminal, the electronic ink label screen can be used as the graphic code display screen. For example, the display screen for displaying the graphic code provided on the device terminal can be reused. Among them, when the client scans the graphic code displayed on the target device terminal, it can parse out the target dynamic password corresponding to the graphic code, then generate a device control request based on the target dynamic password, and send the device control request to the background server, So that the background server controls the target device terminal based on the device control request. Further, in order to improve the judgment efficiency and judgment accuracy of the timeliness of the target dynamic password, the invalid dynamic password can be automatically deleted, and then after receiving the device control request, it is determined whether there is the target dynamic password carried in the device control request. , So as to determine whether the target dynamic password meets the preset timeliness condition. Based on this, as shown in FIG. 6, after sending the generated graphic code information to the target device terminal in S206, it also includes: S207. Add the determined dynamic password to the dynamic password set, and when any dynamic password meets a preset destruction condition, remove the dynamic password from the dynamic password set, where the preset destruction condition includes: The password reaches the preset survival time and/or the dynamic password has been used. Specifically, the dynamic password reaches the preset survival time means that the inventory time of the dynamic password is greater than the preset aging threshold, that is, the dynamic password expires and is destroyed, and the dynamic password has been used means that it has been used. Device terminal control is performed on the dynamic password, that is, the dynamic password has been used and destroyed, wherein the dynamic password set includes at least one valid dynamic password, and the dynamic password set is set in the key-value database (ie redis); Correspondingly, the foregoing S202 determines whether the target dynamic password carried in the device control request meets the preset timeliness condition, which specifically includes: S2021: Determine whether the target dynamic password carried in the device control request exists in the dynamic password set; If the judgment result is yes, it is determined that the target dynamic password meets the preset timeliness condition, and the above-mentioned S2031 is executed to return the service page to the client, so that the client requests the background server to control the target device terminal based on the service page; If the judgment result is negative, it is determined that the target dynamic password does not meet the preset timeliness condition, and the above-mentioned S2032 is executed to return the first prompt information to the client, so that the client prompts based on the first prompt information. Specifically, when a certain dynamic password is removed from the dynamic password set, it means that the graphic code corresponding to the dynamic password becomes invalid, and the image code displayed on the corresponding device terminal needs to be updated. Based on this, the above S207 changes After the dynamic password is removed from the dynamic password collection, it also includes: Generate a new dynamic password, and update the corresponding graphic code displayed on the target device terminal based on the new dynamic password; Specifically, for the process of generating a new dynamic password, refer to the above step S204. After the new dynamic password is generated, graphic code information is generated according to the dynamic password, and the graphic code information is issued to the corresponding target device terminal. Update the graphic code displayed on the terminal of the target device. Wherein, the above S204 determines the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information, which specifically includes: The message digest algorithm is used to determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information. The message digest algorithm can be an md5 encryption algorithm. Specifically, use The md5 encryption algorithm performs md5 encryption on at least two of the device id, the unique key corresponding to the device id, and the timestamp information, and generates the sign field. Wherein, the above S2034 sends a control instruction to the target device terminal based on the received control confirmation information, which specifically includes: In the dynamic password set, find out whether there is a dynamic password corresponding to the received control confirmation information. Specifically, after receiving the control confirmation information sent by the client for the business page, judge again whether there is a corresponding dynamic password in the dynamic set ; If yes, remove the dynamic password from the above dynamic password set, and send a control instruction to the target device terminal; Specifically, after receiving the control confirmation information sent by the client for the business page, it is explained that the background server needs to perform corresponding control operations on the device terminal. Correspondingly, the dynamic password meets the preset destruction conditions. After the dynamic password is destroyed, For the target device terminal displaying the graphic code containing the dynamic password, a new dynamic password is generated, and the graphic code displayed on the target device terminal is updated based on the new dynamic password; If not, send a control instruction to the target device terminal, or return a second prompt message to the client to prompt the user whether to resend the device control request to the background server; Specifically, because the target dynamic password carried in the device control request meets the preset timeliness condition after the verification is passed during the verification phase of scanning the graphic code, if the client sends a control confirmation to the background server for the business page within the preset time Information, the target dynamic password corresponding to this device control request should be valid, that is, the target dynamic password exists in the dynamic password set. If the target dynamic password does not exist in the dynamic password set, it means that the client has not been within the preset time The control confirmation information sent to the back-end server for the business page. In a specific embodiment, the foregoing scanning code control method mainly includes: a graphic code information delivery process and a process of device control based on graphic code timeliness. As shown in Figure 7a, the graphic code information in the code scanning control method is shown. The information interaction diagram of the distribution process is as follows: S701: The background server obtains the device identification of the target device terminal; S702. The background server generates a dynamic password according to the device ID of the target device terminal, the identification key corresponding to the device ID, and the time stamp information, where it can be generated after determining that the graphic code displayed on the target device terminal expires. To update the graphic code displayed on the target device terminal, it can also generate a new dynamic code after confirming that the client has issued a device control request based on the dynamic password for the graphic code to update the display on the target device terminal Graphic code S703: The background server generates graphic code information according to the generated dynamic password and the preset URL address; S704: The background server sends graphic code information to the target device terminal; S705: After receiving the graphic code information, the target device terminal displays the graphic code on the display screen based on the graphic code information; S706: The background server stores the generated dynamic password in the key-value database, where it is. For the dynamic password stored in the key-value database, if the dynamic password meets the preset destruction conditions, the dynamic password will be deleted; As shown in Figure 7b, a schematic diagram of the information interaction of the device control process based on the timeliness of the graphic code in the scanning code control method is given. For the case where the device terminal is a scanning code selling device, the specifics are: S707: The client sends a device control request carrying the target dynamic password to the background server, where the device control request may be sent by the client based on actively scanning the graphic code on the target device terminal, or it may be The client is triggered by a malicious user through illegal means; S708: After receiving the device control request, the background server triggers the key-value database to query whether the target dynamic password carried in the device control request exists; S709: The key-value database returns the query result of the dynamic password to the back-end server, where the query result may be that the target dynamic password exists, or that the target dynamic password does not exist; S710: When the received query result is non-existent, the background server sends an error message prompt page to the client; S711: When the received query result is determined to exist, the background server sends business data for rendering the door opening page to the client; S712, the client renders and displays the door opening page, where the door opening page is used to trigger the user to confirm the door opening request; S713: If the client detects that the user clicks on the confirm door opening option, it sends a door opening confirmation request to the background server; S714: After receiving the confirmation door opening request, the background server triggers the key-value database to query whether there is a target dynamic password corresponding to the confirmation door opening request; S715: If the key-value database determines that the query result exists, destroy the target dynamic password; S716: The key-value database returns the query result of the existence of the dynamic password to the background server; S717: After receiving the query result of the existence of the dynamic password, the background server issues a door opening instruction to the device terminal; and, In S718, the background server re-executes the graphic code information issuing step to update the graphic code displayed on the device terminal, so as to realize the dynamic update of the graphic code displayed on the control device terminal. The code scanning control method in one or more embodiments of this specification receives a device control request sent by a client; judges whether the target dynamic password carried in the device control request meets the preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the terminal of the target device correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users. Corresponding to the code scanning control method described in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a code scanning control method. FIG. 8 provides one or more embodiments of this specification. A schematic flow chart of the scanning code control method. The method in FIG. 8 can be executed by the client in FIG. 1. As shown in FIG. 8, the method at least includes the following steps: S801: Send a device control request carrying the target dynamic password to the background server, so that the background server determines whether the target dynamic password meets the preset timeliness condition; S802: Receive feedback information sent by the back-end server, where the feedback information is generated by the back-end server according to the timeliness of the target dynamic password. