WO2020140925A1 - 识别损坏二维码的方法、装置、设备以及存储介质 - Google Patents

识别损坏二维码的方法、装置、设备以及存储介质 Download PDF

Info

Publication number
WO2020140925A1
WO2020140925A1 PCT/CN2020/070019 CN2020070019W WO2020140925A1 WO 2020140925 A1 WO2020140925 A1 WO 2020140925A1 CN 2020070019 W CN2020070019 W CN 2020070019W WO 2020140925 A1 WO2020140925 A1 WO 2020140925A1
Authority
WO
WIPO (PCT)
Prior art keywords
dimensional code
damaged
information
identifying
server
Prior art date
Application number
PCT/CN2020/070019
Other languages
English (en)
French (fr)
Inventor
朱晋
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2020140925A1 publication Critical patent/WO2020140925A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/146Methods for optical code recognition the method including quality enhancement steps

Definitions

  • the present disclosure relates to (but not limited to) the technical field of two-dimensional code recognition.
  • QR Code Quality Response Code
  • Two-dimensional bar code/two-dimensional code (2-dimensional bar code) is to use a certain geometric figure according to a certain rule distributed on the plane (two-dimensional direction) of black and white graphics to record data symbol information; clever in the preparation of the code Use the concept of "0" and "1" bit streams that form the basis of the internal logic of the computer, use several geometric shapes corresponding to binary to represent text value information, and automatically read through image input equipment or photoelectric scanning equipment to achieve Automatic information processing: it has some common features of bar code technology: each code system has its specific character set; each character occupies a certain width; it has a certain check function, etc. At the same time, it also has the function of automatically recognizing different lines of information and processing the rotation points of the graphics.
  • the QR code cannot be recognized due to the destruction of the QR code or the time of the QR code is too long, so it cannot be set from the QR code picture. Do not include the information contained in it, such as common bicycle sharing, QR codes on public equipment, etc.
  • a method for identifying a damaged two-dimensional code which includes: when a mobile terminal detects that the two-dimensional code is damaged, acquiring a two-dimensional code scanning picture information including the damaged area of the two-dimensional code; After acquiring the scanned image information of the two-dimensional code, the mobile terminal prompts the user to input auxiliary identification information of the two-dimensional code, and sends the scanned image information of the two-dimensional code and the auxiliary identification information to the server; and The mobile terminal receives a two-dimensional code recognition result that the server responds to according to the two-dimensional code scanning picture information and the auxiliary identification information, and operates according to the two-dimensional code recognition result.
  • a method for identifying a damaged two-dimensional code includes: a server receiving two-dimensional code scanning picture information and auxiliary identification information sent by a mobile terminal; Scanning two-dimensional code image information and the auxiliary identification information for identification to obtain the two-dimensional code identification result; and the server sending the two-dimensional code identification result to the mobile terminal.
  • an apparatus for identifying a damaged two-dimensional code including: an acquisition module for acquiring two-dimensional code scanning picture information including a damaged area of the two-dimensional code when the damaged two-dimensional code is detected
  • the sending module is used to prompt the user to input the auxiliary identification information of the two-dimensional code after acquiring the two-dimensional code scan picture information, and send the two-dimensional code scan picture information and the auxiliary identification information to the server
  • a receiving recognition result module configured to receive a two-dimensional code recognition result that the server responds to according to the two-dimensional code scanning picture information and the auxiliary identification information, and operate according to the two-dimensional code recognition result.
  • an apparatus for identifying a damaged two-dimensional code including: a receiving module for receiving two-dimensional code scanning picture information and auxiliary identification information sent by a mobile terminal; and an identifying module for utilizing a preset two-dimensional code A code database to identify the scanned image information of the two-dimensional code and the auxiliary identification information to obtain the two-dimensional code recognition result; and a sending module to send the two-dimensional code recognition result to the mobile terminal .
  • An apparatus for identifying a damaged two-dimensional code includes: a processor, and a memory coupled to the processor, and the memory stores identification damage that can run on the processor A two-dimensional code program.
  • the processor implements the steps of the method for identifying a damaged two-dimensional code according to an embodiment of the present disclosure.
  • a computer storage medium provided according to an embodiment of the present disclosure has stored thereon a program for identifying a damaged two-dimensional code, and when the program for identifying a damaged two-dimensional code is executed by a processor, the processor is implemented according to the present disclosure
  • An example of a method of identifying a damaged two-dimensional code is described in detail below.
  • FIG. 1 is a flowchart of a method for identifying a damaged two-dimensional code according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of an apparatus for identifying a damaged two-dimensional code according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of a system for identifying a damaged two-dimensional code according to an embodiment of the present disclosure
  • FIG. 4 is a working flowchart of the client in FIG. 3 according to an embodiment of the present disclosure
  • FIG. 5 is a working flowchart of the server side in FIG. 3 according to an embodiment of the present disclosure
  • FIG. 6 is a flowchart of intelligent identification of the server side in FIG. 3 according to an embodiment of the present disclosure