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. Among them, the above S802 receives the feedback information sent by the back-end server, which specifically includes: Receive the business page sent by the back-end server to determine that the target dynamic password meets the preset timeliness condition, and request the back-end server to control the target device terminal based on the business page; Receive the prompt information sent by the back-end server when it determines that the target dynamic password does not meet the preset timeliness condition, and prompt based on the prompt information. The code scanning control method in one or more embodiments of this specification sends a device control request carrying a target dynamic password to the background server, so that the background server can determine whether the target dynamic password meets the preset timeliness condition; and receive The feedback information sent by the back-end server, where the feedback information is generated by the back-end server based on the timeliness of the target dynamic password. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. It should be noted that this embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the aforementioned code scanning control method, and the repetition will not be repeated. Corresponding to the code scanning control method described in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a code scanning control method. FIG. 9 is provided by one or more embodiments of this specification. A schematic flow chart of the code scanning control method. The method in FIG. 9 can be executed by the device terminal in FIG. 1. As shown in FIG. 9, the method includes at least the following steps: S901: Display the corresponding graphic code based on the graphic code information issued by the background server, where the graphic code is dynamically updated under the control of the background server, and each graphic code corresponds to a unique dynamic password; S902: Receive a control instruction sent by the back-end server, where the control instruction is generated by the back-end server in response to the timeliness judgment result of the target dynamic password carried in the received device control request. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. Wherein, the foregoing S902 receives the control instruction sent by the background server, which specifically includes: Receive the control instruction sent by the background server to determine that the target dynamic password satisfies the preset timeliness condition, and execute the corresponding control action based on the control instruction. For the scanning code sales device, the control instruction is the door opening instruction, scanning After receiving the door opening instruction, the code vending equipment executes the door opening operation. The scanning code control method in one or more embodiments of this specification displays the corresponding graphic code based on the graphic code information issued by the back-end server, where the graphic code is dynamically updated under the control of the back-end server, and each graphic The code corresponds to a unique dynamic password; and a control instruction sent by the background server is received, where the control instruction is generated by the background server according to the timeliness of the target dynamic password carried in the received device control request. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. It should be noted that this embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the aforementioned code scanning control method, and the repetition will not be repeated. Corresponding to the code scanning control method described in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a code scanning control method. FIG. 10 provides one or more embodiments of this specification. A schematic flow chart of the scanning code control method. The method in Fig. 10 can be executed by the background server in Fig. 1. As shown in Fig. 10, for the case where the device terminal is a scanning code selling device, the method includes at least the following steps: S1001. Receive a device control request for a code scanning vending device sent by a client, where the device control request carries a target dynamic password, and the code scanning vending device may be a smart code scanning open door self-pickup container; wherein, step S1001 Refer to step S201 for the specific implementation manner, which will not be repeated here. S1002: Determine whether the target dynamic password carried in the device control request satisfies the preset timeliness condition, where the target dynamic password corresponds to the dynamically updated graphic code displayed on the target scan code sales device; wherein, the details of step S1002 For the implementation manner, refer to step S202, which will not be repeated here. S1003: Perform a corresponding control operation according to the timeliness judgment result for the target dynamic password; wherein, for the specific implementation of step S1003, refer to step S203, which is not repeated here. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. Wherein, before S1001 receives the device control request for the scan code selling device sent by the client, it further includes: Step 1: Determine the dynamic password according to at least two of the device identification of the target scan code selling device, the identification key corresponding to the device identification, and the time stamp information; Step 2: Generate graphic code information according to the determined dynamic password; Step 3: Send the generated graphic code information to the target scan code sales device, so that the target scan code sales device displays the graphic code based on the graphic code information. Wherein, the above step 1 after determining the dynamic password according to at least two of the device identification of the target scan code selling device, the identification key corresponding to the device identification, and the time stamp information, further includes: The determined dynamic password is added to the dynamic password set, and when any dynamic password meets the preset destruction condition, the dynamic password is removed from the dynamic password set, where the preset destruction condition includes: the dynamic password reaches the preset destruction condition Suppose the survival time and/or dynamic password have been used; Correspondingly, the foregoing S1002 determines whether the target dynamic password carried in the device control request meets the preset timeliness condition, which specifically includes: If there is a target dynamic password in the dynamic password set, it is determined that the target dynamic password meets the preset timeliness condition; If the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not meet the preset timeliness condition. Among them, after the above-mentioned removal of the dynamic password from the dynamic password set, it also includes: A new dynamic password is generated, and the graphic code displayed on the target scan code sales device is updated based on the new dynamic password. The code scanning control method in one or more embodiments of this specification receives a device control request sent by a client; judges whether the target dynamic password carried in the device control request meets the preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the target scanning code sales device correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. It should be noted that this embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the aforementioned code scanning control method, and the repetition will not be repeated. Corresponding to the code scanning control method described in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a code scanning control device. FIG. 11 provides one or more embodiments of this specification. A schematic diagram of the module composition of the code scanning control device, which is used to implement the code scanning control method described in Figs. 2 to 6, as shown in Fig. 11, the device includes: The request receiving module 1101 is configured to receive a device control request sent by a client, where the device control request carries a target dynamic password; The password identification module 1102 is used to determine whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; The control module 1103 is configured to perform corresponding control operations according to the timeliness judgment result for the target dynamic password. Optionally, the aforementioned control module 1103 is specifically used for: If the judgment result is yes, return a business page to the client, so that the client requests a back-end server based on the business page to control the target device terminal; If the judgment result is no, the prompt information is sent back to the client, so that the client prompts based on the prompt information. Optionally, the above-mentioned device further includes a control instruction issuing module, wherein the control instruction issuing module is used for: After returning the business page to the client, receiving control confirmation information sent by the client for the business page; Based on the control confirmation information, a control instruction is sent to the target device terminal, so that the target device terminal executes a corresponding control action. Optionally, the above-mentioned device further includes a graphic code update module, wherein the graphic code update module is used for: Before receiving the device control request sent by the client, determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information; Generate graphic code information according to the determined dynamic password; The graphic code information is delivered to the target device terminal, so that the target device terminal displays the graphic code based on the graphic code information. Optionally, the above-mentioned device further includes a dynamic password addition and deletion module, wherein the dynamic password addition and deletion module is used for: After the dynamic password is determined, the dynamic password is added to the dynamic password set, and when the dynamic password satisfies a preset destruction condition, the dynamic password is removed from the dynamic password set, wherein the preset The destruction conditions include: the dynamic password reaches the preset survival time and/or the dynamic password has been used; Correspondingly, the aforementioned password identification module 1102 is specifically used for: If the target dynamic password exists in the dynamic password set, determining that the target dynamic password satisfies a preset timeliness condition; If the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not satisfy a preset timeliness condition. Optionally, the above-mentioned graphic code update module is also used for: After the dynamic password is removed from the dynamic password set, a new dynamic password is generated, and the graphic code displayed on the target device terminal is updated based on the new dynamic password. Optionally, the above-mentioned graphic code update module is specifically used for: The message digest algorithm is used to determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information. Optionally, the above-mentioned control instruction issuing module is specifically used for: In the dynamic password set, search for whether there is a dynamic password corresponding to the control confirmation information; If so, trigger the dynamic password addition and deletion module to remove the dynamic password from the dynamic password set, and send a control instruction to the target device terminal. The code scanning control device in one or more embodiments of this specification receives a device control request sent by a client; and determines whether the target dynamic password carried in the device control request meets the preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the terminal of the target device correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users. Corresponding to the code scanning control method described in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a device terminal, where the terminal device may be a code scanning sales device. FIG. 12 shows One or more embodiments of this specification provide a schematic diagram of the module composition of a device terminal. The device is used to execute the code scanning control method described in FIG. 9. As shown in FIG. 12, the device terminal includes: The graphic code display module 1201 is used to display the corresponding graphic code based on the graphic code information issued by the back-end server, where the graphic code is dynamically updated under the control of the back-end server, and each graphic code corresponds to a unique dynamic password; The control instruction receiving module 1202 is configured to receive the control instruction sent by the background server, where the control instruction is generated by the background server according to the timeliness judgment result of the target dynamic password carried in the received device control request. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. Wherein, the above-mentioned control command receiving module 1202 is specifically used for: Receive the control instruction sent by the background server to determine that the target dynamic password satisfies the preset timeliness condition, and execute the corresponding control action based on the control instruction. For the scanning code sales device, the control instruction is the door opening instruction, scanning After receiving the door opening instruction, the code vending equipment executes the door opening operation. The device terminal in one or more embodiments of this specification displays the corresponding graphic code based on the graphic code information issued by the back-end server, where the graphic code is dynamically updated under the control of the back-end server, and each graphic code corresponds to A unique dynamic password; and receiving a control instruction sent by the back-end server, where the control instruction is generated by the back-end server based on the timeliness judgment result of the target dynamic password carried in the received device control request. In one or more embodiments of this specification, the graphic code displayed on the device terminal is dynamically updated through the background server control. Since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain time limit. In this way, the timeliness of the dynamic password can be used to identify whether the client is attacked, and effective control can be carried out in time to avoid unnecessary losses to normal users when the client is identified as being illegally attacked by malicious users. It should be noted that this embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, so the specific implementation of this embodiment can refer to the implementation of the aforementioned code scanning control method, and the repetition will not be repeated. Corresponding to the code scanning control method described in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a code scanning control system. FIG. 13 provides one or more embodiments of this specification. A schematic diagram of the module composition of a device terminal. The device is used to execute the code scanning control method described in FIG. 2 to FIG. 6. As shown in FIG. 13, the device terminal includes: a background server 20, a client 10, and a device terminal 30; Wherein, the aforementioned background server 20 is configured to receive a device control request sent by a client; determine whether the target dynamic password carried in the device control request meets a preset timeliness condition; judge according to the timeliness of the target dynamic password As a result, perform corresponding control operations; The above-mentioned client 10 is configured to send a device control request to a back-end server; and receive feedback information sent by the back-end server in response to the timeliness judgment result of the target dynamic password; The above-mentioned equipment terminal 30 is configured to display corresponding graphic codes based on graphic code information issued by the background server, wherein the graphic codes are dynamically updated, and each graphic code corresponds to a unique dynamic password; and receiving A control instruction sent by the background server in response to the timeliness judgment result of the target dynamic password. The code scanning control method in one or more embodiments of this specification receives a device control request sent by a client; judges whether the target dynamic password carried in the device control request meets the preset timeliness condition, wherein the target dynamic password and The dynamically updated graphic codes displayed on the terminal of the target device correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users. Further, corresponding to the methods shown in FIGS. 2 to 6 above, based on the same technical concept, one or more embodiments of this specification also provide a code scanning control device, which is used to execute the above code scanning control method, As shown in Figure 14. The scan code control device may have relatively large differences due to different configurations or performances, and may include one or more processors 1401 and a memory 1402, and the memory 1402 may store one or more storage applications or data. Among them, the memory 1402 can be short-term storage or permanent storage. The application program stored in the memory 1402 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions for the scanning code control device. Furthermore, the processor 1401 may be configured to communicate with the memory 1402, and execute a series of computer-executable instructions in the memory 1402 on the code scanning control device. The scanning control device may also include one or more power supplies 1403, one or more wired or wireless network interfaces 1404, one or more input and output interfaces 1405, one or more keyboards 1406, and so on. In a specific embodiment, the scan code control device includes a memory and one or more programs. One or more programs are stored in the memory, and the one or more programs may include one or more modules. Each module can include a series of computer-executable instructions in the scanning code control device, and is configured to be executed by one or more processors. The one or more programs include the following computer-executable instructions : Receiving a device control request sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. Optionally, when the computer-executable instruction is executed, the execution of the corresponding control operation according to the timeliness judgment result for the target dynamic password includes: If the judgment result is yes, return a business page to the client, so that the client requests a back-end server based on the business page to control the target device terminal; If the judgment result is no, the prompt information is sent back to the client, so that the client prompts based on the prompt information. Optionally, when the computer-executable instructions are executed, they also include the following computer-executable instructions: After returning the business page to the client, it also includes: Receiving control confirmation information sent by the client for the service page; Based on the control confirmation information, a control instruction is sent to the target device terminal, so that the target device terminal executes a corresponding control action. Optionally, when the computer-executable instructions are executed, they also include the following computer-executable instructions: Before receiving the device control request sent by the client, it also includes: Determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information; Generate graphic code information according to the determined dynamic password; The graphic code information is delivered to the target device terminal, so that the target device terminal displays the graphic code based on the graphic code information. Optionally, when the computer-executable instructions are executed, they also include the following computer-executable instructions: After determining the dynamic password, it also includes: The dynamic password is added to the dynamic password set, and when the dynamic password meets a preset destruction condition, the dynamic password is removed from the dynamic password set, wherein the preset destruction condition includes: dynamic The password reaches the preset survival time and/or the dynamic password has been used; The judging whether the target dynamic password meets a preset timeliness condition includes: If the target dynamic password exists in the dynamic password set, determining that the target dynamic password satisfies a preset timeliness condition; If the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not satisfy a preset timeliness condition. Optionally, when the computer-executable instructions are executed, they also include the following computer-executable instructions: After removing the dynamic password from the dynamic password set, the method further includes: A new dynamic password is generated, and the graphic code displayed on the target device terminal is updated based on the new dynamic password. Optionally, when the computer-executable instructions are executed, the determination of the dynamic password based on at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information includes: The message digest algorithm is used to determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information. Optionally, when the computer-executable instruction is executed, the sending a control instruction to the target device terminal based on the control confirmation information includes: In the dynamic password set, search for whether there is a dynamic password corresponding to the control confirmation information; If so, remove the dynamic password from the dynamic password set, and send a control instruction to the target device terminal. The code scanning control device in one or more embodiments of this specification receives the device control request sent by the client; and determines whether the target dynamic password carried in the device control request meets the preset timeliness condition, wherein the target dynamic password is equal to The dynamically updated graphic codes displayed on the terminal of the target device correspond one-to-one; corresponding control operations are performed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users. Further, corresponding to the methods shown in FIG. 2 to FIG. 6, based on the same technical concept, one or more embodiments of this specification also provide a storage medium for storing computer-executable instructions. In a specific embodiment , The storage medium can be a U disk, an optical disk, a hard disk, etc., when the computer executable instructions stored in the storage medium are executed by the processor, the following process can be realized: Receiving a device control request sent by the client, where the device control request carries a target dynamic password; Judging whether the target dynamic password meets a preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; Perform corresponding control operations according to the timeliness judgment result for the target dynamic password. Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the execution of corresponding control operations according to the timeliness judgment result for the target dynamic password includes: If the judgment result is yes, return a business page to the client, so that the client requests a back-end server based on the business page to control the target device terminal; If the judgment result is no, the prompt information is sent back to the client, so that the client prompts based on the prompt information. Optionally, when the computer executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented: After returning the business page to the client, it also includes: Receiving control confirmation information sent by the client for the service page; Based on the control confirmation information, a control instruction is sent to the target device terminal, so that the target device terminal executes a corresponding control action. Optionally, when the computer executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented: Before receiving the device control request sent by the client, it also includes: Determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information; Generate graphic code information according to the determined dynamic password; The graphic code information is delivered to the target device terminal, so that the target device terminal displays the graphic code based on the graphic code information. Optionally, when the computer executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented: After determining the dynamic password, it also includes: The dynamic password is added to the dynamic password set, and when the dynamic password meets a preset destruction condition, the dynamic password is removed from the dynamic password set, wherein the preset destruction condition includes: dynamic The password reaches the preset survival time and/or the dynamic password has been used; The judging whether the target dynamic password meets a preset timeliness condition includes: If the target dynamic password exists in the dynamic password set, determining that the target dynamic password satisfies a preset timeliness condition; If the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not satisfy a preset timeliness condition. Optionally, when the computer executable instructions stored in the storage medium are executed by the processor, the following processes are also implemented: After removing the dynamic password from the dynamic password set, the method further includes: A new dynamic password is generated, and the graphic code displayed on the target device terminal is updated based on the new dynamic password. Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and time stamp information, Determine the dynamic password, including: The message digest algorithm is used to determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information. Optionally, when the computer-executable instructions stored in the storage medium are executed by the processor, the sending a control instruction to the target device terminal based on the control confirmation information includes: In the dynamic password set, search for whether there is a dynamic password corresponding to the control confirmation information; If so, remove the dynamic password from the dynamic password set, and send a control instruction to the target device terminal. When the computer executable instructions stored in the storage medium in one or more embodiments of this specification are executed by the processor, they receive the device control request sent by the client; determine whether the target dynamic password carried in the device control request meets the preset time limit Conditions, where the target dynamic password corresponds to the dynamically updated graphic code displayed on the terminal of the target device one-to-one; and the corresponding control operation is executed according to the timeliness judgment result. In one or more embodiments of this specification, since the graphic code displayed on the device terminal changes dynamically, the dynamic password uploaded by the client should have a certain timeliness, so that the timeliness of the dynamic password can be used to identify whether the client has been Attacks, aiming at identifying the situation where the client is illegally attacked by malicious users, carry out effective control in time to avoid unnecessary losses to normal users. In the 1990s, the improvement of a technology can be clearly distinguished from the improvement of the hardware (for example, the improvement of the circuit structure of diodes, transistors, switches, etc.) or the improvement of the software (for the process of the method). Improve). However, with the development of technology, the improvement of many methods and processes of today can be regarded as a direct improvement of the hardware circuit structure. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by the hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (such as a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic function is determined by the user's programming of the device. It is programmed by the designer to "integrate" a digital system on a PLD without requiring the chip manufacturer to design and manufacture a dedicated integrated circuit chip. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly realized by using "logic compiler" software, which is similar to the software compiler used in program development and writing, but compiles The original code before has to be written in a specific programming language, which is called Hardware Description Language (HDL), and HDL is not only one, but there are many, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HD Cal, JHDL (Java Hardware Description Language), Lava, Lola, My HDL, PALASM, RHDL (Ruby Hardware Description Language), etc., Currently the most commonly used are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that only a little logic programming of the method flow in the above hardware description languages and programming into the integrated circuit can easily obtain the hardware circuit that implements the logic method flow. The controller can be implemented in any suitable manner. For example, the controller can be a microprocessor or a processor, and a computer readable program code (such as software or firmware) that can be executed by the (micro) processor. Media, logic gates, switches, application specific integrated circuits (ASIC), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the memory control logic. Those skilled in the art also know that in addition to implementing the controller in a purely computer-readable program code manner, it is completely possible to make the controller use logic gates, switches, dedicated integrated circuits, programmable logic controllers and Embedded in the form of a microcontroller, etc. to achieve the same function. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component. The systems, devices, modules, or units explained in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, and a wearable device. Or a combination of any of these devices. For the convenience of description, when describing the above device, the functions are divided into various units and described separately. Of course, when implementing one or more of this specification, the functions of each unit can be implemented in the same or multiple software and/or hardware. Those skilled in the art should understand that one or more of the embodiments in this specification can be provided as a method, a system, or a computer program product. Therefore, one or more of this specification may take the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware. Moreover, one or more of this specification can be implemented on one or more computer-usable storage media (including but not limited to magnetic disk memory, CD-ROM, optical memory, etc.) containing computer-usable program codes. The form of the program product. One or more of this specification is described with reference to flowcharts and/or block diagrams of methods, devices (systems), and computer program products according to one or more embodiments of this specification. It should be understood that each process and/or block in the flowchart and/or block diagram, and the combination of processes and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions can be provided to the processors of general-purpose computers, special-purpose computers, embedded processors, or other programmable data processing equipment to generate a machine, so that the instructions executed by the processor of the computer or other programmable data processing equipment can be generated. It is a device that implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram. These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product that includes the instruction device, The instruction device realizes the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram. These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment. The instructions provide steps for implementing functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram. In a typical configuration, the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory. Memory memory may include non-permanent memory in computer-readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). ). Memory memory is an example of computer-readable media. Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory memory technology, read-only CD-ROM (CD-ROM), digital multi-function Optical discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. It should also be noted that the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or they also include elements inherent to such processes, methods, commodities, or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the element. Those skilled in the art should understand that one or more of the embodiments in this specification can be provided as a method, a system, or a computer program product. Therefore, one or more of this specification may take the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware. Moreover, one or more of this specification can be implemented on one or more computer-usable storage media (including but not limited to magnetic disk memory, CD-ROM, optical memory, etc.) containing computer-usable program codes. The form of the program product. One or more of this specification may be described in the general context of computer-executable instructions executed by a computer, such as a program module. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. One or more of this specification can also be practiced in a distributed computing environment. In these distributed computing environments, remote processing devices connected through a communication network perform tasks. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices. The various embodiments in this specification are described in a progressive manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiment. The above description is only one or more embodiments of this specification, and is not used to limit one or more of this specification. For those skilled in the art, one or more of this specification can have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within one or more of the spirit and principles of this specification shall be included in the scope of one or more of the patent applications in this specification.