  • FIG. 7 is a schematic diagram of a user who can actively click a button and trigger QR code recognition according to an embodiment of the present disclosure
  • FIG. 8 is a schematic diagram of a user touching a damaged two-dimensional code area and triggering two-dimensional code recognition in a dynamic scanning area according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of a user performing fine adjustment of a damaged area and editing of other auxiliary information uploaded after completion of marking according to an embodiment of the present disclosure.
  • FIG. 1 is a flowchart of a method for identifying a damaged two-dimensional code according to an embodiment of the present disclosure.
  • the method for identifying a damaged two-dimensional code includes steps S101 to S103.
  • step S101 when detecting that the two-dimensional code is damaged, the mobile terminal obtains the two-dimensional code scan picture information including the damaged area of the two-dimensional code.
  • step S102 after acquiring the two-dimensional code scan picture information, the mobile terminal prompts the user to input auxiliary identification information of the two-dimensional code, and sends the two-dimensional code scan picture information and the auxiliary identification information To the server.
  • step S103 the mobile terminal receives a two-dimensional code recognition result that the server responds to according to the two-dimensional code scanning picture information and the auxiliary identification information, and operates according to the two-dimensional code recognition result.
  • the auxiliary identification information includes serial numbers and/or geographic location information.
  • the step of acquiring the two-dimensional code scan picture information containing the damaged area of the two-dimensional code includes: the mobile terminal detects the two When the QR code is damaged, obtain a QR code scan picture of the QR code; and the mobile terminal receives the user's click operation on the damaged area of the QR code in the QR code scan picture to obtain Scan the image information of the QR code in the damaged area of the QR code.
  • An embodiment of the present disclosure also provides a method for identifying a damaged two-dimensional code applied to a server side, which includes: the server receives two-dimensional code scanning picture information and auxiliary identification information sent by a mobile terminal; the server uses a preset two-dimensional code The database identifies the scanned image information of the two-dimensional code and the auxiliary identification information to obtain the two-dimensional code recognition result; and the server sends the two-dimensional code recognition result to the mobile terminal.
  • the server uses a preset two-dimensional code database to identify the scanned image information of the two-dimensional code and the auxiliary identification information, and the step of obtaining the two-dimensional code recognition result includes: the server using the preset two A QR code picture database, performing first recognition on the scanned picture information of the two-dimensional code to determine whether the first recognition is successful; when it is judged that the first recognition fails, the server uses the preset auxiliary information database , Performing second identification on the auxiliary identification information to determine whether the second identification is successful; and when determining that the first identification or the second identification is successful, the server obtains the two-dimensional code identification result.
  • FIG. 2 is a schematic diagram of an apparatus for identifying a damaged two-dimensional code according to an embodiment of the present disclosure.
  • the apparatus for identifying a damaged two-dimensional code includes: an obtaining module 201, a sending module 202, and a receiving recognition result module 203.
  • the obtaining module 201 is used to obtain the scanned image information of the two-dimensional code containing the damaged area of the two-dimensional code when the two-dimensional code is damaged.
  • the sending module 202 is configured to prompt the user to input the auxiliary identification information of the two-dimensional code after acquiring the two-dimensional code scanned picture information, and send the two-dimensional code scanned picture information and the auxiliary identification information to the server.
  • the receiving recognition result module 203 is used to receive a two-dimensional code recognition result that the server responds to according to the two-dimensional code scanning picture information and the auxiliary identification information, and operate according to the two-dimensional code recognition result.
  • the auxiliary identification information includes serial numbers and/or geographic location information.
  • An embodiment of the present disclosure also provides an apparatus for identifying a damaged two-dimensional code applied to a server side, including: a receiving module for receiving two-dimensional code scanning picture information and auxiliary identification information sent by a mobile terminal; an identifying module for utilizing A preset two-dimensional code database, identifying the scanned image information and the auxiliary identification information of the two-dimensional code to obtain the two-dimensional code recognition result; and a sending module for sending the two-dimensional code recognition result To the mobile terminal.
  • a device for identifying a damaged two-dimensional code including: a processor, and a memory coupled to the processor, the memory storing identification damage that can run on the processor A two-dimensional code program.
  • the processor implements the steps of the method for identifying a damaged two-dimensional code according to an embodiment of the present disclosure.
  • a computer storage medium provided according to an embodiment of the present disclosure has stored thereon a program for identifying a damaged two-dimensional code, and when the program for identifying a damaged two-dimensional code is executed by a processor, the processor is implemented according to the present disclosure
  • An example of a method of identifying a damaged two-dimensional code is described in detail below.
  • FIG. 3 is a schematic diagram of a system for identifying a damaged two-dimensional code according to an embodiment of the present disclosure.
  • the entire system is divided into a server side and a client (for example, a mobile terminal).
  • a client for example, a mobile terminal
  • the server includes: a response module, a comprehensive intelligent identification module, a result distribution module, and a cloud database operation module.
  • the integrated intelligent identification module includes: a two-dimensional code image comparison identification module, a two-dimensional code algorithm identification module, and an auxiliary information comparison module.
  • Clients include: network information interaction module, terminal device information acquisition module, QR code scanning module, information editing module and response module.
  • the operation flow of the client includes steps 401 to 409.
  • step 401 the QR code scanning module is entered to perform the QR code scanning operation.
  • step 402 if the scanning of the QR code times out, it is asked whether to enter the damaged QR code recognition process.
  • step 403 the user actively clicks the two-dimensional code damage button, as shown in FIG. 7, or clicks the scan area to mark the damaged area, as shown in FIG. 8, to trigger the entry into the damaged two-dimensional code identification process.
  • step 404 enter the damaged two-dimensional code editing module. As shown in FIG. 9, a modification operation for marking a damaged area of the two-dimensional code can be performed.
  • step 405 the user actively inputs auxiliary information, for example, a numbered number (for example, a part number number of a shared bicycle, a table number on a dining table, etc.).
  • auxiliary information for example, a numbered number (for example, a part number number of a shared bicycle, a table number on a dining table, etc.).
  • step 406 terminal device information, such as GPS location information, is automatically acquired.
  • step 407 upload the damaged QR code information (damaged area coordinates, etc.), user input auxiliary information, and automatically acquired terminal information (GPS, etc.) to the server, request the server to perform intelligent identification, and the detailed process of intelligent identification is shown in Figure 6 Show.
  • damaged QR code information damaged area coordinates, etc.
  • user input auxiliary information user input auxiliary information
  • automatically acquired terminal information GPS, etc.
  • step 408 it waits and prompts the user to wait for the server to return the result.
  • the server return data is obtained through the network interaction module, the data is analyzed to obtain the server recognition result.
  • the result first contains success or failure flag information.
  • the success message also contains whether the unique identification is successful or there are multiple possibilities of identification. If it is unique identification, the server returns the information content represented by the current QR code (for example: unique digital number, network link address), if the server has no unique identification, There are many possibilities, the server will automatically generate the results for the user to choose (for example: if you scan the QR code to unlock the bicycle, the server can send multiple passwords to the user to let the user try to unlock).
  • step 409 UI prompts and response related instructions are performed according to the server return result.
  • the QR code is to open a webpage link
  • the corresponding webpage is opened in response to the server return result, and if the bicycle is unlocked, a subsequent unlock request action is performed.
  • the operation flow on the server side includes steps 501 to 504.
  • step 501 in response to the client's request, the uploaded information is obtained through the network interaction module.
  • step 502 the uploaded information is parsed to obtain the damaged QR code information and the specified damaged area information and auxiliary information.
  • step 503 the information is submitted to the integrated intelligent recognition module for recognition operation ( Figure 6).
  • a server response result is generated and delivered to the client.
  • the server result content is automatically generated according to the system settings and contains success and failure information. Specifically, as described in step 408, after issuing the instruction through the network interaction module, the client stops waiting and obtains the server return data to enter the parsing action flow in step 408.
  • FIG. 6 is a flowchart of intelligent identification of the server in FIG. 3 according to an embodiment of the present disclosure.
  • the intelligent identification process of the server includes steps 601 to 605.
  • step 601 the server sends the QR code picture and the damaged area information to the QR code picture comparison module.
  • step 602 the QR code picture comparison module of the server compares the QR code picture and the damaged area information with the QR code picture in the QR code picture database to determine whether the comparison is successful, and if the comparison is successful, the successful result is issued If the comparison fails, the QR code algorithm is identified.
  • step 603 the server judges whether the recognition of the two-dimensional code algorithm is successful. If the recognition is successful, the successful result is delivered. If the recognition fails, the auxiliary information is compared and recognized.
  • step 604 the server compares the auxiliary information with the auxiliary information database such as serial number and GPS history.
  • step 605 the server determines whether the comparison is successful. If the comparison is successful, the successful result is delivered. If the comparison fails, the failed result is delivered.
  • the user provides a quick operation method during the scanning of the QR code by the APP, so that the user can mark the damaged part and quickly enter the identification process of the damaged QR code, and the terminal can be input by the user or automatically obtained by the APP
  • Some auxiliary information (such as device number, current GPS position, etc.) plus damaged QR code information is uploaded to the server side.
  • the server performs comprehensive information processing and calculation based on the server cloud storage data information plus user uploaded information, and intelligently recognizes The damaged two-dimensional code and feedback the result to the user to solve the problem that the damaged two-dimensional code cannot be identified.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