1101:請求接收模組 1102:密碼識別模組 1103:控制模組 1201:圖形碼展示模組 1202:控制指令接收模組 10:客戶端 20:後台服務端 30:設備終端 1401:處理器 1402:記憶體 1403:電源 1404:有線或無線網路介面 1405:輸入輸出介面 1406:鍵盤1101: Request receiving module 1102: Password identification module 1103: Control Module 1201: Graphic code display module 1202: Control command receiving module 10: client 20: Background server 30: Device terminal 1401: processor 1402: memory 1403: power supply 1404: Wired or wireless network interface 1405: Input and output interface 1406: keyboard

為了更清楚地說明本說明書一個或多個實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的附圖作簡單地介紹,顯而易見地,下面描述中的附圖僅僅是本說明書一個或多個中記載的一些實施例,對於本領域普通技術人員來講,在不付出創造性勞動性的前提下,還可以根據這些附圖獲得其他的附圖。 圖1為本說明書一個或多個實施例提供的掃碼控制系統的應用場景示意圖; 圖2為本說明書一個或多個實施例提供的應用于後台服務端的掃碼控制方法的第一種流程示意圖; 圖3為本說明書一個或多個實施例提供的應用于後台服務端的掃碼控制方法的第二種流程示意圖; 圖4為本說明書一個或多個實施例提供的應用于後台服務端的掃碼控制方法的第三種流程示意圖; 圖5為本說明書一個或多個實施例提供的應用于後台服務端的掃碼控制方法的第四種流程示意圖; 圖6為本說明書一個或多個實施例提供的應用于後台服務端的掃碼控制方法的第五種流程示意圖; 圖7a為本說明書一個或多個實施例提供的掃碼控制方法的第一種資訊互動示意圖; 圖7b為本說明書一個或多個實施例提供的掃碼控制方法的第二種資訊互動示意圖; 圖8為本說明書一個或多個實施例提供的應用於客戶端的掃碼控制方法的流程示意圖; 圖9為本說明書一個或多個實施例提供的應用於設備終端的掃碼控制方法的流程示意圖; 圖10為本說明書一個或多個實施例提供的針對掃碼售賣設備的掃碼控制方法的流程示意圖; 圖11為本說明書一個或多個實施例提供的設置于後台服務端的掃碼控制裝置的模組組成示意圖; 圖12為本說明書一個或多個實施例提供的設備終端的模組組成示意圖; 圖13為本說明書一個或多個實施例提供的掃碼控制系統的結構組成示意圖; 圖14為本說明書一個或多個實施例提供的掃碼控制設備的結構示意圖。In order to more clearly explain one or more embodiments of this specification or the technical solutions in the prior art, the following will briefly introduce the drawings that need to be used in the description of the embodiments or the prior art. Obviously, the appendix in the following description The drawings are only some of the embodiments described in one or more of this specification. For those of ordinary skill in the art, other drawings can be obtained based on these drawings without creative labor. FIG. 1 is a schematic diagram of an application scenario of a code scanning control system provided by one or more embodiments of this specification; 2 is a schematic diagram of the first flow chart of the code scanning control method applied to the back-end server provided by one or more embodiments of this specification; FIG. 3 is a schematic diagram of a second flow chart of a code scanning control method applied to a background server provided by one or more embodiments of this specification; 4 is a schematic diagram of a third flow chart of a code scanning control method applied to a back-end server according to one or more embodiments of this specification; 5 is a schematic diagram of a fourth flow chart of a code scanning control method applied to a background server provided by one or more embodiments of this specification; FIG. 6 is a schematic flowchart of a fifth method for scanning code control applied to a back-end server according to one or more embodiments of this specification; FIG. 7a is a schematic diagram of the first information interaction of the code scanning control method provided by one or more embodiments of this specification; FIG. 7b is a schematic diagram of the second information interaction of the scanning code control method provided by one or more embodiments of this specification; FIG. 8 is a schematic flowchart of a code scanning control method applied to a client according to one or more embodiments of this specification; FIG. 9 is a schematic flowchart of a code scanning control method applied to a device terminal according to one or more embodiments of this specification; FIG. 10 is a schematic flowchart of a code scanning control method for a code scanning vending device provided by one or more embodiments of this specification; 11 is a schematic diagram of the module composition of the code scanning control device provided on the background server provided by one or more embodiments of this specification; FIG. 12 is a schematic diagram of the module composition of a device terminal provided by one or more embodiments of this specification; FIG. 13 is a schematic structural composition diagram of a code scanning control system provided by one or more embodiments of this specification; FIG. 14 is a schematic structural diagram of a code scanning control device provided by one or more embodiments of this specification.

Claims (21)

一種掃碼控制方法,其特徵在於,包括:接收客戶端發送的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,其中,在接收客戶端發送的設備控制請求之前,還包括:根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標設備終端,以使該目標設備終端基於該圖形碼資訊顯示圖形碼。 A code scanning control method, characterized by comprising: receiving a device control request sent by a client, wherein the device control request carries a target dynamic password; judging whether the target dynamic password meets a preset timeliness condition, wherein the The target dynamic password has a one-to-one correspondence with the dynamically updated graphic code displayed on the target device terminal; the corresponding control operation is performed according to the timeliness judgment result of the target dynamic password. Among them, before receiving the device control request sent by the client, the Including: determining the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information; generating the graphic code information according to the determined dynamic password; the graphic code The information is delivered to the target device terminal so that the target device terminal displays the graphic code based on the graphic code information. 根據申請專利範圍第1項所述的方法,其中,所述根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,包括:若判斷結果為是,則向該客戶端回傳業務頁面,以使該客戶端基於該業務頁面向後台服務端請求控制該目標設備終端; 若判斷結果為否,則向該客戶端回傳提示資訊,以使該客戶端基於該提示資訊進行提示。 The method according to item 1 of the scope of patent application, wherein the execution of corresponding control operations according to the timeliness judgment result of the target dynamic password includes: if the judgment result is yes, returning the business page to the client , So that the client requests the background server to control the target device terminal based on the business page; If the judgment result is no, the prompt information is sent back to the client, so that the client can prompt based on the prompt information. 根據申請專利範圍第2項所述的方法,其中,在向該客戶端回傳業務頁面之後,還包括:接收該客戶端針對該業務頁面發送的控制確認資訊;基於該控制確認資訊向該目標設備終端發送控制指令,以使該目標設備終端執行相應的控制動作。 According to the method described in item 2 of the scope of patent application, after returning the business page to the client, the method further includes: receiving control confirmation information sent by the client for the business page; and sending the control confirmation information to the target based on the control confirmation information. The device terminal sends a control instruction so that the target device terminal executes the corresponding control action. 根據申請專利範圍第1項所述的方法,其中,在確定動態密碼之後,還包括:將該動態密碼添加至動態密碼集合,以及當該動態密碼滿足預設銷毀條件時,將該動態密碼從該動態密碼集合中移除,其中,該預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用;所述判斷該目標動態密碼是否滿足預設時效性條件,包括:若該動態密碼集合中存在該目標動態密碼,則確定該目標動態密碼滿足預設時效性條件;若該動態密碼集合中不存在該目標動態密碼,則確定該目標動態密碼不滿足預設時效性條件。 According to the method described in item 1 of the scope of patent application, after determining the dynamic password, it further includes: adding the dynamic password to the dynamic password set, and when the dynamic password meets the preset destruction conditions, removing the dynamic password from The dynamic password is removed from the set, where the preset destruction conditions include: the dynamic password reaches the preset survival time and/or the dynamic password has been used; the determining whether the target dynamic password meets the preset timeliness condition includes: if If the target dynamic password exists in the dynamic password set, it is determined that the target dynamic password meets the preset timeliness condition; if the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not meet the preset timeliness condition . 根據申請專利範圍第4項所述的方法,其中,所述將該動態密碼從該動態密碼集合中移除之後,還包括: 生成新的動態密碼,基於該新的動態密碼更新該目標設備終端上顯示的圖形碼。 The method according to item 4 of the scope of patent application, wherein, after removing the dynamic password from the dynamic password set, the method further includes: A new dynamic password is generated, and the graphic code displayed on the target device terminal is updated based on the new dynamic password. 根據申請專利範圍第1項所述的方法,其中,該根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼,包括:利用消息摘要算法根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼。 The method according to item 1 of the scope of patent application, wherein the determination of the dynamic password based on at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information includes: using a message The digest algorithm determines the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information. 根據申請專利範圍第3項所述的方法,其中,所述基於該控制確認資訊向該目標設備終端發送控制指令,包括:在動態密碼集合中,查找是否存在與該控制確認資訊對應的動態密碼;若是,則將該動態密碼從該動態密碼集合中移除,以及向目標設備終端發送控制指令。 The method according to item 3 of the scope of patent application, wherein the sending a control instruction to the target device terminal based on the control confirmation information includes: in the dynamic password set, searching whether there is a dynamic password corresponding to the control confirmation information ; If yes, remove the dynamic password from the dynamic password set, and send a control instruction to the target device terminal. 一種掃碼控制方法,其特徵在於,包括:向後台服務端發送攜帶有目標動態密碼的設備控制請求,以使該後台服務端判斷該目標動態密碼是否滿足預設時效性條件;接收該後台服務端發送的回饋資訊,其中,該回饋資訊是該後台服務端針對該目標動態密碼的時效性判斷結果 生成的,其中,在該後台服務端接收發送的設備控制請求之前,進行以下步驟:根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標設備終端,以使該目標設備終端基於該圖形碼資訊顯示圖形碼。 A code scanning control method, characterized by comprising: sending a device control request carrying a target dynamic password to a background server, so that the background server can determine whether the target dynamic password meets a preset timeliness condition; receiving the background service The feedback information sent by the client, where the feedback information is the timeliness judgment result of the back-end server for the target dynamic password Before the back-end server receives the sent device control request, the following steps are performed: determine according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information Dynamic password; according to the determined dynamic password, graphic code information is generated; the graphic code information is sent to the target device terminal so that the target device terminal displays the graphic code based on the graphic code information. 根據申請專利範圍第8項所述的方法,其中,所述接收該後台服務端發送的回饋資訊,包括:接收該後台服務端確定該目標動態密碼滿足預設時效性條件時所發送的業務頁面,並基於該業務頁面向該後台服務端請求控制目標設備終端;接收該後台服務端確定該目標動態密碼不滿足預設時效性條件時所發送的提示資訊,並基於該提示資訊進行提示。 The method according to item 8 of the scope of patent application, wherein the receiving the feedback information sent by the back-end server includes: receiving the business page sent when the back-end server determines that the target dynamic password meets a preset timeliness condition , And based on the business page, request the back-end server to control the target device terminal; receive the prompt information sent by the back-end server when it determines that the target dynamic password does not meet the preset timeliness condition, and prompt based on the prompt information. 一種掃碼控制方法,其特徵在於,包括:基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,該圖形碼是動態更新的,每個該圖形碼對應於一個唯一的動態密碼;接收該後台服務端發送的控制指令,其中,該控制指令是該後台服務端針對接收到的設備控制請求中攜帶的目 標動態密碼的時效性判斷結果生成的,其中,在該後台服務端接收發送的設備控制請求之前,進行以下步驟:根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標設備終端,以使該目標設備終端基於該圖形碼資訊顯示圖形碼。 A scanning code control method, characterized in that it comprises: displaying a corresponding graphic code based on graphic code information issued by a background server, wherein the graphic code is dynamically updated, and each graphic code corresponds to a unique dynamic password ; Receive the control instruction sent by the back-end server, where the control instruction is the back-end server for the purpose carried in the received device control request Before the background server receives the sent device control request, the following steps are performed: according to the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp At least two of the information, determine a dynamic password; generate graphic code information based on the determined dynamic code; send the graphic code information to the target device terminal, so that the target device terminal displays graphics based on the graphic code information code. 根據申請專利範圍第10項所述的方法,其中,所述接收該後台服務端發送的控制指令,包括:接收該後台服務端確定該目標動態密碼滿足預設時效性條件時所發送的控制指令,以及基於該控制指令執行相應的控制動作。 The method according to item 10 of the scope of patent application, wherein the receiving the control instruction sent by the back-end server includes: receiving the control instruction sent by the back-end server when the target dynamic password meets the preset timeliness condition , And execute the corresponding control action based on the control instruction. 一種掃碼控制方法,其特徵在於,包括:接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,其中,在接收客戶端發送的針對掃碼售賣設備的設備 控制請求之前,還包括:根據目標掃碼售賣設備的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標掃碼售賣設備,以使該目標掃碼售賣設備基於該圖形碼資訊顯示圖形碼。 A scanning code control method, characterized by comprising: receiving a device control request for a scanning code selling device sent by a client, wherein the device control request carries a target dynamic password; judging whether the target dynamic password meets a preset time limit The target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target scan code sales device; the corresponding control operation is executed according to the timeliness judgment result of the target dynamic password, wherein, in the receiving client Sent equipment for scanning code sales equipment Before the control request, it also includes: determining a dynamic password based on at least two of the device identification of the target scan code selling device, the identification key corresponding to the device identification, and the time stamp information; and generating a graphic based on the determined dynamic password Code information; the graphic code information is issued to the target code scanning sales device, so that the target code scanning sales device displays the graphic code based on the graphic code information. 根據申請專利範圍第12項所述的方法,其中,在確定動態密碼之後,還包括:將該動態密碼添加至動態密碼集合,以及當該動態密碼滿足預設銷毀條件時,將該動態密碼從該動態密碼集合中移除,其中,該預設銷毀條件包括:動態密碼達到預設存活時間及/或動態密碼已使用;所述判斷該目標動態密碼是否滿足預設時效性條件,包括:若該動態密碼集合中存在該目標動態密碼,則確定該目標動態密碼滿足預設時效性條件;若該動態密碼集合中不存在該目標動態密碼,則確定該目標動態密碼不滿足預設時效性條件。 According to the method described in item 12 of the scope of patent application, after determining the dynamic password, it further includes: adding the dynamic password to the dynamic password set, and when the dynamic password meets the preset destruction conditions, removing the dynamic password from The dynamic password is removed from the set, where the preset destruction conditions include: the dynamic password reaches the preset survival time and/or the dynamic password has been used; the determining whether the target dynamic password meets the preset timeliness condition includes: if If the target dynamic password exists in the dynamic password set, it is determined that the target dynamic password meets the preset timeliness condition; if the target dynamic password does not exist in the dynamic password set, it is determined that the target dynamic password does not meet the preset timeliness condition . 根據申請專利範圍第13項所述的方法,其中,所述將該動態密碼從該動態密碼集合中移除之後,還包括:生成新的動態密碼,基於該新的動態密碼更新該目標 掃碼售賣設備上顯示的圖形碼。 The method according to item 13 of the scope of patent application, wherein, after removing the dynamic password from the dynamic password set, the method further includes: generating a new dynamic password, and updating the target based on the new dynamic password Scan the code to sell the graphic code displayed on the device. 