一种识别损坏二维码的方法、装置、设备以及存储介质。所述方法包括:移动终端检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息(S101);所述移动终端在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器(S102);以及所述移动终端接收所述服务器根据所述二维码扫描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所述二维码识别结果进行操作(S103)。

Description

识别损坏二维码的方法、装置、设备以及存储介质 技术领域
本公开涉及(但不限于)二维码识别技术领域。
背景技术
QR Code(Quick Response Code,二维码)是一个近几年来移动设备上超流行的一种编码方式,它比传统的Bar Code条形码能存更多的信息,也能表示更多的数据类型。二维条码/二维码(2-dimensional bar code)是用某种特定的几何图形按一定规律在平面(二维方向上)分布的黑白相间的图形记录数据符号信息的;在代码编制上巧妙地利用构成计算机内部逻辑基础的“0”、“1”比特流的概念,使用若干个与二进制相对应的几何形体来表示文字数值信息,通过图象输入设备或光电扫描设备自动识读以实现信息自动处理:它具有条码技术的一些共性:每种码制有其特定的字符集;每个字符占有一定的宽度;具有一定的校验功能等。同时还具有对不同行的信息自动识别功能、及处理图形旋转变化点。
但是,用户在使用移动终端自带的摄像头扫描二维码图片时,由于二维码被破坏或是二维码时间过久,导致二维码不能识别,因此也不能从二维码图片中设别出其中包含的信息,比如常见的共享单车、公共设备上的二维码等等。
发明内容
根据本公开实施例提供一种识别损坏二维码的方法,包括:移动终端检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息;所述移动终端在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器;以及所述移动终端接收所述服务器根据所述二维码扫描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所述二维码识别结果进行操作。
根据本公开实施例提供一种识别损坏二维码的方法,包括:服务器接收移动终端发送的二维码扫描图片信息和辅助识别信息;所述服务器利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果;以及所述服务器将所述二维码识别结果发送给所述移动终端。
根据本公开实施例提供一种识别损坏二维码的装置,包括:获取模块,用于检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息;发送模块,用于在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器;以及接收识别结果模块,用于接收所述服务器根据所述二维码扫描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所述二维码识别结果进行操作。
根据本公开实施例提供一种识别损坏二维码的装置,包括:接收模块,用于接收移动终端发送的二维码扫描图片信息和辅助识别信息;识别模块,用于利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果;以及发送模块,用于将所述二维码识别结果发送给所述移动终端。
根据本公开实施例提供的一种识别损坏二维码的设备,包括:处理器,以及与所述处理器耦接的存储器,所述存储器上存储有可在所述处理器上运行的识别损坏二维码的程序,所述识别损坏二维码的程序被所述处理器执行时,所述处理器实现根据本公开实施例的识别损坏二维码的方法的步骤。
根据本公开实施例提供的一种计算机存储介质,其上存储有识别损坏二维码的程序,所述识别损坏二维码的程序被处理器执行时,使得所述处理器实现根据本公开实施例的识别损坏二维码的方法的步骤。
附图说明
此处所说明的附图用来提供对本公开的进一步理解,构成本公 开的一部分,本公开的示意性实施例及其说明用于理解本公开,并不构成对本公开的不当限定。在附图中:
图1是根据本公开实施例的识别损坏二维码的方法流程图;
图2是根据本公开实施例的识别损坏二维码的装置示意图;
图3是根据本公开实施例的识别损坏二维码的系统示意图;
图4是根据本公开实施例的图3中的客户端的工作流程图;
图5是根据本公开实施例的图3中的服务器端的工作流程图;
图6是根据本公开实施例的图3中的服务器端的智能识别流程图;
图7是根据本公开实施例的用户主动可以点击按钮并触发二维码识别的示意图;
图8是根据本公开实施例的用户在动态扫描区触摸损坏二维码区域并触发二维码识别的示意图;以及
图9是根据本公开实施例的用户在标记完成后进行损坏区域的精细调整和上传其他辅助信息编辑的示意图。
具体实施方式
以下结合附图对本公开的优选实施例进行详细说明,应当理解,以下所说明的优选实施例仅用于说明和解释本公开,并不用于限定本公开。
图1是根据本公开实施例的识别损坏二维码的方法流程图。
如图1所示,根据本公开实施例的识别损坏二维码的方法包括步骤S101至S103。
在步骤S101,移动终端检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息。
在步骤S102,所述移动终端在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器。
在步骤S103,所述移动终端接收所述服务器根据所述二维码扫描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所 述二维码识别结果进行操作。
所述辅助识别信息包括编号数字和/或地理位置信息。
所述移动终端检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息的步骤(即,步骤S101)包括:所述移动终端检测到所述二维码发生损坏时,获取所述二维码的二维码扫描图片;以及所述移动终端通过接收用户对所述二维码扫描图片中的二维码损坏区域的点击操作,获取包含所述二维码损坏区域的二维码扫描图片信息。
本公开实施例还提供一种应用于服务器侧的识别损坏二维码的方法,包括:服务器接收移动终端发送的二维码扫描图片信息和辅助识别信息;所述服务器利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果;以及所述服务器将所述二维码识别结果发送给所述移动终端。
所述服务器利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果的步骤包括:所述服务器利用预置的二维码图片数据库,对所述二维码扫描图片信息进行第一识别,判断所述第一识别是否识别成功;当判断所述第一识别失败时,则所述服务器利用预置的辅助信息数据库,对所述辅助识别信息进行第二识别,判断所述第二识别是否识别成功;以及当判断所述第一识别或所述第二识别成功时,则所述服务器得到所述二维码识别结果。
图2是根据本公开实施例的识别损坏二维码的装置示意图。
如图2所示,根据本公开实施例的识别损坏二维码的装置包括:获取模块201、发送模块202以及接收识别结果模块203。
获取模块201用于检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息。
发送模块202用于在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器。
接收识别结果模块203用于接收所述服务器根据所述二维码扫 描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所述二维码识别结果进行操作。
所述辅助识别信息包括编号数字和/或地理位置信息。
本公开实施例还提供一种应用于服务器侧的识别损坏二维码的装置,包括:接收模块,用于接收移动终端发送的二维码扫描图片信息和辅助识别信息;识别模块,用于利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果;以及发送模块,用于将所述二维码识别结果发送给所述移动终端。
根据本公开实施例还提供一种识别损坏二维码的设备,包括:处理器,以及与所述处理器耦接的存储器,所述存储器上存储有可在所述处理器上运行的识别损坏二维码的程序,所述识别损坏二维码的程序被所述处理器执行时,所述处理器实现根据本公开实施例的识别损坏二维码的方法的步骤。