一種掃碼控制裝置,其特徵在於,包括:請求接收模組,用於接收客戶端發送的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;密碼識別模組,用於判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;控制模組,用於根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作;圖形碼更新模組,用於:在接收客戶端發送的設備控制請求之前,根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的所述動態密碼,生成圖形碼資訊;將所述圖形碼資訊下發給所述目標設備終端,以使所述目標設備終端基於所述圖形碼資訊顯示圖形碼。 A code scanning control device is characterized by comprising: a request receiving module for receiving a device control request sent by a client, wherein the device control request carries a target dynamic password; a password identification module is used for judging the device control request. Whether the target dynamic password meets the preset timeliness condition, where the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal; the control module is used to determine the timeliness of the target dynamic password Perform corresponding control operations; the graphic code update module is used to: before receiving the device control request sent by the client, according to the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information At least two, determine dynamic passwords; generate graphic code information according to the determined dynamic password; deliver the graphic code information to the target device terminal, so that the target device terminal is based on the graphic code information Display the graphic code. 一種掃碼控制裝置,其特徵在於,包括:請求接收模組,用於接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;密碼識別模組,用於判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標掃碼售賣設 備上顯示的動態更新的圖形碼一一對應;控制模組,用於根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作;圖形碼更新模組,用於:在接收客戶端發送的針對掃碼售賣設備的設備控制請求之前,根據目標掃碼售賣設備的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標掃碼售賣設備,以使該目標掃碼售賣設備基於該圖形碼資訊顯示圖形碼。 A scanning code control device, which is characterized by comprising: a request receiving module for receiving a device control request for a scanning code selling device sent by a client, wherein the device control request carries a target dynamic password; a password recognition module Group, used to determine whether the target dynamic password meets the preset timeliness condition, where the target dynamic password and the target scan code sales device The graphic code of the dynamic update displayed on the device corresponds one-to-one; the control module is used to perform corresponding control operations according to the timeliness judgment result of the target dynamic password; the graphic code update module is used to: send at the receiving client Before requesting a device control request for a code-scanning vending device, determine a dynamic password according to at least two of the device ID of the target code-scanning vending device, the identification key corresponding to the device ID, and the time stamp information; The dynamic password generates graphic code information; the graphic code information is issued to the target code scanning sales device, so that the target code scanning sales device displays the graphic code based on the graphic code information. 一種掃碼控制系統,其特徵在於,包括:後台服務端、客戶端和設備終端;其中,該後台服務端,用於接收客戶端發送的設備控制請求;判斷該設備控制請求中攜帶的目標動態密碼是否滿足預設時效性條件;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作;該客戶端,用於向後台服務端發送設備控制請求;以及接收該後台服務端針對該目標動態密碼的時效性判斷結果發送的回饋資訊;該設備終端,用於基於後台服務端下發的圖形碼資訊展示相應的圖形碼,其中,該圖形碼是動態更新的,每個該圖形碼對應於一個唯一的動態密碼;以及接收該後台服 務端針對該目標動態密碼的時效性判斷結果發送的控制指令,其中,在接收該客戶端發送的設備控制請求之前,該後台服務端進行下列步驟:根據目標設備終端的設備標識、與所述設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的所述動態密碼,生成圖形碼資訊;將所述圖形碼資訊下發給所述目標設備終端,以使所述目標設備終端基於所述圖形碼資訊顯示圖形碼。 A code scanning control system, which is characterized by comprising: a background server, a client, and a device terminal; wherein the background server is used to receive a device control request sent by the client; and to determine the target dynamics carried in the device control request Whether the password meets the preset timeliness condition; execute the corresponding control operation according to the timeliness judgment result of the target dynamic password; the client is used to send a device control request to the backend server; and receive the backend server for the target The feedback information sent by the timeliness of the dynamic password; the device terminal is used to display the corresponding graphic code based on the graphic code information issued by the back-end server, where the graphic code is dynamically updated, and each graphic code corresponds to To a unique dynamic password; and to receive the background server The control instruction sent by the server for the timeliness judgment result of the target dynamic password, wherein, before receiving the device control request sent by the client, the background server performs the following steps: according to the device identification of the target device terminal, and the At least two of the identification key corresponding to the device identification and the time stamp information, determine a dynamic password; generate graphic code information according to the determined dynamic password; deliver the graphic code information to the target device terminal, So that the target device terminal displays a graphic code based on the graphic code information. 一種掃碼控制設備,其特徵在於,包括:處理器;以及被安排成儲存計算機可執行指令的記憶體,該可執行指令在被執行時使該處理器:接收客戶端發送的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,其中,在接收客戶端發送的設備控制請求之前,該處理器還進行: 根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標設備終端,以使該目標設備終端基於該圖形碼資訊顯示圖形碼。 A code scanning control device is characterized by comprising: a processor; and a memory arranged to store computer-executable instructions. When the executable instructions are executed, the processor: receives a device control request sent by a client, Wherein, the device control request carries the target dynamic password; it is judged whether the target dynamic password meets the preset timeliness condition, wherein the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal in a one-to-one correspondence; The timeliness judgment result of the target dynamic password executes the corresponding control operation, wherein, before receiving the device control request sent by the client, the processor also performs: Determine the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information; generate graphic code information according to the determined dynamic password; download the graphic code information Send to the target device terminal so that the target device terminal displays the graphic code based on the graphic code information. 一種掃碼控制設備,其特徵在於,包括:處理器;以及被安排成儲存計算機可執行指令的記憶體,該可執行指令在被執行時使該處理器:接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,其中,在接收客戶端發送的針對掃碼售賣設備的設備控制請求之前,該處理器還進行:根據目標掃碼售賣設備的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標掃碼售賣設備,以使該 目標掃碼售賣設備基於該圖形碼資訊顯示圖形碼。 A scan code control device, which is characterized by comprising: a processor; and a memory arranged to store computer executable instructions. When the executable instructions are executed, the processor: The device control request of the device, where the device control request carries the target dynamic password; it is judged whether the target dynamic password meets the preset timeliness condition, and the target dynamic password is the same as the dynamic update displayed on the target scan code sales device The graphic code corresponds to one to one; the corresponding control operation is executed according to the timeliness judgment result of the target dynamic password, wherein, before receiving the device control request for the scanning code sales device sent by the client, the processor also performs: according to the target At least two of the device identification of the scanning code selling device, the identification key corresponding to the device identification, and the time stamp information, determine the dynamic password; generate graphic code information according to the determined dynamic password; download the graphic code information Send the target scan code to sell the equipment so that the The target scanning code selling device displays the graphic code based on the graphic code information. 一種儲存媒體,用於儲存計算機可執行指令,其特徵在於,該可執行指令在被執行時實現以下流程:接收客戶端發送的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;判斷該目標動態密碼是否滿足預設時效性條件,其中,該目標動態密碼與目標設備終端上顯示的動態更新的圖形碼一一對應;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,其中,在接收客戶端發送的設備控制請求之前,還包括:根據目標設備終端的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標設備終端,以使該目標設備終端基於該圖形碼資訊顯示圖形碼。 A storage medium for storing computer executable instructions, wherein the executable instructions implement the following process when executed: receiving a device control request sent by a client, wherein the device control request carries a target dynamic password; Determine whether the target dynamic password meets the preset timeliness condition, where the target dynamic password corresponds to the dynamically updated graphic code displayed on the target device terminal; execute corresponding control according to the timeliness judgment result of the target dynamic password Operation, wherein, before receiving the device control request sent by the client, it further includes: determining the dynamic password according to at least two of the device identification of the target device terminal, the identification key corresponding to the device identification, and the time stamp information; The determined dynamic password generates graphic code information; the graphic code information is delivered to the target device terminal, so that the target device terminal displays the graphic code based on the graphic code information. 一種儲存媒體,用於儲存計算機可執行指令,其特徵在於,該可執行指令在被執行時實現以下流程:接收客戶端發送的針對掃碼售賣設備的設備控制請求,其中,該設備控制請求中攜帶有目標動態密碼;判斷該目標動態密碼是否滿足預設時效性條件,其 中,該目標動態密碼與目標掃碼售賣設備上顯示的動態更新的圖形碼一一對應;根據針對該目標動態密碼的時效性判斷結果執行相應的控制操作,其中,在接收客戶端發送的針對掃碼售賣設備的設備控制請求之前,還包括:根據目標掃碼售賣設備的設備標識、與該設備標識對應的標識密鑰以及時間戳資訊中的至少兩個,確定動態密碼;根據確定出的該動態密碼,生成圖形碼資訊;將該圖形碼資訊下發給該目標掃碼售賣設備,以使該目標掃碼售賣設備基於該圖形碼資訊顯示圖形碼。 A storage medium for storing computer-executable instructions, characterized in that, when the executable instructions are executed, the following process is realized: receiving a device control request for a code scanning sales device sent by a client, wherein the device control request is Carry the target dynamic password; to determine whether the target dynamic password meets the preset timeliness condition, its , The target dynamic password is in one-to-one correspondence with the dynamically updated graphic code displayed on the target scan code sales device; the corresponding control operation is executed according to the timeliness judgment result of the target dynamic password, where the target dynamic password sent by the client is received Before the device control request of the scan code selling device, it also includes: determining the dynamic password according to at least two of the device ID of the target scan code selling device, the identification key corresponding to the device ID, and the time stamp information; The dynamic password generates graphic code information; the graphic code information is distributed to the target code scanning sales device, so that the target code scanning sales device displays the graphic code based on the graphic code information.
TW108123746A 2018-09-13 2019-07-05 Code scanning control method, device and system TWI724450B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811066827.7 2018-09-13
CN201811066827.7A CN109389386B (en) 2018-09-13 2018-09-13 Code scanning control method, device and system