根据本公开实施例提供的一种计算机存储介质,其上存储有识别损坏二维码的程序,所述识别损坏二维码的程序被处理器执行时,使得所述处理器实现根据本公开实施例的识别损坏二维码的方法的步骤。
图3是根据本公开实施例的识别损坏二维码的系统示意图。
如图3所示,整个系统分为服务器端和客户端(例如,移动终端)。
服务器端包括:响应模块、综合智能识别模块、结果下发模块以及云数据库操作模块。综合智能识别模块包括:二维码图片对比识别模块、二维码算法识别模块、辅助信息对比模块。
客户端包括:网络信息交互模块、终端设备信息获取模块、二维码扫描模块、信息编辑模块以及响应模块。
下面分别参照图4和图5来具体描述根据本公开实施例的识别损坏二维码的系统的操作流程。
如图4所示,客户端的操作流程包括步骤401至409。
在步骤401,进入二维码扫描模块,进行二维码扫描动作。
在步骤402,如果扫描二维码超时,询问是否进入损坏二维码识别流程。
在步骤403,用户主动点击二维码损坏按钮,如图7所示,或者点击扫描区域标记损坏区域,如图8所示,来触发进入损坏二维码识别流程。
在步骤404,进入损坏二维码编辑模块,如图9所示,可以进行标记二维码损坏区域的修改操作。
在步骤405,用户主动输入辅助信息,例如:编号数字(比如,共享单车的部分编号数字、餐桌上的桌号等等)。
在步骤406,自动获取终端设备信息,例如:GPS位置信息。
在步骤407,将损坏二维码信息(损坏的区域坐标等)、用户输入辅助信息和自动获取的终端信息(GPS等)一起上传服务器,要求服务器进行智能识别,智能识别详细流程如图6所示。
在步骤408,等待并提示用户正在等待服务器返回结果,当通过网络交互模块获取到服务器返回数据后,解析数据获取服务器识别结果。结果首先包含成功或者失败标志信息。然后成功信息还包含是唯一识别成功还是存在多种可能性识别,如果是唯一识别,服务器返回当前二维码表示的信息内容(例如:唯一数字编号,网络链接地址),如果服务器没有唯一识别,有多种可能性,服务器会自动的生成结果让用户进行选择(例如:如果是扫描二维码进行单车解锁,服务器可以发送多个密码给用户,让用户尝试解锁)。
在步骤409,根据服务器返回结果进行UI提示和响应相关指令。(例如:如果二维码是打开网页链接,则响应服务器返回结果打开对应网页,如果是解锁单车则进行后续解锁请求动作)。
如图5所示,服务器端的操作流程包括步骤501至504。
在步骤501,响应客户端的请求,通过网络交互模块获取上传的信息。
在步骤502,解析上传信息,获取到损坏二维码信息和指定的损坏区域信息和辅助信息。
在步骤503,将信息提交给综合智能识别模块进行识别操作(图 6)。
在步骤504,根据识别结果,生成服务器响应结果下发给客户端。服务器结果内容根据系统设置自动生成,包含成功和失败信息,具体如步骤408所述,通过网络交互模块下发指令后,客户端停止等待并获取服务器返回数据进入408步骤中解析动作流程。
图6是根据本公开实施例的图3中的服务器的智能识别流程图。
如图6所示,根据本公开实施例的服务器的智能识别流程包括步骤601至605。
在步骤601,服务器将二维码图片、损坏区域信息发送至二维码图片对比模块中。
在步骤602,服务器的二维码图片对比模块将二维码图片、损坏区域信息与二维码图片数据库中的二维码图片进行对比,判断是否对比成功,若对比成功,则下发成功结果,若对比失败,则进行二维码算法识别。
在步骤603,服务器判断二维码算法识别是否成功,若识别成功,则下发成功结果,若识别失败,则进行辅助信息对比识别。
在步骤604,服务器将辅助信息与编号、GPS历史等辅助信息数据库进行对比。
在步骤605,服务器判断是否对比成功,若对比成功,则下发成功结果,若对比失败,则下发失败结果。
根据本公开实施例提供的方案,在APP扫描二维码过程中提供用户快捷的操作方式,让用户能够标记损坏部位和快速进入损坏二维码的识别流程,并由用户输入或者APP自动获取终端的一些辅助信息(例如设备编号、当前GPS位置等)加上损坏的二维码信息,上传到服务器端由服务器根据服务器云存储数据信息加用户上传的信息进行综合信息处理运算,智能的识别出损坏的二维码并将结果反馈给用户,解决了损坏二维码无法识别的问题。
尽管上文对本公开进行了详细说明,但是本公开不限于此,本技术领域技术人员可以根据本公开的原理进行各种修改。因此,凡按照本公开原理所作的修改,都应当理解为落入本公开的保护范围。