Publications (2)

Publication Number Publication Date
TW202011310A TW202011310A (en) 2020-03-16
TWI724450B true TWI724450B (en) 2021-04-11

Family

ID=65418828

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108123746A TWI724450B (en) 2018-09-13 2019-07-05 Code scanning control method, device and system

Country Status (3)

Country Link
CN (2) CN112488694A (en)
TW (1) TWI724450B (en)
WO (1) WO2020052371A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488694A (en) * 2018-09-13 2021-03-12 创新先进技术有限公司 Code scanning control method, device and system
CN109949521A (en) * 2019-03-07 2019-06-28 爱布客(武汉)科技有限公司 A kind of method of self-help book returning, system, terminal and storage medium
CN110334559B (en) * 2019-05-31 2024-03-15 努比亚技术有限公司 Code scanning identification method, terminal and computer readable storage medium
CN113938316A (en) * 2021-11-26 2022-01-14 中国船舶重工集团公司第七0七研究所 Distributed node control response method based on dynamic password

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200935313A (en) * 2007-12-04 2009-08-16 At Comm Co Ltd Two-dimentional code display system, two-dimentional code display method and a program thereof
US20120145779A1 (en) * 2009-04-08 2012-06-14 Continental Teves Ag & Co. Ohg Two-dimensional symbol code and method for reading the symbol code
CN106204864A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system based on dynamic two-dimension code and door opening method

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100125516A1 (en) * 2008-11-14 2010-05-20 Wankmueller John R Methods and systems for secure mobile device initiated payments
CN104253689B (en) * 2013-06-28 2018-10-23 中国电信股份有限公司 Subscriber card verifying dynamic password method and system based on Quick Response Code
CN104426659B (en) * 2013-09-02 2018-05-18 中国移动通信集团公司 Dynamic password formation method, authentication method and system, relevant device
CN103729765B (en) * 2014-01-15 2016-02-17 腾讯科技(深圳)有限公司 A kind of authentication control method, terminal, server, terminal device and system
CN103944730A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive system
CN103944910A (en) * 2014-04-25 2014-07-23 天地融科技股份有限公司 Data security interactive method
KR20160084617A (en) * 2015-01-06 2016-07-14 에스케이플래닛 주식회사 System for providing payment service using combined barcode, Apparatus and Method for providing payment service in the system
CN111800276B (en) * 2016-05-30 2022-12-23 创新先进技术有限公司 Service processing method and device
CN106878245B (en) * 2016-07-18 2020-04-24 阿里巴巴集团控股有限公司 Graphic code information providing and obtaining method, device and terminal
CN106651378A (en) * 2016-10-21 2017-05-10 北京数码视讯支付技术有限公司 Payment terminal, system and method
CN106600827A (en) * 2016-12-14 2017-04-26 上海众人网络安全技术有限公司 Selling method and system based on dynamic password transaction authentication
CN106790138A (en) * 2016-12-28 2017-05-31 山东浪潮云服务信息科技有限公司 A kind of method of government affairs cloud application User logs in double factor checking
CN107256584A (en) * 2017-08-08 2017-10-17 黎志瀛 The door lock control system that a kind of dynamic code is shown
CN112488694A (en) * 2018-09-13 2021-03-12 创新先进技术有限公司 Code scanning control method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200935313A (en) * 2007-12-04 2009-08-16 At Comm Co Ltd Two-dimentional code display system, two-dimentional code display method and a program thereof
US20120145779A1 (en) * 2009-04-08 2012-06-14 Continental Teves Ag & Co. Ohg Two-dimensional symbol code and method for reading the symbol code
CN106204864A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system based on dynamic two-dimension code and door opening method

Also Published As

Publication number Publication date
TW202011310A (en) 2020-03-16
CN109389386B (en) 2020-09-29
CN109389386A (en) 2019-02-26
CN112488694A (en) 2021-03-12
WO2020052371A1 (en) 2020-03-19

Similar Documents

Publication Publication Date Title
TWI724450B (en) Code scanning control method, device and system
TWI695290B (en) Login information processing method and equipment
CA3051025C (en) Blockchain system and data storage method and apparatus
AU2019221574B2 (en) Asset management system, method, apparatus, and electronic device
US10812477B2 (en) Blockchain-based enterprise authentication method, apparatus, and device, and blockchain-based authentication traceability method, apparatus, and device
US10474843B2 (en) Identifying stolen databases
US9495558B2 (en) Systems, methods, and computer program products for managing access control
CN111738737B (en) Method, device and equipment for generating digital property right certificate
EP3964995B1 (en) Data processing methods, apparatuses, and devices
US20200286006A1 (en) Method and apparatus for secure check-in
EP3648038A1 (en) Writing and payment method, apparatus and device for nfc portable device
JP2019501461A (en) Security verification method and device for smart card applications
US20240129288A1 (en) Privacy-protection based verification
CN113918989A (en) Method, apparatus, electronic device and medium for protecting personal privacy information of user
US20230119117A1 (en) Security for connected devices
CN116823278A (en) Event processing method and device
CN115222526A (en) Method and terminal for managing transaction times of digital currency and currency management device