Claims (10)

  1. 一种识别损坏二维码的方法,包括:
    移动终端检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息;
    所述移动终端在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器;以及
    所述移动终端接收所述服务器根据所述二维码扫描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所述二维码识别结果进行操作。
  2. 根据权利要求1所述的方法,其中,所述辅助识别信息包括编号数字和/或地理位置信息。
  3. 根据权利要求1所述的方法,其中,移动终端检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息的步骤包括:
    所述移动终端检测到所述二维码发生损坏时,获取所述二维码的二维码扫描图片;以及
    所述移动终端通过接收用户对所述二维码扫描图片中的二维码损坏区域的点击操作,获取包含所述二维码损坏区域的二维码扫描图片信息。
  4. 一种识别损坏二维码的方法,包括:
    服务器接收移动终端发送的二维码扫描图片信息和辅助识别信息;
    所述服务器利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果;以及
    所述服务器将所述二维码识别结果发送给所述移动终端。
  5. 根据权利要求4所述的方法,其中,所述服务器利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果的步骤包括:
    所述服务器利用预置的二维码图片数据库,对所述二维码扫描图片信息进行第一识别,判断所述第一识别是否识别成功;
    当判断所述第一识别失败时,则所述服务器利用预置的辅助信息数据库,对所述辅助识别信息进行第二识别,判断所述第二识别是否识别成功;以及
    当判断所述第一识别或所述第二识别成功时,则所述服务器得到所述二维码识别结果。
  6. 一种识别损坏二维码的装置,包括:
    获取模块,用于检测到所述二维码发生损坏时,获取包含所述二维码损坏区域的二维码扫描图片信息;
    发送模块,用于在获取所述二维码扫描图片信息后,提示用户输入所述二维码的辅助识别信息,并将所述二维码扫描图片信息和所述辅助识别信息发送给服务器;以及
    接收识别结果模块,用于接收所述服务器根据所述二维码扫描图片信息和所述辅助识别信息而响应的二维码识别结果,并根据所述二维码识别结果进行操作。
  7. 根据权利要求6所述的装置,其中,所述辅助识别信息包括编号数字和/或地理位置信息。
  8. 一种识别损坏二维码的装置,包括:
    接收模块,用于接收移动终端发送的二维码扫描图片信息和辅助识别信息;
    识别模块,用于利用预置的二维码数据库,对所述二维码扫描图片信息和所述辅助识别信息进行识别,得到所述二维码识别结果; 以及
    发送模块,用于将所述二维码识别结果发送给所述移动终端。
  9. 一种识别损坏二维码的设备,包括:处理器,以及与所述处理器耦接的存储器,所述存储器上存储有可在所述处理器上运行的识别损坏二维码的程序,所述识别损坏二维码的程序被所述处理器执行时,所述处理器实现如权利要求1至5中任一项所述的识别损坏二维码的方法的步骤。
  10. 一种计算机存储介质,其上存储有识别损坏二维码的程序,所述识别损坏二维码的程序被处理器执行时,使得所述处理器实现如权利要求1至5中任一项所述的识别损坏二维码的方法的步骤。
PCT/CN2020/070019 2019-01-02 2020-01-02 识别损坏二维码的方法、装置、设备以及存储介质 WO2020140925A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910000595.3A CN111401095A (zh) 2019-01-02 2019-01-02 一种识别损坏二维码的方法、装置、设备以及存储介质
CN201910000595.3 2019-01-02

Publications (1)

Publication Number Publication Date
WO2020140925A1 true WO2020140925A1 (zh) 2020-07-09

Family

ID=71407257

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/070019 WO2020140925A1 (zh) 2019-01-02 2020-01-02 识别损坏二维码的方法、装置、设备以及存储介质

Country Status (2)

Country Link
CN (1) CN111401095A (zh)
WO (1) WO2020140925A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022060396A1 (en) * 2020-09-21 2022-03-24 Google Llc System and method providing for self-healing visual codes

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112508211B (zh) * 2020-12-18 2023-01-31 上海钧正网络科技有限公司 一种信息码缺失的车辆识别方法及装置、上报方法及装置、电子设备及存储介质
CN113011540A (zh) * 2021-03-01 2021-06-22 北京骑胜科技有限公司 识别方法、装置、可读存储介质和电子设备
CN114330404A (zh) * 2021-12-28 2022-04-12 易唯思智能自动化装备无锡有限公司 二维码刻印效果验证方法、系统及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727594A (zh) * 2009-11-26 2010-06-09 南京烽火星空通信发展有限公司 一种服务端辅助的移动终端条码识别方法与系统
US20120241516A1 (en) * 2011-03-22 2012-09-27 Christopher Rainer Zuleeg Zulu numbers for object identification and enhancement
CN106022183A (zh) * 2015-08-11 2016-10-12 上海畅星软件有限公司 维保电梯的识别方法
CN107452148A (zh) * 2017-07-27 2017-12-08 广州市智专信息科技有限公司 一种移动终端开启自行车的方法、相应的单车运营平台及自行车
CN107590994A (zh) * 2017-10-10 2018-01-16 余多明 基于具有可编码标记物的公共自行车停车桩的工作方法
CN107644186A (zh) * 2017-10-24 2018-01-30 河南科技大学 一种基于计算全息的破损二维码识别方法
CN109615734A (zh) * 2018-11-16 2019-04-12 连尚(新昌)网络科技有限公司 一种用于解锁车辆设备的方法与设备

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727594A (zh) * 2009-11-26 2010-06-09 南京烽火星空通信发展有限公司 一种服务端辅助的移动终端条码识别方法与系统
US20120241516A1 (en) * 2011-03-22 2012-09-27 Christopher Rainer Zuleeg Zulu numbers for object identification and enhancement
CN106022183A (zh) * 2015-08-11 2016-10-12 上海畅星软件有限公司 维保电梯的识别方法
CN107452148A (zh) * 2017-07-27 2017-12-08 广州市智专信息科技有限公司 一种移动终端开启自行车的方法、相应的单车运营平台及自行车
CN107590994A (zh) * 2017-10-10 2018-01-16 余多明 基于具有可编码标记物的公共自行车停车桩的工作方法
CN107644186A (zh) * 2017-10-24 2018-01-30 河南科技大学 一种基于计算全息的破损二维码识别方法
CN109615734A (zh) * 2018-11-16 2019-04-12 连尚(新昌)网络科技有限公司 一种用于解锁车辆设备的方法与设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022060396A1 (en) * 2020-09-21 2022-03-24 Google Llc System and method providing for self-healing visual codes

Also Published As

Publication number Publication date
CN111401095A (zh) 2020-07-10

Similar Documents

Publication Publication Date Title
WO2020140925A1 (zh) 识别损坏二维码的方法、装置、设备以及存储介质
US10748054B2 (en) Two-dimensional code information query method, server, client, and system
US11381556B2 (en) Method and device for information interaction and association between human biological feature data and account
WO2019134245A1 (zh) 基于人脸识别的排号方法、服务器及存储介质
US7991778B2 (en) Triggering actions with captured input in a mixed media environment
US7672543B2 (en) Triggering applications based on a captured text in a mixed media environment
US7920759B2 (en) Triggering applications for distributed action execution and use of mixed media recognition as a control input
US8600989B2 (en) Method and system for image matching in a mixed media environment
EP2814212B1 (en) Method and apparatus for adding friend, and storage medium
WO2019223177A1 (zh) 电子签名认证方法、系统、计算机设备和存储介质
US20150012988A1 (en) Authentication method and authentication system
US20130037608A1 (en) Method and process for symbolic mark decoding
WO2013004036A1 (zh) 结合文字识别和图像匹配的名片识别方法
US9117130B2 (en) Information obtaining method and apparatus
JP2016143165A (ja) 情報処理装置、方法およびプログラム
US20180205851A1 (en) Information analysis system and information analysis method
TWI676111B (zh) 業務過程的啟動方法和裝置
WO2019144756A1 (zh) 验证短信的处理方法及系统
US20210089737A1 (en) Service process starting method and apparatus
CN107862364B (zh) 一种明码与密码相结合的个体识别标识的生成方法及系统
CN111769969A (zh) 基于二维码的终端配置方法、装置和计算机设备
US20110154483A1 (en) Electronic device with password protection function and method thereof
US11442982B2 (en) Method and system for acquiring data files of blocks of land and of building plans and for making matches thereof
US7333658B2 (en) Data verification using text messaging
JP4757225B2 (ja) 名刺情報管理プログラム、名刺情報管理装置、および名刺情報管理方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20736110

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12.11.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 20736110

Country of ref document: EP

Kind code of ref document: A1